0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (21)
  • R250 - R500 (87)
  • R500+ (1,898)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government - 5th IFIP Conference on e-Commerce, e-Business, and... Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government - 5th IFIP Conference on e-Commerce, e-Business, and e-Government (I3E'2005), October 28-30 2005, Poznan, Poland (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Matohisa Funabashi, Adam Grzech
R4,107 Discovery Miles 41 070 Ships in 18 - 22 working days

2.1 E-Government: e-Governance and e-Democracy The term Electronic Government (e-Government), as an expression, was coined after the example of Electronic Commerce. In spite of being a relatively recent expression, e-Government designates a field of activity that has been with us for several decades and which has attained a high level of penetration in many countries2. What has been observed over the recent years is a shift on the broadness of the e-Government concept. The ideas inside e-Governance and e- Democracy are to some extent promising big changes in public administration. The demand now is not only simply delivering a service - line. It is to deliver complex and new services, which are all citizen-centric. Another important demand is related to the improvement of citizen's participation in governmental processes and decisions so that the governments' transparency and legitimacy are enforced. In order to fulfill these new demands, a lot of research has been done over the recent years (see Section 3) but many challenges are still to be faced, not only in the technological field, but also in the political and social aspects.

Quality Of Protection - Security Measurements and Metrics (Paperback, Softcover reprint of hardcover 1st ed. 2006): Dieter... Quality Of Protection - Security Measurements and Metrics (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin
R5,143 Discovery Miles 51 430 Ships in 18 - 22 working days

Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano, Italy (September 2005). This volume discusses how security research can progress towards quality of protection in security comparable to quality of service in networking and software measurements, and metrics in empirical software engineering. Information security in the business setting has matured in the last few decades. Standards such as IS017799, the Common Criteria (ISO15408), and a number of industry certifications and risk analysis methodologies have raised the bar for good security solutions from a business perspective.

Designed for a professional audience composed of researchers and practitioners in industry, Quality of Protection: Security Measurements and Metrics is also suitable for advanced-level students in computer science.

Coding Theory and Number Theory (Paperback, Softcover reprint of hardcover 1st ed. 2003): T. Hiramatsu, Gunter Koehler Coding Theory and Number Theory (Paperback, Softcover reprint of hardcover 1st ed. 2003)
T. Hiramatsu, Gunter Koehler
R1,379 Discovery Miles 13 790 Ships in 18 - 22 working days

This book grew out of our lectures given in the Oberseminar on 'Cod ing Theory and Number Theory' at the Mathematics Institute of the Wiirzburg University in the Summer Semester, 2001. The coding the ory combines mathematical elegance and some engineering problems to an unusual degree. The major advantage of studying coding theory is the beauty of this particular combination of mathematics and engineering. In this book we wish to introduce some practical problems to the math ematician and to address these as an essential part of the development of modern number theory. The book consists of five chapters and an appendix. Chapter 1 may mostly be dropped from an introductory course of linear codes. In Chap ter 2 we discuss some relations between the number of solutions of a diagonal equation over finite fields and the weight distribution of cyclic codes. Chapter 3 begins by reviewing some basic facts from elliptic curves over finite fields and modular forms, and shows that the weight distribution of the Melas codes is represented by means of the trace of the Hecke operators acting on the space of cusp forms. Chapter 4 is a systematic study of the algebraic-geometric codes. For a long time, the study of algebraic curves over finite fields was the province of pure mathematicians. In the period 1977 - 1982, V. D. Goppa discovered an amazing connection between the theory of algebraic curves over fi nite fields and the theory of q-ary codes."

Introduction to Cryptography - Principles and Applications (Paperback, Softcover reprint of hardcover 2nd ed. 2007): Hans... Introduction to Cryptography - Principles and Applications (Paperback, Softcover reprint of hardcover 2nd ed. 2007)
Hans Delfs, Helmut Knebl
R1,658 Discovery Miles 16 580 Ships in 18 - 22 working days

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data. In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. The second edition contains corrections, revisions and new material, including a complete description of the AES, an extended section on cryptographic hash functions, a new section on random oracle proofs, and a new section on public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks.

Creation and Transfer of Knowledge - Institutions and Incentives (Paperback, Softcover reprint of hardcover 1st ed. 1998):... Creation and Transfer of Knowledge - Institutions and Incentives (Paperback, Softcover reprint of hardcover 1st ed. 1998)
Giorgio Barba Navaretti, Partha Dasgupta, Karl-Goran Maler, Domenico Siniscalco
R2,661 Discovery Miles 26 610 Ships in 18 - 22 working days

Is knowledge an economic good? Which are the characteristics of the institutions regulating the production and diffusion of knowledge? Cumulation of knowledge is a key determinant of economic growth, but only recently knowledge has moved to the core of economic analysis. Recent literature also gives profound insights into events like scientific progress, artistic and craft development which have been rarely addressed as socio-economic institutions, being the domain of sociologists and historians rather than economists. This volume adopts a multidisciplinary approach to bring knowledge in the focus of attention, as a key economic issue.

The Codes of Life - The Rules of Macroevolution (Paperback, Softcover reprint of hardcover 1st ed. 2008): Marcello Barbieri The Codes of Life - The Rules of Macroevolution (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Marcello Barbieri
R6,545 Discovery Miles 65 450 Ships in 18 - 22 working days

Building on a range of disciplines from biology and anthropology to philosophy and linguistics this book draws on the expertise of leading names in the study of organic, mental and cultural codes brought together by the emerging discipline of biosemiotics.

The book s 18 chapters present a range of experimental evidence which suggests that the genetic code was only the first in a long series of organic codes, and that it has been the appearance of new codes organic, mental and cultural that paved the way for the major transitions in the history of life.

While the existence of many organic codes has been proposed since the 1980s, this volume represents the first multi-authored attempt to deal with the range of codes relevant to life, and to reveal the ubiquitous role of coding mechanisms in both organic and mental evolution. This creates the conditions for a synthesis of biology and linguistics that finally overcomes the old divide between nature and culture.

The book will appeal to all those interested in the origins and evolution of life, including biologists (from molecular and cellular biologists to evolutionary and developmental biologists), ecologists, anthropologists, psychologists, philosophers of science, linguists, and researchers interested in the history of science, the origins of life, artificial life and intelligence, and information theory and communication technology."

Algorithmic Information Theory - Mathematics of Digital Information Processing (Paperback, Softcover reprint of hardcover 1st... Algorithmic Information Theory - Mathematics of Digital Information Processing (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Peter Seibt
R4,054 Discovery Miles 40 540 Ships in 18 - 22 working days

Algorithmic Information Theory treats the mathematics of many important areas in digital information processing. It has been written as a read-and-learn book on concrete mathematics, for teachers, students and practitioners in electronic engineering, computer science and mathematics. The presentation is dense, and the examples and exercises are numerous. It is based on lectures on information technology (Data Compaction, Cryptography, Polynomial Coding) for engineers.

Fractal Image Encoding and Analysis (Paperback, Softcover reprint of hardcover 1st ed. 1998): Yuval Fisher Fractal Image Encoding and Analysis (Paperback, Softcover reprint of hardcover 1st ed. 1998)
Yuval Fisher
R5,168 Discovery Miles 51 680 Ships in 18 - 22 working days

The related fields of fractal image encoding and fractal image analysis have blossomed in recent years. This book, originating from a NATO Advanced Study Institute held in 1995, presents work by leading researchers. It is developing the subjects at an introductory level, but it also has some recent and exciting results in both fields.
The book contains a thorough discussion of fractal image compression and decompression, including both continuous and discrete formulations, vector space and hierarchical methods, and algorithmic optimizations. The book also discusses multifractal approaches to image analysis, segmentation, and recognition, including medical applications.

Mathematical Modeling - Problems, Methods, Applications (Paperback, Softcover reprint of hardcover 1st ed. 2001): Ludmilla A.... Mathematical Modeling - Problems, Methods, Applications (Paperback, Softcover reprint of hardcover 1st ed. 2001)
Ludmilla A. Uvarova, Anatolii V. Latyshev
R4,034 Discovery Miles 40 340 Ships in 18 - 22 working days

This volume contains review articles and original results obtained in various fields of modern science using mathematical simulation methods. The basis of the articles are the plenary and some section reports that were made and discussed at the Fourth International Mathematical Simulation Conference, held in Moscow on June 27 through July 1, 2000. The conference was devoted to the following scientific areas: * mathematical and computer discrete systems models; * non-linear excitation in condensed media; * complex systems evolution; * mathematical models in economics; * non-equilibrium processes kinematics; * dynamics and structure of the molecular and biomolecular systems; * mathematical transfer models in non-linear systems; * numerical simulation and algorithms; * turbulence and determined chaos; * chemical physics of polymer. This conference was supported by the Russian Ministry of Education, Russian foundation for Basic Research and Federal Program "Integration". This volume contains the following sections: 1. models of non-linear phenomena in physics; 2. numerical methods and computer simulations; 3. mathematical computer models of discrete systems; 4. mathematical models in economics; 5. non-linear models in chemical physics and physical chemistry; 6. mathematical models of transport processes in complex systems. In Sections One and Five a number of fundamental and sufficiently general problems, concerning real physical and physical-chemical systems simulation, is discussed.

Hop Integrity in the Internet (Paperback, Softcover reprint of hardcover 1st ed. 2006): Chin-tser Huang, Mohamed G Gouda Hop Integrity in the Internet (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Chin-tser Huang, Mohamed G Gouda
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Denial-of-service attacks are one of the most severe challenges confronting the online world. This ground-breaking volume discusses a new method of countering denial-of-service attacks called hop integrity. It details a suite of protocols for providing hop integrity. In particular, each protocol in this suite is specified and verified using an abstract and formal notation, called the Secure Protocol Notation. In addition, the book presents an alternative way to achieve strong hop integrity with hard sequence numbers.

Insider Attack and Cyber Security - Beyond the Hacker (Paperback, Softcover reprint of hardcover 1st ed. 2008): Salvatore J... Insider Attack and Cyber Security - Beyond the Hacker (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Salvatore J Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos D. Keromytis, Sara Sinclair, …
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College.

This book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and includes the following topics: critical IT infrastructure, insider threats, awareness and dealing with nefarious human activities in a manner that respects individual liberties and privacy policies of organizations while providing the best protection of critical resources and services. In some sense, the insider problem is the ultimate security problem. This volume concludes with technical and legal challenges facing researchers who study and propose solutions to mitigate insider attacks.

Malware Detection (Paperback, Softcover reprint of hardcover 1st ed. 2007): Mihai Christodorescu, Somesh Jha, Douglas Maughan,... Malware Detection (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang
R7,642 Discovery Miles 76 420 Ships in 18 - 22 working days

This book captures the state of the art research in the area of malicious code detection, prevention and mitigation. It contains cutting-edge behavior-based techniques to analyze and detect obfuscated malware. The book analyzes current trends in malware activity online, including botnets and malicious code for profit, and it proposes effective models for detection and prevention of attacks using. Furthermore, the book introduces novel techniques for creating services that protect their own integrity and safety, plus the data they manage.

Preserving Privacy in On-Line Analytical Processing (OLAP) (Paperback, Softcover reprint of hardcover 1st ed. 2007): Lingyu... Preserving Privacy in On-Line Analytical Processing (OLAP) (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Lingyu Wang, Sushil Jajodia, Duminda Wijesekera
R3,989 Discovery Miles 39 890 Ships in 18 - 22 working days

This book addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. OLAP systems usually need to meet two conflicting goals. First, the sensitive data stored in underlying data warehouses must be kept secret. Second, analytical queries about the data must be allowed for decision support purposes. The main challenge is that sensitive data can be inferred from answers to seemingly innocent aggregations of the data. This volume reviews a series of methods that can precisely answer data cube-style OLAP, regarding sensitive data while provably preventing adversaries from inferring data.

Vulnerability Analysis and Defense for the Internet (Paperback, Softcover reprint of hardcover 1st ed. 2008): Abhishek Singh Vulnerability Analysis and Defense for the Internet (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Abhishek Singh; Contributions by B Singh, H. Joseph
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Vulnerability analysis, also known as vulnerability assessment, is a process that defines, identifies, and classifies the security holes, or vulnerabilities, in a computer, network, or application. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use. Vulnerability Analysis and Defense for the Internet provides packet captures, flow charts and pseudo code, which enable a user to identify if an application/protocol is vulnerable. This edited volume also includes case studies that discuss the latest exploits.

Security for Wireless Sensor Networks (Paperback, Softcover reprint of hardcover 1st ed. 2007): Donggang Liu, Peng Ning Security for Wireless Sensor Networks (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Donggang Liu, Peng Ning
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

This book discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security. It contains example applications for target tracking, scientific exploration and data acquisition in hazardous environments, and includes a fairly new study on capabilities of mu-TESLA, a broadcast authentication technique for wireless sensor networks. The book assists both professionals and students to understand background knowledge in wireless sensor network security and prepare them for producing research in this domain.

Privacy Preserving Data Mining (Paperback, Softcover reprint of hardcover 1st ed. 2006): Jaideep Vaidya, Christopher W Clifton,... Privacy Preserving Data Mining (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Jaideep Vaidya, Christopher W Clifton, Yu Michael Zhu
R2,609 Discovery Miles 26 090 Ships in 18 - 22 working days

Privacy preserving data mining implies the "mining" of knowledge from distributed data without violating the privacy of the individual/corporations involved in contributing the data. This volume provides a comprehensive overview of available approaches, techniques and open problems in privacy preserving data mining. Crystallizing much of the underlying foundation, the book aims to inspire further research in this new and growing area.

Privacy Preserving Data Mining is intended to be accessible to industry practitioners and policy makers, to help inform future decision making and legislation, and to serve as a useful technical reference.

Orthogonal Frequency Division Multiplexing for Wireless Communications (Paperback, Softcover reprint of hardcover 1st ed.... Orthogonal Frequency Division Multiplexing for Wireless Communications (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Ye (Geoffrey) Li, Gordon L. Stuber
R4,245 Discovery Miles 42 450 Ships in 18 - 22 working days

Orthogonal Frequency Division Multiplexing for Wireless Communications is an edited volume with contributions by leading authorities in the subject of OFDM. Its coverage consists of principles, important wireless topics (e.g. Synchronization, channel estimation, etc.) and techniques. Included is information for advancing wireless communication in a multipath environment with an emphasis on implementation of OFDM in base stations.

Orthogonal Frequency Division Multiplexing for Wireless Communications provides a comprehensive introduction of the theory and practice of OFDM. To facilitate the readers, extensive subject indices and references are given at the end of the book. Even though each chapter is written by different experts, symbols and notations in all chapters of the book are consistent.

Synchronizing Internet Protocol Security (SIPSec) (Paperback, Softcover reprint of hardcover 1st ed. 2007): Charles A.... Synchronizing Internet Protocol Security (SIPSec) (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Charles A. Shoniregun
R3,762 Discovery Miles 37 620 Ships in 18 - 22 working days

Synchronizing Internet Protocol Security (SIPSec) focuses on the combination of theoretical investigation and practical implementation, which provides an in-depth understanding of the Internet Protocol Security (IPSec) framework. The standard internet protocol is completely unprotected, allowing hosts to inspect or modify data in transit. This volume identifies the security problems facing internet communication protocols along with the risks associated with internet connections. It also includes an investigative case study regarding the vulnerabilities that impair IPSec and proposes a SIPSec Model.

Information and Complexity in Statistical Modeling (Paperback, Softcover reprint of hardcover 1st ed. 2007): Jorma Rissanen Information and Complexity in Statistical Modeling (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Jorma Rissanen
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

No statistical model is "true" or "false," "right" or "wrong"; the models just have varying performance, which can be assessed. The main theme in this book is to teach modeling based on the principle that the objective is to extract the information from data that can be learned with suggested classes of probability models. The intuitive and fundamental concepts of complexity, learnable information, and noise are formalized, which provides a firm information theoretic foundation for statistical modeling. Although the prerequisites include only basic probability calculus and statistics, a moderate level of mathematical proficiency would be beneficial.

Secure Key Establishment (Paperback, Softcover reprint of hardcover 1st ed. 2009): Kim-Kwang Raymond Choo Secure Key Establishment (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Kim-Kwang Raymond Choo
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.

Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare-Rogaway model and the Canetti-Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare-Rogaway model using the automated model checker tool.

Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.

Wireless Network Security (Paperback, Softcover reprint of hardcover 1st ed. 2007): Yang Xiao, Xuemin Shen, Dingzhu Du Wireless Network Security (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Yang Xiao, Xuemin Shen, Dingzhu Du
R4,048 Discovery Miles 40 480 Ships in 18 - 22 working days

This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.

Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks (Paperback, Softcover reprint of hardcover... Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Radha Poovendran, Cliff Wang, Sumit Roy
R5,399 Discovery Miles 53 990 Ships in 18 - 22 working days

This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc networks and wireless sensor networks. It is suitable as a text for computer science courses in wireless systems and security. It includes implementation studies with mica2 mote sensors. Due to the open spectrum nature of wireless communication, it is subject to attacks and intrusions. Hence the wireless network synchronization needs to be both robust and secure. Furthermore, issues such as energy constraints and mobility make the localization process even more challenging. The book will also interest developers of secure wireless systems.

Self-Dual Codes and Invariant Theory (Paperback, Softcover reprint of hardcover 1st ed. 2006): Gabriele Nebe, Eric M. Rains,... Self-Dual Codes and Invariant Theory (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Gabriele Nebe, Eric M. Rains, Neil J.A. Sloane
R4,735 Discovery Miles 47 350 Ships in 18 - 22 working days

One of the most remarkable and beautiful theorems in coding theory is Gleason's 1970 theorem about the weight enumerators of self-dual codes and their connections with invariant theory, which has inspired hundreds of papers about generalizations and applications of this theorem to different types of codes. This self-contained book develops a new theory which is powerful enough to include all the earlier generalizations.

The Multimedia Internet (Paperback, Softcover reprint of hardcover 1st ed. 2005): Stephen Weinstein The Multimedia Internet (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Stephen Weinstein
R3,130 Discovery Miles 31 300 Ships in 18 - 22 working days

Here is a thorough, not-overly-complex introduction to the three technical foundations for multimedia applications across the Internet: communications (principles, technologies and networking); compressive encoding of digital media; and Internet protocol and services. All the contributing systems elements are explained through descriptive text and numerous illustrative figures; the result is a book well-suited toward non-specialists, preferably with technical background, who need well-composed tutorial introductions to the three foundation areas. The text discusses the latest advances in digital audio and video encoding, optical and wireless communications technologies, high-speed access networks, and IP-based media streaming, all crucial enablers of the multimedia Internet.

Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Toronto, Canada, August 11-12, 2011, Revised Selected... Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Toronto, Canada, August 11-12, 2011, Revised Selected Papers (Paperback, 2012)
Ali Miri, Serge Vaudenay
R1,447 Discovery Miles 14 470 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 18th Annual International Workshop on Selected Areas in Cryptography, SAC 2011, held in Toronto, Canada in August 2011. The 23 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 92 submissions. The papers are organized in topical sections on cryptanalysis of hash functions, security in clouds, bits and randomness, cryptanalysis of ciphers, cryptanalysis of public-key crypthography, cipher implementation, new designs and mathematical aspects of applied cryptography.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Cyber Security Handbook - Prepare…
IT Governance Paperback R1,368 Discovery Miles 13 680
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Secure Broadcast Communication - In…
Adrian Perrig, J. D. Tygar Hardcover R2,779 Discovery Miles 27 790
Candidate Multilinear Maps
Sanjam Garg Hardcover R1,770 Discovery Miles 17 700
Cyber Defense Mechanisms - Security…
Gautam Kumar, Dinesh Kumar Saini, … Paperback R1,487 Discovery Miles 14 870
Luck Follows the Brave - From Refugee…
Aida Šibić Hardcover R697 R646 Discovery Miles 6 460
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,321 R1,228 Discovery Miles 12 280
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Integrated Research in Steganography
Audrey Coon Hardcover R1,565 R1,456 Discovery Miles 14 560
Blockchain Applications
Arshdeep Bagha Hardcover R1,870 R1,522 Discovery Miles 15 220

 

Partners