0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (16)
  • R250 - R500 (91)
  • R500+ (1,943)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Creation and Transfer of Knowledge - Institutions and Incentives (Paperback, Softcover reprint of hardcover 1st ed. 1998):... Creation and Transfer of Knowledge - Institutions and Incentives (Paperback, Softcover reprint of hardcover 1st ed. 1998)
Giorgio Barba Navaretti, Partha Dasgupta, Karl-Goran Maler, Domenico Siniscalco
R2,882 Discovery Miles 28 820 Ships in 10 - 15 working days

Is knowledge an economic good? Which are the characteristics of the institutions regulating the production and diffusion of knowledge? Cumulation of knowledge is a key determinant of economic growth, but only recently knowledge has moved to the core of economic analysis. Recent literature also gives profound insights into events like scientific progress, artistic and craft development which have been rarely addressed as socio-economic institutions, being the domain of sociologists and historians rather than economists. This volume adopts a multidisciplinary approach to bring knowledge in the focus of attention, as a key economic issue.

Asymmetry: The Foundation of Information (Paperback, Softcover reprint of hardcover 1st ed. 2007): Scott J. Muller Asymmetry: The Foundation of Information (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Scott J. Muller
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book gathers concepts of information across diverse fields -physics, electrical engineering and computational science - surveying current theories, discussing underlying notions of symmetry, and showing how the capacity of a system to distinguish itself relates to information. The author develops a formal methodology using group theory, leading to the application of Burnside's Lemma to count distinguishable states. This provides a tool to quantify complexity and information capacity in any physical system.

The Multimedia Internet (Paperback, Softcover reprint of hardcover 1st ed. 2005): Stephen Weinstein The Multimedia Internet (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Stephen Weinstein
R3,391 Discovery Miles 33 910 Ships in 10 - 15 working days

Here is a thorough, not-overly-complex introduction to the three technical foundations for multimedia applications across the Internet: communications (principles, technologies and networking); compressive encoding of digital media; and Internet protocol and services. All the contributing systems elements are explained through descriptive text and numerous illustrative figures; the result is a book well-suited toward non-specialists, preferably with technical background, who need well-composed tutorial introductions to the three foundation areas. The text discusses the latest advances in digital audio and video encoding, optical and wireless communications technologies, high-speed access networks, and IP-based media streaming, all crucial enablers of the multimedia Internet.

TErrestrial Trunked RAdio - TETRA - A Global Security Tool (Paperback, 2007): Peter Stavroulakis TErrestrial Trunked RAdio - TETRA - A Global Security Tool (Paperback, 2007)
Peter Stavroulakis
R4,356 Discovery Miles 43 560 Ships in 10 - 15 working days

Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular due to the strongly increased security demands for mobile systems. In this book, the authors show how TETRA can be strongly improved and these improvements will most probably be part of future TETRA standards. The areas examined include channel assignment and multiple access techniques, video transmission, wireless LAN integration, and the establishment of multiple wireless mesh networks. Since the requirements for these networks is security, the authors show that innovative techniques such as those based on chaotic signals can be used in order to maximize security.

The book is a vital reference point for researchers with ambition to find the general solution for modern problems of public safety.

Primality Testing and Integer Factorization in Public-Key Cryptography (Paperback, Softcover reprint of hardcover 2nd ed.... Primality Testing and Integer Factorization in Public-Key Cryptography (Paperback, Softcover reprint of hardcover 2nd ed. 2009)
Song Y. Yan
R4,377 Discovery Miles 43 770 Ships in 10 - 15 working days

Intended for advanced level students in computer science and mathematics, this key text, now in a brand new edition, provides a survey of recent progress in primality testing and integer factorization, with implications for factoring based public key cryptography. For this updated and revised edition, notable new features include a comparison of the Rabin-Miller probabilistic test in RP, the Atkin-Morain elliptic curve test in ZPP and the AKS deterministic test.

Algorithmic Information Theory - Mathematics of Digital Information Processing (Paperback, Softcover reprint of hardcover 1st... Algorithmic Information Theory - Mathematics of Digital Information Processing (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Peter Seibt
R4,394 Discovery Miles 43 940 Ships in 10 - 15 working days

Algorithmic Information Theory treats the mathematics of many important areas in digital information processing. It has been written as a read-and-learn book on concrete mathematics, for teachers, students and practitioners in electronic engineering, computer science and mathematics. The presentation is dense, and the examples and exercises are numerous. It is based on lectures on information technology (Data Compaction, Cryptography, Polynomial Coding) for engineers.

Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working... Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Steve Furnell; Edited by (ghost editors) Paul Dowland; Edited by Bhavani Thuraisingham, X.Sean Wang
R2,902 Discovery Miles 29 020 Ships in 10 - 15 working days

This is the first joint working conference between the IFIP Working Groups 11. 1 and 11. 5. We hope this joint conference will promote collaboration among researchers who focus on the security management issues and those who are interested in integrity and control of information systems. Indeed, as management at any level may be increasingly held answerable for the reliable and secure operation of the information systems and services in their respective organizations in the same manner as they are for financial aspects of the enterprise, there is an increasing need for ensuring proper standards of integrity and control in information systems in order to ensure that data, software and, ultimately, the business processes are complete, adequate and valid for intended functionality and expectations of the owner (i. e. the user organization). As organizers, we would like to thank the members of the international program committee for their review work during the paper selection process. We would also like to thank the authors of the invited papers, who added valuable contribution to this first joint working conference. Paul Dowland X. Sean Wang December 2005 Contents Preface vii Session 1 - Security Standards Information Security Standards: Adoption Drivers (Invited Paper) 1 JEAN-NOEL EZINGEARD AND DAVID BIRCHALL Data Quality Dimensions for Information Systems Security: A Theorectical Exposition (Invited Paper) 21 GURVIRENDER TEJAY, GURPREET DHILLON, AND AMITA GOYAL CHIN From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper) 41 C. FARKAS, V. GowADiA, A. JAIN, AND D.

Malware Detection (Paperback, Softcover reprint of hardcover 1st ed. 2007): Mihai Christodorescu, Somesh Jha, Douglas Maughan,... Malware Detection (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang
R8,290 Discovery Miles 82 900 Ships in 10 - 15 working days

This book captures the state of the art research in the area of malicious code detection, prevention and mitigation. It contains cutting-edge behavior-based techniques to analyze and detect obfuscated malware. The book analyzes current trends in malware activity online, including botnets and malicious code for profit, and it proposes effective models for detection and prevention of attacks using. Furthermore, the book introduces novel techniques for creating services that protect their own integrity and safety, plus the data they manage.

Hop Integrity in the Internet (Paperback, Softcover reprint of hardcover 1st ed. 2006): Chin-tser Huang, Mohamed G Gouda Hop Integrity in the Internet (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Chin-tser Huang, Mohamed G Gouda
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Denial-of-service attacks are one of the most severe challenges confronting the online world. This ground-breaking volume discusses a new method of countering denial-of-service attacks called hop integrity. It details a suite of protocols for providing hop integrity. In particular, each protocol in this suite is specified and verified using an abstract and formal notation, called the Secure Protocol Notation. In addition, the book presents an alternative way to achieve strong hop integrity with hard sequence numbers.

Insider Attack and Cyber Security - Beyond the Hacker (Paperback, Softcover reprint of hardcover 1st ed. 2008): Salvatore J... Insider Attack and Cyber Security - Beyond the Hacker (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Salvatore J Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos D. Keromytis, Sara Sinclair, …
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College.

This book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and includes the following topics: critical IT infrastructure, insider threats, awareness and dealing with nefarious human activities in a manner that respects individual liberties and privacy policies of organizations while providing the best protection of critical resources and services. In some sense, the insider problem is the ultimate security problem. This volume concludes with technical and legal challenges facing researchers who study and propose solutions to mitigate insider attacks.

Image and Video Encryption - From Digital Rights Management to Secured Personal Communication (Paperback, Softcover reprint of... Image and Video Encryption - From Digital Rights Management to Secured Personal Communication (Paperback, Softcover reprint of hardcover 1st ed. 2005)
Andreas Uhl, Andreas Pommer
R2,840 Discovery Miles 28 400 Ships in 10 - 15 working days

Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....).

The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material.

Information and Complexity in Statistical Modeling (Paperback, Softcover reprint of hardcover 1st ed. 2007): Jorma Rissanen Information and Complexity in Statistical Modeling (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Jorma Rissanen
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

No statistical model is "true" or "false," "right" or "wrong"; the models just have varying performance, which can be assessed. The main theme in this book is to teach modeling based on the principle that the objective is to extract the information from data that can be learned with suggested classes of probability models. The intuitive and fundamental concepts of complexity, learnable information, and noise are formalized, which provides a firm information theoretic foundation for statistical modeling. Although the prerequisites include only basic probability calculus and statistics, a moderate level of mathematical proficiency would be beneficial.

Wireless Network Security (Paperback, Softcover reprint of hardcover 1st ed. 2007): Yang Xiao, Xuemin Shen, Dingzhu Du Wireless Network Security (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Yang Xiao, Xuemin Shen, Dingzhu Du
R4,388 Discovery Miles 43 880 Ships in 10 - 15 working days

This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.

Secure Key Establishment (Paperback, Softcover reprint of hardcover 1st ed. 2009): Kim-Kwang Raymond Choo Secure Key Establishment (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Kim-Kwang Raymond Choo
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.

Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare-Rogaway model and the Canetti-Krawczyk model is included. An integrative framework is proposed that allows protocols to be analyzed in a modified version of the Bellare-Rogaway model using the automated model checker tool.

Secure Key Establishment is designed for advanced level students in computer science and mathematics, as a secondary text or reference book. This book is also suitable for practitioners and researchers working for defense agencies or security companies.

Self-Dual Codes and Invariant Theory (Paperback, Softcover reprint of hardcover 1st ed. 2006): Gabriele Nebe, Eric M. Rains,... Self-Dual Codes and Invariant Theory (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Gabriele Nebe, Eric M. Rains, Neil J.A. Sloane
R5,134 Discovery Miles 51 340 Ships in 10 - 15 working days

One of the most remarkable and beautiful theorems in coding theory is Gleason's 1970 theorem about the weight enumerators of self-dual codes and their connections with invariant theory, which has inspired hundreds of papers about generalizations and applications of this theorem to different types of codes. This self-contained book develops a new theory which is powerful enough to include all the earlier generalizations.

Security for Wireless Sensor Networks (Paperback, Softcover reprint of hardcover 1st ed. 2007): Donggang Liu, Peng Ning Security for Wireless Sensor Networks (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Donggang Liu, Peng Ning
R4,348 Discovery Miles 43 480 Ships in 10 - 15 working days

This book discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security. It contains example applications for target tracking, scientific exploration and data acquisition in hazardous environments, and includes a fairly new study on capabilities of mu-TESLA, a broadcast authentication technique for wireless sensor networks. The book assists both professionals and students to understand background knowledge in wireless sensor network security and prepare them for producing research in this domain.

Preserving Privacy in On-Line Analytical Processing (OLAP) (Paperback, Softcover reprint of hardcover 1st ed. 2007): Lingyu... Preserving Privacy in On-Line Analytical Processing (OLAP) (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Lingyu Wang, Sushil Jajodia, Duminda Wijesekera
R4,324 Discovery Miles 43 240 Ships in 10 - 15 working days

This book addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. OLAP systems usually need to meet two conflicting goals. First, the sensitive data stored in underlying data warehouses must be kept secret. Second, analytical queries about the data must be allowed for decision support purposes. The main challenge is that sensitive data can be inferred from answers to seemingly innocent aggregations of the data. This volume reviews a series of methods that can precisely answer data cube-style OLAP, regarding sensitive data while provably preventing adversaries from inferring data.

New Approaches for Security, Privacy and Trust in Complex Environments - Proceedings of the IFIP TC 11 22nd International... New Approaches for Security, Privacy and Trust in Complex Environments - Proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Hein Venter, Mariki Eloff, Les Labuschagne, Jan Eloff, Rossouw von Solms
R2,938 Discovery Miles 29 380 Ships in 10 - 15 working days

The current IT environment deals with novel, complex approaches such as information privacy, trust, digital forensics, management, and human aspects. This volume includes papers offering research contributions that focus both on access control in complex environments as well as other aspects of computer security and privacy.

Biometric User Authentication for IT Security - From Fundamentals to Handwriting (Paperback, Softcover reprint of hardcover 1st... Biometric User Authentication for IT Security - From Fundamentals to Handwriting (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Claus Vielhauer
R2,874 Discovery Miles 28 740 Ships in 10 - 15 working days

Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans.

Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological traits such as fingerprint, iris, face) and active (learned and trained behavior such as voice, handwriting and gait) biometric recognition techniques to the reader. Unlike other publications in this area that concentrate on passive schemes, this professional book reflects a more comprehensive analysis of one particular active biometric technique: handwriting. Aspects that are thoroughly discussed include sensor characteristic dependency, attack scenarios, and the generation of cryptographic keys from handwriting.

Privacy Preserving Data Mining (Paperback, Softcover reprint of hardcover 1st ed. 2006): Jaideep Vaidya, Christopher W Clifton,... Privacy Preserving Data Mining (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Jaideep Vaidya, Christopher W Clifton, Yu Michael Zhu
R2,826 Discovery Miles 28 260 Ships in 10 - 15 working days

Privacy preserving data mining implies the "mining" of knowledge from distributed data without violating the privacy of the individual/corporations involved in contributing the data. This volume provides a comprehensive overview of available approaches, techniques and open problems in privacy preserving data mining. Crystallizing much of the underlying foundation, the book aims to inspire further research in this new and growing area.

Privacy Preserving Data Mining is intended to be accessible to industry practitioners and policy makers, to help inform future decision making and legislation, and to serve as a useful technical reference.

Vulnerability Analysis and Defense for the Internet (Paperback, Softcover reprint of hardcover 1st ed. 2008): Abhishek Singh Vulnerability Analysis and Defense for the Internet (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Abhishek Singh; Contributions by B Singh, H. Joseph
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Vulnerability analysis, also known as vulnerability assessment, is a process that defines, identifies, and classifies the security holes, or vulnerabilities, in a computer, network, or application. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use. Vulnerability Analysis and Defense for the Internet provides packet captures, flow charts and pseudo code, which enable a user to identify if an application/protocol is vulnerable. This edited volume also includes case studies that discuss the latest exploits.

Orthogonal Frequency Division Multiplexing for Wireless Communications (Paperback, Softcover reprint of hardcover 1st ed.... Orthogonal Frequency Division Multiplexing for Wireless Communications (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Ye (Geoffrey) Li, Gordon L. Stuber
R4,602 Discovery Miles 46 020 Ships in 10 - 15 working days

Orthogonal Frequency Division Multiplexing for Wireless Communications is an edited volume with contributions by leading authorities in the subject of OFDM. Its coverage consists of principles, important wireless topics (e.g. Synchronization, channel estimation, etc.) and techniques. Included is information for advancing wireless communication in a multipath environment with an emphasis on implementation of OFDM in base stations.

Orthogonal Frequency Division Multiplexing for Wireless Communications provides a comprehensive introduction of the theory and practice of OFDM. To facilitate the readers, extensive subject indices and references are given at the end of the book. Even though each chapter is written by different experts, symbols and notations in all chapters of the book are consistent.

Foundations and Applications of Sensor Management (Paperback, Softcover reprint of hardcover 1st ed. 2008): Alfred Olivier... Foundations and Applications of Sensor Management (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Alfred Olivier Hero, David Castanon, Doug Cochran, Keith Kastella
R4,358 Discovery Miles 43 580 Ships in 10 - 15 working days

This book covers control theory signal processing and relevant applications in a unified manner. It introduces the area, takes stock of advances, and describes open problems and challenges in order to advance the field. The editors and contributors to this book are pioneers in the area of active sensing and sensor management, and represent the diverse communities that are targeted.

Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks (Paperback, Softcover reprint of hardcover... Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Radha Poovendran, Cliff Wang, Sumit Roy
R5,855 Discovery Miles 58 550 Ships in 10 - 15 working days

This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc networks and wireless sensor networks. It is suitable as a text for computer science courses in wireless systems and security. It includes implementation studies with mica2 mote sensors. Due to the open spectrum nature of wireless communication, it is subject to attacks and intrusions. Hence the wireless network synchronization needs to be both robust and secure. Furthermore, issues such as energy constraints and mobility make the localization process even more challenging. The book will also interest developers of secure wireless systems.

Botnet Detection - Countering the Largest Security Threat (Paperback, Softcover reprint of hardcover 1st ed. 2008): Wenke Lee,... Botnet Detection - Countering the Largest Security Threat (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Wenke Lee, Cliff Wang, David Dagon
R4,324 Discovery Miles 43 240 Ships in 10 - 15 working days

Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat. Botnet Detection: Countering the Largest Security Threat consists of chapters contributed by world-class leaders in this field, from the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
C++ How to Program: Horizon Edition
Harvey Deitel, Paul Deitel Paperback R1,917 Discovery Miles 19 170
Online and Matching-Based Market Design
Federico Echenique, Nicole Immorlica, … Hardcover R1,799 Discovery Miles 17 990
Norms, Logics and Information Systems…
H. Prakken, P. McNamara Hardcover R2,365 Discovery Miles 23 650
Technological Prospects and Social…
Lavanya Sharma, Pradeep Kumar Garg Hardcover R3,065 Discovery Miles 30 650
Architecture of Reliable Web…
Hardcover R2,847 Discovery Miles 28 470
Multisensor Fusion Estimation Theory and…
Liping Yan, Lu Jiang, … Hardcover R4,239 Discovery Miles 42 390
Digital Signal Processing Systems…
Cornelius T. Leondes Hardcover R1,289 Discovery Miles 12 890
Efficient Polymorphic Calls
Karel Driesen Hardcover R4,483 Discovery Miles 44 830
Computing with Memory for…
Somnath Paul, Swarup Bhunia Hardcover R3,901 Discovery Miles 39 010
Parallel Computing
Eduard L Lafferty Hardcover R1,820 R1,273 Discovery Miles 12 730

 

Partners