0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (21)
  • R250 - R500 (87)
  • R500+ (1,898)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Adaptive Signal Processing - Theory and Applications (Paperback, Softcover reprint of the original 1st ed. 1986): Thomas S... Adaptive Signal Processing - Theory and Applications (Paperback, Softcover reprint of the original 1st ed. 1986)
Thomas S Alexander
R2,399 Discovery Miles 23 990 Ships in 18 - 22 working days

The creation of the text really began in 1976 with the author being involved with a group of researchers at Stanford University and the Naval Ocean Systems Center, San Diego. At that time, adaptive techniques were more laboratory (and mental) curiosities than the accepted and pervasive categories of signal processing that they have become. Over the lasl 10 years, adaptive filters have become standard components in telephony, data communications, and signal detection and tracking systems. Their use and consumer acceptance will undoubtedly only increase in the future. The mathematical principles underlying adaptive signal processing were initially fascinating and were my first experience in seeing applied mathematics work for a paycheck. Since that time, the application of even more advanced mathematical techniques have kept the area of adaptive signal processing as exciting as those initial days. The text seeks to be a bridge between the open literature in the professional journals, which is usually quite concentrated, concise, and advanced, and the graduate classroom and research environment where underlying principles are often more important.

Communications and Multimedia Security - 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June... Communications and Multimedia Security - 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010, Proceedings (Paperback, Edition.)
Bart De Decker, Ingrid Schaumuller-Bichl
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Over the last decade, we have witnessed a growing dependency on information technologyresultingina wide rangeofnew opportunities. Clearly, ithas become almost impossible to imagine life without a personal computer or laptop, or without a cell phone. Social network sites (SNS) are competing with face-- face encounters and may even oust them. Most SNS-adepts have hundreds of "friends," happily sharing pictures and pro?les and endless chitchat. We are on the threshold of the Internet of Things, where every object will have its RFID-tag. This will not only e?ect companies, who will be able to optimize their production and delivery processes, but also end users, who will be able to enjoy many new applications, ranging from smart shopping, and smart fridges to geo-localized services. In the near future, elderly people will be able to stay longer at home due to clever health monitoring systems. The sky seems to be the limit However, we have also seen the other side of the coin: viruses, Trojan horses, breaches of privacy, identity theft, and other security threats. Our real and virtual worlds are becoming increasingly vulnerable to attack. In order to encouragesecurity researchby both academia and industry and to stimulate the dissemination of results, conferences need to be organized. With the 11th edition of the joint IFIP TC-6 TC-11 Conference on C- munications and Multimedia Security (CMS 2010), the organizers resumed the tradition of previous CMS conferences after a three-year recess.

Computer Intrusion Detection and Network Monitoring - A Statistical Viewpoint (Paperback, Softcover reprint of the original 1st... Computer Intrusion Detection and Network Monitoring - A Statistical Viewpoint (Paperback, Softcover reprint of the original 1st ed. 2001)
David J Marchette
R2,668 Discovery Miles 26 680 Ships in 18 - 22 working days

This book covers the basic statistical and analytical techniques of computer intrusion detection. It is the first to present a data-centered approach to these problems. It begins with a description of the basics of TCP/IP, followed by chapters dealing with network traffic analysis, network monitoring for intrusion detection, host based intrusion detection, and computer viruses and other malicious code.

Nearrings - Some Developments Linked to Semigroups and Groups (Paperback, Softcover reprint of the original 1st ed. 2002): G.... Nearrings - Some Developments Linked to Semigroups and Groups (Paperback, Softcover reprint of the original 1st ed. 2002)
G. Ferrero
R6,601 Discovery Miles 66 010 Ships in 18 - 22 working days

This work presents new and old constructions of nearrings. Links between properties of the multiplicative of nearrings (as regularity conditions and identities) and the structure of nearrings are studied. Primality and minimality properties of ideals are collected. Some types of simpler' nearrings are examined. Some nearrings of maps on a group are reviewed and linked with group-theoretical and geometrical questions.
Audience: Researchers working in nearring theory, group theory, semigroup theory, designs, and translation planes. Some of the material will be accessible to graduate students.

Advances in Network Security and Applications - 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011,... Advances in Network Security and Applications - 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011, Proceedings (Paperback, Edition.)
David C. Wyld, Michal Wozniak, Nabendu Chaki, Natarajan Meghanathan, Dhinaharan Nagamalai
R2,776 Discovery Miles 27 760 Ships in 18 - 22 working days

This book constitutes the proceedings of the 4th International Conference on Network Security and Applications held in Chennai, India, in July 2011. The 63 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address all technical and practical aspects of security and its applications for wired and wireless networks and are organized in topical sections on network security and applications, ad hoc, sensor and ubiquitous computing, as well as peer-to-peer networks and trust management.

Smart Card Research and Advanced Applications - 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany,... Smart Card Research and Advanced Applications - 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010, Proceedings (Paperback, Edition.)
Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

TheseproceedingscontainthepapersselectedforpresentationatCARDIS 2010, the 9th IFIP Conference on Smart Card Research and Advanced Application hosted by the Institute of IT-Security and Security Law (ISL) of the University ofPassau, Germany.CARDISisorganizedbyIFIPWorkingGroupsWG8.8and WG 11.2. Since 1994, CARDIS has been the foremost international conference dedicated to smart card research and applications. Every second year leading researchers and practitioners meet to present new ideas and discuss recent - velopments in smart card technologies. Thefastevolutioninthe?eldofinformationsecurityrequiresadequatemeans for representing the user in human-machine interactions. Smart cards, and by extension smart devices with their processing power and their direct association with the user, are considered the ?rst choice for this purpose. A wide range of areas including hardware design, operating systems, systems modelling, cr- tography, and distributed systems contribute to this fast-growing technology. The submissions to CARDIS were reviewed by at least three members of the ProgramCommittee, followedbyatwo-weekdiscussionphaseheldelectronically, wherecommittee memberscouldcomment onall papersand allreviews.Finally, 16 papers were selected for presentation at CARDIS. There aremany volunteerswho o?ered their time and energy to put together the symposium and who deserve our acknowledgment. We want to thank all the members of the Program Committee and the external reviewers for their hard work in evaluating and discussing the submissions. We are also very grateful to JoachimPosegga, the GeneralChairof CARDIS 2010, andhisteam for thelocal conference management. Last, but certainly not least, our thanks go to all the authors who submitted papers and all the attendees. We hope you ?nd the proceedings stimulat

Managing Information Risk and the Economics of Security (Paperback, Softcover reprint of hardcover 1st ed. 2009): M. Eric... Managing Information Risk and the Economics of Security (Paperback, Softcover reprint of hardcover 1st ed. 2009)
M. Eric Johnson
R4,029 Discovery Miles 40 290 Ships in 18 - 22 working days

Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of serious study and ongoing research. While much research has focused on the technical aspects of computer security, far less attention has been given to the management issues of information risk and the economic concerns facing firms and nations. Managing Information Risk and the Economics of Security provides leading edge thinking on the security issues facing managers, policy makers, and individuals. Many of the chapters of this volume were presented and debated at the 2008 Workshop on the Economics of Information Security (WEIS), hosted by the Tuck School of Business at Dartmouth College. Sponsored by Tuck's Center for Digital Strategies and the Institute for Information Infrastructure Protection (I3P), the conference brought together over one hundred information security experts, researchers, academics, reporters, corporate executives, government officials, cyber crime investigators and prosecutors. The group represented the global nature of information security with participants from China, Italy, Germany, Canada, Australia, Denmark, Japan, Sweden, Switzerland, the United Kingdom and the US. This volume would not be possible without the dedicated work Xia Zhao (of Dartmouth College and now the University of North Carolina, Greensboro) who acted as the technical editor.

Algebraic Aspects of Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 1998): Neal Koblitz Algebraic Aspects of Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 1998)
Neal Koblitz; Appendix by A.J. Menezes, Y.-H. Wu, R.J. Zuccherato
R4,691 Discovery Miles 46 910 Ships in 18 - 22 working days

From the reviews: "This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for a course in mathematics or computer science. ...] Overall, this is an excellent expository text, and will be very useful to both the student and researcher." Mathematical Reviews

Turbo Code Applications - a Journey from a Paper to realization (Paperback, Softcover reprint of hardcover 1st ed. 2005):... Turbo Code Applications - a Journey from a Paper to realization (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Keattisak Sripimanwat
R4,047 Discovery Miles 40 470 Ships in 18 - 22 working days

Turbo Code Applications: a journey from a paper to realization presents c- temporary applications of turbo codes in thirteen technical chapters. Each chapter focuses on a particular communication technology utilizing turbo codes, and they are written by experts who have been working in related th areas from around the world. This book is published to celebrate the 10 year anniversary of turbo codes invention by Claude Berrou Alain Glavieux and Punya Thitimajshima (1993-2003). As known for more than a decade, turbo code is the astonishing error control coding scheme which its perf- mance closes to the Shannon's limit. It has been honored consequently as one of the seventeen great innovations during the ?rst ?fty years of information theory foundation. With the amazing performance compared to that of other existing codes, turbo codes have been adopted into many communication s- tems and incorporated with various modern industrial standards. Numerous research works have been reported from universities and advance companies worldwide. Evidently, it has successfully revolutionized the digital commu- cations. Turbo code and its successors have been applied in most communications startingfromthegroundorterrestrialsystemsofdatastorage, ADSLmodem, and ?ber optic communications. Subsequently, it moves up to the air channel applications by employing to wireless communication systems, and then ?ies up to the space by using in digital video broadcasting and satellite com- nications. Undoubtedly, with the excellent error correction potential, it has been selected to support data transmission in space exploring system as well.

Minds Alive - Libraries and Archives Now (Hardcover): Patricia A Demers, Toni Samek Minds Alive - Libraries and Archives Now (Hardcover)
Patricia A Demers, Toni Samek
R2,058 Discovery Miles 20 580 Ships in 10 - 15 working days

Minds Alive explores the enduring role and intrinsic value of libraries, archives, and public institutions in the digital age. Featuring international contributors, this volume delves into libraries and archives as institutions and institutional partners, the professional responsibilities of librarians and archivists, and the ways in which librarians and archivists continue to respond to the networked age, digital culture, and digitization. The endless possibilities and robust importance of libraries and archives are at the heart of this optimistic collection. Topics include transformations in the networked digital age; Indigenous issues and challenges in custodianship, ownership, and access; the importance of the harmonization of memory institutions today; and the overarching significance of libraries and archives in the public sphere. Libraries and archives - at once public institutions providing both communal and private havens of discovery - are being repurposed and transformed in intercultural contexts. Only by keeping pace with users' changing needs can they continue to provide the richest resources for an informed citizenry.

Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30-June 1, 2011,... Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30-June 1, 2011, Proceedings (Paperback, Edition.)
Feng Bao, Jian Weng
R1,453 Discovery Miles 14 530 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011.
The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols.

Intrusion Detection and Correlation - Challenges and Solutions (Paperback, Softcover reprint of hardcover 1st ed. 2005):... Intrusion Detection and Correlation - Challenges and Solutions (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Christopher Kruegel, Fredrik Valeur, Giovanni Vigna
R2,610 Discovery Miles 26 100 Ships in 18 - 22 working days

Details how intrusion detection works in network security with comparisons to traditional methods such as firewalls and cryptography

Analyzes the challenges in interpreting and correlating Intrusion Detection alerts

Ethics and Policy of  Biometrics - Third International Conference on Ethics  and Policy of Biometrics and International Data... Ethics and Policy of Biometrics - Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, Hong Kong, January 4-5, 2010 (Paperback, Edition.)
Ajay Kumar, David Zhang
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The past decade has seen tremendous growth in the demand for biometrics and data security technologies in applications ranging from law enforcement and immigration control to online security. The benefits of biometrics technologies are apparent as they become important technologies for information security of governments, business enterprises, and individuals. At the same time, however, the use of biometrics has raised concerns as to issues of ethics, privacy, and the policy implications of its wi- spread use. The large-scale deployment of biometrics technologies in e-governance, e-security, and e-commerce has required that we launch an international dialogue on these issues, a dialogue that must involve key stakeholders and that must consider the legal, poli- cal, philosophical and cultural aspects of the deployment of biometrics technologies. The Third International Conference on Ethics and Policy of Biometrics and Inter- tional Data Sharing was highly successful in facilitating such interaction among - searchers, policymakers, consumers, and privacy groups. This conference was supported and funded as part of the RISE project in its ongoing effort to develop wide consensus and policy recommendations on ethical, medical, legal, social, cultural, and political concerns in the usage of biometrics and data security technologies. The - tential concerns over the deployment of biometrics systems can be jointly addressed by developing smart biometrics technologies and by developing policies for the - ployment of biometrics technologies that clearly demarcate conflicts of interest - tween stakeholders.

Propositional, Probabilistic and Evidential Reasoning - Integrating Numerical and Symbolic Approaches (Paperback, Softcover... Propositional, Probabilistic and Evidential Reasoning - Integrating Numerical and Symbolic Approaches (Paperback, Softcover reprint of hardcover 1st ed. 2001)
Weiru Liu
R2,652 Discovery Miles 26 520 Ships in 18 - 22 working days

How to draw plausible conclusions from uncertain and conflicting sources of evidence is one of the major intellectual challenges of Artificial Intelligence. It is a prerequisite of the smart technology needed to help humans cope with the information explosion of the modern world. In addition, computational modelling of uncertain reasoning is a key to understanding human rationality. Previous computational accounts of uncertain reasoning have fallen into two camps: purely symbolic and numeric. This book represents a major advance by presenting a unifying framework which unites these opposing camps. The Incidence Calculus can be viewed as both a symbolic and a numeric mechanism. Numeric values are assigned indirectly to evidence via the possible worlds in which that evidence is true. This facilitates purely symbolic reasoning using the possible worlds and numeric reasoning via the probabilities of those possible worlds. Moreover, the indirect assignment solves some difficult technical problems, like the combinat ion of dependent sources of evidcence, which had defeated earlier mechanisms. Weiru Liu generalises the Incidence Calculus and then compares it to a succes sion of earlier computational mechanisms for uncertain reasoning: Dempster-Shafer Theory, Assumption-Based Truth Maintenance, Probabilis tic Logic, Rough Sets, etc. She shows how each of them is represented and interpreted in Incidence Calculus. The consequence is a unified mechanism which includes both symbolic and numeric mechanisms as special cases. It provides a bridge between symbolic and numeric approaches, retaining the advantages of both and overcoming some of their disadvantages."

Coding and Cryptology - Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings (Paperback,... Coding and Cryptology - Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings (Paperback, Edition.)
Yeow Meng Chee, Zhenbo Guo, San Ling, Fengjing Shao, Yuansheng Tang, …
R1,410 Discovery Miles 14 100 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC 2011, held in Qingdao, China, May 30-June 3, 2011. The 19 revised full technical papers are contributed by the invited speakers of the workshop. The papers were carefully reviewed and cover a broad range of foundational and methodological as well as applicative issues in coding and cryptology, as well as related areas such as combinatorics.

NETWORKING 2011 - 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011, Proceedings, Part I... NETWORKING 2011 - 10th International IFIP TC 6 Networking Conference, Valencia, Spain, May 9-13, 2011, Proceedings, Part I (Paperback, Edition.)
Jordi Domingo-Pascual, Pietro Manzoni, Sergio Palazzo, Ana Pont, Caterina Scoglio
R1,460 Discovery Miles 14 600 Ships in 18 - 22 working days

The two-volume set LNCS 6640 and 6641 constitutes the refereed proceedings of the 10th International IFIP TC 6 Networking Conference held in Valencia, Spain, in May 2011. The 64 revised full papers presented were carefully reviewed and selected from a total of 294 submissions. The papers feature innovative research in the areas of applications and services, next generation Internet, wireless and sensor networks, and network science. The first volume includes 36 papers and is organized in topical sections on anomaly detection, content management, DTN and sensor networks, energy efficiency, mobility modeling, network science, network topology configuration, next generation Internet, and path diversity.

Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers (Paperback,... Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers (Paperback, Edition.)
Bruce Christianson, James Malcolm, Vashek Matyas, Michael Roe
R1,739 Discovery Miles 17 390 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols, SP 2008, held in Cambridge, UK, in April 2008. The 17 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have gone through multiple rounds of reviewing, revision, and selection. The theme of this workshop was "Remodelling the Attacker" with the intention to tell the students at the start of a security course that it is very important to model the attacker, but like most advice to the young, this is an oversimplification. Shouldn't the attacker's capability be an output of the design process as well as an input? The papers and discussions in this volume examine the theme from the standpoint of various different applications and adversaries.

Information Security and Privacy - 16th Australisian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011,... Information Security and Privacy - 16th Australisian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011, Proceedings (Paperback, Edition.)
Udaya Parampalli, Philip Hawkes
R1,456 Discovery Miles 14 560 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011. The 24 revised full papers presented together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.

Privacy-Preserving Data Mining - Models and Algorithms (Paperback, Softcover reprint of hardcover 1st ed. 2008): Charu C.... Privacy-Preserving Data Mining - Models and Algorithms (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Charu C. Aggarwal, Philip S. Yu
R5,639 Discovery Miles 56 390 Ships in 18 - 22 working days

Advances in hardware technology have increased the capability to store and record personal data. This has caused concerns that personal data may be abused. This book proposes a number of techniques to perform the data mining tasks in a privacy-preserving way. This edited volume contains surveys by distinguished researchers in the privacy field. Each survey includes the key research content as well as future research directions of a particular topic in privacy. The book is designed for researchers, professors, and advanced-level students in computer science, but is also suitable for practitioners in industry.

Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference, May 30... Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Ryoichi Sasaki, Eiji Okamoto, Hiroshi Yoshiura
R4,102 Discovery Miles 41 020 Ships in 18 - 22 working days

Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In addition, we need to deal with new issues such as security in the P2P environment, privacy issues in the use of smart cards, and RFID systems. Security and Privacy in the Age of Ubiquitous Computing addresses these issues and more by exploring a wide scope of topics. The volume presents a selection of papers from the proceedings of the 20th IFIP International Information Security Conference held from May 30 to June 1, 2005 in Chiba, Japan. Topics covered include cryptography applications, authentication, privacy and anonymity, DRM and content security, computer forensics, Internet and web security, security in sensor networks, intrusion detection, commercial and industrial security, authorization and access control, information warfare and critical protection infrastructure. These papers represent the most current research in information security, including research funded in part by DARPA and the National Science Foundation.

Intelligent Agents - Theory and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2004): Germano Resconi Intelligent Agents - Theory and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2004)
Germano Resconi
R4,044 Discovery Miles 40 440 Ships in 18 - 22 working days

This research book presents the agent theory and adaptation of agents in different contexts. Agents of different orders of complexity must be autonomous in the rules used. The agent must have a brain by which it can discover rules contained within the data. Because rules are the instruments by which agents change the environment, any adaptation of the rules can be considered as an evolution of the agents. Because uncertainty is present in every context, we shall describe in this book how it is possible to introduce global uncertainty from the local world into the description of the rules. This book contains ten chapters. Chapter 1 gives a general dscription of the evolutionary adaptation agent. Chapter 2 describes the actions and meta actions of the agent at different orders. Chapter 3 presents in an abstract and formal way the actions at different orders. Chapter 4 connects systems and meta systems with the adaptive agent. Chapter 5 describes the brain of the agent by the morphogenetic neuron theory. Chapter 6 introduces the logic structure of the adaptive agent. Chapter 7 describes the feedback and hyper-feedback in the adaptive agent. Chapter 8 introduces the adaptation field into the modal logic space as logic instrument in the adaptive agent. Chapter 9 describes the action of the agent in the physical domain. Chapter 10 presents the practical application of agents in robots and evolutionary computing."

Data Privacy Management and Autonomous Spontaneous Security - 4th International Workshop, DPM 2009 and Second International... Data Privacy Management and Autonomous Spontaneous Security - 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers (Paperback, Edition.)
Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Yves Roudier
R1,424 Discovery Miles 14 240 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the two international workshops DPM 2009, the 4th International Workshop on Data Privacy Management, and SETOP 2009, the Second International Workshop on Autonomous and Spontaneous Security, collocated with the ESORICS 2009 symposium in St. Malo, France, in September 2009.

The 8 revised full papers for DPM 2009, selected from 23 submissions, presented together with two keynote lectures are accompanied by 9 revised full papers of SETOP 2009; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2009 papers cover topics such as privacy in service oriented architectures, privacy-preserving mechanisms, crossmatching and indistinguishability techniques, privacy policies, and disclosure of information. The SETOP 2009 papers address all current issues within the sope of security policies, identification and privacy, as well as security mechanisms.

Botnet Detection - Countering the Largest Security Threat (Paperback, Softcover reprint of hardcover 1st ed. 2008): Wenke Lee,... Botnet Detection - Countering the Largest Security Threat (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Wenke Lee, Cliff Wang, David Dagon
R3,989 Discovery Miles 39 890 Ships in 18 - 22 working days

Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat. Botnet Detection: Countering the Largest Security Threat consists of chapters contributed by world-class leaders in this field, from the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets.

Foundations and Applications of Sensor Management (Paperback, Softcover reprint of hardcover 1st ed. 2008): Alfred Olivier... Foundations and Applications of Sensor Management (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Alfred Olivier Hero, David Castanon, Doug Cochran, Keith Kastella
R4,020 Discovery Miles 40 200 Ships in 18 - 22 working days

This book covers control theory signal processing and relevant applications in a unified manner. It introduces the area, takes stock of advances, and describes open problems and challenges in order to advance the field. The editors and contributors to this book are pioneers in the area of active sensing and sensor management, and represent the diverse communities that are targeted.

Secure Multi-Party Non-Repudiation Protocols and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2009): Jose A.... Secure Multi-Party Non-Repudiation Protocols and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Jose A. Onieva, Jianying Zhou
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. This book is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. The book is also suitable as an advanced-level text or reference book for students in computer science.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Metallopharmaceuticals I - DNA…
Michael J Clarke, Peter J. Sadler Hardcover R5,255 Discovery Miles 52 550
Technological Breakthroughs in Modern…
Hamid Sharif, Yousef S. Kavian Hardcover R5,094 Discovery Miles 50 940
Overcomer
Melanie Cortijo Hardcover R553 Discovery Miles 5 530
Fourth-Generation Wireless Networks…
Hardcover R4,781 Discovery Miles 47 810
Monet (Life & Times)
Matthias Arnold Paperback R290 R150 Discovery Miles 1 500
Distributed and Multi-database Systems
Angelo R. Bobak Hardcover R2,489 Discovery Miles 24 890
Real-World SQL-DMO for SQL Server
Allan Mitchell, Mark Allison Paperback R1,163 R991 Discovery Miles 9 910
SQL Antipatterns, Volume 1 - Avoiding…
Bill Karwin Paperback R954 Discovery Miles 9 540
Corrosion Control Technologies for…
Zhigang Fang, Jingyi Cao, … Hardcover R5,214 Discovery Miles 52 140
Impressionism
Nathalia Brodskaia Hardcover R517 Discovery Miles 5 170

 

Partners