0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (84)
  • R500+ (1,905)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Certification and Security in Inter-Organizational E-Services - IFIP 18th World Computer Congress, August 22-27, 2004,... Certification and Security in Inter-Organizational E-Services - IFIP 18th World Computer Congress, August 22-27, 2004, Toulouse, France (Paperback, 2005 ed.)
Enrico Nardelli, Maurizio Talamo
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Certification and Security in Inter-Organizational E-Services presents the proceedings of CSES 2004 - the 2nd International Workshop on Certification and Security in Inter-Organizational E-Services held within IFIP WCC in August 2004 in Toulouse, France. Certification and security share a common technological basis in the reliable and efficient monitoring of executed and running processes; they likewise depend on the same fundamental organizational and economic principles. As the range of services managed and accessed through communication networks grows throughout society, and given the legal value that is often attached to data treated or exchanged, it is critical to be able to certify the network transactions and ensure that the integrity of the involved computer-based systems is maintained. This collection of papers documents several important developments, and offers real-life application experiences, research results and methodological proposals of direct interest to systems experts and users in governmental, industrial and academic communities.

Sequences and Their Applications - SETA 2014 - 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014,... Sequences and Their Applications - SETA 2014 - 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings (Paperback, 2014 ed.)
Kai Uwe Schmidt, Arne Winterhof
R2,227 Discovery Miles 22 270 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Conference on Sequences and Their Applications, SETA 2014, held in Melbourne, VIC, Australia, in November 2014. The 24 full papers presented together with 2 invited papers were carefully reviewed and selected from 36 submissions. The papers have been organized in topical sections on Boolean functions, perfect sequences, correlation of arrays, relative difference sets, aperiodic correlation, pseudorandom sequences and stream ciphers, crosscorrelation of sequences, prime numbers in sequences, OFDM and CDMA, and frequency-hopping sequences.

ThinkQuest 2010 - Proceedings of the First International Conference on Contours of Computing Technology (Paperback, 2011 ed.):... ThinkQuest 2010 - Proceedings of the First International Conference on Contours of Computing Technology (Paperback, 2011 ed.)
S. J. Pise
R3,835 Discovery Miles 38 350 Ships in 18 - 22 working days

This proceedings is a representation of decades of reasearch, teaching and application in the field. Image Processing, Fusion and Information Technology areas, Digital radio Communication, Wimax, Electrical engg, VLSI approach to processor design, embedded systems design are dealt in detail through models and illustrative techniques.

Collaborative Networks for a Sustainable World - 11th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2010, St.... Collaborative Networks for a Sustainable World - 11th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2010, St. Etienne, France, October 11-13, 2010, Proceedings (Paperback, 2010 ed.)
Luis M. Camarinha-Matos, Xavier Boucher, Hamideh Afsarmanesh
R2,790 Discovery Miles 27 900 Ships in 18 - 22 working days

Collaborative Networks for a Sustainable World Aiming to reach a sustainable world calls for a wider collaboration among multiple stakeholders from different origins, as the changes needed for sustainability exceed the capacity and capability of any individual actor. In recent years there has been a growing awareness both in the political sphere and in civil society including the bu- ness sectors, on the importance of sustainability. Therefore, this is an important and timely research issue, not only in terms of systems design but also as an effort to b- row and integrate contributions from different disciplines when designing and/or g- erning those systems. The discipline of collaborative networks especially, which has already emerged in many application sectors, shall play a key role in the implemen- tion of effective sustainability strategies. PRO-VE 2010 focused on sharing knowledge and experiences as well as identi- ing directions for further research and development in this area. The conference - dressed models, infrastructures, support tools, and governance principles developed for collaborative networks, as important resources to support multi-stakeholder s- tainable developments. Furthermore, the challenges of this theme open new research directions for CNs. PRO-VE 2010 held in St.

Advances in Image and Graphics Technologies - Chinese Conference, IGTA 2014, Beijing, China, June 19-20, 2014. Proceedings... Advances in Image and Graphics Technologies - Chinese Conference, IGTA 2014, Beijing, China, June 19-20, 2014. Proceedings (Paperback, 2014 ed.)
Tieniu Tan, Qiuqi Ruan, Shengjin Wang, Huimin Ma, Kaiqi Huang
R2,344 Discovery Miles 23 440 Ships in 18 - 22 working days

This book constitutes the referred proceedings of the 8th China Conference on Image and Graphics Technologies and Applications, IGTA 2014, held in Beijing, China, in June 2014. The 39 papers presented were carefully reviewed and selected from 110 submissions. They cover various aspects of research in image processing and graphics and related topics, including object detection, pattern recognition, object tracking, classification, image segmentation, reconstruction, etc.

Identity-Based Encryption (Paperback, 2011 ed.): Sanjit Chatterjee, Palash Sarkar Identity-Based Encryption (Paperback, 2011 ed.)
Sanjit Chatterjee, Palash Sarkar
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find Identity-Based Encryption a useful book. Practitioners and engineers who work with real-world IBE schemes and need a proper understanding of the basic IBE techniques, will also find this book a valuable asset.

Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014.... Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings (Paperback, 2014 ed.)
Michel Abdalla, Roberto De Prisco
R3,031 Discovery Miles 30 310 Ships in 18 - 22 working days

This book constitutes the proceedings of the 9th International Conference on Security and Cryptography, SCN 2014, held in Amalfi, Italy, in September 2014. The 31 papers presented in this volume were carefully reviewed and selected from 95 submissions. They are organized in topical sections on key exchange; multilinear maps and obfuscation; pseudorandom function extensions; secure computation - foundations and algorithms; network security; functional encryption; cryptanalysis; secure computation - implementation; zero knowledge; message authentication; proofs of space and erasure; public-key encryption.

Digital Signatures (Paperback, 2010 ed.): Jonathan Katz Digital Signatures (Paperback, 2010 ed.)
Jonathan Katz
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

As a beginning graduate student, I recall being frustrated by a general lack of acces sible sources from which I could learn about (theoretical) cryptography. I remember wondering: why aren't there more books presenting the basics of cryptography at an introductory level? Jumping ahead almost a decade later, as a faculty member my graduate students now ask me: what is the best resource for learning about (various topics in) cryptography? This monograph is intended to serve as an answer to these 1 questions - at least with regard to digital signature schemes. Given the above motivation, this book has been written with a beginninggraduate student in mind: a student who is potentially interested in doing research in the ?eld of cryptography, and who has taken an introductory course on the subject, but is not sure where to turn next. Though intended primarily for that audience, I hope that advanced graduate students and researchers will ?nd the book useful as well. In addition to covering various constructions of digital signature schemes in a uni?ed framework, this text also serves as a compendium of various "folklore" results that are, perhaps, not as well known as they should be. This book could also serve as a textbook for a graduate seminar on advanced cryptography; in such a class, I expect the entire book could be covered at a leisurely pace in one semester with perhaps some time left over for excursions into related topics.

Platform Embedded Security Technology Revealed - Safeguarding the Future of Computing with Intel Embedded Security and... Platform Embedded Security Technology Revealed - Safeguarding the Future of Computing with Intel Embedded Security and Management Engine (Paperback, 1st ed.)
Xiaoyu Ruan
R1,706 Discovery Miles 17 060 Ships in 18 - 22 working days

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications' secrets and users' privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine. Intel's security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users' security experience, and how third-party vendors can make use of it. It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel's security and management engine. It's also written for advanced users who are interested in understanding how the security features of Intel's platforms work.

Advances in Information and Computer Security - 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August... Advances in Information and Computer Security - 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings (Paperback, 2014 ed.)
Maki Yoshida, Koichi Mouri
R2,153 Discovery Miles 21 530 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption.

Trust, Privacy, and Security in Digital Business - 11th International Conference, TrustBus 2014, Munich, Germany, September... Trust, Privacy, and Security in Digital Business - 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings (Paperback, 2014 ed.)
Claudia Eckert, Sokratis K. Katsikas, Gunther Pernul
R1,910 Discovery Miles 19 100 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital Business, TrustBus 2014, held in Munich, Germany, in September 2014 in conjunction with DEXA 2014. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: trust management; trust metrics and evaluation models; privacy and trust in cloud computing; security management; and security, trust, and privacy in mobile and pervasive environments.

Advances in Cryptology -- CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014,... Advances in Cryptology -- CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I (Paperback, 2014 ed.)
Juan A. Garay, Rosario Gennaro
R2,925 Discovery Miles 29 250 Ships in 18 - 22 working days

The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014. The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations.

Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, COSADE 2014, Paris, France, April 13-15,... Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers (Paperback, 2014 ed.)
Emmanuel Prouff
R1,416 Discovery Miles 14 160 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Workshop, COSADE 2014, held in Paris, France, in April 2014. The 20 revised full papers presented together with two invited talks were carefully selected from 51 submissions and collect truly existing results in cryptographic engineering, from concepts to artifacts, from software to hardware, from attack to countermeasure.

Fault Analysis in Cryptography (Paperback, 2012 ed.): Marc Joye, Michael Tunstall Fault Analysis in Cryptography (Paperback, 2012 ed.)
Marc Joye, Michael Tunstall
R2,674 Discovery Miles 26 740 Ships in 18 - 22 working days

In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic devices designed for harsh environments. Ultimately various mechanisms for fault creation and propagation were discovered, and in particular it was noted that many cryptographic algorithms succumb to so-called fault attacks. Preventing fault attacks without sacrificing performance is nontrivial and this is the subject of this book. Part I deals with side-channel analysis and its relevance to fault attacks. The chapters in Part II cover fault analysis in secret key cryptography, with chapters on block ciphers, fault analysis of DES and AES, countermeasures for symmetric-key ciphers, and countermeasures against attacks on AES. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Part IV examines fault attacks on stream ciphers and how faults interact with countermeasures used to prevent power analysis attacks. Finally, Part V contains chapters that explain how fault attacks are implemented, with chapters on fault injection technologies for microprocessors, and fault injection and key retrieval experiments on a widely used evaluation board. This is the first book on this topic and will be of interest to researchers and practitioners engaged with cryptographic engineering.

Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP... Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings (Paperback, 2014 ed.)
David Naccache, Damien Sauveron
R1,941 Discovery Miles 19 410 Ships in 18 - 22 working days

This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held in Heraklion, Crete, Greece, in June/July 2014. The 8 revised full papers and 6 short papers presented together with 2 keynote talks were carefully reviewed and selected from 33 submissions. The papers have been organized in topical sections on cryptography and cryptanalysis, smart cards and embedded devices, and privacy.

Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014.... Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings (Paperback, 2014 ed.)
Willy Susilo, Yi Mu
R2,629 Discovery Miles 26 290 Ships in 18 - 22 working days

This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in Wollongong, NSW, Australia, in July 2014. The 26 revised full papers and 6 short papers presented in this volume were carefully selected from 91 submissions. The papers are organized in topical sections on cryptanalysis; cryptographic protocols; fine-grain cryptographic protocols; key exchange, fundamentals, lattices and homomorphic encryption, and applications.

Trust and Trustworthy Computing - 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014,... Trust and Trustworthy Computing - 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 -- July 2, 2014, Proceedings (Paperback, 2014 ed.)
Thorsten Holz, Sotiris Ioannidis
R1,994 Discovery Miles 19 940 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Conference on Trust and Trustworthy Computing, TRUST 2014, held in Heraklion, Crete, Greece in June/July 2014. The 10 full papers and three short papers presented together with 9 poster abstracts were carefully reviewed and selected from 40 submissions. They are organized in topical sections such as TPM 2.0, trust in embedded and mobile systems; physical unclonable functions; trust in the web; trust and trustworthiness.

Quantum Attacks on Public-Key Cryptosystems (Paperback, 2013 ed.): Song Y. Yan Quantum Attacks on Public-Key Cryptosystems (Paperback, 2013 ed.)
Song Y. Yan
R3,176 Discovery Miles 31 760 Ships in 18 - 22 working days

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists. Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems. This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field.

Privacy Enhancing Technologies - 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014,... Privacy Enhancing Technologies - 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014, Proceedings (Paperback, 2014 ed.)
Emiliano De Cristofaro, Steven J. Murdoch
R2,269 Discovery Miles 22 690 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 14th International Symposium on Privacy Enhancing Technologies, PETS 2014, held in Amsterdam, The Netherlands, in July 2014.The 16 full papers presented were carefully selected from 86 submissions. Topics addressed by the papers published in these proceedings include study of privacy erosion, designs of privacy-preserving systems, censorship resistance, social networks and location privacy."

Advances in Cryptology -- CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014,... Advances in Cryptology -- CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II (Paperback, 2014 ed.)
Juan A. Garay, Rosario Gennaro
R2,819 Discovery Miles 28 190 Ships in 18 - 22 working days

The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014. The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of hardness; number-theoretic hardness; information-theoretic security; key exchange and secure communication; zero knowledge; composable security; secure computation - foundations; secure computation - implementations.

Healthcare Information Privacy and Security - Regulatory Compliance and Data Security in the Age of Electronic Health Records... Healthcare Information Privacy and Security - Regulatory Compliance and Data Security in the Age of Electronic Health Records (Paperback, 1st ed.)
Bernard Peter Robichau
R2,420 Discovery Miles 24 200 Ships in 18 - 22 working days

Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives and penalties tied to the HITECH Act, HIPAA, and the implementation of Electronic Health Record (EHR) systems, medical practices and healthcare systems are implementing new software at breakneck speed. Yet privacy and security considerations are often an afterthought, putting healthcare organizations at risk of fines and damage to their reputations. Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records outlines the new regulatory regime, and it also provides IT professionals with the processes and protocols, standards, and governance tools they need to maintain a secure and legal environment for data and records. It's a concrete resource that will help you understand the issues affecting the law and regulatory compliance, privacy, and security in the enterprise. As healthcare IT security expert Bernard Peter Robichau II shows, the success of a privacy and security initiative lies not just in proper planning but also in identifying who will own the implementation and maintain technologies and processes. From executive sponsors to system analysts and administrators, a properly designed security program requires that that the right people are assigned to the right tasks and have the tools they need. Robichau explains how to design and implement that program with an eye toward long-term success. Putting processes and systems in place is, of course, only the start. Robichau also shows how to manage your security program and maintain operational support including ongoing maintenance and policy updates. (Because regulations never sleep!) This book will help you devise solutions that include: Identity and access management systems Proper application design Physical and environmental safeguards Systemwide and client-based security configurations Safeguards for patient data Training and auditing procedures Governance and policy administration Healthcare Information Privacy and Security is the definitive guide to help you through the process of maintaining privacy and security in the healthcare industry. It will help you keep health information safe, and it will help keep your organization-whether local clinic or major hospital system-on the right side of the law.

Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers... Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Gregor Leander
R2,978 Discovery Miles 29 780 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Istanbul, Turkey, March 8-11, 2015. The 28 revised full papers presented were carefully reviewed and selected from 71 initial submissions. The papers are organized in topical sections on block cipher cryptanalysis; understanding attacks; implementation issues; more block cipher cryptanalysis; cryptanalysis of authenticated encryption schemes; proofs; design; lightweight; cryptanalysis of hash functions and stream ciphers; and mass surveillance.

Dynamic Secrets in Communication Security (Paperback, Softcover reprint of the original 1st ed. 2014): Sheng Xiao, Weibo Gong,... Dynamic Secrets in Communication Security (Paperback, Softcover reprint of the original 1st ed. 2014)
Sheng Xiao, Weibo Gong, Don Towsley
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user's password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering.

Engineering Secure Future Internet Services and Systems - Current Research (Paperback, 2014 ed.): Maritta Heisel, Wouter... Engineering Secure Future Internet Services and Systems - Current Research (Paperback, 2014 ed.)
Maritta Heisel, Wouter Joosen, Javier Lopez, Fabio Martinelli
R2,428 Discovery Miles 24 280 Ships in 18 - 22 working days

This State-of-the-Art Survey contains a selection of papers representing state-of-the-art results in the engineering of secure software-based Future Internet services and systems, produced by the NESSoS project researchers. The engineering approach of the Network of Excellence NESSoS, funded by the European Commission, is based on the principle of addressing security concerns from the very beginning in all software development phases, thus contributing to reduce the amount of software vulnerabilities and enabling the systematic treatment of security needs through the engineering process. The 15 papers included in this volume deal with the main NESSoS research areas: security requirements for Future Internet services; creating secure service architectures and secure service design; supporting programming environments for secure and composable services; enabling security assurance and integrating former results in a risk-aware and cost-aware software life-cycle.

The Economics of Financial and Medical Identity Theft (Paperback, 2012 ed.): L. Jean Camp, M. Eric Johnson The Economics of Financial and Medical Identity Theft (Paperback, 2012 ed.)
L. Jean Camp, M. Eric Johnson
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Financial identity theft is well understood with clear underlying motives. Medical identity theft is new and presents a growing problem. The solutions to both problems however, are less clear.

The Economics of Financial and Medical Identity Theft discusses how the digital networked environment is critically different from the world of paper, eyeballs and pens. Many of the effective identity protections are embedded behind the eyeballs, where the presumably passive observer is actually a fairly keen student of human behavior. The emergence of medical identity theft and the implications of medical data privacy are described in the second section of this book.

The Economics of Financial and Medical Identity Theft also presents an overview of the current technology for identity management. The book closes with a series of vignettes in the last chapter, looking at the risks we may see in the future and how these risks can be mitigated or avoided.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
How To Get A SARS Refund
Daniel Baines Paperback  (3)
R168 Discovery Miles 1 680
Signal Processing and Machine Learning…
Toshihisa Tanaka, Mahnaz Arvaneh Hardcover R3,321 R2,999 Discovery Miles 29 990
The Soweto Uprisings - Counter-Memories…
Sifiso Mxolisi Ndlovu Paperback  (3)
R250 R227 Discovery Miles 2 270
100 Mandela Moments
Kate Sidley Paperback R231 Discovery Miles 2 310
Democracy Works - Re-Wiring Politics To…
Greg Mills, Olusegun Obasanjo, … Paperback R320 R290 Discovery Miles 2 900
Light Through The Bars - Understanding…
Babychan Arackathara Paperback R30 R28 Discovery Miles 280
Seasons Come To Pass - A Poetry…
H. Moffett Paperback  (5)
R451 R420 Discovery Miles 4 200
40 Lives In 40 Days - Experiencing God's…
John MacArthur Hardcover R397 R360 Discovery Miles 3 600
Nobody
Alice Oswald Hardcover R681 Discovery Miles 6 810
A History Of South Africa - From The…
Fransjohan Pretorius Paperback R724 Discovery Miles 7 240

 

Partners