0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (21)
  • R250 - R500 (86)
  • R500+ (1,899)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009,... Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Dimitris Gritzalis, Javier Lopez
R2,697 Discovery Miles 26 970 Ships in 18 - 22 working days

It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a tradition for - formation security professionals around the world. SEC 2009 was organized by the Technical Committee 11 (TC-11) of IFIP, and took place in Pafos, Cyprus, during May 18-20, 2009. It is an indication of good fortune for a Chair to serve a conference that takes place in a country with the natural beauty of Cyprus, an island where the hospitality and frie- liness of the people have been going together, hand-in-hand, with its long history. This volume contains the papers selected for presentation at SEC 2009. In response to the call for papers, 176 papers were submitted to the conference. All of them were evaluated on the basis of their novelty and technical quality, and reviewed by at least two members of the conference Program Committee. Of the papers submitted, 39 were selected for presentation at the conference; the acceptance rate was as low as 22%, thus making the conference a highly competitive forum. It is the commitment of several people that makes international conferences pos- ble. That also holds true for SEC 2009. The list of people who volunteered their time and energy to help is really long.

Economics of Identity Theft - Avoidance, Causes and Possible Cures (Paperback, Softcover reprint of hardcover 1st ed. 2007): L.... Economics of Identity Theft - Avoidance, Causes and Possible Cures (Paperback, Softcover reprint of hardcover 1st ed. 2007)
L. Jean Camp
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This professional book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. This book also includes identity-based signatures, spyware, and placing biometric security in an economically broken system, which results in a broken biometric system. The last chapters include systematic problems with practical individual strategies for preventing identity theft for any reader of any economic status. While a plethora of books on identity theft exists, this book combines both technical and economic aspects, presented from the perspective of the identified individual.

LDPC Coded Modulations (Paperback, Softcover reprint of hardcover 1st ed. 2009): Michele Franceschini, Gianluigi Ferrari,... LDPC Coded Modulations (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Michele Franceschini, Gianluigi Ferrari, Riccardo Raheli
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

This book focuses on the analysis and design of low-density parity-check (LDPC) coded modulations, which are becoming part of several current and future communication systems, such as high-throughput terrestrial and satellite wireless networks. In this book, a two-sided perspective on the design of LDPC coded systems is proposed, encompassing both code/modulation optimization (transmitter side) and detection algorithm design (receiver side). After introducing key concepts on error control coding, in particular LDPC coding, and detection techniques, the book presents several relevant applications. More precisely, by using advanced performance evaluation techniques, such as extrinsic information transfer charts, the optimization of coded modulation schemes are considered for (i) memoryless channels, (ii) dispersive and partial response channels, and (iii) concatenated systems including differential encoding. This book is designed to be used by graduate students working in the field of communication theory, with particular emphasis on LDPC coded communication schemes, and industry experts working on related fields.

Advances in Information Systems Research, Education and Practice - IFIP 20th World Computer Congress, TC 8, Information... Advances in Information Systems Research, Education and Practice - IFIP 20th World Computer Congress, TC 8, Information Systems, September 7-10, 2008, Milano, Italy (Paperback, Softcover reprint of hardcover 1st ed. 2008)
David Avison, George M. Kasper, Barbara Pernici, Isabel Ramos, Dewald Roode
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Introduction The International Federation for Information Processing (IFIP) is a non-profit umbrella organization for national societies working in the field of information processing. It was founded in 1960 under the auspices of UNESCO. It is organized into several technical c- mittees. This book represents the proceedings of the 2008 conference of technical committee 8 (TC8), which covers the field of infor- tion systems. TC8 aims to promote and encourage the advancement of research and practice of concepts, methods, techniques and issues related to information systems in organisations. TC8 has established eight working groups covering the following areas: design and evaluation of information systems; the interaction of information systems and the organization; decision support systems; e-business information systems: multi-disciplinary research and practice; inf- mation systems in public administration; smart cards, technology, applications and methods; and enterprise information systems. Further details of the technical committee and its working groups can be found on our website (ifiptc8. dsi. uminho. pt). This conference was part of IFIP's World Computer Congress in Milan, Italy which took place 7-10 September 2008. The occasion celebrated the 32nd anniversary of IFIP TC8. The call for papers invited researchers, educators, and practitioners to submit papers and panel proposals that advance concepts, methods, techniques, tools, issues, education, and practice of information systems in organi- tions. Thirty one submissions were received.

Uncertainty-Based Information - Elements of Generalized Information Theory (Paperback, Softcover reprint of the original 2nd... Uncertainty-Based Information - Elements of Generalized Information Theory (Paperback, Softcover reprint of the original 2nd ed. 1999)
George J. Klir, Mark J Wierman
R2,625 Discovery Miles 26 250 Ships in 18 - 22 working days

Information is precious. It reduces our uncertainty in making decisions. Knowledge about the outcome of an uncertain event gives the possessor an advantage. It changes the course of lives, nations, and history itself. Information is the food of Maxwell's demon. His power comes from know ing which particles are hot and which particles are cold. His existence was paradoxical to classical physics and only the realization that information too was a source of power led to his taming. Information has recently become a commodity, traded and sold like or ange juice or hog bellies. Colleges give degrees in information science and information management. Technology of the computer age has provided access to information in overwhelming quantity. Information has become something worth studying in its own right. The purpose of this volume is to introduce key developments and results in the area of generalized information theory, a theory that deals with uncertainty-based information within mathematical frameworks that are broader than classical set theory and probability theory. The volume is organized as follows."

Coordinated Multiuser Communications (Paperback, Softcover reprint of hardcover 1st ed. 2006): Christian Schlegel, Alex Grant Coordinated Multiuser Communications (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Christian Schlegel, Alex Grant
R2,656 Discovery Miles 26 560 Ships in 18 - 22 working days

Coordinated Multiuser Communications provides for the first time a unified treatment of multiuser detection and multiuser decoding in a single volume.

Many communications systems, such as cellular mobile radio and wireless local area networks, are subject to multiple-access interference, caused by a multitude of users sharing a common transmission medium. The performance of receiver systems in such cases can be greatly improved by the application of joint detection and decoding methods. Multiuser detection and decoding not only improve system reliability and capacity, they also simplify the problem of resource allocation.

Coordinated Multiuser Communications provides the reader with tools for the design and analysis of joint detection and joint decoding methods. These methods are developed within a unified framework of linear multiple-access channels, which includes code-division multiple-access, multiple antenna channels and orthogonal frequency division multiple access.

Emphasis is placed on practical implementation aspects and modern iterative processing techniques for systems both with, and without integrated error control coding.

Focusing on the theory and practice of unifying accessing and transmission aspects of communications, this book is a valuable reference for students, researchers and practicing engineers.

Turbo-like Codes - Design for High Speed Decoding (Paperback, Softcover reprint of hardcover 1st ed. 2007): Aliazam Abbasfar Turbo-like Codes - Design for High Speed Decoding (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Aliazam Abbasfar
R2,602 Discovery Miles 26 020 Ships in 18 - 22 working days

This book introduces turbo error correcting concept in a simple language, including a general theory and the algorithms for decoding turbo-like code. It presents a unified framework for the design and analysis of turbo codes and LDPC codes and their decoding algorithms.

A major focus is on high speed turbo decoding, which targets applications with data rates of several hundred million bits per second (Mbps).

Pattern Recognition Theory and Applications - Proceedings of the NATO Advanced Study Institute held at St. Anne's College,... Pattern Recognition Theory and Applications - Proceedings of the NATO Advanced Study Institute held at St. Anne's College, Oxford, March 29-April 10, 1981 (Paperback, Softcover reprint of the original 1st ed. 1982)
J. Kittler, V.W. Fu, L.F. Pau
R7,720 Discovery Miles 77 200 Ships in 18 - 22 working days

This book is the outcome of the successful NATO Advanced Study Institute on Pattern Recognition Theory and Applications, held at St. Anne's College, Oxford, in April 1981., The aim of the meeting was to review the recent advances in the theory of pattern recognition and to assess its current and future practical potential. The theme of the Institute - the decision making aspects of pattern recognition with the emphasis on the novel hybrid approaches - and its scope - a high level tutorial coverage of pattern recognition methodologies counterpointed with contrib uted papers on advanced theoretical topics and applications - are faithfully reflected by the volume. The material is divided into five sections: 1. Methodology 2. Image Understanding and Interpretation 3. Medical Applications 4. Speech Processing and Other Applications 5. Panel Discussions. The first section covers a broad spectrum of pattern recognition methodologies, including geometric, statistical, fuzzy set, syntactic, graph-theoretic and hybrid approaches. Its cove,r age of hybrid methods places the volume in a unique position among existing books on pattern recognition. The second section provides an extensive treatment of the topical problem of image understanding from both the artificial intelligence and pattern recognition points of view. The two application sections demonstrate the usefulness of the novel methodologies in traditional pattern 'recognition application areas. They address the problems of hardware/software implementation and of algorithm robustness, flexibility and general reliability. The final section reports on a panel discussion held during the Institute.

Fundamentals of Computer Security (Paperback, Softcover reprint of hardcover 1st ed. 2003): Josef Pieprzyk, Thomas Hardjono,... Fundamentals of Computer Security (Paperback, Softcover reprint of hardcover 1st ed. 2003)
Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
R1,796 Discovery Miles 17 960 Ships in 18 - 22 working days

This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key encryption, hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, and many others. The section on intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed. The final chapters introduce modern e- business systems based on digital cash.

Information Security - 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, Proceedings (Paperback,... Information Security - 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, Proceedings (Paperback, 2011 ed.)
Xuejia Lai, Jianying Zhou, Hui Li
R1,436 Discovery Miles 14 360 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.

Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011, Proceedings (Paperback,... Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011, Proceedings (Paperback, 2011 ed.)
Liqun Chen
R1,464 Discovery Miles 14 640 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th IMA International Conference on Cryptography and Coding, IMACC 2011, held in Oxford, UK in December 2011. The 27 revised full papers presented together with one invited contribution were carefully reviewed and selected from 57 submissions. The papers cover a wide range of topics in the field of mathematics and computer science, including coding theory, homomorphic encryption, symmetric and public key cryptosystems, cryptographic functions and protocols, efficient pairing and scalar multiplication implementation, knowledge proof, and security analysis.

Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, Proceedings... Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, Proceedings (Paperback)
Dongdai Lin, Gene Tsudik, Xiaoyun Wang
R1,417 Discovery Miles 14 170 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmetric cryptanalysis, symmetric ciphers, public key cryptography, protocol attacks, and privacy techniques.

Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14,... Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011, Proceedings (Paperback, 2011 ed.)
Daniel J. Bernstein, Sanjit Chatterjee
R1,439 Discovery Miles 14 390 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.

Secret Language - Codes, Tricks, Spies, Thieves, and Symbols (Paperback): Barry J Blake Secret Language - Codes, Tricks, Spies, Thieves, and Symbols (Paperback)
Barry J Blake
R359 Discovery Miles 3 590 Ships in 10 - 15 working days

This book is about language that is designed to mean what it does not seem to mean. Ciphers and codes conceal messages and protect secrets. Symbol and magic hide meanings to delight or imperil. Languages made to baffle and confuse let insiders talk openly without being understood by those beyond the circle. Barry Blake looks at these and many more. He explores the history and uses of the slangs and argots of schools and trades. He traces the centuries-old cants used by sailors and criminals in Britain, among them Polari, the mix of Italian, Yiddish, and slang once spoken among strolling players and circus folk and taken up by gays in the twentieth century. He examines the sacred languages of ancient cults and religions, uncovers the workings of onomancy, spells, and gematria, looks into the obliqueness of allusion and parody, and celebrates the absurdities of euphemism and jargon. Secret Language takes the reader on fascinating excursions down obscure byways of language, ranging across time and culture. With revelations on every page it will entertain anyone with an urge to know more about the most arcane and curious uses of language.

Autonomic and Trusted Computing - 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011, Proceedings... Autonomic and Trusted Computing - 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011, Proceedings (Paperback, Edition.)
Jose M. Alcaraz Calero, Laurence T. Yang, Felix Gomez-Marmol, Luis Javier Garcia Villalba, Andy Xiaolin Li, …
R1,401 Discovery Miles 14 010 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Conference on Autonomic and Trusted Computing, ATC 2011, held in Banff, Canada, September 2011.
The 17 revised full papers presented together with 1 keynote speech were carefully reviewed and selected from numerous submissions. The papers address all current issues in autonomic architectures, models and systems, autonomic communications, trusted and secure computing, reliable, secure and trust applications.

Information and Automation - International Symposium, ISIA 2010, Guangzhou, China, November 10-11, 2010. Revised Selected... Information and Automation - International Symposium, ISIA 2010, Guangzhou, China, November 10-11, 2010. Revised Selected Papers (Paperback, Edition.)
Luo Qi
R2,806 Discovery Miles 28 060 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Symposium on Information and Automation, ISIA 2010, held in Guangzhou, China, in November 2010. The 110 revised full papers presented were carefully reviewed and selected from numerous submissions. The symposium provides a forum for researchers, educators, engineers, and government officials to present and discuss their latest research results and exchange views on the future research directions in the general areas of Information and Automation.

Availability, Reliability and Security for Business, Enterprise and Health Information Systems - IFIP WG 8.4/8.9 International... Availability, Reliability and Security for Business, Enterprise and Health Information Systems - IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, Vienna, Austria, August 22-26, 2011, Proceedings (Paperback)
A. Min Tjoa, Gerald Quirchmayr, Ilsun You, Li Da Xu
R1,436 Discovery Miles 14 360 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop on Availability, Reliability and Security - Multidisciplinary Research and Practice for Business, Enterprise and Health Information Systems, ARGES 2011, held in Vienna, Austria, in August 2011.The 29 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of availability, reliability and security for information systems as a discipline bridging the application fields and the well- defined computer science field. They are organized in three sections: multidisciplinary research and practice for business, enterprise and health information systems; massive information sharing and integration and electronic healthcare; and papers from the colocated International Workshop on Security and Cognitive Informatics for Homeland Defense.

Adaptive Signal Processing - Theory and Applications (Paperback, Softcover reprint of the original 1st ed. 1986): Thomas S... Adaptive Signal Processing - Theory and Applications (Paperback, Softcover reprint of the original 1st ed. 1986)
Thomas S Alexander
R2,399 Discovery Miles 23 990 Ships in 18 - 22 working days

The creation of the text really began in 1976 with the author being involved with a group of researchers at Stanford University and the Naval Ocean Systems Center, San Diego. At that time, adaptive techniques were more laboratory (and mental) curiosities than the accepted and pervasive categories of signal processing that they have become. Over the lasl 10 years, adaptive filters have become standard components in telephony, data communications, and signal detection and tracking systems. Their use and consumer acceptance will undoubtedly only increase in the future. The mathematical principles underlying adaptive signal processing were initially fascinating and were my first experience in seeing applied mathematics work for a paycheck. Since that time, the application of even more advanced mathematical techniques have kept the area of adaptive signal processing as exciting as those initial days. The text seeks to be a bridge between the open literature in the professional journals, which is usually quite concentrated, concise, and advanced, and the graduate classroom and research environment where underlying principles are often more important.

Communications and Multimedia Security - 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June... Communications and Multimedia Security - 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010, Proceedings (Paperback, Edition.)
Bart De Decker, Ingrid Schaumuller-Bichl
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Over the last decade, we have witnessed a growing dependency on information technologyresultingina wide rangeofnew opportunities. Clearly, ithas become almost impossible to imagine life without a personal computer or laptop, or without a cell phone. Social network sites (SNS) are competing with face-- face encounters and may even oust them. Most SNS-adepts have hundreds of "friends," happily sharing pictures and pro?les and endless chitchat. We are on the threshold of the Internet of Things, where every object will have its RFID-tag. This will not only e?ect companies, who will be able to optimize their production and delivery processes, but also end users, who will be able to enjoy many new applications, ranging from smart shopping, and smart fridges to geo-localized services. In the near future, elderly people will be able to stay longer at home due to clever health monitoring systems. The sky seems to be the limit However, we have also seen the other side of the coin: viruses, Trojan horses, breaches of privacy, identity theft, and other security threats. Our real and virtual worlds are becoming increasingly vulnerable to attack. In order to encouragesecurity researchby both academia and industry and to stimulate the dissemination of results, conferences need to be organized. With the 11th edition of the joint IFIP TC-6 TC-11 Conference on C- munications and Multimedia Security (CMS 2010), the organizers resumed the tradition of previous CMS conferences after a three-year recess.

Computer Intrusion Detection and Network Monitoring - A Statistical Viewpoint (Paperback, Softcover reprint of the original 1st... Computer Intrusion Detection and Network Monitoring - A Statistical Viewpoint (Paperback, Softcover reprint of the original 1st ed. 2001)
David J Marchette
R2,668 Discovery Miles 26 680 Ships in 18 - 22 working days

This book covers the basic statistical and analytical techniques of computer intrusion detection. It is the first to present a data-centered approach to these problems. It begins with a description of the basics of TCP/IP, followed by chapters dealing with network traffic analysis, network monitoring for intrusion detection, host based intrusion detection, and computer viruses and other malicious code.

Nearrings - Some Developments Linked to Semigroups and Groups (Paperback, Softcover reprint of the original 1st ed. 2002): G.... Nearrings - Some Developments Linked to Semigroups and Groups (Paperback, Softcover reprint of the original 1st ed. 2002)
G. Ferrero
R6,601 Discovery Miles 66 010 Ships in 18 - 22 working days

This work presents new and old constructions of nearrings. Links between properties of the multiplicative of nearrings (as regularity conditions and identities) and the structure of nearrings are studied. Primality and minimality properties of ideals are collected. Some types of simpler' nearrings are examined. Some nearrings of maps on a group are reviewed and linked with group-theoretical and geometrical questions.
Audience: Researchers working in nearring theory, group theory, semigroup theory, designs, and translation planes. Some of the material will be accessible to graduate students.

Advances in Network Security and Applications - 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011,... Advances in Network Security and Applications - 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011, Proceedings (Paperback, Edition.)
David C. Wyld, Michal Wozniak, Nabendu Chaki, Natarajan Meghanathan, Dhinaharan Nagamalai
R2,776 Discovery Miles 27 760 Ships in 18 - 22 working days

This book constitutes the proceedings of the 4th International Conference on Network Security and Applications held in Chennai, India, in July 2011. The 63 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address all technical and practical aspects of security and its applications for wired and wireless networks and are organized in topical sections on network security and applications, ad hoc, sensor and ubiquitous computing, as well as peer-to-peer networks and trust management.

Smart Card Research and Advanced Applications - 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany,... Smart Card Research and Advanced Applications - 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010, Proceedings (Paperback, Edition.)
Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

TheseproceedingscontainthepapersselectedforpresentationatCARDIS 2010, the 9th IFIP Conference on Smart Card Research and Advanced Application hosted by the Institute of IT-Security and Security Law (ISL) of the University ofPassau, Germany.CARDISisorganizedbyIFIPWorkingGroupsWG8.8and WG 11.2. Since 1994, CARDIS has been the foremost international conference dedicated to smart card research and applications. Every second year leading researchers and practitioners meet to present new ideas and discuss recent - velopments in smart card technologies. Thefastevolutioninthe?eldofinformationsecurityrequiresadequatemeans for representing the user in human-machine interactions. Smart cards, and by extension smart devices with their processing power and their direct association with the user, are considered the ?rst choice for this purpose. A wide range of areas including hardware design, operating systems, systems modelling, cr- tography, and distributed systems contribute to this fast-growing technology. The submissions to CARDIS were reviewed by at least three members of the ProgramCommittee, followedbyatwo-weekdiscussionphaseheldelectronically, wherecommittee memberscouldcomment onall papersand allreviews.Finally, 16 papers were selected for presentation at CARDIS. There aremany volunteerswho o?ered their time and energy to put together the symposium and who deserve our acknowledgment. We want to thank all the members of the Program Committee and the external reviewers for their hard work in evaluating and discussing the submissions. We are also very grateful to JoachimPosegga, the GeneralChairof CARDIS 2010, andhisteam for thelocal conference management. Last, but certainly not least, our thanks go to all the authors who submitted papers and all the attendees. We hope you ?nd the proceedings stimulat

Managing Information Risk and the Economics of Security (Paperback, Softcover reprint of hardcover 1st ed. 2009): M. Eric... Managing Information Risk and the Economics of Security (Paperback, Softcover reprint of hardcover 1st ed. 2009)
M. Eric Johnson
R4,029 Discovery Miles 40 290 Ships in 18 - 22 working days

Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of serious study and ongoing research. While much research has focused on the technical aspects of computer security, far less attention has been given to the management issues of information risk and the economic concerns facing firms and nations. Managing Information Risk and the Economics of Security provides leading edge thinking on the security issues facing managers, policy makers, and individuals. Many of the chapters of this volume were presented and debated at the 2008 Workshop on the Economics of Information Security (WEIS), hosted by the Tuck School of Business at Dartmouth College. Sponsored by Tuck's Center for Digital Strategies and the Institute for Information Infrastructure Protection (I3P), the conference brought together over one hundred information security experts, researchers, academics, reporters, corporate executives, government officials, cyber crime investigators and prosecutors. The group represented the global nature of information security with participants from China, Italy, Germany, Canada, Australia, Denmark, Japan, Sweden, Switzerland, the United Kingdom and the US. This volume would not be possible without the dedicated work Xia Zhao (of Dartmouth College and now the University of North Carolina, Greensboro) who acted as the technical editor.

Algebraic Aspects of Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 1998): Neal Koblitz Algebraic Aspects of Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 1998)
Neal Koblitz; Appendix by A.J. Menezes, Y.-H. Wu, R.J. Zuccherato
R4,691 Discovery Miles 46 910 Ships in 18 - 22 working days

From the reviews: "This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for a course in mathematics or computer science. ...] Overall, this is an excellent expository text, and will be very useful to both the student and researcher." Mathematical Reviews

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R778 R682 Discovery Miles 6 820
Blockchain - An Essential Beginner's…
Herbert Jones Hardcover R656 R585 Discovery Miles 5 850
Providing Sound Foundations for…
Oded Goldreich Hardcover R3,016 Discovery Miles 30 160
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R549 R503 Discovery Miles 5 030
Real Life Cryptology - Ciphers and…
Benedek Lang Hardcover R3,336 Discovery Miles 33 360
VLSI-SoC: Advanced Topics on Systems on…
Ricardo Reis, Vincent Mooney, … Hardcover R2,684 Discovery Miles 26 840
Designs From Linear Codes
Cunsheng Ding Hardcover R3,986 Discovery Miles 39 860
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Analysis, Cryptography And Information…
Panos M. Pardalos, Nicholas J. Daras, … Hardcover R2,356 Discovery Miles 23 560

 

Partners