0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (23)
  • R250 - R500 (100)
  • R500+ (1,923)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part I (Paperback, 1st ed. 2018)
Thomas Peyrin, Steven Galbraith
R1,583 Discovery Miles 15 830 Ships in 10 - 15 working days

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.

Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III (Paperback, 1st ed. 2018)
Thomas Peyrin, Steven Galbraith
R1,550 Discovery Miles 15 500 Ships in 10 - 15 working days

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.

Provable Security - 12th International Conference, ProvSec 2018,  Jeju, South Korea, October 25-28, 2018, Proceedings... Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings (Paperback, 1st ed. 2018)
Joonsang Baek, Willy Susilo, Jong-Kil Kim
R1,510 Discovery Miles 15 100 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on Provable Security, ProvSec 2018, held in Jeju, South Korea, in October 2018. The 21 full and 4 short papers presented were carefully reviewed and selected from 48 submissions. The papers are grouped in topical sections on foundation. Public key encryption, digital signature, symmetric key cryptography, and applications.

Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January... Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 - February 2, 2011, Revised Selected Papers (Hardcover)
Gilbert Peterson, Sujeet Shenoi
R1,503 Discovery Miles 15 030 Ships in 10 - 15 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics VII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Fraud and Malware Investigations, Network Forensics, and Advanced Forensic Techniques. This book is the 7th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of 21 edited papers from the 7th Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2011. Advances in Digital Forensics VII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson is an Associate Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.

Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II (Paperback, 1st ed. 2018)
Thomas Peyrin, Steven Galbraith
R1,613 Discovery Miles 16 130 Ships in 10 - 15 working days

The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2018, held in Brisbane, Australia, in December 2018. The 65 revised full papers were carefully selected from 234 submissions. They are organized in topical sections on Post-Quantum Cryptanalysis; Encrypted Storage; Symmetric-Key Constructions; Lattice Cryptography; Quantum Symmetric Cryptanalysis; Zero-Knowledge; Public Key and Identity-Based Encryption; Side-Channels; Signatures; Leakage-Resilient Cryptography; Functional/Inner Product/Predicate Encryption; Multi-party Computation; ORQM; Real World Protocols; Secret Sharing; Isogeny Cryptography; and Foundations.

Soft Computing Systems - Second International Conference, ICSCS 2018, Kollam, India, April 19-20, 2018, Revised Selected Papers... Soft Computing Systems - Second International Conference, ICSCS 2018, Kollam, India, April 19-20, 2018, Revised Selected Papers (Paperback, 1st ed. 2018)
Ivan Zelinka, Roman Senkerik, Ganapati Panda, Padma Suresh Lekshmi Kanthan
R2,963 Discovery Miles 29 630 Ships in 10 - 15 working days

This book (CCIS 837) constitutes the refereed proceedings of the Second International Conference on Soft Computing Systems, ICSCS 2018, held in Sasthamcotta, India, in April 2018. The 87 full papers were carefully reviewed and selected from 439 submissions. The papers are organized in topical sections on soft computing, evolutionary algorithms, image processing, deep learning, artificial intelligence, big data analytics, data minimg, machine learning, VLSI, cloud computing, network communication, power electronics, green energy.

Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018,... Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings (Paperback, 1st ed. 2018)
Chunhua Su, Hiroaki Kikuchi
R1,570 Discovery Miles 15 700 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 14th International Conference on Information Security Practice and Experience, ISPEC 2018, held in Tokyo, Japan, in September 2018. The 39 papers presented in this volume were carefully reviewed and selected from 73 submissions. They were organized in topical sections named: system security; public key cryptography; searchable and functional encryption; post-quantum signature schemas; security protocols; network security; authentication; side-channel attacks; security for cyber-physical systems; security in mobile environment; secure computation and data privacy; and cryptographic protocols.

Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 18th International Conference, NEW2AN 2018, and... Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, St. Petersburg, Russia, August 27-29, 2018, Proceedings (Paperback, 1st ed. 2018)
Olga Galinina, Sergey Andreev, Sergey Balandin, Yevgeni Koucheryavy
R1,594 Discovery Miles 15 940 Ships in 10 - 15 working days

This book constitutes the joint refereed proceedings of the 18th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems, NEW2AN 2018, the 11th Conference on Internet of Things and Smart Spaces, ruSMART 2018. The 64 revised full papers presented were carefully reviewed and selected from 186 submissions. The papers of NEW2AN focus on advanced wireless networking and applications; lower-layer communication enablers; novel and innovative approaches to performance and efficiency analysis of ad-hoc and machine-type systems; employed game-theoretical formulations, Markov chain models, and advanced queuing theory; grapheme and other emerging material, photonics and optics; generation and processing of signals; and business aspects. The ruSMART papers deal with fully-customized applications and services.

Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7,... Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I (Paperback, 1st ed. 2018)
Javier Lopez, Jianying Zhou, Miguel Soriano
R3,266 Discovery Miles 32 660 Ships in 10 - 15 working days

The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security.

Proceedings of the 2nd Workshop on Communication Security - Cryptography and Physical Layer Security (Paperback, Softcover... Proceedings of the 2nd Workshop on Communication Security - Cryptography and Physical Layer Security (Paperback, Softcover reprint of the original 1st ed. 2018)
Marco Baldi, Elizabeth A. Quaglia, Stefano Tomasin
R4,228 Discovery Miles 42 280 Ships in 10 - 15 working days

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-edge research and innovative findings from leading researchers. The characteristic feature of all the contributions in this book is their relevance for the practical application of security principles to a variety of widely used communication techniques, including: multiantenna systems, ultra-wide-band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, building a bridge between two usually distinct worlds. The book gathers extended versions of contributions delivered at the Second Workshop on Communication Security, held in Paris, France, in April 2017 and affiliated with the conference EUROCRYPT 2017.

Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017,... Critical Information Infrastructures Security - 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Gregorio D'Agostino, Antonio Scala
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes revised selected papers from the 12th International Conference on Critical Information Infrastructures Security, CRITIS 201, held in Lucca, Italy, in October 2017. The 21 full papers and 4 short papers presented were carefully reviewed and selected from 63 submissions. They present innovative research and explore new challenges in the field of critical information infrastructures protection (C(I)IP) and deal with multi-disciplinary approaches to relevant C(I)IP problems.

Fading and Shadowing in Wireless Systems (Paperback, Softcover reprint of the original 2nd ed. 2017): P.Mohana Shankar Fading and Shadowing in Wireless Systems (Paperback, Softcover reprint of the original 2nd ed. 2017)
P.Mohana Shankar
R4,626 Discovery Miles 46 260 Ships in 10 - 15 working days

This book offers a comprehensive overview of fading and shadowing in wireless channels. A number of statistical models including simple, hybrid, compound and cascaded ones are presented along with a detailed discussion of diversity techniques employed to mitigate the effects of fading and shadowing. The effects of co-channel interference before and after the implementation of diversity are also analyzed. To facilitate easy understanding of the models and the analysis, the background on probability and random variables is presented with relevant derivations of densities of the sums, products, ratios as well as order statistics of random variables. The book also provides material on digital modems of interest in wireless systems. The updated edition expands the background materials on probability by offering sections on Laplace and Mellin transforms, parameter estimation, statistical testing and receiver operating characteristics. Newer models for fading, shadowing and shadowed fading are included along with the analysis of diversity combining algorithms. In addition, this edition contains a new chapter on Cognitive Radio. Based on the response from readers of the First Edition, detailed Matlab scripts used in the preparation of this edition are provided. Wherever necessary, Maple scripts used are also provided.

Intelligent Mobile Malware Detection (Hardcover): Tony Thomas, Teenu John, Mamoun Alazab, Roopak Surendran Intelligent Mobile Malware Detection (Hardcover)
Tony Thomas, Teenu John, Mamoun Alazab, Roopak Surendran
R2,144 Discovery Miles 21 440 Ships in 12 - 17 working days

Unique selling point: * This book proposes several approaches for dynamic Android malware detection based on system calls which do not have the limitations of existing mechanisms. * This book will be useful for researchers, students, developers and security analysts to know how malware behavior represented in the form of system call graphs can effectively detect Android malware. * The malware detection mechanisms in this book can be integrated with commercial antivirus softwares to detect Android malware including obfuscated variants.

Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23,... Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II (Paperback, 1st ed. 2018)
Hovav Shacham, Alexandra Boldyreva
R2,948 Discovery Miles 29 480 Ships in 10 - 15 working days

The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.

Network Security Metrics (Paperback, Softcover reprint of the original 1st ed. 2017): Lingyu Wang, Sushil Jajodia, Anoop Singhal Network Security Metrics (Paperback, Softcover reprint of the original 1st ed. 2017)
Lingyu Wang, Sushil Jajodia, Anoop Singhal
R2,549 Discovery Miles 25 490 Ships in 10 - 15 working days

This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since "you cannot improve what you cannot measure", a network security metric is essential to evaluating the relative effectiveness of potential network security solutions. The authors start by examining the limitations of existing solutions and standards on security metrics, such as CVSS and attack surface, which typically focus on known vulnerabilities in individual software products or systems. The first few chapters of this book describe different approaches to fusing individual metric values obtained from CVSS scores into an overall measure of network security using attack graphs. Since CVSS scores are only available for previously known vulnerabilities, such approaches do not consider the threat of unknown attacks exploiting the so-called zero day vulnerabilities. Therefore, several chapters of this book are dedicated to develop network security metrics especially designed for dealing with zero day attacks where the challenge is that little or no prior knowledge is available about the exploited vulnerabilities, and thus most existing methodologies for designing security metrics are no longer effective. Finally, the authors examine several issues on the application of network security metrics at the enterprise level. Specifically, a chapter presents a suite of security metrics organized along several dimensions for measuring and visualizing different aspects of the enterprise cyber security risk, and the last chapter presents a novel metric for measuring the operational effectiveness of the cyber security operations center (CSOC). Security researchers who work on network security or security analytics related areas seeking new research topics, as well as security practitioners including network administrators and security architects who are looking for state of the art approaches to hardening their networks, will find this book helpful as a reference. Advanced-level students studying computer science and engineering will find this book useful as a secondary text.

Security in Computer and Information Sciences - First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London,... Security in Computer and Information Sciences - First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers (Paperback, 1st ed. 2018)
Erol Gelenbe, Paolo Campegiani, Tadeusz Czachorski, Sokratis K. Katsikas, Ioannis Komnios, …
R2,031 Discovery Miles 20 310 Ships in 10 - 15 working days

This open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018. The 12 full papers presented together with an overview paper were carefully reviewed and selected from 31 submissions. Security of distributed interconnected systems, software systems, and the Internet of Things has become a crucial aspect of the performance of computer systems. The papers deal with these issues, with a specific focus on societally critical systems such as health informatics systems, the Internet of Things, energy systems, digital cities, digital economy, mobile networks, and the underlying physical and network infrastructures.

Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18,... Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings (Paperback, 1st ed. 2018)
Florian Kerschbaum, Stefano Paraboschi
R1,489 Discovery Miles 14 890 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 32nd Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2018, held in Bergamo, Italy, in July 2018. The 16 full papers and 5 short papers presented were carefully reviewed and selected from 50 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections on administration, access control policies, privacy-preserving access and computation, integrity and user interaction, security analysis and private evaluation, fixing vulnerabilities, and networked systems.

Hardware IP Security and Trust (Paperback, Softcover reprint of the original 1st ed. 2017): Prabhat Mishra, Swarup Bhunia, Mark... Hardware IP Security and Trust (Paperback, Softcover reprint of the original 1st ed. 2017)
Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor
R2,810 Discovery Miles 28 100 Ships in 10 - 15 working days

This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.

Computational Information Geometry - For Image and Signal Processing (Paperback, Softcover reprint of the original 1st ed.... Computational Information Geometry - For Image and Signal Processing (Paperback, Softcover reprint of the original 1st ed. 2017)
Frank Nielsen, Frank Critchley, Christopher T. J. Dodson
R3,276 Discovery Miles 32 760 Ships in 10 - 15 working days

This book focuses on the application and development of information geometric methods in the analysis, classification and retrieval of images and signals. It provides introductory chapters to help those new to information geometry and applies the theory to several applications. This area has developed rapidly over recent years, propelled by the major theoretical developments in information geometry, efficient data and image acquisition and the desire to process and interpret large databases of digital information. The book addresses both the transfer of methodology to practitioners involved in database analysis and in its efficient computational implementation.

Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7,... Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II (Paperback, 1st ed. 2018)
Javier Lopez, Jianying Zhou, Miguel Soriano
R1,556 Discovery Miles 15 560 Ships in 10 - 15 working days

The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security.

Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September... Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings (Paperback, 1st ed. 2018)
Atsuo Inomata, Kan Yasuda
R1,484 Discovery Miles 14 840 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th International Workshop on Security, IWSEC 2018, held in Sendai, Japan, in September 2018. The 18 regular papers and 2 short papers presented in this volume were carefully reviewed and selected from 64 submissions. They were organized in topical sections named: Cryptanalysis, Implementation Security, Public-Key Primitives, Security in Practice, Secret Sharing, Symmetric-Key Primitives, and Provable Security.

Security and Cryptography for Networks - 11th International Conference, SCN 2018, Amalfi, Italy, September 5-7, 2018,... Security and Cryptography for Networks - 11th International Conference, SCN 2018, Amalfi, Italy, September 5-7, 2018, Proceedings (Paperback, 1st ed. 2018)
Dario Catalano, Roberto De Prisco
R1,558 Discovery Miles 15 580 Ships in 10 - 15 working days

This book constitutes the proceedings of the 11th International Conference on Security and Cryptography for Networks, SCN 2018, held in Amalfi, Italy, in September 2018.The 30 papers presented in this volume were carefully reviewed and selected from 66 submissions. They are organized in topical sections on signatures and watermarking; composability; encryption; multiparty computation; anonymity and zero knowledge; secret sharing and oblivious transfer; lattices and post quantum cryptography; obfuscation; two-party computation; and protocols.

Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece,... Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings (Paperback, 1st ed. 2018)
Gerhard P Hancke, Ernesto Damiani
R2,003 Discovery Miles 20 030 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms.

Service-Oriented Computing - ICSOC 2017 Workshops - ASOCA, ISyCC, WESOACS, and Satellite Events, Malaga, Spain, November 13-16,... Service-Oriented Computing - ICSOC 2017 Workshops - ASOCA, ISyCC, WESOACS, and Satellite Events, Malaga, Spain, November 13-16, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Lars Braubach, Juan M. Murillo, Nima Kaviani, Manuel Lama, Loli Burgueno, …
R1,507 Discovery Miles 15 070 Ships in 10 - 15 working days

This book constitutes the revised selected papers of the scientific satellite events that were held in conjunction with the 15th International Conference on Service-Oriented Computing, ICSOC 2017, held in Malaga, Spain, in November 2017. The ICSOC 2017 workshop track consisted of three workshops on a wide range of topics that fall into the general area of service computing: ASOCA 2017: The Second Workshop on Adaptive Service-Oriented and Cloud Applications ISyCC 2016: The Second Workshop on IoT Systems Provisioning and Management in Cloud Computing WESOACS 2017: The 13th International Workshop on Engineering Service-Oriented Applications and Cloud Services

Advances in Digital Forensics VI - Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January... Advances in Digital Forensics VI - Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selected Papers (Hardcover, Edition.)
Kam-Pui Chow, Sujeet Shenoi
R1,508 Discovery Miles 15 080 Ships in 10 - 15 working days

Advances in Digital Forensics VI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Internet Crime Investigations, Live Forensics, Advanced Forensic Techniques, and Forensic Tools. This book is the sixth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-one edited papers from the Sixth Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the University of Hong Kong, Hong Kong, China, in January 2010.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Quantum Error Correction - Symmetric…
Giuliano Gadioli La Guardia Hardcover R2,342 Discovery Miles 23 420
New Research on the Voynich Manuscript…
National Security Agency Hardcover R503 Discovery Miles 5 030
Re-imagining Diffusion and Adoption of…
Sujeet K. Sharma, Yogesh K. Dwivedi, … Hardcover R4,318 Discovery Miles 43 180
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R798 Discovery Miles 7 980
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R784 Discovery Miles 7 840
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R639 Discovery Miles 6 390
Introduction to Bitcoin
David Ricardo Hardcover R733 Discovery Miles 7 330
TLS Mastery
Michael W Lucas Hardcover R970 R838 Discovery Miles 8 380
Bitcoin and Cryptocurrency Technologies…
Keizer Soeze Hardcover R1,968 R1,559 Discovery Miles 15 590
Providing Sound Foundations for…
Oded Goldreich Hardcover R3,177 Discovery Miles 31 770

 

Partners