0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (84)
  • R500+ (1,895)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Basic Prediction Techniques in Modern Video Coding Standards (Paperback, 1st ed. 2016): Byung-gyu Kim, Kalyan Goswami Basic Prediction Techniques in Modern Video Coding Standards (Paperback, 1st ed. 2016)
Byung-gyu Kim, Kalyan Goswami
R1,603 Discovery Miles 16 030 Ships in 18 - 22 working days

This book discusses in detail the basic algorithms of video compression that are widely used in modern video codec. The authors dissect complicated specifications and present material in a way that gets readers quickly up to speed by describing video compression algorithms succinctly, without going to the mathematical details and technical specifications. For accelerated learning, hybrid codec structure, inter- and intra- prediction techniques in MPEG-4, H.264/AVC, and HEVC are discussed together. In addition, the latest research in the fast encoder design for the HEVC and H.264/AVC is also included.

Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Jung Hee Cheon, Tsuyoshi Takagi
R2,860 Discovery Miles 28 600 Ships in 18 - 22 working days

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.

A Life in Code - Pioneer Cryptanalyst Elizebeth Smith Friedman (Paperback): G. Stuart Smith A Life in Code - Pioneer Cryptanalyst Elizebeth Smith Friedman (Paperback)
G. Stuart Smith
R906 R672 Discovery Miles 6 720 Save R234 (26%) Ships in 10 - 15 working days

Protesters called it an act of war when the U.S. Coast Guard sank a Canadian-flagged vessel in the Gulf of Mexico in 1929. It took a cool-headed codebreaker solving a ""trunk-full"" of smugglers' encrypted messages to get Uncle Sam out of the mess: Elizebeth Smith Friedman's groundbreaking work helped prove the boat was owned by American gangsters. This book traces the career of a legendary U.S. law enforcement agent, from her work for the Allies during World War I through Prohibition, when she faced danger from mobsters while testifying in high profile trials. Friedman founded the cryptanalysis unit that provided evidence against American rum runners and Chinese drug smugglers. During World War II, her decryptions brought a Japanese spy to justice and her Coast Guard unit solved the Enigma ciphers of German spies. Friedman's ""all source intelligence"" model is still used by law enforcement and counterterrorism agencies against 21st century threats.

Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19,... Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings (Paperback, 1st ed. 2016)
Benedikt Gierlichs, Axel Y. Poschmann
R3,116 Discovery Miles 31 160 Ships in 18 - 22 working days

This book constitutes the proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2016, held in Santa Barbara, CA, USA, in August 2016. The 30 full papers presented in this volume were carefully reviewed and selected from 148 submissions. They were organized in topical sections named: side channel analysis; automotive security; invasive attacks; side channel countermeasures; new directions; software implementations; cache attacks; physical unclonable functions; hardware implementations; and fault attacks.

Evolution of Semantic Systems (Paperback, 2013 ed.): Bernd-Olaf Kuppers, Udo Hahn, Stefan Artmann Evolution of Semantic Systems (Paperback, 2013 ed.)
Bernd-Olaf Kuppers, Udo Hahn, Stefan Artmann
R3,250 Discovery Miles 32 500 Ships in 18 - 22 working days

Complex systems in nature and society make use of information for the development of their internal organization and the control of their functional mechanisms. Alongside technical aspects of storing, transmitting and processing information, the various semantic aspects of information, such as meaning, sense, reference and function, play a decisive part in the analysis of such systems. With the aim of fostering a better understanding of semantic systems from an evolutionary and multidisciplinary perspective, this volume collects contributions by philosophers and natural scientists, linguists, information and computer scientists. They do not follow a single research paradigm; rather they shed, in a complementary way, new light upon some of the most important aspects of the evolution of semantic systems. Evolution of Semantic Systems is intended for researchers in philosophy, computer science, and the natural sciences who work on the analysis or development of semantic systems, ontologies, or similar complex information structures. In the eleven chapters, they will find a broad discussion of topics ranging from underlying universal principles to representation and processing aspects to paradigmatic examples.

Introduction to the Theory of Quantum Information Processing (Paperback, 2013 ed.): Janos A. Bergou, Mark Hillery Introduction to the Theory of Quantum Information Processing (Paperback, 2013 ed.)
Janos A. Bergou, Mark Hillery
R2,246 Discovery Miles 22 460 Ships in 18 - 22 working days

Introduction to the Theory of Quantum Information Processing provides the material for a one-semester graduate level course on quantum information theory and quantum computing for students who have had a one-year graduate course in quantum mechanics. Many standard subjects are treated, such as density matrices, entanglement, quantum maps, quantum cryptography, and quantum codes. Also included are discussions of quantum machines and quantum walks. In addition, the book provides detailed treatments of several underlying fundamental principles of quantum theory, such as quantum measurements, the no-cloning and no-signaling theorems, and their consequences. Problems of various levels of difficulty supplement the text, with the most challenging problems bringing the reader to the forefront of active research. This book provides a compact introduction to the fascinating and rapidly evolving interdisciplinary field of quantum information theory, and it prepares the reader for doing active research in this area.

Scalable Information Systems - 5th International Conference, INFOSCALE 2014, Seoul, South Korea, September 25-26, 2014, Revised... Scalable Information Systems - 5th International Conference, INFOSCALE 2014, Seoul, South Korea, September 25-26, 2014, Revised Selected Papers (Paperback, 2015 ed.)
Jason J. Jung, Costin Badica, Attila Kiss
R1,451 Discovery Miles 14 510 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Scalable Information Systems, INFOSCALE 2014, held in September 2014 in Seoul, South Korea. The 9 revised full papers presented were carefully reviewed and selected from 14 submissions. The papers cover a wide range of topics such as scalable data analysis and big data applications.

Guide to Wireless Network Security (Paperback, Softcover reprint of the original 1st ed. 2006): John R Vacca Guide to Wireless Network Security (Paperback, Softcover reprint of the original 1st ed. 2006)
John R Vacca
R4,225 Discovery Miles 42 250 Ships in 18 - 22 working days

A major, comprehensive professional text/reference for designing and maintaining security and reliability. From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. Includes coverage of wireless security testing techniques and prevention techniques for intrusion (attacks). An essential resource for wireless network administrators and developers.

Digital Watermarking Techniques in Curvelet and Ridgelet Domain (Paperback, 1st ed. 2016): Channapragada Rama Seshagiri Rao,... Digital Watermarking Techniques in Curvelet and Ridgelet Domain (Paperback, 1st ed. 2016)
Channapragada Rama Seshagiri Rao, Munaga V. N. K. Prasad
R1,656 Discovery Miles 16 560 Ships in 18 - 22 working days

This book describes the design, development, and testing of a novel digital watermarking technique for color images using Magic Square and Ridgelet transforms. The novel feature of the method is that it generates and uses multiple copies of the digital watermark. The book describes how the method was tested for embedding digital watermarks into color cover images, resulting in very high PSNR value and yielding comparable results with existing watermarking techniques.To reach this new method, eight different techniques are designed, developed and tested. First, the authors test two digital watermarking techniques based on encryption: Image Watermark Using Complete Complementary Code Technique (CCCT) and Image Watermarking Using CCC-Fast Walsh Hadamard Transform Technique (CCC-FWHTT). Next, four digital watermarking techniques based on curvelet transforms are discussed: Image Watermarking Using Curvelet Transform (WCT), Watermark Wavelets in Curvelets of Cover Image (WWCT), Resized Watermark into Curvelets of Cover Image (RWCT), and Resized Watermark Wavelets into Curvelets of Cover Image (RWWCT). Then, two final techniques are presented: Image Watermarking Based on Magic Square (MST) and Image watermarking based on Magic Square and Ridgelet Transform (MSRTT). Future research directions are explored in the final chapter.Designed for professionals and researchers in computer graphics and imaging, Digital Watermarking Techniques in Curvelet and Ridgelet Domain is also a useful tool for advanced-level students.

Elements of Cloud Computing Security - A Survey of Key Practicalities (Paperback, 1st ed. 2016): Mohammed M. Alani Elements of Cloud Computing Security - A Survey of Key Practicalities (Paperback, 1st ed. 2016)
Mohammed M. Alani
R1,539 Discovery Miles 15 390 Ships in 18 - 22 working days

This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on different levels, including attacks on the hypervisor, and on the confidentiality of data. Newer types, such as side-channel attacks and resource-freeing attacks, are also described. The work closes by providing a set of general security recommendations for the cloud.

Applications and Techniques in Information Security - 6th International Conference, ATIS 2015, Beijing, China, November 4-6,... Applications and Techniques in Information Security - 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings (Paperback, 1st ed. 2015)
Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, …
R2,460 Discovery Miles 24 600 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.

Classification Algorithms for Codes and Designs (Paperback, 2006 ed.): Petteri Kaski, Patric R.J. OEstergard Classification Algorithms for Codes and Designs (Paperback, 2006 ed.)
Petteri Kaski, Patric R.J. OEstergard
R3,142 Discovery Miles 31 420 Ships in 18 - 22 working days

A new starting-point and a new method are requisite, to insure a complete [classi?cation of the Steiner triple systems of order 15]. This method was furnished, and its tedious and di?cult execution und- taken, by Mr. Cole. F. N. Cole, L. D. Cummings, and H. S. White (1917) [129] The history of classifying combinatorial objects is as old as the history of the objects themselves. In the mid-19th century, Kirkman, Steiner, and others became the fathers of modern combinatorics, and their work - on various objects, including (what became later known as) Steiner triple systems - led to several classi?cation results. Almost a century earlier, in 1782, Euler [180] published some results on classifying small Latin squares, but for the ?rst few steps in this direction one should actually go at least as far back as ancient Greece and the proof that there are exactly ?ve Platonic solids. One of the most remarkable achievements in the early, pre-computer era is the classi?cation of the Steiner triple systems of order 15, quoted above. An onerous task that, today, no sensible person would attempt by hand calcu- tion. Because, with the exception of occasional parameters for which com- natorial arguments are e?ective (often to prove nonexistence or uniqueness), classi?cation in general is about algorithms and computation.

Probability, Random Processes, and Ergodic Properties (Paperback, 2nd ed. 2009): Robert M. Gray Probability, Random Processes, and Ergodic Properties (Paperback, 2nd ed. 2009)
Robert M. Gray
R4,255 Discovery Miles 42 550 Ships in 18 - 22 working days

Probability, Random Processes, and Ergodic Properties is for mathematically inclined information/communication theorists and people working in signal processing. It will also interest those working with random or stochastic processes, including mathematicians, statisticians, and economists. Highlights: Complete tour of book and guidelines for use given in Introduction, so readers can see at a glance the topics of interest. Structures mathematics for an engineering audience, with emphasis on engineering applications. New in the Second Edition: Much of the material has been rearranged and revised for pedagogical reasons. The original first chapter has been split in order to allow a more thorough treatment of basic probability before tackling random processes and dynamical systems. The final chapter has been broken into two pieces to provide separate emphasis on process metrics and the ergodic decomposition of affine functionals. Many classic inequalities are now incorporated into the text, along with proofs; and many citations have been added.

Information Processing and Security Systems (Paperback, 2005 ed.): Khalid Saeed, Jerzy Pejas Information Processing and Security Systems (Paperback, 2005 ed.)
Khalid Saeed, Jerzy Pejas
R5,195 Discovery Miles 51 950 Ships in 18 - 22 working days

Information Processing and Security Systems is a collection of forty papers that were originally presented at an international multi-conference on Advanced Computer Systems (ACS) and Computer Information Systems and Industrial Management Applications (CISIM) held in Elk, Poland. This volume describes the latest developments in advanced computer systems and their applications within artificial intelligence, biometrics and information technology security. The volume also includes contributions on computational methods, algorithms and applications, computational science, education and industrial management applications.

Collaborative Networks for a Sustainable World - 11th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2010, St.... Collaborative Networks for a Sustainable World - 11th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2010, St. Etienne, France, October 11-13, 2010, Proceedings (Paperback, 2010 ed.)
Luis M. Camarinha-Matos, Xavier Boucher, Hamideh Afsarmanesh
R2,790 Discovery Miles 27 900 Ships in 18 - 22 working days

Collaborative Networks for a Sustainable World Aiming to reach a sustainable world calls for a wider collaboration among multiple stakeholders from different origins, as the changes needed for sustainability exceed the capacity and capability of any individual actor. In recent years there has been a growing awareness both in the political sphere and in civil society including the bu- ness sectors, on the importance of sustainability. Therefore, this is an important and timely research issue, not only in terms of systems design but also as an effort to b- row and integrate contributions from different disciplines when designing and/or g- erning those systems. The discipline of collaborative networks especially, which has already emerged in many application sectors, shall play a key role in the implemen- tion of effective sustainability strategies. PRO-VE 2010 focused on sharing knowledge and experiences as well as identi- ing directions for further research and development in this area. The conference - dressed models, infrastructures, support tools, and governance principles developed for collaborative networks, as important resources to support multi-stakeholder s- tainable developments. Furthermore, the challenges of this theme open new research directions for CNs. PRO-VE 2010 held in St.

Advances in Cryptology -- ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology -- ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I (Paperback, 2014 ed.)
Palash Sarkar, Tetsu Iwata
R2,936 Discovery Miles 29 360 Ships in 18 - 22 working days

The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.

Advances in Cryptology -- ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology -- ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II (Paperback, 2014 ed.)
Palash Sarkar, Tetsu Iwata
R2,819 Discovery Miles 28 190 Ships in 18 - 22 working days

The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.

Information Theory and Coding by Example (Hardcover, New): Mark Kelbert, Yuri Suhov Information Theory and Coding by Example (Hardcover, New)
Mark Kelbert, Yuri Suhov
R4,292 Discovery Miles 42 920 Ships in 10 - 15 working days

This fundamental monograph introduces both the probabilistic and algebraic aspects of information theory and coding. It has evolved from the authors' years of experience teaching at the undergraduate level, including several Cambridge Maths Tripos courses. The book provides relevant background material, a wide range of worked examples and clear solutions to problems from real exam papers. It is a valuable teaching aid for undergraduate and graduate students, or for researchers and engineers who want to grasp the basic principles.

Channel Estimation for Physical Layer Network Coding Systems (Paperback, 2014 ed.): Feifei Gao, Chengwen Xing, Gongpu Wang Channel Estimation for Physical Layer Network Coding Systems (Paperback, 2014 ed.)
Feifei Gao, Chengwen Xing, Gongpu Wang
R1,603 Discovery Miles 16 030 Ships in 18 - 22 working days

This SpringerBrief presents channel estimation strategies for the physical later network coding (PLNC) systems. Along with a review of PLNC architectures, this brief examines new challenges brought by the special structure of bi-directional two-hop transmissions that are different from the traditional point-to-point systems and unidirectional relay systems. The authors discuss the channel estimation strategies over typical fading scenarios, including frequency flat fading, frequency selective fading and time selective fading, as well as future research directions. Chapters explore the performance of the channel estimation strategy and optimal structure of training sequences for each scenario. Besides the analysis of channel estimation strategies, the book also points out the necessity of revisiting other signal processing issues for the PLNC system. Channel Estimation of Physical Layer Network Coding Systems is a valuable resource for researchers and professionals working in wireless communications and networks. Advanced-level students studying computer science and electrical engineering will also find the content helpful.

Cooperative Communications and Networking - Technologies and System Design (Paperback, 2010 ed.): Y -W Peter Hong, Wan-Jen... Cooperative Communications and Networking - Technologies and System Design (Paperback, 2010 ed.)
Y -W Peter Hong, Wan-Jen Huang, C.-C.Jay Kuo
R4,046 Discovery Miles 40 460 Ships in 18 - 22 working days

Cooperative and relay communications have recently become the most widely explored topics in communications, whereby users cooperate in transmitting their messages to the destination, instead of conventional networks which operate independently and compete among each other for channel resources. As the field has progressed, cooperative communications have become a design concept rather than a specific transmission technology. This concept has revolutionized the design of wireless networks, allowing increased coverage, throughput, and transmission reliability even as conventional transmission techniques gradually reach their limits. Cooperative and relay technologies have also made their way toward next generation wireless standards, such as IEEE802.16 (WiMAX) or LTE, and have been incorporated into many modern wireless applications, such as cognitive radio and secret communications. Cooperative Communications and Networking: Technologies and System Design provides a systematic introduction to the fundamental concepts of cooperative communications and relays technology to enable engineers, researchers or graduate students to conduct advanced research and development in this area. Cooperative Communications and Networking: Technologies and System Design provides researchers, graduate students, and practical engineers with sufficient knowledge of both the background of cooperative communications and networking, and potential research directions.

Sequences and Their Applications - SETA 2014 - 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014,... Sequences and Their Applications - SETA 2014 - 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings (Paperback, 2014 ed.)
Kai Uwe Schmidt, Arne Winterhof
R2,227 Discovery Miles 22 270 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Conference on Sequences and Their Applications, SETA 2014, held in Melbourne, VIC, Australia, in November 2014. The 24 full papers presented together with 2 invited papers were carefully reviewed and selected from 36 submissions. The papers have been organized in topical sections on Boolean functions, perfect sequences, correlation of arrays, relative difference sets, aperiodic correlation, pseudorandom sequences and stream ciphers, crosscorrelation of sequences, prime numbers in sequences, OFDM and CDMA, and frequency-hopping sequences.

Impacts and Risk Assessment of Technology for Internet Security - Enabled Information Small-Medium Enterprises (TEISMES)... Impacts and Risk Assessment of Technology for Internet Security - Enabled Information Small-Medium Enterprises (TEISMES) (Paperback, 2005 ed.)
Charles A. Shoniregun
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Details the key impacts and risk assessment within the context of technology-enabled information (TEI). This volume is designed as a secondary text for graduate students, and also for a professional audience of researchers and practitioners in industry.

Advances in Image and Graphics Technologies - Chinese Conference, IGTA 2014, Beijing, China, June 19-20, 2014. Proceedings... Advances in Image and Graphics Technologies - Chinese Conference, IGTA 2014, Beijing, China, June 19-20, 2014. Proceedings (Paperback, 2014 ed.)
Tieniu Tan, Qiuqi Ruan, Shengjin Wang, Huimin Ma, Kaiqi Huang
R2,344 Discovery Miles 23 440 Ships in 18 - 22 working days

This book constitutes the referred proceedings of the 8th China Conference on Image and Graphics Technologies and Applications, IGTA 2014, held in Beijing, China, in June 2014. The 39 papers presented were carefully reviewed and selected from 110 submissions. They cover various aspects of research in image processing and graphics and related topics, including object detection, pattern recognition, object tracking, classification, image segmentation, reconstruction, etc.

Identity-Based Encryption (Paperback, 2011 ed.): Sanjit Chatterjee, Palash Sarkar Identity-Based Encryption (Paperback, 2011 ed.)
Sanjit Chatterjee, Palash Sarkar
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Identity-Based Encryption a useful book. Practitioners and engineers who work with real-world IBE schemes and need a proper understanding of the basic IBE techniques, will also find this book a valuable asset.

Platform Embedded Security Technology Revealed - Safeguarding the Future of Computing with Intel Embedded Security and... Platform Embedded Security Technology Revealed - Safeguarding the Future of Computing with Intel Embedded Security and Management Engine (Paperback, 1st ed.)
Xiaoyu Ruan
R1,706 Discovery Miles 17 060 Ships in 18 - 22 working days

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications' secrets and users' privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine. Intel's security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users' security experience, and how third-party vendors can make use of it. It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel's security and management engine. It's also written for advanced users who are interested in understanding how the security features of Intel's platforms work.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Computer & Internet Security - A…
Wenliang Du Hardcover R1,874 Discovery Miles 18 740
Real Life Cryptology - Ciphers and…
Benedek Lang Hardcover R3,336 Discovery Miles 33 360
Performances of Peace: Utrecht 1713
Renger Bruin, Cornelis Haven, … Hardcover R4,705 Discovery Miles 47 050
Improving Image Quality in Visual…
Bin Yan, Yong Xiang, … Hardcover R2,653 Discovery Miles 26 530
Providing Sound Foundations for…
Oded Goldreich Hardcover R3,016 Discovery Miles 30 160
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Computational Information Geometry - For…
Frank Nielsen, Frank Critchley, … Hardcover R5,036 Discovery Miles 50 360
Introduction to Bitcoin
David Ricardo Hardcover R756 Discovery Miles 7 560
Recent Advances in Multimedia Signal…
Mislav Grgic, Kresimir Delac, … Hardcover R4,131 Discovery Miles 41 310
Technical Articles about the Voynich…
National Security Agency Hardcover R697 Discovery Miles 6 970

 

Partners