0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (13)
  • R250 - R500 (88)
  • R500+ (1,342)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Official (ISC)2 (R) Guide to the CISSP (R)-ISSEP (R) CBK (R) (Hardcover): Susan Hansche Official (ISC)2 (R) Guide to the CISSP (R)-ISSEP (R) CBK (R) (Hardcover)
Susan Hansche
R2,882 Discovery Miles 28 820 Ships in 12 - 19 working days

The Official (ISC)2 (R) Guide to the CISSP (R)-ISSEP (R) CBK (R) provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge. The first fully comprehensive guide to the CISSP-ISSEP CBK, this book promotes understanding of the four ISSEP domains: Information Systems Security Engineering (ISSE); Certification and Accreditation; Technical Management; and an Introduction to United States Government Information Assurance Regulations. This volume explains ISSE by comparing it to a traditional Systems Engineering model, enabling you to see the correlation of how security fits into the design and development process for information systems. It also details key points of more than 50 U.S. government policies and procedures that need to be understood in order to understand the CBK and protect U.S. government information. About the Author Susan Hansche, CISSP-ISSEP is the training director for information assurance at Nortel PEC Solutions in Fairfax, Virginia. She has more than 15 years of experience in the field and since 1998 has served as the contractor program manager of the information assurance training program for the U.S. Department of State.

Chaos Synchronization and Cryptography for Secure Communications - Applications for Encryption (Hardcover, New): Santo Banerjee Chaos Synchronization and Cryptography for Secure Communications - Applications for Encryption (Hardcover, New)
Santo Banerjee
R5,077 Discovery Miles 50 770 Ships in 10 - 15 working days

Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption explores the combination of ordinary and time delayed systems and their applications in cryptographic encoding. This innovative publication presents a critical mass of the most sought after research, providing relevant theoretical frameworks and the latest empirical research findings in this area of study.

Security with Noisy Data - On Private Biometrics, Secure Key Storage and Anti-Counterfeiting (Hardcover, Revised ed.): Pim... Security with Noisy Data - On Private Biometrics, Secure Key Storage and Anti-Counterfeiting (Hardcover, Revised ed.)
Pim Tuyls, Boris Skoric, Tom Kevenaar
R3,077 Discovery Miles 30 770 Ships in 10 - 15 working days

Noisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human beings, or physical structures, such as physical unclonable functions. This book examines how the presence of noise has an impact on information security, describes how it can be dealt with and possibly used to generate an advantage over traditional approaches, and provides a self-contained overview of the techniques and applications of security based on noisy data.

Security with Noisy Data thoroughly covers the theory of authentication based on noisy data and shows it in practice as a key tool for preventing counterfeiting. Part I discusses security primitives that allow noisy inputs, and Part II focuses on the practical applications of the methods discussed in the first part.

Key features:

a [ Contains algorithms to derive secure keys from noisy data, in particular from physical unclonable functions and biometrics - as well as the theory proving that those algorithms are secure

a [ Offers practical implementations of algorithms, including techniques that give insight into system security

a [ Includes an overview and detailed description of new applications made possible by using these new algorithms

a [ Discusses recent theoretical as well as application-oriented developments in the field, combining noisy data with cryptography

a [ Describes the foundations of the subject in a clear, accessible and reader-friendly style

a [ Presents the principles of key establishment and multiparty computation over noisy channels

a [ Provides a detailed overview of the building blocks of cryptography for noisy data and explains how these techniquescan be applied, (for example as anti-counterfeiting and key storage)

a [ Introduces privacy protected biometric systems, analyzes the theoretical and practical properties of PUFs and discusses PUF based systems

a [ Addresses biometrics and physical unclonable functions extensively

This comprehensive introduction offers an excellent foundation to graduate students and researchers entering the field, and will also benefit professionals needing to expand their knowledge. Readers will gain a well-rounded and broad understanding of the topic through the insight it provides into both theory and practice.

Pim Tuyls is a Principal Scientist at Philips Research and a Visiting Professor at the COSIC Department of the Katholieke Universiteit of Leuven, Dr Boris Skoric and Dr Tom Kevenaar are research scientists at Philips Research Laboratories, Eindhoven.

Information Processing and Security Systems (Hardcover): Khalid Saeed, Jerzy Pejas Information Processing and Security Systems (Hardcover)
Khalid Saeed, Jerzy Pejas
R5,862 Discovery Miles 58 620 Ships in 10 - 15 working days

Information Processing and Security Systems is a collection of forty papers that were originally presented at an international multi-conference on Advanced Computer Systems (ACS) and Computer Information Systems and Industrial Management Applications (CISIM) held in Elk, Poland. This volume describes the latest developments in advanced computer systems and their applications within artificial intelligence, biometrics and information technology security. The volume also includes contributions on computational methods, algorithms and applications, computational science, education and industrial management applications.

Artificial Intelligence and Security in Computing Systems - 9th International Conference, ACS '2002 Miedzyzdroje, Poland... Artificial Intelligence and Security in Computing Systems - 9th International Conference, ACS '2002 Miedzyzdroje, Poland October 23-25, 2002 Proceedings (Hardcover, 2003 ed.)
Jerzy Soldek, Leszek Drobiazgiewicz
R4,530 Discovery Miles 45 300 Ships in 10 - 15 working days

Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies:

-Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments.
-Multiagent Systems include laboratory research on multiagent intelligent systems as well as upon their applications in transportation and information systems.
-Computer Security and Safety presents techniques and algorithms which will be of great interest to practitioners. In general, they focus on new cryptographic algorithms (including a symmetric key encryption scheme, hash functions, secret generation and sharing schemes, and secure data storage), a formal language for policy access control description and its implementation, and risk management methods (used for continuous analysis both in distributed network and software development projects).

Hacking Connected Cars - Tactics, Techniques, and Procedures (Paperback): A. Knight Hacking Connected Cars - Tactics, Techniques, and Procedures (Paperback)
A. Knight
R1,156 R915 Discovery Miles 9 150 Save R241 (21%) Ships in 12 - 19 working days

A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles. Written by a veteran of risk management and penetration testing of IoT devices and connected cars, this book provides a detailed account of how to perform penetration testing, threat modeling, and risk assessments of telematics control units and infotainment systems. This book demonstrates how vulnerabilities in wireless networking, Bluetooth, and GSM can be exploited to affect confidentiality, integrity, and availability of connected cars. Passenger vehicles have experienced a massive increase in connectivity over the past five years, and the trend will only continue to grow with the expansion of The Internet of Things and increasing consumer demand for always-on connectivity. Manufacturers and OEMs need the ability to push updates without requiring service visits, but this leaves the vehicle's systems open to attack. This book examines the issues in depth, providing cutting-edge preventative tactics that security practitioners, researchers, and vendors can use to keep connected cars safe without sacrificing connectivity. Perform penetration testing of infotainment systems and telematics control units through a step-by-step methodical guide Analyze risk levels surrounding vulnerabilities and threats that impact confidentiality, integrity, and availability Conduct penetration testing using the same tactics, techniques, and procedures used by hackers From relatively small features such as automatic parallel parking, to completely autonomous self-driving cars--all connected systems are vulnerable to attack. As connectivity becomes a way of life, the need for security expertise for in-vehicle systems is becoming increasingly urgent. Hacking Connected Cars provides practical, comprehensive guidance for keeping these vehicles secure.

Certification and Security in Inter-Organizational E-Services - IFIP 18th World Computer Congress, August 22-27, 2004,... Certification and Security in Inter-Organizational E-Services - IFIP 18th World Computer Congress, August 22-27, 2004, Toulouse, France (Hardcover, 2005 ed.)
Enrico Nardelli, Maurizio Talamo
R1,611 Discovery Miles 16 110 Ships in 10 - 15 working days

Certification and Security in Inter-Organizational E-Services presents the proceedings of CSES 2004 - the 2nd International Workshop on Certification and Security in Inter-Organizational E-Services held within IFIP WCC in August 2004 in Toulouse, France. Certification and security share a common technological basis in the reliable and efficient monitoring of executed and running processes; they likewise depend on the same fundamental organizational and economic principles. As the range of services managed and accessed through communication networks grows throughout society, and given the legal value that is often attached to data treated or exchanged, it is critical to be able to certify the network transactions and ensure that the integrity of the involved computer-based systems is maintained.

This collection of papers documents several important developments, and offers real-life application experiences, research results and methodological proposals of direct interest to systems experts and users in governmental, industrial and academic communities.

Certification and Security in E-Services - From E-Government to E-Business (Hardcover, 2003 ed.): Enrico Nardelli, Sabina... Certification and Security in E-Services - From E-Government to E-Business (Hardcover, 2003 ed.)
Enrico Nardelli, Sabina Posadziejewski, Maurizio Talamo
R3,046 Discovery Miles 30 460 Ships in 10 - 15 working days

This volume contains the final proceedings of the special stream on security in E-government and E-business. This stream has been an integral part of the IFIP World Computer Congress 2002, that has taken place from 26-29 August 2002 in Montreal, Canada. The stream consisted of three events: one tutorial and two workshops. The tutorial was devoted to the theme "An Architecture for Information Se curity Management," and was presented by Prof. Dr. Basie von Solms (Past chairman of IFIP TC 11) and Prof. Dr. Jan Eloff (Past chairman of IFIP TC 11 WG 11.2). Both are from Rand Afrikaans University -Standard Bank Academy for Information Technology, Johannesburg, South Africa. The main purpose of the tutorial was to present and discuss an Architecture for Informa tion Security Management and was specifically of value for people involved in, or who wanted to find out more about the management of information secu rity in a company. It provided a reference framework covering all three of the relevant levels or dimensions of Information Security Management. The theme of the first workshop was "E-Government and Security" and was chaired by Leon Strous, CISA (De Nederlandsche Bank NY, The Netherlands and chairman of IFIP TC 11) and by Sabina Posadziejewski, I.S.P., MBA (Al berta Innovation and Science, Edmonton, Canada)."

Random Curves - Journeys of a Mathematician (Hardcover, 2008 ed.): Neal Koblitz Random Curves - Journeys of a Mathematician (Hardcover, 2008 ed.)
Neal Koblitz
R3,181 Discovery Miles 31 810 Ships in 10 - 15 working days

Neal Koblitz is a co-inventor of one of the two most popular forms of encryption and digital signature, and his autobiographical memoirs are collected in this volume. Besides his own personal career in mathematics and cryptography, Koblitz details his travels to the Soviet Union, Latin America, Vietnam and elsewhere; political activism; and academic controversies relating to math education, the C. P. Snow "two-culture" problem, and mistreatment of women in academia. These engaging stories fully capture the experiences of a student and later a scientist caught up in the tumultuous events of his generation.

Securing Web Services - Practical Usage of Standards and Specifications (Hardcover): Panos Periorellis Securing Web Services - Practical Usage of Standards and Specifications (Hardcover)
Panos Periorellis
R4,999 Discovery Miles 49 990 Ships in 10 - 15 working days

'Securing Web Services' investigates the security-related specifications that encompass message level security, transactions, and identity management.

Critical Infrastructure Protection V - 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP... Critical Infrastructure Protection V - 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, Revised Selected Papers (Hardcover)
Jonathan Butts, Sujeet Shenoi
R1,534 Discovery Miles 15 340 Ships in 10 - 15 working days

The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection V describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Themes and Issues, Control Systems Security, Infrastructure Security, and Infrastructure Modeling and Simulation. This book is the 5th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of 14 edited papers from the 5th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at Dartmouth College, Hanover, New Hampshire, USA in the spring of 2011. Critical Infrastructure Protection V is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Jonathan Butts is an Assistant Professor of Computer Science at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.

Communications and Multimedia Security - 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18,... Communications and Multimedia Security - 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom (Hardcover, 2005 ed.)
David Chadwick, Bart Preneel
R3,046 Discovery Miles 30 460 Ships in 10 - 15 working days

Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields of Communications and Multimedia Security.

This state-of-the-art volume presents the proceedings of the Eighth Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, September 2004, in Windermere, UK. The papers presented here represent the very latest developments in security research from leading people in the field. The papers explore a wide variety of subjects including privacy protection and trust negotiation, mobile security, applied cryptography, and security of communication protocols. Of special interest are several papers which addressed security in the Microsoft .Net architecture, and the threats that builders of web service applications need to be aware of. The papers were a result of research sponsored by Microsoft at five European University research centers.

This collection will be important not only for multimedia security experts and researchers, but also for all teachers and administrators interested in communications security.

Theory and Practice of Cryptography Solutions for Secure Information Systems (Hardcover, New): Atilla Elci, Josef Pieprzyk,... Theory and Practice of Cryptography Solutions for Secure Information Systems (Hardcover, New)
Atilla Elci, Josef Pieprzyk, Alexander G. Chefranov, Mehmet A. Orgun, Huaxiong Wang, …
R5,473 Discovery Miles 54 730 Ships in 10 - 15 working days

Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.

Cryptography and Security Services - Mechanisms and Applications (Hardcover): Manuel Mogollon Cryptography and Security Services - Mechanisms and Applications (Hardcover)
Manuel Mogollon
R2,883 Discovery Miles 28 830 Ships in 10 - 15 working days

Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptography & Security Devices: Mechanisms & Applications addresses cryptography from the perspective of the security services and mechanisms available to implement these services: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and the confidentiality and integrity of security services. This book provides scholars and practitioners in the field of information assurance working knowledge of fundamental encryption algorithms and systems supported in information technology and secure communication networks.

Complexity of Lattice Problems - A Cryptographic Perspective (Hardcover, 2002 ed.): Daniele Micciancio, Shafi Goldwasser Complexity of Lattice Problems - A Cryptographic Perspective (Hardcover, 2002 ed.)
Daniele Micciancio, Shafi Goldwasser
R7,030 Discovery Miles 70 300 Ships in 12 - 19 working days

Lattices are geometric objects that can be pictorially described as the set of intersection points of an infinite, regular n-dimensional grid. De spite their apparent simplicity, lattices hide a rich combinatorial struc ture, which has attracted the attention of great mathematicians over the last two centuries. Not surprisingly, lattices have found numerous ap plications in mathematics and computer science, ranging from number theory and Diophantine approximation, to combinatorial optimization and cryptography. The study of lattices, specifically from a computational point of view, was marked by two major breakthroughs: the development of the LLL lattice reduction algorithm by Lenstra, Lenstra and Lovasz in the early 80's, and Ajtai's discovery of a connection between the worst-case and average-case hardness of certain lattice problems in the late 90's. The LLL algorithm, despite the relatively poor quality of the solution it gives in the worst case, allowed to devise polynomial time solutions to many classical problems in computer science. These include, solving integer programs in a fixed number of variables, factoring polynomials over the rationals, breaking knapsack based cryptosystems, and finding solutions to many other Diophantine and cryptanalysis problems."

Trusted Information - The New Decade Challenge (Hardcover, 2001 ed.): Michel Dupuy, Pierre Paradinas Trusted Information - The New Decade Challenge (Hardcover, 2001 ed.)
Michel Dupuy, Pierre Paradinas
R5,872 Discovery Miles 58 720 Ships in 10 - 15 working days

Since the early eighties IFIP/Sec has been an important rendezvous for Information Technology researchers and specialists involved in all aspects of IT security. The explosive growth of the Web is now faced with the formidable challenge of providing trusted information. IFIP/Sec'01 is the first of this decade (and century) and it will be devoted to "Trusted Information - the New Decade Challenge" This proceedings are divided in eleven parts related to the conference program. Session are dedicated to technologies: Security Protocols, Smart Card, Network Security and Intrusion Detection, Trusted Platforms. Others sessions are devoted to application like eSociety, TTP Management and PKI, Secure Workflow Environment, Secure Group Communications, and on the deployment of applications: Risk Management, Security Policies andTrusted System Design and Management. The year 2001 is a double anniversary. First, fifteen years ago, the first IFIP/Sec was held in France (IFIP/Sec'86, Monte-Carlo) and 2001 is also the anniversary of smart card technology. Smart cards emerged some twenty years ago as an innovation and have now become pervasive information devices used for highly distributed secure applications. These cards let millions of people carry a highly secure device that can represent them on a variety of networks. To conclude, we hope that the rich "menu" of conference papers for this IFIP/Sec conference will provide valuable insights and encourage specialists to pursue their work in trusted information.

System-on-Chip Architectures and Implementations for Private-Key Data Encryption (Hardcover, 2003 ed.): Maire McLoone, John V.... System-on-Chip Architectures and Implementations for Private-Key Data Encryption (Hardcover, 2003 ed.)
Maire McLoone, John V. McCanny
R2,973 Discovery Miles 29 730 Ships in 10 - 15 working days

In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architectures for the DES and Rijndael symmetric key encryption algorithms are presented. The generic architectures can be utilised to rapidly and effortlessly generate system-on-chip cores, which support numerous application requirements, most importantly, different modes of operation and encryption and decryption capabilities. In addition, efficient silicon SHA-1, SHA-2 and HMAC hash algorithm architectures are described. A single-chip Internet Protocol Security (IPSec) architecture is also presented that comprises a generic Rijndael design and a highly efficient HMAC-SHA-1 implementation.

In the opinion of the authors, highly efficient hardware implementations of cryptographic algorithms are provided in this book. However, these are not hard-fast solutions. The aim of the book is to provide an excellent guide to the design and development process involved in the translation from encryption algorithm to silicon chip implementation.

Intrusion Detection Systems (Hardcover, 2008 ed.): Roberto Di Pietro, Luigi V. Mancini Intrusion Detection Systems (Hardcover, 2008 ed.)
Roberto Di Pietro, Luigi V. Mancini
R4,585 Discovery Miles 45 850 Ships in 12 - 19 working days

In our world of ever-increasing Internet connectivity, there is an on-going threat of intrusion, denial of service attacks, or countless other abuses of computer and network resources. In particular, these threats continue to persist due to the flaws of current commercial intrusion detection systems (IDSs). Intrusion Detection Systems is an edited volume by world class leaders in this field. This edited volume sheds new light on defense alert systems against computer and network intrusions. It also covers integrating intrusion alerts within security policy framework for intrusion response, related case studies and much more. This volume is presented in an easy-to-follow style while including a rigorous treatment of the issues, solutions, and technologies tied to the field. Intrusion Detection Systems is designed for a professional audience composed of researchers and practitioners within the computer network and information security industry. It is also suitable as a reference or secondary textbook for advanced-level students in computer science.

Elliptic Curves and Their Applications to Cryptography - An Introduction (Hardcover, 1999 ed.): Andreas Enge Elliptic Curves and Their Applications to Cryptography - An Introduction (Hardcover, 1999 ed.)
Andreas Enge
R6,416 Discovery Miles 64 160 Ships in 10 - 15 working days

Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic communication, and this need, given the tremendous growth of the Internet, is likely to continue growing. Elliptic curve cryptosystems represent the state of the art for such systems. Elliptic Curves and Their Applications to Cryptography: An Introduction provides a comprehensive and self-contained introduction to elliptic curves and how they are employed to secure public key cryptosystems. Even though the elegant mathematical theory underlying cryptosystems is considerably more involved than for other systems, this text requires the reader to have only an elementary knowledge of basic algebra. The text nevertheless leads to problems at the forefront of current research, featuring chapters on point counting algorithms and security issues. The Adopted unifying approach treats with equal care elliptic curves over fields of even characteristic, which are especially suited for hardware implementations, and curves over fields of odd characteristic, which have traditionally received more attention. Elliptic Curves and Their Applications: An Introduction has been used successfully for teaching advanced undergraduate courses. It will be of greatest interest to mathematicians, computer scientists, and engineers who are curious about elliptic curve cryptography in practice, without losing the beauty of the underlying mathematics.

Fifth World Conference on Information Security Education - Proceedings of the IFIP TC 11 WG 11.8, WISE 5, 19 to 21 June 2007,... Fifth World Conference on Information Security Education - Proceedings of the IFIP TC 11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, NY, USA (Hardcover, 2007 ed.)
Lynn Futcher, Ronald Dodge
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

The International Federation for Information Processing (IFIP) series publishes state-of-the-art results in the sciences and technologies of information and communication. The IFIP series encourages education and the dissemination and exchange of information on all aspects of computing. This particular volume presents the most up-to-date research findings from leading experts from around the world on information security education.

Botnet Detection - Countering the Largest Security Threat (Hardcover): Wenke Lee, Cliff Wang, David Dagon Botnet Detection - Countering the Largest Security Threat (Hardcover)
Wenke Lee, Cliff Wang, David Dagon
R2,975 Discovery Miles 29 750 Ships in 10 - 15 working days

Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat. Botnet Detection: Countering the Largest Security Threat consists of chapters contributed by world-class leaders in this field, from the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets.

Database Recovery (Hardcover, 1998 ed.): Vijay Kumar, Sang Hyuk Son Database Recovery (Hardcover, 1998 ed.)
Vijay Kumar, Sang Hyuk Son
R4,406 Discovery Miles 44 060 Ships in 10 - 15 working days

Database Recovery presents an in-depth discussion on all aspects of database recovery. Firstly, it introduces the topic informally to set the intuitive understanding, and then presents a formal treatment of recovery mechanism. In the past, recovery has been treated merely as a mechanism which is implemented on an ad-hoc basis. This book elevates the recovery from a mechanism to a concept, and presents its essential properties. A book on recovery is incomplete if it does not present how recovery is practiced in commercial systems. This book, therefore, presents a detailed description of recovery mechanisms as implemented on Informix, OpenIngres, Oracle, and Sybase commercial database systems. Database Recovery is suitable as a textbook for a graduate-level course on database recovery, as a secondary text for a graduate-level course on database systems, and as a reference for researchers and practitioners in industry.

Security Education and Critical Infrastructures - IFIP TC11 / WG11.8 Third Annual World Conference on Information Security... Security Education and Critical Infrastructures - IFIP TC11 / WG11.8 Third Annual World Conference on Information Security Education (WISE3) June 26-28, 2003, Monterey, California, USA (Hardcover, 2003 ed.)
Cynthia Irvine, Helen Armstrong
R3,077 Discovery Miles 30 770 Ships in 10 - 15 working days

Security Education and Critical Infrastructures presents the most recent developments in research and practice on teaching information security, and covers topics including:

-Curriculum design;
-Laboratory systems and exercises;
-Security education program assessment;
-Distance learning and web-based teaching of security;
-Teaching computer forensics;
-Laboratory-based system defense games;
-Security education tools;
-Education in security policies, management and system certification;
-Case studies.

Human Factors in Safety-Critical Systems (Hardcover): Felix Redmill, Jane Rajan Human Factors in Safety-Critical Systems (Hardcover)
Felix Redmill, Jane Rajan
R3,678 Discovery Miles 36 780 Ships in 9 - 17 working days

Safety-critical systems are found in almost every sector of industry. Faults in these systems will result in a breach of safe operating conditions and exposure to the possible risk of major loss of life or catastrophic damage to plant, equipment or the environment. An understanding of the basis for the functioning of these systems is therefore vital to all involved in their operation. In particular, the interaction of the disciplines of software engineering, safety engineering, human factors and safety management is a total process whose entirety is not widely understood by those working in any of the individual fields. This book will redress that problem by providing an introduction to each constituent part with a cohesive structure and overview of the whole subject. It will be of interest to engineers, managers, students and anyone with responsibilities in these areas.

Database Security XII - Status and Prospects (Hardcover, 1999 ed.): Sushil Jajodia Database Security XII - Status and Prospects (Hardcover, 1999 ed.)
Sushil Jajodia
R4,532 Discovery Miles 45 320 Ships in 10 - 15 working days

New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implications for the whole of society. Database Security Volume XII covers issues related to security and privacy of information in a wide range of applications, including: Electronic Commerce Informational Assurances Workflow Privacy Policy Modeling Mediation Information Warfare Defense Multilevel Security Role-based Access Controls Mobile Databases Inference Data Warehouses and Data Mining. This book contains papers and panel discussions from the Twelfth Annual Working Conference on Database Security, organized by the International Federation for Information Processing (IFIP) and held July 15-17, 1998 in Chalkidiki, Greece. Database Security Volume XII will prove invaluable reading for faculty and advanced students as well as for industrial researchers and practitioners working in the area of database security research and development.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Core Java for the Impatient
Cay Horstmann Paperback R1,097 Discovery Miles 10 970
Turkish Natural Language Processing
Kemal Oflazer, Murat Saraclar Hardcover R4,180 R3,610 Discovery Miles 36 100
C++ How to Program: Horizon Edition
Harvey Deitel, Paul Deitel Paperback R1,917 Discovery Miles 19 170
Stochastically-Based Semantic Analysis
Wolfgang Minker, Alex Waibel, … Hardcover R3,010 Discovery Miles 30 100
Coding for Kids Ages 10 and Up - Coding…
Bob Mather Hardcover R933 Discovery Miles 9 330
Signal Processing Techniques for Power…
Fernando Gregorio, Gustavo Gonzalez, … Hardcover R3,391 Discovery Miles 33 910
Research Anthology on Implementing…
Information R Management Association Hardcover R17,073 Discovery Miles 170 730
Value-Driven - The CIOs Handbook for…
D Brent Messer Hardcover R750 Discovery Miles 7 500
Modeling and Simulation of Smart Grid…
Abdelaziz Mohamed Mohamed, Ali Mohamed Eltamaly Hardcover R3,890 Discovery Miles 38 900
Parallel Processing of Discrete…
Panos M. Pardalos Hardcover R2,593 Discovery Miles 25 930

 

Partners