0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (15)
  • R250 - R500 (86)
  • R500+ (1,946)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

CompTIA A+(r) Certification All-in-One For Dummies (r), 5th Edition (Paperback, 5th Edition): Ge Clarke CompTIA A+(r) Certification All-in-One For Dummies (r), 5th Edition (Paperback, 5th Edition)
Ge Clarke
R1,039 R960 Discovery Miles 9 600 Save R79 (8%) Ships in 12 - 19 working days

Fully updated to cover the 2019 exam release! CompTIA's A+ certification is an essential certification to building a successful IT career. Test takers must pass both 90-question exams to be certified, and this book--plus online test bank--will help you reach your certification goal. The 9 minibooks map to the exam's objectives, and include new content on Windows 10, Scripting, Linux, and mobile devices. You'll learn about how computers work, networking, computer repair and troubleshooting, security, permissions, and customer service. You'll also find test-taking advice and a review of the types of questions you'll see on the exam. Use the online test bank to test your knowledge and prepare for the exam Get up to speed on operating system basics Find out how to manage the operating system Discover maintenance and troubleshooting tips Inside is all the knowledge you need to pass the new A+ exam!

Security and Privacy in Digital Economy - First International Conference, SPDE 2020, Quzhou, China, October 30 - November 1,... Security and Privacy in Digital Economy - First International Conference, SPDE 2020, Quzhou, China, October 30 - November 1, 2020, Proceedings (Paperback, 1st ed. 2020)
Shui Yu, Peter Mueller, Jiangbo Qian
R3,013 Discovery Miles 30 130 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First International Conference on Security and Privacy in Digital Economy, SPDE 2020, held in Quzhou, China, in October 2020*. The 49 revised full papers and 2 short papers were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections: cyberspace security, privacy protection, anomaly and intrusion detection, trust computation and forensics, attacks and countermeasures, covert communication, security protocol, anonymous communication, security and privacy from social science. *The conference was held virtually due to the COVID-19 pandemic.

Steganography Techniques for Digital Images (Paperback, Softcover reprint of the original 1st ed. 2019): Abid Yahya Steganography Techniques for Digital Images (Paperback, Softcover reprint of the original 1st ed. 2019)
Abid Yahya
R3,365 Discovery Miles 33 650 Ships in 10 - 15 working days

This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding. Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption; Provides a variety of methods to achieve characteristic region Steganography synchronization; Shows how Steganography improves upon cryptography by using obscurity features.

Cognitive Cities - Second International Conference, IC3 2019, Kyoto, Japan, September 3-6, 2019, Revised Selected Papers... Cognitive Cities - Second International Conference, IC3 2019, Kyoto, Japan, September 3-6, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Jian Shen, Yao-Chung Chang, Yu-Sheng Su, Hiroaki Ogata
R3,008 Discovery Miles 30 080 Ships in 10 - 15 working days

This book constitutes refereed proceeding of the Second International Cognitive Cities Conference, IC3 2019, held in Kyoto, Japan, in September 2019. The 37 full papers and 46 short papers were thoroughly reviewed and selected from 206 submissions. The papers are organized according to the topical sections on cognitive city for special needs; cognitive city theory, modeling and simulation; XR and educational innovations for cognitive city; educational technology and strategy in cognitive city; safety, security and privacy in cognitive city; artificial intelligence theory and technology related to cognitive city; Internet of Things for cognitive city; business application and management for cognitive city; big data for cognitive city; engineering technology and applied science for cognitive city; maker, CT and STEAM education for cognitive city.

Implementing Effective Code Reviews - How to Build and Maintain Clean Code (Paperback, 1st ed.): Giuliana Carullo Implementing Effective Code Reviews - How to Build and Maintain Clean Code (Paperback, 1st ed.)
Giuliana Carullo
R1,619 R1,317 Discovery Miles 13 170 Save R302 (19%) Ships in 10 - 15 working days

The ideal code review process differs from organization to organization, but the needs all boil down to the same foundational factors. A software development team cannot properly grow if its code reviews are not consistent, straightforward, and aspire to hit several company goals at once, such as security, performance, longevity, and more. Implementing Effective Code Reviews is the manual your team has been seeking. Author Giuliana Carullo uses her expert background to guide you through the basics of building and maintaining clean code, and she is known for distilling complex concepts into entertaining and easy-to-grasp lessons. Healthy code requires incremental improvements, and knowing how to execute this is essential for conducting effective reviews on your team. While complex and fancy code can be interesting to work with, it will not always achieve business goals or solve urgent problems. Good coding practices are at the heart of a high-performing team, and Carullo instills these core values in a simple, straight-forward way in Implementing Effective Code Reviews. Whether you are a passionate programmer looking to go the extra mile at the office, or an experienced software engineer seeking a guide to how to improve your leadership and code review process, this book covers it all. With each chapter wrapped up in a handy checklist of crucial takeaways, Carullo has created an essential handbook for coders everywhere. There are a lot of myths that dominate the programming landscape, and Implementing Effective Code Reviews grounds the process and gets to the heart of the matter. What You Will Learn Understand how to work with your team to implement effective code reviews Master good programming practices that will build healthy code Discover how you should tackle different complex areas during code review like, security and performance Who This Book Is For Passionate programmers willing to go the extra mile to be better at their jobs, new programmers looking to strengthen their programming skills, and experienced software engineers looking for a quick guide on how to review code

Blockchain, Big Data and Machine Learning - Trends and Applications (Hardcover): Neeraj Kumar, N. Gayathri, B. Balamurugan, Md... Blockchain, Big Data and Machine Learning - Trends and Applications (Hardcover)
Neeraj Kumar, N. Gayathri, B. Balamurugan, Md Arafatur Rahman
R4,483 Discovery Miles 44 830 Ships in 12 - 19 working days

Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and experimental case studies related to real-time environment are covered as well. Aimed at Senior undergraduate students, researchers and professionals in computer science and engineering and electrical engineering, this book: Converges Blockchain, Big Data and Machine learning in one volume. Connects Blockchain technologies with the data centric applications such Big data and E-Health. Easy to understand examples on how to create your own blockchain supported by case studies of blockchain in different industries. Covers big data analytics examples using R. Includes lllustrative examples in python for blockchain creation.

Design, User Experience, and Usability. Design for Contemporary Interactive Environments - 9th International Conference, DUXU... Design, User Experience, and Usability. Design for Contemporary Interactive Environments - 9th International Conference, DUXU 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19-24, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Aaron Marcus, Elizabeth Rosenzweig
R1,657 Discovery Miles 16 570 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Conference on Design, User Experience, and Usability, DUXU 2020, held as part of the 22nd International Conference on Human-Computer Interaction, HCII 2020, in Copenhagen, Denmark, in July 2020. The conference was held virtually due to the COVID-19 pandemic. From a total of 6326 submissions, a total of 1439 papers and 238 posters has been accepted for publication in the HCII 2020 proceedings. The 50 papers included in this volume were organized in topical sections on interactions in intelligent and IoT environments, usability aspects of handheld and mobile devices, designing games and immersive experiences, and UX studies in automotive and transport.

Progress in Cryptology - LATINCRYPT 2017 - 5th International Conference on Cryptology and Information Security in Latin... Progress in Cryptology - LATINCRYPT 2017 - 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20-22, 2017, Revised Selected Papers (Paperback, 1st ed. 2019)
Tanja Lange, Orr Dunkelman
R2,053 Discovery Miles 20 530 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 5th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2017, held in Havana, Cuba, in September 2017. The 20 papers presented were carefully reviewed and selected from 64 submissions. They are organized in the following topical sections: security protocols; public-key implementation; cryptanalysis; theory of symmetric-key cryptography; multiparty computation and privacy; new constructions; and adversarial cryptography.

Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019,... Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part IV (Paperback, 1st ed. 2019)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,632 Discovery Miles 16 320 Ships in 10 - 15 working days

The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.

Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019,... Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part III (Paperback, 1st ed. 2019)
Xingming Sun, Zhaoqing Pan, Elisa Bertino
R1,634 Discovery Miles 16 340 Ships in 10 - 15 working days

The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.

Distributed Applications and Interoperable Systems - 19th IFIP WG 6.1 International Conference, DAIS 2019, Held as Part of the... Distributed Applications and Interoperable Systems - 19th IFIP WG 6.1 International Conference, DAIS 2019, Held as Part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019, Kongens Lyngby, Denmark, June 17-21, 2019, Proceedings (Paperback, 1st ed. 2019)
Jose Pereira, Laura Ricci
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the proceedings of the 19th IFIP International Conference on Distributed Applications and Interoperable Systems, DAIS 2019, held in Kongens Lyngby, Denmark, in June 2019, as part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019. The 9 full papers presented together with 2 short papers were carefully reviewed and selected from 28 submissions. The papers addressed challenges in multiple application areas, such as the Internet-of-Things, cloud and edge computing, and mobile systems. Some papers focused on middleware for managing concurrency and consistency in distributed systems, including data replication and transactions.

Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019,... Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings (Paperback, 1st ed. 2019)
Julian Jang-Jaccard, Fuchun Guo
R2,747 Discovery Miles 27 470 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 24th Australasian Conference on Information Security and Privacy, ACISP 2019, held in Christchurch, New Zealand, in July 2019. The 32 revised full papers and 8 short papers presented were carefully revised and selected from 129 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as encryption; post-quantum security; cryptocurrency related; foundations; system and network security; and symmetric cryptography.

Services Computing - SCC 2019 - 16th International Conference, Held as Part of the Services Conference Federation, SCF 2019,... Services Computing - SCC 2019 - 16th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25-30, 2019, Proceedings (Paperback, 1st ed. 2019)
Joao Eduardo Ferreira, Aibek Musaev, Liang-Jie Zhang
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This volume constitutes the proceedings of the 16th International Conference on Services Computing 2019, held as Part of SCF 2019 in San Diego, CA, USA in June 2019. The 9 full papers presented in this volume were carefully reviewed and selected from 15 submissions. They cover topics such as: foundations of services computing; scientific workflows; business process integration and management; microservices; modeling of services systems; service security and privacy; SOA service applications; and service lifecycle management.

Network Coding and Subspace Designs (Paperback, Softcover reprint of the original 1st ed. 2018): Marcus Greferath, Mario Osvin... Network Coding and Subspace Designs (Paperback, Softcover reprint of the original 1st ed. 2018)
Marcus Greferath, Mario Osvin Pavcevic, Natalia Silberstein, Maria Angeles Vazquez-Castro
R2,921 Discovery Miles 29 210 Ships in 10 - 15 working days

This book, written by experts from universities and major research laboratories, addresses the hot topic of network coding, a powerful scheme for information transmission in networks that yields near-optimal throughput. It introduces readers to this striking new approach to network coding, in which the network is not simply viewed as a mechanism for delivering packets, but rather an algebraic structure named the subspace, which these packets span. This leads to a new kind of coding theory, employing what are called subspace codes. The book presents selected, highly relevant advanced research output on: Subspace Codes and Rank Metric Codes; Finite Geometries and Subspace Designs; Application of Network Coding; Codes for Distributed Storage Systems. The outcomes reflect research conducted within the framework of the European COST Action IC1104: Random Network Coding and Designs over GF(q). Taken together, they offer communications engineers, R&D engineers, researchers and graduate students in Mathematics, Computer Science, and Electrical Engineering a comprehensive reference guide to the construction of optimal network codes, as well as efficient encoding and decoding schemes for a given network code.

The Future of Identity in the Information Society - 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno,... The Future of Identity in the Information Society - 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers (Hardcover, 2009 ed.)
Vashek Matyas, Simone Fischer-Hubner, Daniel Cvrcek, Petr Svenda
R2,904 Discovery Miles 29 040 Ships in 10 - 15 working days

What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity m- agement and to build up collegial relationships with others. As such, the Summer Schools have been introducing participants to the social implications of information technology through the process of informed discussion. The 4th International Summer School took place in Brno, Czech Republic, during September 1-7, 2008. It was organized by IFIP (International Federation for Infor- tion Processing) working groups 9.2 (Social Accountability), 9.6/11.7 (IT Misuse and the Law) and 11.6 (Identity Management) in cooperation with the EU FP6 Network of Excellence FIDIS and Masaryk University in Brno. The focus of the event was on security and privacy issues in the Internet environment, and aspects of identity m- agement in relation to current and future technologies in a variety of contexts.

Algebraic Informatics - 8th International Conference, CAI 2019, Nis, Serbia, June 30-July 4, 2019, Proceedings (Paperback, 1st... Algebraic Informatics - 8th International Conference, CAI 2019, Nis, Serbia, June 30-July 4, 2019, Proceedings (Paperback, 1st ed. 2019)
Miroslav Ciric, Manfred Droste, Jean-Eric Pin
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Algebraic Informatics, CAI 2019, held in Nis, Serbia, in June/July 2019. The 20 revised papers presented were carefully reviewed and selected from 35 submissions. The papers present research at the intersection of theoretical computer science, algebra, and related areas. They report original unpublished research and cover a broad range of topics from automata theory and logic, cryptography and coding theory, computer algebra, design theory, natural and quantum computation, and related areas.

Cyber Security Cryptography and Machine Learning - Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27-28,... Cyber Security Cryptography and Machine Learning - Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings (Paperback, 1st ed. 2019)
Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung
R2,028 Discovery Miles 20 280 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019. The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.

Quantum Theory: Informational Foundations and Foils (Paperback, Softcover reprint of the original 1st ed. 2016): Giulio... Quantum Theory: Informational Foundations and Foils (Paperback, Softcover reprint of the original 1st ed. 2016)
Giulio Chiribella, Robert W. Spekkens
R4,173 Discovery Miles 41 730 Ships in 10 - 15 working days

This book provides the first unified overview of the burgeoning research area at the interface between Quantum Foundations and Quantum Information. Topics include: operational alternatives to quantum theory, information-theoretic reconstructions of the quantum formalism, mathematical frameworks for operational theories, and device-independent features of the set of quantum correlations. Powered by the injection of fresh ideas from the field of Quantum Information and Computation, the foundations of Quantum Mechanics are in the midst of a renaissance. The last two decades have seen an explosion of new results and research directions, attracting broad interest in the scientific community. The variety and number of different approaches, however, makes it challenging for a newcomer to obtain a big picture of the field and of its high-level goals. Here, fourteen original contributions from leading experts in the field cover some of the most promising research directions that have emerged in the new wave of quantum foundations. The book is directed at researchers in physics, computer science, and mathematics and would be appropriate as the basis of a graduate course in Quantum Foundations.

Information Theory for Electrical Engineers (Paperback, Softcover reprint of the original 1st ed. 2018): Orhangazi Information Theory for Electrical Engineers (Paperback, Softcover reprint of the original 1st ed. 2018)
Orhangazi
R2,382 Discovery Miles 23 820 Ships in 10 - 15 working days

This book explains the fundamental concepts of information theory, so as to help students better understand modern communication technologies. It was especially written for electrical and communication engineers working on communication subjects. The book especially focuses on the understandability of the topics, and accordingly uses simple and detailed mathematics, together with a wealth of solved examples. The book consists of four chapters, the first of which explains the entropy and mutual information concept for discrete random variables. Chapter 2 introduces the concepts of entropy and mutual information for continuous random variables, along with the channel capacity. In turn, Chapter 3 is devoted to the typical sequences and data compression. One of Shannon's most important discoveries is the channel coding theorem, and it is critical for electrical and communication engineers to fully comprehend the theorem. As such, Chapter 4 solely focuses on it. To gain the most from the book, readers should have a fundamental grasp of probability and random variables; otherwise, they will find it nearly impossible to understand the topics discussed.

Fault Tolerant Architectures for Cryptography and Hardware Security (Paperback, Softcover reprint of the original 1st ed.... Fault Tolerant Architectures for Cryptography and Hardware Security (Paperback, Softcover reprint of the original 1st ed. 2018)
Sikhar Patranabis, Debdeep Mukhopadhyay
R4,102 Discovery Miles 41 020 Ships in 10 - 15 working days

This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.

Secure Networked Inference with Unreliable Data Sources (Paperback, Softcover reprint of the original 1st ed. 2018): Aditya... Secure Networked Inference with Unreliable Data Sources (Paperback, Softcover reprint of the original 1st ed. 2018)
Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference.

Locally Relevant ICT Research - 10th International Development Informatics Association Conference, IDIA 2018, Tshwane, South... Locally Relevant ICT Research - 10th International Development Informatics Association Conference, IDIA 2018, Tshwane, South Africa, August 23-24, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Kirstin Krauss, Marita Turpin, Filistea Naude
R1,536 Discovery Miles 15 360 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Development Informatics Association Conference, IDIA 2018, held in Tshwane, South Africa, in August 2018. The 20 revised full papers presented were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections on ICT adoption and impact; mobile education; e-education; community development; design; innovation and maturity; data.

Information Systems Security and Privacy - 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January... Information Systems Security and Privacy - 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Paolo Mori, Steven Furnell, Olivier Camp
R1,528 Discovery Miles 15 280 Ships in 10 - 15 working days

This book constitutes the revised selected papers of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018. The 15 full papers presented were carefully reviewed and selected from a total of 71 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; information systems security and privacy; authentication, privacy and security models; data mining and knowledge discovery; phishing; security architecture and design analysis; security testing; vulnerability analysis and countermeasures; web applications and services.

Trusted Computing and Information Security - 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised... Trusted Computing and Information Security - 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Huanguo Zhang, Bo Zhao, Fei Yan
R1,559 Discovery Miles 15 590 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2018, held in Wuhan, China, in October 2018. The 24 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, and network security.

Blockchain - ICBC 2019 - Second International Conference, Held as Part of the Services Conference Federation, SCF 2019, San... Blockchain - ICBC 2019 - Second International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25-30, 2019, Proceedings (Paperback, 1st ed. 2019)
James Joshi, Surya Nepal, Q.I. Zhang, Liang-Jie Zhang
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Conference on Blockchain, ICBC 2019, held as part of the Services Conference Federation, SCF 2019, in San Diego, CA, USA, in June 2019. The 13 full papers and 2 short papers presented were carefully reviewed and selected from 29 submissions. The papers cover a wide range of topics in blockchain technologies, platforms, solutions and business models such as new blockchain architecture, platform constructions, blockchain development and blockchain services technologies, as well as standards, and blockchain services innovation lifecycle including enterprise modeling, business consulting, solution creation, services orchestration, services optimization, services management, services marketing, business process integration and management.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Adaptive Mechanics
V. y. Tertychny-Dauri Hardcover R2,999 Discovery Miles 29 990
Handbook of Reinforcement Learning and…
Kyriakos G. Vamvoudakis, Yan Wan, … Hardcover R6,510 Discovery Miles 65 100
Biomedical Diagnostics and Clinical…
Manuela Pereira, Mario Freire Hardcover R6,675 Discovery Miles 66 750
Geospatial Web Services - Advances in…
Peisheng Zhao Hardcover R5,057 Discovery Miles 50 570
Virtual Nonlinear Multibody Systems
Werner Schiehlen, Michael Valasek Hardcover R2,954 Discovery Miles 29 540
Intelligent Systems and Networks…
Duc-Tan Tran, Gwanggil Jeon, … Hardcover R5,730 Discovery Miles 57 300
Reinforcement Learning From Scratch…
Uwe Lorenz Hardcover R2,385 Discovery Miles 23 850
Functional Statistics and Applications…
Elias Ould Said, Idir Ouassou, … Hardcover R5,140 R3,471 Discovery Miles 34 710
Programming with TensorFlow - Solution…
Kolla Bhanu Prakash, G. R. Kanagachidambaresan Hardcover R2,862 Discovery Miles 28 620
The Supply of Concepts
Irving Silverman Hardcover R2,219 Discovery Miles 22 190

 

Partners