0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (84)
  • R500+ (1,905)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Access Control Systems - Security, Identity Management and Trust Models (Paperback, Softcover reprint of hardcover 1st ed.... Access Control Systems - Security, Identity Management and Trust Models (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Messaoud Benantar
R3,083 Discovery Miles 30 830 Ships in 18 - 22 working days

This essential resource for professionals and advanced students in security programming and system design introduces the foundations of programming systems security and the theory behind access control models, and addresses emerging access control mechanisms.

RFID Security and Privacy - Concepts, Protocols, and Architectures (Paperback, Softcover reprint of hardcover 1st ed. 2008):... RFID Security and Privacy - Concepts, Protocols, and Architectures (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Dirk Henrici
R4,009 Discovery Miles 40 090 Ships in 18 - 22 working days

In the beginning of 2003, I found a short article about the privacy implications of RFID technology in a newspaper. It raised my interest, and after reading some early research papers on the topic, I thought: "There must exist better solutions. " I c- cerned myself with the topic in my spare time. After having developed my rst - lutions, I asked my supervisor, Prof. Dr. Paul Muller ], whether I could write a paper about my results. As the topic did not t into any running project or at least the overall research directions of his group, he could have answered no. But instead, he encouraged me to do it. The paper became a success, and many other papers about new concepts and solutions followed. Now the answer is obvious: There exist better solutions. I have dealt with the topic over the past years. Now I want to share the basics as well as current research results with the reader. This book is surely not a bedside reading. But with all the presented concepts, it can broaden the mind of the reader concerning security, privacy, and RFIDsystems. Iwishthe reader many new insights. There are many people I would like to thank. First of all, my thanks go to my ] supervisor, Prof. Dr. Paul Muller. He gave me room for creativity and plenty of rope to work on my own."

Managing Information Risk and the Economics of Security (Paperback, Softcover reprint of hardcover 1st ed. 2009): M. Eric... Managing Information Risk and the Economics of Security (Paperback, Softcover reprint of hardcover 1st ed. 2009)
M. Eric Johnson
R4,029 Discovery Miles 40 290 Ships in 18 - 22 working days

Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of serious study and ongoing research. While much research has focused on the technical aspects of computer security, far less attention has been given to the management issues of information risk and the economic concerns facing firms and nations. Managing Information Risk and the Economics of Security provides leading edge thinking on the security issues facing managers, policy makers, and individuals. Many of the chapters of this volume were presented and debated at the 2008 Workshop on the Economics of Information Security (WEIS), hosted by the Tuck School of Business at Dartmouth College. Sponsored by Tuck's Center for Digital Strategies and the Institute for Information Infrastructure Protection (I3P), the conference brought together over one hundred information security experts, researchers, academics, reporters, corporate executives, government officials, cyber crime investigators and prosecutors. The group represented the global nature of information security with participants from China, Italy, Germany, Canada, Australia, Denmark, Japan, Sweden, Switzerland, the United Kingdom and the US. This volume would not be possible without the dedicated work Xia Zhao (of Dartmouth College and now the University of North Carolina, Greensboro) who acted as the technical editor.

Net-Centric Approaches to Intelligence and National Security (Paperback, Softcover reprint of hardcover 1st ed. 2005): Roy... Net-Centric Approaches to Intelligence and National Security (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Roy Ladner, Frederick E. Petry
R2,625 Discovery Miles 26 250 Ships in 18 - 22 working days

The development of net-centric approaches for intelligence and national security applications has become a major concern in many areas such as defense, intelligence and national and international law enforcement agencies. In this volume we consider the web architectures and recent developments that make n- centric approaches for intelligence and national security possible. These include developments in information integration and recent advances in web services including the concept of the semantic web. Discovery, analysis and management of web-available data pose a number of interesting challenges for research in w- based management systems. Intelligent agents and data mining are some of the techniques that can be employed. A number of specific systems that are net-centric based in various areas of military applications, intelligence and law enforcement are presented that utilize one or more of such techniques The opening chapter overviews the concepts related to ontologies which now form much of the basis of the possibility of sharing of information in the Semantic Web. In the next chapter an overview of Web Services and examples of the use of Web Services for net-centric operations as applied to meteorological and oceanographic (MetOc) data is presented and issues related to the Navy's use of MetOc Web Services are discussed. The third chapter focuses on metadata as conceived to support the concepts of a service-oriented architecture and, in particular, as it relates to the DoD Net-Centric Data Strategy and the NCES core services.

Algebraic Aspects of Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 1998): Neal Koblitz Algebraic Aspects of Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 1998)
Neal Koblitz; Appendix by A.J. Menezes, Y.-H. Wu, R.J. Zuccherato
R4,691 Discovery Miles 46 910 Ships in 18 - 22 working days

From the reviews: "This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for a course in mathematics or computer science. ...] Overall, this is an excellent expository text, and will be very useful to both the student and researcher." Mathematical Reviews

LDPC Coded Modulations (Paperback, Softcover reprint of hardcover 1st ed. 2009): Michele Franceschini, Gianluigi Ferrari,... LDPC Coded Modulations (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Michele Franceschini, Gianluigi Ferrari, Riccardo Raheli
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

This book focuses on the analysis and design of low-density parity-check (LDPC) coded modulations, which are becoming part of several current and future communication systems, such as high-throughput terrestrial and satellite wireless networks. In this book, a two-sided perspective on the design of LDPC coded systems is proposed, encompassing both code/modulation optimization (transmitter side) and detection algorithm design (receiver side). After introducing key concepts on error control coding, in particular LDPC coding, and detection techniques, the book presents several relevant applications. More precisely, by using advanced performance evaluation techniques, such as extrinsic information transfer charts, the optimization of coded modulation schemes are considered for (i) memoryless channels, (ii) dispersive and partial response channels, and (iii) concatenated systems including differential encoding. This book is designed to be used by graduate students working in the field of communication theory, with particular emphasis on LDPC coded communication schemes, and industry experts working on related fields.

Turbo Code Applications - a Journey from a Paper to realization (Paperback, Softcover reprint of hardcover 1st ed. 2005):... Turbo Code Applications - a Journey from a Paper to realization (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Keattisak Sripimanwat
R4,047 Discovery Miles 40 470 Ships in 18 - 22 working days

Turbo Code Applications: a journey from a paper to realization presents c- temporary applications of turbo codes in thirteen technical chapters. Each chapter focuses on a particular communication technology utilizing turbo codes, and they are written by experts who have been working in related th areas from around the world. This book is published to celebrate the 10 year anniversary of turbo codes invention by Claude Berrou Alain Glavieux and Punya Thitimajshima (1993-2003). As known for more than a decade, turbo code is the astonishing error control coding scheme which its perf- mance closes to the Shannon's limit. It has been honored consequently as one of the seventeen great innovations during the ?rst ?fty years of information theory foundation. With the amazing performance compared to that of other existing codes, turbo codes have been adopted into many communication s- tems and incorporated with various modern industrial standards. Numerous research works have been reported from universities and advance companies worldwide. Evidently, it has successfully revolutionized the digital commu- cations. Turbo code and its successors have been applied in most communications startingfromthegroundorterrestrialsystemsofdatastorage, ADSLmodem, and ?ber optic communications. Subsequently, it moves up to the air channel applications by employing to wireless communication systems, and then ?ies up to the space by using in digital video broadcasting and satellite com- nications. Undoubtedly, with the excellent error correction potential, it has been selected to support data transmission in space exploring system as well.

Grey Information - Theory and Practical Applications (Paperback, Softcover reprint of hardcover 1st ed. 2006): Sifeng Liu, Yi... Grey Information - Theory and Practical Applications (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Sifeng Liu, Yi Lin
R4,072 Discovery Miles 40 720 Ships in 18 - 22 working days

Rapid formation and development of new theories of systems science have become an important part of modern science and technology. For - ample, since the 1940s, there have appeared systems theory, information theory, fuzzy mathematics, cybernetics, dissipative structures, synergetics, catastrophe theory, chaos theory, bifurcations, ultra circulations, dynamics, and many other systems theories. Grey systems theory is also one of such systems theories that appeared initially in the 1980s. When the research of systems science and the method and technology of systems engineering are applied in various traditional disciplines, such as management science, decision science, and various scienti?c disciplines, a whole new group of new results and breakthroughs are obtained. Such a historical background has provided the environment and soil for grey systems theory to form and to develop rapidly in the past 20-plus years. More speci?cally, in 1982, Professor Deng Ju-Long published the ?rst research paper in the area of grey systems in the international journal entitled Systems and Control Letters, published by North-Holland Co. His paper was titled "Control Problems of Grey Systems. " The publication of this paper signalled the birth of grey systems theory after many years of e ective research of the founding father. This new theory soon caught the attention of the international academic community and practitioners of science. Many well-known scholars, such as Chinese academicians Qian Xueshen, Song Jian, and Zhang Zhongjun. Professor Roger W.

Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, Proceedings... Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, Proceedings (Paperback)
Dongdai Lin, Gene Tsudik, Xiaoyun Wang
R1,417 Discovery Miles 14 170 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmetric cryptanalysis, symmetric ciphers, public key cryptography, protocol attacks, and privacy techniques.

Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011, Proceedings (Paperback,... Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011, Proceedings (Paperback, 2011 ed.)
Liqun Chen
R1,464 Discovery Miles 14 640 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th IMA International Conference on Cryptography and Coding, IMACC 2011, held in Oxford, UK in December 2011. The 27 revised full papers presented together with one invited contribution were carefully reviewed and selected from 57 submissions. The papers cover a wide range of topics in the field of mathematics and computer science, including coding theory, homomorphic encryption, symmetric and public key cryptosystems, cryptographic functions and protocols, efficient pairing and scalar multiplication implementation, knowledge proof, and security analysis.

Coding for Data and Computer Communications (Paperback, Softcover reprint of hardcover 1st ed. 2005): David Salomon Coding for Data and Computer Communications (Paperback, Softcover reprint of hardcover 1st ed. 2005)
David Salomon
R3,418 Discovery Miles 34 180 Ships in 18 - 22 working days

Coding is an highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basis of coding can prevent a serious and practical understanding of this important area.

"Coding for Data and Computer Communications" eschews the complex mathematics and clearly describes the core concepts, principles, and methods of channel codes ( for error correction), source codes (for compressing data), and secure codes (for cryptography, data hiding, and privacy). Conveniently organized and segmented into three associated parts for these coding types, the book examines the most important approaches and techniques used to make the storage and transmission of information (data) fast, secure, and reliable.

Topics and features:

*Integrates the disciplines of error control, data compression, and cryptography and data hiding

*Presents material in a logical, clear, and lively way for rapid learning

*Highly inclusive, balanced coverage for specialists and nonspecialists

*Contains a chapter on the rarely covered topic of check digits

*Provides numerous examples, illustrations, and other helpful learning aids

An essential resource and monograph for all security researchers and professionals who need to understand and effectively use coding employed in computers and data communications. Anchored by a clear, nonmathematical exposition, the book presents all the major topics, principles, and methods in an accessible style suitable for professional specialists, nonspecialists, students, and individual self-study.

Turbo-like Codes - Design for High Speed Decoding (Paperback, Softcover reprint of hardcover 1st ed. 2007): Aliazam Abbasfar Turbo-like Codes - Design for High Speed Decoding (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Aliazam Abbasfar
R2,602 Discovery Miles 26 020 Ships in 18 - 22 working days

This book introduces turbo error correcting concept in a simple language, including a general theory and the algorithms for decoding turbo-like code. It presents a unified framework for the design and analysis of turbo codes and LDPC codes and their decoding algorithms.

A major focus is on high speed turbo decoding, which targets applications with data rates of several hundred million bits per second (Mbps).

Secure Group Communications Over Data Networks (Paperback, Softcover reprint of hardcover 1st ed. 2005): Xukai Zou, Byrav... Secure Group Communications Over Data Networks (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
R2,626 Discovery Miles 26 260 Ships in 18 - 22 working days

The ubiquitous nature of the Internet is enabling a new generation of - pUcations to support collaborative work among geographically distant users. Security in such an environment is of utmost importance to safeguard the pri vacy of the communication and to ensure the integrity of the applications. 'Secure group communications' (SGC) refers to a scenario in which a group of participants can receive and send messages to group members, in a way that outsiders are unable to glean any information even when they are able to intercept the messages. SGC is becoming extremely important for researchers and practitioners because many applications that require SGC are now widely used, such as teleconferencing, tele-medicine, real-time information services, distributed interactive simulations, collaborative work, grid computing, and the deployment of VPN (Virtual Private Networks). Even though considerable research accomplishments have been achieved in SGC, few books exist on this very important topic. The purpose of this book is to provide a comprehensive survey of principles and state-of-the-art techniques for secure group communications over data net works. The book is targeted towards practitioners, researchers and students in the fields of networking, security, and software applications development. The book consists of 7 chapters, which are listed and described as follows."

Pattern Recognition Theory and Applications - Proceedings of the NATO Advanced Study Institute held at St. Anne's College,... Pattern Recognition Theory and Applications - Proceedings of the NATO Advanced Study Institute held at St. Anne's College, Oxford, March 29-April 10, 1981 (Paperback, Softcover reprint of the original 1st ed. 1982)
J. Kittler, V.W. Fu, L.F. Pau
R7,720 Discovery Miles 77 200 Ships in 18 - 22 working days

This book is the outcome of the successful NATO Advanced Study Institute on Pattern Recognition Theory and Applications, held at St. Anne's College, Oxford, in April 1981., The aim of the meeting was to review the recent advances in the theory of pattern recognition and to assess its current and future practical potential. The theme of the Institute - the decision making aspects of pattern recognition with the emphasis on the novel hybrid approaches - and its scope - a high level tutorial coverage of pattern recognition methodologies counterpointed with contrib uted papers on advanced theoretical topics and applications - are faithfully reflected by the volume. The material is divided into five sections: 1. Methodology 2. Image Understanding and Interpretation 3. Medical Applications 4. Speech Processing and Other Applications 5. Panel Discussions. The first section covers a broad spectrum of pattern recognition methodologies, including geometric, statistical, fuzzy set, syntactic, graph-theoretic and hybrid approaches. Its cove,r age of hybrid methods places the volume in a unique position among existing books on pattern recognition. The second section provides an extensive treatment of the topical problem of image understanding from both the artificial intelligence and pattern recognition points of view. The two application sections demonstrate the usefulness of the novel methodologies in traditional pattern 'recognition application areas. They address the problems of hardware/software implementation and of algorithm robustness, flexibility and general reliability. The final section reports on a panel discussion held during the Institute.

Fundamentals of Computer Security (Paperback, Softcover reprint of hardcover 1st ed. 2003): Josef Pieprzyk, Thomas Hardjono,... Fundamentals of Computer Security (Paperback, Softcover reprint of hardcover 1st ed. 2003)
Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
R1,796 Discovery Miles 17 960 Ships in 18 - 22 working days

This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key encryption, hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, and many others. The section on intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed. The final chapters introduce modern e- business systems based on digital cash.

Information Hiding - 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers... Information Hiding - 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers (Paperback, 2011 ed.)
Tomas Filler, Tomas Pevny, Scott Craver, Andrew Ker
R1,424 Discovery Miles 14 240 Ships in 18 - 22 working days

This book contains the thoroughly refereed post-conferernce proceedings of the 13th Information Hiding Conference, IH 2011, held in Prague, Czech Republic, in May 2011. Included in this volume are 23 carefully reviewed papers that were selected out of 69 submissions. The contributions are organized in topical sections on: fingerprinting, anonymity and privacy, steganography and steganalysis, watermarking, digital rights management and digital forensics, and digital hiding in unusual context. Also included are the papers that were presented as part of the special session dedicated to the BOSS (Break Our Steganographic System) contest.

Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14,... Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011, Proceedings (Paperback, 2011 ed.)
Daniel J. Bernstein, Sanjit Chatterjee
R1,439 Discovery Miles 14 390 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.

Recent Trends in Network Security and Applications - Third International Conference, CNSA 2010, Chennai, India, July 23-25,... Recent Trends in Network Security and Applications - Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 Proceedings (Paperback, 2010 ed.)
Natarajan Meghanathan, Selma Boumerdassi, Nabendu Chaki, Dhinaharan Nagamalai
R2,935 Discovery Miles 29 350 Ships in 18 - 22 working days

The Third International Conference on Network Security and Applications (CNSA-2010) focused on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding modern security threats and countermeasures, and establishing new collaborations in these areas. Authors are invited to contribute to the conference by submitting articles that illustrate research results, projects, survey work and industrial experiences describing significant advances in the areas of security and its applications, including: * Network and Wireless Network Security * Mobile, Ad Hoc and Sensor Network Security * Peer-to-Peer Network Security * Database and System Security * Intrusion Detection and Prevention * Internet Security, and Applications Security and Network Management * E-mail Security, Spam, Phishing, E-mail Fraud * Virus, Worms, Trojon Protection * Security Threats and Countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc. ) * Ubiquitous Computing Security * Web 2. 0 Security * Cryptographic Protocols * Performance Evaluations of Protocols and Security Application There were 182 submissions to the conference and the Program Committee selected 63 papers for publication. The book is organized as a collection of papers from the First International Workshop on Trust Management in P2P Systems (IWTMP2PS 2010), the First International Workshop on Database Management Systems (DMS- 2010), and the First International Workshop on Mobile, Wireless and Networks Security (MWNS-2010).

Secret Language - Codes, Tricks, Spies, Thieves, and Symbols (Paperback): Barry J Blake Secret Language - Codes, Tricks, Spies, Thieves, and Symbols (Paperback)
Barry J Blake
R359 Discovery Miles 3 590 Ships in 10 - 15 working days

This book is about language that is designed to mean what it does not seem to mean. Ciphers and codes conceal messages and protect secrets. Symbol and magic hide meanings to delight or imperil. Languages made to baffle and confuse let insiders talk openly without being understood by those beyond the circle. Barry Blake looks at these and many more. He explores the history and uses of the slangs and argots of schools and trades. He traces the centuries-old cants used by sailors and criminals in Britain, among them Polari, the mix of Italian, Yiddish, and slang once spoken among strolling players and circus folk and taken up by gays in the twentieth century. He examines the sacred languages of ancient cults and religions, uncovers the workings of onomancy, spells, and gematria, looks into the obliqueness of allusion and parody, and celebrates the absurdities of euphemism and jargon. Secret Language takes the reader on fascinating excursions down obscure byways of language, ranging across time and culture. With revelations on every page it will entertain anyone with an urge to know more about the most arcane and curious uses of language.

Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011, Proceedings (Paperback, Edition.)
Kenneth G. Paterson
R1,499 Discovery Miles 14 990 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2011, held in Tallinn, Estonia, in May 2011. The 31 papers, presented together with 2 invited talks, were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on lattice-base cryptography, implementation and side channels, homomorphic cryptography, signature schemes, information-theoretic cryptography, symmetric key cryptography, attacks and algorithms, secure computation, composability, key dependent message security, and public key encryption.

Availability, Reliability and Security for Business, Enterprise and Health Information Systems - IFIP WG 8.4/8.9 International... Availability, Reliability and Security for Business, Enterprise and Health Information Systems - IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, Vienna, Austria, August 22-26, 2011, Proceedings (Paperback)
A. Min Tjoa, Gerald Quirchmayr, Ilsun You, Li Da Xu
R1,436 Discovery Miles 14 360 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop on Availability, Reliability and Security - Multidisciplinary Research and Practice for Business, Enterprise and Health Information Systems, ARGES 2011, held in Vienna, Austria, in August 2011.The 29 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of availability, reliability and security for information systems as a discipline bridging the application fields and the well- defined computer science field. They are organized in three sections: multidisciplinary research and practice for business, enterprise and health information systems; massive information sharing and integration and electronic healthcare; and papers from the colocated International Workshop on Security and Cognitive Informatics for Homeland Defense.

Communications and Multimedia Security - 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June... Communications and Multimedia Security - 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010, Proceedings (Paperback, Edition.)
Bart De Decker, Ingrid Schaumuller-Bichl
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Over the last decade, we have witnessed a growing dependency on information technologyresultingina wide rangeofnew opportunities. Clearly, ithas become almost impossible to imagine life without a personal computer or laptop, or without a cell phone. Social network sites (SNS) are competing with face-- face encounters and may even oust them. Most SNS-adepts have hundreds of "friends," happily sharing pictures and pro?les and endless chitchat. We are on the threshold of the Internet of Things, where every object will have its RFID-tag. This will not only e?ect companies, who will be able to optimize their production and delivery processes, but also end users, who will be able to enjoy many new applications, ranging from smart shopping, and smart fridges to geo-localized services. In the near future, elderly people will be able to stay longer at home due to clever health monitoring systems. The sky seems to be the limit However, we have also seen the other side of the coin: viruses, Trojan horses, breaches of privacy, identity theft, and other security threats. Our real and virtual worlds are becoming increasingly vulnerable to attack. In order to encouragesecurity researchby both academia and industry and to stimulate the dissemination of results, conferences need to be organized. With the 11th edition of the joint IFIP TC-6 TC-11 Conference on C- munications and Multimedia Security (CMS 2010), the organizers resumed the tradition of previous CMS conferences after a three-year recess.

Computer Intrusion Detection and Network Monitoring - A Statistical Viewpoint (Paperback, Softcover reprint of the original 1st... Computer Intrusion Detection and Network Monitoring - A Statistical Viewpoint (Paperback, Softcover reprint of the original 1st ed. 2001)
David J Marchette
R2,668 Discovery Miles 26 680 Ships in 18 - 22 working days

This book covers the basic statistical and analytical techniques of computer intrusion detection. It is the first to present a data-centered approach to these problems. It begins with a description of the basics of TCP/IP, followed by chapters dealing with network traffic analysis, network monitoring for intrusion detection, host based intrusion detection, and computer viruses and other malicious code.

Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011, Proceedings... Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011, Proceedings (Paperback, Edition.)
Simone Fischer-Hubner, Nicholas Hopper
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Symposium, PETS 2011, held in Waterloo, Canada, in July 2011.
The 15 revised full papers were carefully reviewed and selected from 61 submissions. The papers address design and realization of privacy services for the Internet, other data systems and communication networks. Presenting novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems the volume also features novel technical contributions from other communities such as law, business, and data protection authorities, that present their perspectives on technological issues.

Advances in Network Security and Applications - 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011,... Advances in Network Security and Applications - 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011, Proceedings (Paperback, Edition.)
David C. Wyld, Michal Wozniak, Nabendu Chaki, Natarajan Meghanathan, Dhinaharan Nagamalai
R2,776 Discovery Miles 27 760 Ships in 18 - 22 working days

This book constitutes the proceedings of the 4th International Conference on Network Security and Applications held in Chennai, India, in July 2011. The 63 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address all technical and practical aspects of security and its applications for wired and wireless networks and are organized in topical sections on network security and applications, ad hoc, sensor and ubiquitous computing, as well as peer-to-peer networks and trust management.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Codes and Designs - Proceedings of a…
K.T. Arasu, Akos Seress Hardcover R5,404 Discovery Miles 54 040
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
Cooperative Communications and…
Y -W Peter Hong, Wan-Jen Huang, … Hardcover R4,237 Discovery Miles 42 370
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R778 R682 Discovery Miles 6 820
Computer & Internet Security - A…
Wenliang Du Hardcover R1,874 Discovery Miles 18 740
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Technical Articles about the Voynich…
National Security Agency Hardcover R597 Discovery Miles 5 970
Discrete Mathematics with Cryptographic…
Alexander I Kheyfits Hardcover R1,852 R1,484 Discovery Miles 14 840
Providing Sound Foundations for…
Oded Goldreich Hardcover R3,016 Discovery Miles 30 160

 

Partners