0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (328)
  • R250 - R500 (865)
  • R500+ (14,046)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

RFID Security - Techniques, Protocols and System-On-Chip Design (Hardcover, 4., Bearb. Aufl): Paris Kitsos, Yan Zhang RFID Security - Techniques, Protocols and System-On-Chip Design (Hardcover, 4., Bearb. Aufl)
Paris Kitsos, Yan Zhang
R4,425 Discovery Miles 44 250 Ships in 12 - 17 working days

RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardware implementations for cryptography algorithms and security techniques in RFID. The volume is structured in three parts. Part 1 deals with RFID fundamentals, including system architectures and applications. Part 2 addresses RFID security protocols and techniques with a comprehensive collection of the recent state-of-art protocols and techniques to secure RFID avoiding all potential security forces and cracks. Finally, the book discusses hardware implementation of security algorithms. This section deals with the hardware implementations of cryptography algorithms and protocols dedicated to RFID platforms and chips.

Smart Card Security and Applications (Hardcover): Mike Hendry Smart Card Security and Applications (Hardcover)
Mike Hendry
R3,059 Discovery Miles 30 590 Ships in 12 - 17 working days

Smart cards have recently emerged as a key computer network and Internet security technology. These plastic cards contain an embedded microprocessor, allowing them to be programmed to perform specific duties. This extensively updated, second edition of the popular Artech House book, Smart Card Security and Applications, offers a current overview of the ways smart cards address the computer security issues of today's varied applications. Brand new discussions on multi-application operating systems, computer networks, and the Internet are included to keep technical and business professionals abreast of the very latest developments in this field. The book provides technical details on the newest protection mechanisms, features a discussion on the effects of recent attacks, and presents a clear methodology for solving unique security problems.

Broadband Satellite Communication Systems and the Challenges of Mobility - IFIP TC6 Workshops on Broadband Satellite... Broadband Satellite Communication Systems and the Challenges of Mobility - IFIP TC6 Workshops on Broadband Satellite Communication Systems and Challenges of Mobility, World Computer Congress August 22-27, 2004, Toulouse, France (Hardcover, 2005 ed.)
Thierry Gayraud, Michel Mazella, Fernando Pedro Lopes Boavida Fernandes, Edmundo Heitor da Silva Monteiro, Joao Gilberto De Matos Orvalho
R3,028 Discovery Miles 30 280 Ships in 10 - 15 working days

Broadband Satellite Communication Systems and the Challenges of Mobility is an essential reference for both academic and professional researchers in the field of telecommunications, computer networking and wireless networks.

Recently the request of multimedia services has been rapidly increasing and satellite networks appear to be attractive for a fast service deployment and for extending the typical service area of terrestrial systems. In comparison with traditional wide area networks, a characteristic of satellite communication systems is their ability in broadcasting and multicasting multimedia information flows anywhere over the satellite coverage. The papers presented in this volume highlight key areas such as Satellite Network Architectures, Services and Applications; Mobile Satellite Systems and Services; and Hybrid Satellite and Terrestrial Networks.

Mobility will inevitably be one of the main characteristics of future networks, terminals and applications and, thus, extending and integrating fixed network protocols and services to mobile systems represents one of the main issues of present networking. The secondary focus of this volume is on challenges of mobility, that is, on technologies, protocols and services for the support of seamless and nomadic user access to new classes of applications in person-to-person, device-to-device and device-to-person environments. The book comprises recent results of research and development in the following areas; Seamless mobility; Mobile ad hoc and sensor networks; Analysis, simulation and measurements of mobile and wireless systems; Integration and inter-working of wired and wireless networks; QoS in mobile and wireless networks; Future trends and issues concerning mobility.

This state -of-the-art volume contains a collection of papers from two of the workshops of the 18th IFIP World Computer Congress, held August 22-27, 2004, in Toulouse, France: the Workshop on Broadband Satellite Communication Systems, and the Workshop on the Challenges of Mobility.

Distributed and Parallel Systems - Cluster and Grid Computing (Hardcover, 2004 ed.): Zoltan Juhasz, Peter Kacsuk, Dieter... Distributed and Parallel Systems - Cluster and Grid Computing (Hardcover, 2004 ed.)
Zoltan Juhasz, Peter Kacsuk, Dieter Kranzlmuller
R2,882 Discovery Miles 28 820 Ships in 10 - 15 working days

DAPSY (Austrian-Hungarian Workshop on Distributed and Parallel Systems) is an international conference series with biannual events dedicated to all aspects of distributed and parallel computing. DAPSY started under a different name in 1992 (Sopron, Hungary) as regional meeting of Austrian and Hungarian researchers focusing on transputer-related parallel computing; a hot research topic of that time. A second workshop followed in 1994 (Budapest, Hungary). As transputers became history, the scope of the workshop widened to include parallel and distributed systems in general and the 1st DAPSYS in 1996 (Miskolc, Hungary) reflected the results of these changes.

Distributed and Parallel Systems: Cluster and Grid Computing is an edited volume based on DAPSYS, 2004, the 5th Austrian-Hungarian Workshop on Distributed and Parallel Systems. The workshop was held in conjunction with EuroPVM/MPI-2004, Budapest, Hungary September 19-22, 2004.

Intelligent Multimedia Technologies for Networking Applications - Techniques and Tools (Hardcover, New): Dimitris N.... Intelligent Multimedia Technologies for Networking Applications - Techniques and Tools (Hardcover, New)
Dimitris N. Kanellopoulos
R5,200 Discovery Miles 52 000 Ships in 12 - 17 working days

As ubiquitous multimedia applications benefit from the rapid development of intelligent multimedia technologies, there is an inherent need to present frameworks, techniques and tools that adopt these technologies to a range of networking applications. Intelligent Multimedia Technologies for Networking Applications: Techniques and Tools promotes the discussion of specific solutions for improving the quality of multimedia experience while investigating issues arising from the deployment of techniques for adaptive video streaming. This reference source provides relevant theoretical frameworks and leading empirical research findings and is suitable for practitioners and researchers in the area of multimedia technology.

High-speed Communication Networks - Proceedings of TriComm '92 Held in Raleigh, North Carolina, February 27-28, 1992... High-speed Communication Networks - Proceedings of TriComm '92 Held in Raleigh, North Carolina, February 27-28, 1992 (Hardcover, New)
Harry G. Perros
R2,495 Discovery Miles 24 950 Ships in 12 - 17 working days

Local ATM.- Architecture of Local and Metropolitan ATM Networks: New Trends.- Supercomputer Communications as an Application for ATM Local Area Networks.- Gigabit Local Area Networks.- Congestion Control I.- An Overview of Bandwidth Management Procedures in High-Speed Networks.- Performance of the Buffered Leaky Bucket Policing Mechanism.- Congestion Control II.- Explicit Foward Congestion Notification in ATM Networks.- A Novel Architecture and Flow Control Scheme for Private ATM Networks.- Gateway Congestion Controls in High-Speed Backbone Networks.- Standards.- What's New in B-ISDN Standards?.- Routing.- Routing in ATM Networks.- A Queueing-Network Model for Half-Duplex Routing in Data Communication Networks.- Transport Protocols.- The Xpress Transfer Protocol.- Radiology Communications for Imaging Systems.- High-Speed Transport Protocol Evaluation in the VISTAnet Project.- Traffic Measurements.- Traffic Models for ISDN and B-ISDN Users.- Traffic Characterization in a Wide Area Network.- Telecommunications Software Engineering.- Engineering of Telecommunications Software.- Reliability of Telecommunications Software: Assessing Sensitivity of Least Squares Reliability Estimates.- Software Metrics and the Quality of Telecommunication Software.

Implementing Computational Intelligence Techniques for Security Systems Design (Hardcover): Yousif Abdullatif Albastaki, Wasan... Implementing Computational Intelligence Techniques for Security Systems Design (Hardcover)
Yousif Abdullatif Albastaki, Wasan Awad
R5,767 Discovery Miles 57 670 Ships in 10 - 15 working days

Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms that take advantage of approaches based on computational intelligence techniques, such as genetic algorithms, genetic programming, and so on, have been proposed to solve these issues. Implementing Computational Intelligence Techniques for Security Systems Design is an essential research book that explores the application of computational intelligence and other advanced techniques in information security, which will contribute to a better understanding of the factors that influence successful security systems design. Featuring a range of topics such as encryption, self-healing systems, and cyber fraud, this book is ideal for security analysts, IT specialists, computer engineers, software developers, technologists, academicians, researchers, practitioners, and students.

A Graph-Theoretic Approach to Enterprise Network Dynamics (Hardcover, 2007 ed.): Horst Bunke, Peter J. Dickinson, Miro Kraetzl,... A Graph-Theoretic Approach to Enterprise Network Dynamics (Hardcover, 2007 ed.)
Horst Bunke, Peter J. Dickinson, Miro Kraetzl, Walter D. Wallis
R3,008 Discovery Miles 30 080 Ships in 10 - 15 working days

Networks have become nearly ubiquitous and increasingly complex, and their support of modern enterprise environments has become fundamental. Accordingly, robust network management techniques are essential to ensure optimal performance of these networks. This monograph treats the application of numerous graph-theoretic algorithms to a comprehensive analysis of dynamic enterprise networks. Network dynamics analysis yields valuable information about network performance, efficiency, fault prediction, cost optimization, indicators and warnings. Based on many years of applied research of generic network dynamics, this work covers a number of elegant applications (including many new and experimental results) of traditional graph theory algorithms and techniques to computationally tractable network dynamics analysis to motivate network analysts, practitioners and researchers alike. The material is also suitable for graduate courses addressing state-of-the-art applications of graph theory in analysis of dynamic communication networks, dynamic databasing, and knowledge management.

Disruptive Technologies, Innovation and Global Redesign - Emerging Implications (Hardcover): Ndubuisi Ekekwe, Nazrul Islam Disruptive Technologies, Innovation and Global Redesign - Emerging Implications (Hardcover)
Ndubuisi Ekekwe, Nazrul Islam
R4,949 Discovery Miles 49 490 Ships in 12 - 17 working days

In the last few years, most parts of the world have morphed into an electronically interdependent economic unit where a disruption in one marketplace affects the others. New technologies have emerged, transforming the ways we do business and, consequently, redesigning the world. Innovation in disruptive technologies pushes new and more agile firms to set new benchmarks and forces established companies to revisit existing models or re-invent themselves to stay competitive. Disruptive Technologies, Innovation and Global Redesign: Emerging Implications provides case studies as well as practical and theoretical papers on the issues surrounding disruptive technologies, innovation, global redesign. This book will be a useful reference for academics, students, policymakers and professionals in the fields of emerging and disruptive technologies, innovation, economic planning, technology and society, technology transfer, and general technology management.

Distributed Computing Innovations for Business, Engineering, and Science (Hardcover): Alfred Wai-Sing Loo Distributed Computing Innovations for Business, Engineering, and Science (Hardcover)
Alfred Wai-Sing Loo
R5,304 Discovery Miles 53 040 Ships in 12 - 17 working days

In recent years, distributed systems and computing applications continue to increase its approaches towards business, engineering, and science. Distributed Computing Innovations for Business, Engineering, and Science is a collection of widespread research providing relevant theoretical frameworks and research findings on the applications of distributed computing innovations to the business, engineering and science fields. This book aims to provide insights on the management of expertise, knowledge, information and organizational development in distributed computing.

Automotive Informatics and Communicative Systems - Principles in Vehicular Networks and Data Exchange (Hardcover): Huaqun Guo Automotive Informatics and Communicative Systems - Principles in Vehicular Networks and Data Exchange (Hardcover)
Huaqun Guo
R5,303 Discovery Miles 53 030 Ships in 12 - 17 working days

Emerging vehicular networks are fast becoming a reality that will enable a variety of applications such as safety, traffic efficiency, and infotainment. ""Automotive Informatics and Communicative Systems: Principles in Vehicular Networks and Data Exchange"" introduces vehicular networks and advanced information technologies applied in the automotive region. Presenting advanced research works in secure remote monitoring and control of vehicles, this book provides future trends of information technologies in the automotive domain.

Hacking For Dummies (Paperback, 7th Edition): K Beaver Hacking For Dummies (Paperback, 7th Edition)
K Beaver
R675 R527 Discovery Miles 5 270 Save R148 (22%) Ships in 9 - 15 working days

Learn to think like a hacker to secure your own systems and data.

Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information that should remain private. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong.

Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them. You will learn to secure your Wi-Fi networks, lock down your latest Windows 11 installation, understand the security implications of remote work, and much more.

You’ll find out how to:

  • Stay on top of the latest security weaknesses that could affect your business’s security setup
  • Use freely available testing tools to “penetration test” your network’s security
  • Use ongoing security checkups to continually ensure that your data is safe from hackers

Perfect for small business owners, IT and security professionals, and employees who work remotely, Hacking For Dummies is a must-have resource for anyone who wants to keep their data safe.

Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Hardcover): Harris Schwartz Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Hardcover)
Harris Schwartz
R847 Discovery Miles 8 470 Ships in 10 - 15 working days
Secure Cloud Transformation - The CIO's Journey (Hardcover): Richard Stiennon Secure Cloud Transformation - The CIO's Journey (Hardcover)
Richard Stiennon
R730 Discovery Miles 7 300 Ships in 12 - 17 working days
Bayesian Network Technologies - Applications and Graphical Models (Hardcover): Bayesian Network Technologies - Applications and Graphical Models (Hardcover)
R2,778 Discovery Miles 27 780 Ships in 12 - 17 working days

Bayesian networks are now being used in a variety of artificial intelligence applications. These networks are high-level representations of probability distributions over a set of variables that are used for building a model of the problem domain. ""Bayesian Network Technologies: Applications and Graphical Models"" provides an excellent and well-balanced collection of areas where Bayesian networks have been successfully applied. This book describes the underlying concepts of Bayesian Networks in an interesting manner with the help of diverse applications, and theories that prove Bayesian networks valid. ""Bayesian Network Technologies: Applications and Graphical Models"" provides specific examples of how Bayesian networks are powerful machine learning tools critical in solving real-life problems.

Advances in Ubiquitous Computing - Future Paradigms and Directions (Hardcover): Soraya Kouadri Mostefaoui, Zakaria Maamar,... Advances in Ubiquitous Computing - Future Paradigms and Directions (Hardcover)
Soraya Kouadri Mostefaoui, Zakaria Maamar, George M Giaglis
R2,779 Discovery Miles 27 790 Ships in 12 - 17 working days

The development and availability of new computing and communication devices, and the increased connectivity between these devices, thanks to wired and wireless networks, are enabling new opportunities for people to perform their operations anywhere and anytime. This technological expansion has developed a multitude of challenges that demand further research. ""Advances in Ubiquitous Computing: Future Paradigms and Directions"" investigates the technology foreground of ubiquitous computing, the emerging applications and services, as well as certain social issues that are vital for the successful deployment of a ubiquitous computing application, through a multi-perspective analytical lens.Providing academics and practitioners with high quality, authoritative content on such topics as device design, wireless communication, location sensing, privacy concerns, attention focus, multi-person interaction, and direct interaction, work patterns, this Premier Reference Source is a must-have addition to library collections worldwide.

Essentials of Blockchain Technology (Hardcover): Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino Essentials of Blockchain Technology (Hardcover)
Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino
R2,542 Discovery Miles 25 420 Ships in 12 - 17 working days

Blockchain technologies, as an emerging distributed architecture and computing paradigm, have accelerated the development/application of the Cloud/GPU/Edge Computing, Artificial Intelligence, cyber physical systems, social networking, crowdsourcing and crowdsensing, 5G, trust management, and finance. The popularity and rapid development of Blockchain brings many technical and regulatory challenges for research and academic communities. This book will feature contributions from experts on topics related to performance, benchmarking, durability, robustness, as well data gathering and management, algorithms, analytics techniques for transactions processing, and implementation of applications.

Cloud Computing and Virtualization Technologies in Libraries (Hardcover, New): Sangeeta N. Dhamdhere Cloud Computing and Virtualization Technologies in Libraries (Hardcover, New)
Sangeeta N. Dhamdhere
R4,782 Discovery Miles 47 820 Ships in 12 - 17 working days

The emergence of open access, web technology, and e-publishing has slowly transformed modern libraries into digital libraries. With this variety of technologies utilized, cloud computing and virtual technology has become an advantage for libraries to provide a single efficient system that saves money and time. Cloud Computing and Virtualization Technologies in Libraries highlights the concerns and limitations that need addressed in order to optimize the benefits of cloud computing to the virtualization of libraries. Focusing on the latest innovations and technological advancements, this book is essential for professionals, students, and researchers interested in cloud library management and development in different types of information environments.

Heterogeneous Wireless Access Networks - Architectures and Protocols (Hardcover, 2009 ed.): Ekram Hossain Heterogeneous Wireless Access Networks - Architectures and Protocols (Hardcover, 2009 ed.)
Ekram Hossain
R2,961 Discovery Miles 29 610 Ships in 10 - 15 working days

Heterogeneous wireless networking, which is sometimes referred to as the fourth-generation (4G) wireless, is a new frontier in the future wireless communications technology and there has been a growing interest on this topic among researchers and engineers in both academia and industry. This book will include a set of research and survey articles featuring the recent advances in theory and applications of heterogeneous wireless networking technology for the next generation (e.g., fourth generation) wireless communications systems. With the rapid growth in the number of wireless applications, services and devices, using a single wireless technology such as a second generation (2G) and third generation (3G) wireless system would not be efficient to deliver high speed data rate and quality-of-service (QoS) support to mobile users in a seamless way. Fourth generation (4G) wireless systems are devised with the vision of heterogeneity in which a mobile user/device will be able to connect to multiple wireless networks (e.g., WLAN, cellular, WMAN) simultaneously. This book intends to provide a unified view on the state-of-the-art of protocols and architectures for heterogeneous wireless networking. The contributed articles will cover both the theoretical concepts and system-level implementation issues related to design, analysis, and optimization of architectures and protocols for heterogeneous wireless access networks.

Cryptographic Algorithms on Reconfigurable Hardware (Hardcover, 2007 ed.): Francisco Rodriguez-henriquez, N. A. Saqib, Arturo... Cryptographic Algorithms on Reconfigurable Hardware (Hardcover, 2007 ed.)
Francisco Rodriguez-henriquez, N. A. Saqib, Arturo Diaz Perez, Cetin Kaya Koc
R5,140 Discovery Miles 51 400 Ships in 12 - 17 working days

Software-based cryptography can be used for security applications where data traffic is not too large and low encryption rate is tolerable. But hardware methods are more suitable where speed and real-time encryption are needed. Until now, there has been no book explaining how cryptographic algorithms can be implemented on reconfigurable hardware devices. This book covers computational methods, computer arithmetic algorithms, and design improvement techniques needed to implement efficient cryptographic algorithms in FPGA reconfigurable hardware platforms. The author emphasizes the practical aspects of reconfigurable hardware design, explaining the basic mathematics involved, and giving a comprehensive description of state-of-the-art implementation techniques.

Transforming Your Business with AWS - Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services... Transforming Your Business with AWS - Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services (Paperback)
P Abdoulaye
R723 Discovery Miles 7 230 Ships in 12 - 17 working days

Expert guidance on how to use Amazon Web Services to supercharge your digital services business In Transforming Your Business with AWS: Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services, renowned international consultant and sought-after speaker Philippe Abdoulaye delivers a practical and accessible guide to using Amazon Web Services to modernize your business and the digital services you offer. This book provides you with a concrete action plan to build a team capable of creating world-class digital services and long-term competitive advantages. You'll discover what separates merely average digital service organizations from the truly outstanding, as well as how moving to the cloud will enable your business to deliver your services faster, better, and more efficiently. This book also includes: A comprehensive overview of building industry-leading digital service delivery capabilities, including discussions of the development lifecycle, best practices, and AWS-based development infrastructure Explanations of how to implement a digital business transformation strategy An exploration of key roles like DevOps Continuous Delivery, Continuous Deployment, Continuous Integration, Automation, and DevSecOps Hands-on treatments of AWS application management tools, including Elastic Beanstalk, CodeDeploy, and CodePipeline Perfect for executives, managers, and other business leaders attempting to clarify and implement their organization's digital vision and strategy, Transforming Your Business with AWS is a must-read reference that answers the "why" and, most importantly, the "how," of digital transformation with Amazon Web Services.

Network Science, Nonlinear Science and Infrastructure Systems (Hardcover, 2007 ed.): Terry L. Friesz Network Science, Nonlinear Science and Infrastructure Systems (Hardcover, 2007 ed.)
Terry L. Friesz
R2,927 Discovery Miles 29 270 Ships in 10 - 15 working days

Network Science, Nonlinear Science and Infrastructure Systems has been written by leading scholars in these areas. Its express purpose is to develop common theoretical underpinnings to better solve modern infrastructural problems. It is felt by many who work in these fields that many modern communication problems, ranging from transportation networks to telecommunications, Internet, supply chains, etc., are fundamentally infrastructure problems. Moreover, these infrastructure problems would benefit greatly from a confluence of theoretical and methodological work done with the areas of Network Science, Dynamical Systems and Nonlinear Science. This book is dedicated to the formulation of infrastructural tools that will better solve these types of infrastructural problems.

Protocols for Secure Electronic Commerce (Hardcover, 2nd edition): Mostafa Hashem Sherif Protocols for Secure Electronic Commerce (Hardcover, 2nd edition)
Mostafa Hashem Sherif; Series edited by Saba Zamir
R4,648 Discovery Miles 46 480 Ships in 12 - 17 working days

The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securely integrate online activities with pre-existing infrastructures, laws and processes. Protocols for Secure Electronic Commerce, Second Edition addresses the security portion of this challenge. It is a full compendium of the protocols for securing online commerce and payments, serving as an invaluable resource for students and professionals in the fields of computer science and engineering, IT security, and financial and banking technology.

The initial sections provide a broad overview of electronic commerce, money, payment systems, and business-to-business commerce, followed by an examination of well-known protocols (SSL, TLS, WTLS, and SET). The book also explores encryption algorithms and methods, EDI, micropayment, and multiple aspects of digital money.

Like its predecessor, this edition is a general analysis that provides many references to more technical resources. It delivers extensive revisions of previous chapters, along with new chapters on electronic commerce in society, new e-commerce systems, and the security of integrated circuit cards.

Achieving Full Realization and Mitigating the Challenges of the Internet of Things (Hardcover): Marcel Ohanga Odhiambo, Weston... Achieving Full Realization and Mitigating the Challenges of the Internet of Things (Hardcover)
Marcel Ohanga Odhiambo, Weston Mwashita
R6,451 Discovery Miles 64 510 Ships in 10 - 15 working days

As the IoT market is booming, several issues are delaying the full realization of the technology. IoT devices, in cybersecurity terms, greatly increase security risk. This means that any scientific work that offers cybersecurity strategies will excite security experts who will be glad to expand their knowledge base on IoT cybersecurity. As a result of the booming of the IoT market, business competitors are jockeying for a piece of the market. This means that solutions from researchers that address compatibility issues will be greatly welcomed by IoT technology developers. Connectivity providers are likely to embrace solutions to challenges of bandwidth since a growing IoT market must be followed up by bandwidth-intensive IoT applications which tend to jostle for space on the current client-server model. Overpromising followed by underdelivering, has been the current approach by many innovators and the mismatch results in losses in production, orphaned technologies accompanied by frequent system failures. Solutions that address IoT performance issues are likely to excite many start-ups. Solutions to challenges of fragmentation presented by thousands of devices from different manufacturers operating on proprietary ecosystems are likely to be warmly embraced by many IoT brands developers. As such, a publication that specifically addresses the challenges faced in the rolling out of IoT technologies is sorely needed.

E-Commerce Security and Privacy (Hardcover, 2001 ed.): Anup K. Ghosh E-Commerce Security and Privacy (Hardcover, 2001 ed.)
Anup K. Ghosh
R2,981 Discovery Miles 29 810 Ships in 10 - 15 working days

While e-commerce has experienced meteoric growth recently, security risks have similarly grown in scope and magnitude. Three major factors have driven the security risks in e-commerce: the growing reliance on the electronic medium for a company's core business, the growing complexity of the software systems needed to support e-commerce, and the value of the digital assets brought online to an inherently insecure medium - the Internet. While security has long been a primary concern in e-commerce, more recently privacy has also grown in importance to consumers. Many of the same Internet technologies that make e-commerce possible also make it possible to create detailed profiles of an individual's purchases, to spy on individual Web usage habits, and even to peer into confidential files that reside on an individual's machine. E-Commerce Security and Privacy is the first volume to pull together leading researchers and practitioners in diverse areas of computer science and software engineering to explore their technical innovations to problems in security and privacy in e-commerce. The information is drawn from selected papers presented at the first Workshop on Security and Privacy in E-Commerce (WSPEC'00) held in Athens, Greece, November 4, 2000. As such, E-Commerce Security and Privacy introduces both practitioners and researchers to innovations in secure and private e-commerce. Practitioners will gain great insight from the case studies, and researchers will learn about state-of-the-art protocols in secure and private e-commerce that will serve as the basis for future innovations in applied e-commerce technologies. E-Commerce Security and Privacy is suitable as a secondary text for agraduate level course, and as a reference for researchers and practitioners in industry.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Constructing an Ethical Hacking…
Sunita Vikrant Dhavale Hardcover R5,913 Discovery Miles 59 130
Working Postures and Movements
Nico J. Delleman, Christine M. Haslegrave, … Paperback R2,341 Discovery Miles 23 410
Companion to Intrinsic Properties
Robert M Francescotti Hardcover R2,823 Discovery Miles 28 230
Healing in His Presence - The Untold…
Joan Gieson Hardcover R833 Discovery Miles 8 330
Works for Keyboard 2
Jan Sweelink, Sweelinck, … CD R41 Discovery Miles 410
The Art of Segmented Wood Turning - A…
Malcolm Tibbetts Paperback R722 R654 Discovery Miles 6 540
Seasons / Concert Waltzes / Scheherazade…
Philharmonia Orchestra, London Symphony Orchestra CD R146 Discovery Miles 1 460
How Industry Analysts Shape the Digital…
Neil Pollock, Robin Williams Hardcover R4,303 Discovery Miles 43 030
11 Oak Street - The True Story of the…
Graham Cook Hardcover R333 Discovery Miles 3 330
Entrepreneurship and Small Business…
Ge Chiloane-Tsoka, E.M. Rankhumise Paperback  (2)
R666 Discovery Miles 6 660

 

Partners