0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (15)
  • R250 - R500 (87)
  • R500+ (1,946)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Intrusion Detection - A Data Mining Approach (Paperback, 1st ed. 2020): Nandita Sengupta, Jaya Sil Intrusion Detection - A Data Mining Approach (Paperback, 1st ed. 2020)
Nandita Sengupta, Jaya Sil
R4,348 Discovery Miles 43 480 Ships in 10 - 15 working days

This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncertainty involved in the detection of traffic anomaly to secure data resources from possible attack. Genetic algorithms make it possible to optimally select the network traffic parameters to reduce the risk of network intrusion. The book is unique in terms of its content, organization, and writing style. Primarily intended for graduate electrical and computer engineering students, it is also useful for doctoral students pursuing research in intrusion detection and practitioners interested in network security and administration. The book covers a wide range of applications, from general computer security to server, network, and cloud security.

Secure Knowledge Management In Artificial Intelligence Era - 8th International Conference, SKM 2019, Goa, India, December... Secure Knowledge Management In Artificial Intelligence Era - 8th International Conference, SKM 2019, Goa, India, December 21-22, 2019, Proceedings (Paperback, 1st ed. 2020)
Sanjay K. Sahay, Nihita Goel, Vishwas Patil, Murtuza Jadliwala
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference On Secure Knowledge Management In Artificial Intelligence Era, SKM 2019, held in Goa, India, in December 2019. The 12 full papers presented were carefully reviewed and selected from 34 submissions. They were organized according to the following topical sections: cyber security; security and artifcial intelligence; access control models; and social networks.

Information and Cyber Security - 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019,... Information and Cyber Security - 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings (Paperback, 1st ed. 2020)
Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISSA 2019, held in Johannesburg, South Africa, in August 2019. The 12 revised full papers presented were carefully reviewed and selected from 35 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.

Digital Forensics and Watermarking - 18th International Workshop, IWDW 2019, Chengdu, China, November 2-4, 2019, Revised... Digital Forensics and Watermarking - 18th International Workshop, IWDW 2019, Chengdu, China, November 2-4, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Hongxia Wang, Xianfeng Zhao, Yun Qing Shi, Hyoung Joong Kim, Alessandro Piva
R2,180 Discovery Miles 21 800 Ships in 10 - 15 working days

The 22 full papers and 12 shorts papers presented in this volume were carefully reviewed and selected from 70 submissions. The contributions are covering the following topics: deep learning for multimedia security; digital forensics and anti-forensics; digital watermarking; information hiding; steganography and steganalysis; authentication and security.

Big Data Analytics - 8th International Conference, BDA 2020, Sonepat, India, December 15-18, 2020, Proceedings (Paperback, 1st... Big Data Analytics - 8th International Conference, BDA 2020, Sonepat, India, December 15-18, 2020, Proceedings (Paperback, 1st ed. 2020)
Ladjel Bellatreche, Vikram Goyal, Hamido Fujita, Anirban Mondal, P. Krishna Reddy
R1,540 Discovery Miles 15 400 Ships in 10 - 15 working days

This book constitutes the proceedings of the 8th International Conference on Big Data Analytics, BDA 2020, which took place during December 15-18, 2020, in Sonepat, India. The 11 full and 3 short papers included in this volume were carefully reviewed and selected from 48 submissions; the book also contains 4 invited and 3 tutorial papers. The contributions were organized in topical sections named as follows: data science systems; data science architectures; big data analytics in healthcare; information interchange of Web data resources; and business analytics.

Security and Privacy in New Computing Environments - Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August... Security and Privacy in New Computing Environments - Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings (Paperback, 1st ed. 2021)
Ding Wang, Weizhi Meng, Jinguang Han
R1,574 Discovery Miles 15 740 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually. The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.

Applied Technologies - First International Conference, ICAT 2019, Quito, Ecuador, December 3-5, 2019, Proceedings, Part I... Applied Technologies - First International Conference, ICAT 2019, Quito, Ecuador, December 3-5, 2019, Proceedings, Part I (Paperback, 1st ed. 2020)
Miguel Botto-Tobar, Marcelo Zambrano Vizuete, Pablo Torres-Carrion, Sergio Montes Leon, Guillermo Pizarro Vasquez, …
R1,590 Discovery Miles 15 900 Ships in 10 - 15 working days

This first volume of the three-volume set (CCIS 1193, CCIS 1194, and CCIS 1195) constitutes the refereed proceedings of the First International Conference on Applied Technologies, ICAT 2019, held in Quito, Ecuador, in December 2019. The 124 full papers were carefully reviewed and selected from 328 submissions. The papers are organized according to the following topics: technology trends; computing; intelligent systems; machine vision; security; communication; electronics; e-learning; e-government; e-participation.

Advances in Computational Intelligence, Security and Internet of Things - Second International Conference, ICCISIoT 2019,... Advances in Computational Intelligence, Security and Internet of Things - Second International Conference, ICCISIoT 2019, Agartala, India, December 13-14, 2019, Proceedings (Paperback, 1st ed. 2020)
Ashim Saha, Nirmalya Kar, Suman Deb
R1,578 Discovery Miles 15 780 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the Second International Conference on Computational Intelligence, Security and Internet of Things, ICCISIoT 2019, held in Agartala, India, in December 2019. The 31 full papers and 6 short papers were carefully reviewed and selected from 153 submissions. The papers are organised according to the following topics: Computational Intelligence, Security, Internet of Things. Papers from the extended track are also presented in the volume.

Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18,... Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Ioana Boureanu, Constantin Catalin Dragan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, …
R1,540 Discovery Miles 15 400 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy, DETIPS 2020; the First International Workshop on Dependability and Safety of Emerging Cloud and Fog Systems, DeSECSys 2020; Third International Workshop on Multimedia Privacy and Security, MPS 2020; and the Second Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2020; held in Guildford, UK, in September 2020, in conjunction with the 25th European Symposium on Research in Computer Security, ESORICS 2020. A total of 42 papers was submitted. For the DETIPS Workshop 8 regular papers were selected for presentation. Topics of interest address various aspect of the core areas in relation to digital economy. For the DeSECSys Workshop 4 regular papers are included. The workshop had the objective of fostering collaboration and discussion among cyber-security researchers and practitioners to discuss the various facets and trade-o s of cyber security. In particular, applications, opportunities and possible shortcomings of novel security technologies and their integration in emerging application domains. For the MPS Workshop 4 regular papers are presented which cover topics related to the security and privacy of multimedia systems of Internet-based video conferencing systems (e.g., Zoom, Microsoft Teams, Google Meet), online chatrooms (e.g., Slack), as well as other services to support telework capabilities. For the SPOSE Workshop 3 full papers were accepted for publication. They reflect the discussion, exchange, and development of ideas and questions regarding the design and engineering of technical security and privacy mechanisms with particular reference to organizational contexts.

Research and the Future of Telematics - 20th International Conference on Transport Systems Telematics, TST 2020, Krakow,... Research and the Future of Telematics - 20th International Conference on Transport Systems Telematics, TST 2020, Krakow, Poland, October 27-30, 2020, Selected Papers (Paperback, 1st ed. 2020)
Jerzy Mikulski
R1,577 Discovery Miles 15 770 Ships in 10 - 15 working days

This book constitutes selected papers from the 20th International Conference on Transport Systems Telematics, TST 2020, held in Krakow, Poland, in October 2020. The 34 full papers presented in this volume were carefully reviewed and selected from 97 submissions. They were organized in topical sections named: telematics in road transport - general view; telematics in road transport - details in applications.- telematics in rail and marine transport; general about telematics.

Blockchain Technology and Application - Second CCF China Blockchain Conference, CBCC 2019, Chengdu, China, October 11-13, 2019,... Blockchain Technology and Application - Second CCF China Blockchain Conference, CBCC 2019, Chengdu, China, October 11-13, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Xueming Si, Hai Jin, Yi Sun, Jianming Zhu, Liehuang Zhu, …
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second CCF China Blockchain Conference, CBCC 2019, held in Chengdu, China, in October 2019. The 16 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers deal with research results and development activities in all aspects of blockchain science and technology.

Trusted Computing and Information Security - 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24-27, 2019, Revised... Trusted Computing and Information Security - 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24-27, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Weili Han, Liehuang Zhu, Fei Yan
R1,543 Discovery Miles 15 430 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2019, held in Shanghai, China, in October 2019. The 22 revised full papers presented were carefully reviewed and selected from 247 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, network security, information hiding.

Large-Scale Scientific Computing - 12th International Conference, LSSC 2019, Sozopol, Bulgaria, June 10-14, 2019, Revised... Large-Scale Scientific Computing - 12th International Conference, LSSC 2019, Sozopol, Bulgaria, June 10-14, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Ivan Lirkov, Svetozar Margenov
R1,627 Discovery Miles 16 270 Ships in 10 - 15 working days

This book constitutes revised papers from the 12th International Conference on Large-Scale Scientific Computing, LSSC 2019, held in Sozopol, Bulgaria, in June 2019. The 70 papers presented in this volume were carefully reviewed and selected from 81 submissions. The book also contains two invited talks. The papers were organized in topical sections named as follows: control and optimization of dynamical systems; meshfree and particle methods; fractional diffusion problems: numerical methods, algorithms and applications; pore scale flow and transport simulation; tensors based algorithms and structures in optimization and applications; HPC and big data: algorithms and applications; large-scale models: numerical methods, parallel computations and applications; monte carlo algorithms: innovative applications in conjunctions with other methods; application of metaheuristics to large-scale problems; large scale machine learning: multiscale algorithms and performance guarantees; and contributed papers.

Smart Card Research and Advanced Applications - 18th International Conference, CARDIS 2019, Prague, Czech Republic, November... Smart Card Research and Advanced Applications - 18th International Conference, CARDIS 2019, Prague, Czech Republic, November 11-13, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Sonia Belaid, Tim Guneysu
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Smart Card Research and Advanced Applications, CARDIS 2019, held in Prague, Czech Republic, in November 2019. The 15 revised full papers presented in this book were carefully reviewed and selected from 31 submissions. The papers are organized in the following topical sections: system-on-a-chip security; post-quantum cryptography; side-channel analysis; microarchitectural attacks; cryptographic primitives; advances in side-channel analysis. CARDIS has provided a space for security experts from industry and academia to exchange on security of smart cards and related applications.

Services Computing - SCC 2020 - 17th International Conference, Held as Part of the Services Conference Federation, SCF 2020,... Services Computing - SCC 2020 - 17th International Conference, Held as Part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18-20, 2020, Proceedings (Paperback, 1st ed. 2020)
Qingyang Wang, Yunni Xia, Sangeetha Seshadri, Liang-Jie Zhang
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This volume constitutes the proceedings of the 17th International Conference on Services Computing 2020, held as Part of SCF 2020 in Honolulu, HI, USA in September 2020.. The 8 full papers and 2 short papers presented in this volume were carefully reviewed and selected from 20 submissions. They cover topics such as: foundations of services computing; scientific workflows; business process integration and management; microservices; modeling of services systems; service security and privacy; SOA service applications; and service lifecycle management.

Information Security Applications - 21st International Conference, WISA 2020, Jeju Island, South Korea, August 26-28, 2020,... Information Security Applications - 21st International Conference, WISA 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Ilsun You
R1,562 Discovery Miles 15 620 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, WISA 2020, held in Jeju Island, South Korea, in August 2020. The 30 full research papers included in this book were carefully reviewed and selected from 89 submissions. They are organized in the following topical sections: AI Security and Intrusion Detection; Steganography and Malware; Application, System, and Hardware Security; Cryptography; Advances in Network Security and Attack Defense; and Cyber Security.

Trends in Computational Intelligence, Security and Internet of Things - Third International Conference, ICCISIoT 2020, Tripura,... Trends in Computational Intelligence, Security and Internet of Things - Third International Conference, ICCISIoT 2020, Tripura, India, December 29-30, 2020, Proceedings (Paperback, 1st ed. 2020)
Nirmalya Kar, Ashim Saha, Suman Deb
R1,536 Discovery Miles 15 360 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the Third International Conference on Computational Intelligence, Security and Internet of Things, ICCISIoT 2020, held in Agartala, India, in December 2020. Due to the COVID-19 pandemic the conference was held online. The 23 full papers and 4 short papers were carefully reviewed and selected from 113 submissions. The papers are organised according to the following topics: computational intelligence, security, and internet of things.

Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings... Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings (Paperback, 1st ed. 2020)
Salil Kanhere, Vishwas T Patil, Shamik Sural, Manoj S Gaur
R2,264 Discovery Miles 22 640 Ships in 10 - 15 working days

This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held in Jammu, India, during December 16-20, 2020.The 11 regular papers, 2 short papers and 3 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 53 submissions. The papers were organized in topical sections named: access control; AI/ML in security; privacy and Web security; cryptography; and systems security.

Security and Cryptography for Networks - 12th International Conference, SCN 2020, Amalfi, Italy, September 14-16, 2020,... Security and Cryptography for Networks - 12th International Conference, SCN 2020, Amalfi, Italy, September 14-16, 2020, Proceedings (Paperback, 1st ed. 2020)
Clemente Galdi, Vladimir Kolesnikov
R2,994 Discovery Miles 29 940 Ships in 10 - 15 working days

This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN 2020, held in Amalfi, Italy, in September 2020*.The 33 papers presented in this volume were carefully reviewed and selected from 87 submissions. They are organized in topical sections on blockchain; multiparty computation; oblivious RAM; primitives and constructions; signatures, encryption, and algebraic constructions; symmetric crypto; theory and lower bounds ; zero-knowledge. *The conference was held virtually due to the COVID-19 pandemic.

Topics in Cryptology - CT-RSA 2020 - The Cryptographers' Track at the RSA Conference 2020, San Francisco, CA, USA,... Topics in Cryptology - CT-RSA 2020 - The Cryptographers' Track at the RSA Conference 2020, San Francisco, CA, USA, February 24-28, 2020, Proceedings (Paperback, 1st ed. 2020)
Stanislaw Jarecki
R1,642 Discovery Miles 16 420 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2020, CT-RSA 2020, held in San Francisco, CA, USA, in February 2020. The 28 papers presented in this volume were carefully reviewed and selected from 95 submissions. CT-RSA is the track devoted to scientific papers on cryptography, public-key to symmetric-key cryptography and from crypto-graphic protocols to primitives and their implementation security.

Cryptology and Network Security - 19th International Conference, CANS 2020, Vienna, Austria, December 14-16, 2020, Proceedings... Cryptology and Network Security - 19th International Conference, CANS 2020, Vienna, Austria, December 14-16, 2020, Proceedings (Paperback, 1st ed. 2020)
Stephan Krenn, Haya Shulman, Serge Vaudenay
R2,977 Discovery Miles 29 770 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS 2020, held in Vienna, Austria, in December 2020.*The 30 full papers were carefully reviewed and selected from 118 submissions. The papers focus on topics such as cybersecurity; credentials; elliptic curves; payment systems; privacy-enhancing tools; lightweight cryptography; and codes and lattices. *The conference was held virtually due to the COVID-19 pandemic.

Codes and turbo codes (Paperback, 2010 ed.): Claude Berrou Codes and turbo codes (Paperback, 2010 ed.)
Claude Berrou
R2,920 Discovery Miles 29 200 Ships in 10 - 15 working days

What is commonly called the information age began with a double big bang. It was 1948 and the United States of America was continuing to invest heavily in high-tech research, the ?rst advantages of which had been reaped during the Second World War. In the Bell Telephone Laboratories, set up in New Jersey, to the south of New York, several teams were set up around brilliant researchers, manyofwhomhadbeentrainedatMIT(MassachusettsInstituteofTechnology). Thatyeartwoexceptionaldiscoveriesweremade, onetechnologicalandtheother theoretical, which were to mark the 20th century. For, a few months apart, and in the same institution John Bardeen, Walter Brattain and William Shockley invented the transistor while Claude Elwood Shannon established information and digital communications theory. This phenomenal coincidence saw the birth ofnear-twins: thesemi-conductorcomponentwhich, accordingtoits conduction state (on or o?), is able to materially represent binary information ("0" or "1") andtheShannon orbit (shortforbinaryunit), a unit that measuresinformation capacity. Today we can recognize the full importance of these two inventions that - abledthe tremendousexpansionofcomputing andtelecommunications, to name but these two. Since 1948, the meteoric progress of electronics, then of mic- electronics, has providedengineers and researchersin the world of telecommu- cations with a support for their innovations, in order to continually increase the performanceof their systems.

Electronic Government - 19th IFIP WG 8.5 International Conference, EGOV 2020, Linkoeping, Sweden, August 31 - September 2,... Electronic Government - 19th IFIP WG 8.5 International Conference, EGOV 2020, Linkoeping, Sweden, August 31 - September 2, 2020, Proceedings (Paperback, 1st ed. 2020)
Gabriela Viale Pereira, Marijn Janssen, Habin Lee, Ida Lindgren, Manuel Pedro Rodriguez-Bolivar, …
R3,405 Discovery Miles 34 050 Ships in 10 - 15 working days

This book constitutes the proceedings of the 19th IFIP WG 8.5 International Conference on Electronic Government, EGOV 2020, held in Linkoeping, Sweden, in August/September 2020, in conjunction with the IFIP WG 8.5 IFIP International Conference on Electronic Participation (ePart 2020) and the International Conference for E-Democracy and Open Government Conference (CeDEM 2020). The conference was held virtually due to the COVID-19 pandemic. The 30 full papers presented were carefully reviewed and selected from 118 submissions. The papers are clustered under the following topical sections: e-government foundations; e-government services and open government; open data: social and technical aspects; AI, data analytics, and automated decision making; and smart cities.

Learn Blockchain by Building One - A Concise Path to Understanding Cryptocurrencies (Paperback, 1st ed.): Daniel Van Flymen Learn Blockchain by Building One - A Concise Path to Understanding Cryptocurrencies (Paperback, 1st ed.)
Daniel Van Flymen
R1,073 R907 Discovery Miles 9 070 Save R166 (15%) Ships in 10 - 15 working days

As cryptocurrencies and their underlying data structure, blockchains, become further intertwined in our daily lives, a full understanding of them is essential to anyone who wants to keep up and remain informed of the future of finance. There is no better learning method than a hands-on one, and Learn Blockchain by Building One offers just that. Develop your own blockchain using Python with step-by-step instructions from author Daniel van Flymen, an expert in the field. You will come away with a confident working knowledge of popular cryptocurrencies such as Bitcoin and Ethereum and which foundations make them work. Through helpful exercises and real-world examples, you will understand the core concepts of peer-to-peer networking, proof of work, hashing, encryption, and digital signatures. Learn Blockchain by Building One gives you timely, real-world lessons in blockchain and cryptocurrencies that you will need as our modern society becomes increasingly digitally sophisticated. The lasting implications of such technology, including the security of personal transactions and the role of government regulation, are not to be underestimated. Stay ahead of the curve and become a confident blockchain builder now! What You Will Learn Develop a fully-fledged blockchain in Python Obtain a ground-up understanding of of Proof of Work Grasp core cryptographic concepts, such as hashing, encryption, and digital signatures Understand how gossip protocols and peer-to-peer networking works by implementing a TCP client-server Realize the differences and trade-offs between popular blockchains such as Bitcoin and Ethereum Who This Book Is For This book is aimed at intermediate programmers in any area from finance to academia. Readers should be comfortable reading and writing basic Python.

Advanced Communication Systems and Information Security - Second International Conference, ACOSIS 2019, Marrakesh, Morocco,... Advanced Communication Systems and Information Security - Second International Conference, ACOSIS 2019, Marrakesh, Morocco, November 20-22, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Mostafa Belkasmi, Jalel Ben-Othman, Cheng Li, Mohamed Essaaidi
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes selected papers of the Second International Conference on Advanced Communication Systems and Information Security, ACOSIS 2019, held in Marrakesh, Morocco, in November 2019. The 10 full papers and 10 short papers were thoroughly reviewed and selected from 94 submissions. The papers are organized accroding to the following topical sections: wireless communications and services; vehicular communications; channel coding; construction of error correcting codes; intrusion detection techniques; wireless and mobile network security; applied cryptography.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,551 Discovery Miles 25 510
Security and Privacy - Select…
Pantelimon Stanica, Sugata Gangopadhyay, … Hardcover R2,874 Discovery Miles 28 740
Alice and Bob Learn Application Security
T Janca Paperback R1,084 R924 Discovery Miles 9 240
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R819 Discovery Miles 8 190
Improving Image Quality in Visual…
Bin Yan, Yong Xiang, … Hardcover R2,873 Discovery Miles 28 730
TLS Mastery
Michael W Lucas Hardcover R970 R875 Discovery Miles 8 750
Introduction to Bitcoin
David Ricardo Hardcover R799 Discovery Miles 7 990
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R539 Discovery Miles 5 390
Technical Articles about the Voynich…
National Security Agency Hardcover R630 Discovery Miles 6 300
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R673 Discovery Miles 6 730

 

Partners