0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (87)
  • R500+ (1,283)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastian,... Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastian, Spain, July 7-8, 2016, Proceedings (Paperback, 1st ed. 2016)
Juan Caballero, Urko Zurutuza, Ricardo J. Rodriguez
R2,565 Discovery Miles 25 650 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastian, Spain, in July 2016. The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web security, malware detection and classification, authentication, data leakage prevention, and countering evasive techniques such as obfuscation.

Information Security Applications - 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised... Information Security Applications - 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers (Paperback, 2015 ed.)
Kyung-Hyune Rhee, Jeong Hyun Yi
R2,470 Discovery Miles 24 700 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications, WISA 2014, held on Jeju Island, Korea, in August 2014. The 30 revised full papers presented in this volume were carefully reviewed and selected from 69 submissions. The papers are organized in topical sections such as malware detection; mobile security; vulnerability analysis; applied cryptography; network security; cryptography; hardware security; and critical infrastructure security and policy.

Industry 4.0 - Technologies, Applications, and Challenges (Hardcover, 1st ed. 2023): Aydin Azizi, Reza Vatankhah Barenji Industry 4.0 - Technologies, Applications, and Challenges (Hardcover, 1st ed. 2023)
Aydin Azizi, Reza Vatankhah Barenji
R3,005 Discovery Miles 30 050 Ships in 10 - 15 working days

This book presents Industry 4.0 enabler technologies and tools. It also highlights some of the existing empirical applications in the context of manufacturing. The book elucidates innovative thematic concepts of Industry 4.0 and its perspectives. It establishes routes to empirically utilize Industry 4.0 standards for manufacturing companies. The book can be used as a reference for professionals/engineers, researchers, and students.

Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised... Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers (Paperback, 2015 ed.)
Frederic Cuppens, Joaquin Garcia-Alfaro, Nur Zincir Heywood, Philip W. L. Fong
R2,396 Discovery Miles 23 960 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-proceedings of the 7th Symposium on Foundations and Practice of Security, FPS 2014, held in Montreal, QC, Canada, in November 2014. The 18 revised full papers presented together with 5 short papers and 2 position papers were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on privacy; software security and malware analysis; network security and protocols; access control models and policy analysis; protocol verification; and cryptographic technologies.

Coding Theory and Cryptography - The Essentials (Hardcover, 2nd edition): C.A. Rodger, J.R. Wall, D.C. Hankerson, Gary Hoffman,... Coding Theory and Cryptography - The Essentials (Hardcover, 2nd edition)
C.A. Rodger, J.R. Wall, D.C. Hankerson, Gary Hoffman, D.A. Leonard, …
R3,512 Discovery Miles 35 120 Ships in 10 - 15 working days

Containing data on number theory, encryption schemes, and cyclic codes, this highly successful textbook, proven by the authors in a popular two-quarter course, presents coding theory, construction, encoding, and decoding of specific code families in an "easy-to-use" manner appropriate for students with only a basic background in mathematics offering revised and updated material on the Berlekamp-Massey decoding algorithm and convolutional codes. Introducing the mathematics as it is needed and providing exercises with solutions, this edition includes an extensive section on cryptography, designed for an introductory course on the subject.

Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016,... Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Joseph K. Liu, Ron Steinfeld
R2,777 Discovery Miles 27 770 Ships in 18 - 22 working days

The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016. The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully reviewed and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital Forensics; Lightweight Security; Secure Batch Processing; Pseudo Random/One-Way Function; Cloud Storage Security; Password/QR Code Security; and Functional Encryption and Attribute-Based Cryptosystem. Part II (LNCS 9723) comprises topics such as Signature and Key Management; Public Key and Identity-Based Encryption; Searchable Encryption; Broadcast Encryption; Mathematical Primitives; Symmetric Cipher; Public Key and Identity-Based Encryption; Biometric Security; Digital Forensics; National Security Infrastructure; Mobile Security; Network Security; and Pseudo Random / One-Way Function.

Public-Key Cryptography -- PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography,... Public-Key Cryptography -- PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings (Paperback, 2015 ed.)
Jonathan Katz
R1,554 Discovery Miles 15 540 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015. The 36 papers presented in this volume were carefully reviewed and selected from 118 submissions. They are organized in topical sections named: public-key encryption; e-cash; cryptanalysis; digital signatures; password-based authentication; pairint-based cryptography; efficient constructions; cryptography with imperfect keys; interactive proofs; lattice-based cryptography; and identity-based, predicate, and functional encryption.

The Lure - The True Story of How the Department of Justice Brought Down Two of The World's Most Dangerous Cyber Criminals... The Lure - The True Story of How the Department of Justice Brought Down Two of The World's Most Dangerous Cyber Criminals (Paperback, International Edition)
Stephen Schroeder
R809 Discovery Miles 8 090 Ships in 10 - 15 working days

Beginning in the fall of 1999, a number of Internet-related businesses and financial institutions in the United States suffered computer intrusions or "hacks" that originated from Russia. The hackers gained control of the victims' computers, copied and stole private data that included credit card information, and threatened to publish or use the stolen credit cards or inflict damage on the compromised computers unless the victims paid money or gave the hackers a job. Some of the companies gave in and paid off the hackers. Some decided not to. The hackers responded by shutting down parts of their networks and using stolen credit card numbers to order thousands of dollars' worth of computer equipment. THE LURE is the true, riveting story of how these Russian hackers, who bragged that the laws in their country offered them no threat, and who mocked the inability of the FBI to catch them, were caught by an FBI lure designed to appeal to their egos and their greed. The story of the sting operation and subsequent trial is told for the first time here by the Department of Justice's attorney for the prosecution. This fascinating story reads like a crime thriller, but also offers a wealth of information that can be used by IT professionals, business managers, lawyers and academics who wish to learn how to protect systems from abuse, and who want to respond appropriately to network incidents. They also provide insight into the hacker's world and explain how their own words and actions were used against them in a court of law - the evidence provided is in the raw, uncensored words of the hackers themselves. This is a multi-layered true crime story, a real-life law and order story that explains how hackers and computer thieves operate, how the FBI takes them down, and how the Department of Justice prosecutes them in the courtroom.

Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015,... Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Tal Malkin, Vladimir Kolesnikov, Allison Lewko, Michalis Polychronakis
R1,521 Discovery Miles 15 210 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement; authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.

Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings (Paperback,... Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings (Paperback, 2014 ed.)
Sherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu
R2,915 Discovery Miles 29 150 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014. The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security.

Information Security and Cryptology -- ICISC 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised... Information Security and Cryptology -- ICISC 2013 - 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers (Paperback, 2014 ed.)
Hyang-Sook Lee, Dong-Guk Han
R2,819 Discovery Miles 28 190 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013. The 31 revised full papers presented together with 2 invited talks were carefully selected from 126 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on secure multiparty computation, proxy re-encryption, side channel analysis and its countermeasures, cryptanalysis, embedded system security and its implementation, primitives for cryptography, digital signature, security protocol, cyber security, and public key cryptography.

Information Security and Cryptology - ICISC 2015 - 18th International Conference, Seoul, South Korea, November 25-27, 2015,... Information Security and Cryptology - ICISC 2015 - 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers (Paperback, 1st ed. 2016)
Soonhak Kwon, Aaram Yun
R2,386 Discovery Miles 23 860 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security and Cryptology, ICISC 2015, held in Seoul, South Korea, in November 2015. The 23 revised full papers presented were carefully selected from 84 submissions during two rounds of reviewing and improvement. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are grouped around the following topics: digital signatures; public-key cryptography; block cipher cryptanalysis; elliptic curve cryptography; protocols; security; side-channel attacks.

Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings... Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings (Paperback, 1st ed. 2016)
Tsuyoshi Takagi
R2,100 Discovery Miles 21 000 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Workshop on Post-Quantum Cryptography, PQCrypto 2016, held in Fukuoka, Japan, in February 2016. The 16 revised full papers presented were carefully reviewed and selected from 42 submissions. The papers cover all technical aspects of multivariate polynomial cryptography, code-based cryptography, lattice-based cryptography, quantum algorithms, post-quantum protocols, and implementations.

Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I... Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Eyal Kushilevitz, Tal Malkin
R4,276 Discovery Miles 42 760 Ships in 18 - 22 working days

The two-volume set LNCS 9562 and LNCS 9563 constitutes the refereedproceedings of the 13th International Conference on Theory ofCryptography, TCC 2016, held in Tel Aviv, Israel, in January 2016. The 45 revised full papers presented were carefully reviewed andselected from 112 submissions. The papers are organized in topicalsections on obfuscation, differential privacy, LWR and LPN, public key encryption, signatures, and VRF, complexity of cryptographic primitives, multiparty computation, zero knowledge and PCP, oblivious RAM, ABE and IBE, and codes and interactive proofs. The volume also includes an invited talk on cryptographic assumptions.

Forensic Computing (Hardcover, 2nd ed. 2007): Anthony Sammes, Brian Jenkinson Forensic Computing (Hardcover, 2nd ed. 2007)
Anthony Sammes, Brian Jenkinson
R2,496 R1,545 Discovery Miles 15 450 Save R951 (38%) Ships in 9 - 17 working days

In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how the contents of computer systems can be recovered, even when hidden or subverted by criminals. Equally important, they demonstrate how to insure that computer evidence is admissible in court. Updated to meet ACPO 2003 guidelines, Forensic Computing: A Practitioner's Guide offers: methods for recovering evidence information from computer systems; principles of password protection and data encryption; evaluation procedures used in circumventing a system's internal security safeguards, and full search and seizure protocols for experts and police officers.

Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings (Paperback,... Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings (Paperback, 1st ed. 2015)
Man-Ho Au, Atsuko Miyaji
R1,469 Discovery Miles 14 690 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec 2015, held in Kanazawa, Japan, in November 2015. The 19 full papers and 7 short papers presented together with 3 invited talks were carefully reviewed and selected from 60 submissions. The papers are grouped in topical sections on fundamental, protocol, authenticated encryption and key exchange, encryption and identification, privacy and cloud, leakage-resilient cryptography and lattice cryptography, signature and broadcast encryption.

Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July... Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Nitesh Saxena, Ahmad-Reza Sadeghi
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed post-proceedings of the 10th Workshop on RFID Security and Privacy, RFIDSec 2014, held in Oxford, UK, in 2014. The 9 revised full papers and 4 short papers presented in this volume were carefully reviewed and selected from 27 submissions. The papers deal with topics such as RFID power-efficiency, privacy, authentication and side channels, and key exchange.

Secure IT Systems - 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings (Paperback, 1st... Secure IT Systems - 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings (Paperback, 1st ed. 2015)
Sonja Buchegger, Mads Dam
R2,005 Discovery Miles 20 050 Ships in 18 - 22 working days

This book constitutes the proceedings of the 20th Nordic Conference on Secure IT Systems, held in Stockholm, Sweden, in October 2015. The 11 full papers presented together with 5 short papers in this volume were carefully reviewed and selected from 38 submissions. They are organized in topical sections named: cyber-physical systems security, privacy, cryptography, trust and fraud, and network and software security.

Security and Trust Management - 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings... Security and Trust Management - 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings (Paperback, 1st ed. 2015)
Sara Foresti
R2,164 Discovery Miles 21 640 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management, STM 2015, held in Vienna, Austria, in September 2015, in conjunction with the 20th European Symposium Research in Computer Security, ESORICS 2015. The 15 revised full papers were carefully reviewed and selected from 38 submissions. They are organized in topical sections as security metrics and classification; data protection; intrusion detection and software vulnerabilities; cryptographic protocols; controlling data release; and security analysis, risk management and usability.

Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA,... Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings (Paperback, 1st ed. 2016)
Kazue Sako
R2,629 Discovery Miles 26 290 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2016, CT-RSA 2016, held in San Francisco, CA, USA, in February/March 2016. The 26 papers presented in this volume were carefully reviewed and selected from 76 submissions. The focus of the track is on following subjects: secure key exchange schemes, authenticated encryption, searchable symmetric encryption, digital signatures with new functionality, secure multi party computation, how to verify procedures, side-channel attacks on elliptic curve cryptography, hardware attacks and security, structure-preserving signatures, lattice cryptography, cryptanalysis of symmetric key encryption, message authentication code and PRF-security, and security of public key encryption.

Cryptographic Hardware and Embedded Systems -- CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16,... Cryptographic Hardware and Embedded Systems -- CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings (Paperback, 1st ed. 2015)
Tim Guneysu, Helena Handschuh
R1,522 Discovery Miles 15 220 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 17th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015, held in Saint Malo, France, in September 2015. The 34 full papers included in this volume were carefully reviewed and selected from 128 submissions. They are organized in the following topical sections: processing techniques in side-channel analysis; cryptographic hardware implementations; homomorphic encryption in hardware; side-channel attacks on public key cryptography; cipher design and cryptanalysis; true random number generators and entropy estimations; side-channel analysis and fault injection attacks; higher-order side-channel attacks; physically unclonable functions and hardware trojans; side-channel attacks in practice; and lattice-based implementations.

Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA,... Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part II (Paperback, 1st ed. 2022)
Yevgeniy Dodis, Thomas Shrimpton
R1,352 Discovery Miles 13 520 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022. The total of 100 papers included in the 4-volume proceedings LNCS 13507, 13508, 13509, 13510, was reviewed and selected from 455 submissions. The papers were organized in the following topical sections: Cryptanalysis; randomness; quantum cryptography; advanced encryption systems; secure messaging; lattice-based zero knowledge; lattice-based signatures; blockchain; coding theory; public key cryptography; signatures, idealized models; lower bounds; secure hash functions; post-quantum cryptography; symmetric cryptanalysis; secret sharing and secure multiparty computation; unique topics; symmetric key theory; zero knowledge; and threshold signatures.

Cryptography and Information Security in the Balkans - First International Conference, BalkanCryptSec 2014, Istanbul, Turkey,... Cryptography and Information Security in the Balkans - First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers (Paperback, 1st ed. 2015)
Berna Ors, Bart Preneel
R2,058 Discovery Miles 20 580 Ships in 18 - 22 working days

This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named: symmetric cryptography, cryptographic hardware, cryptographic protocols and public key cryptography. The book also contains one invited talk in full paper length.

Accountability and Security in the Cloud - First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6,... Accountability and Security in the Cloud - First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lectures (Paperback, 2015 ed.)
Massimo Felici, Carmen Fernandez-Gago
R2,206 Discovery Miles 22 060 Ships in 18 - 22 working days

The First A4Cloud Summer School has been one of the first events in the area of accountability and security in the cloud. It was organized by the EU-funded A4Cloud project, in collaboration with the European projects CIRRUS, Coco Cloud, CUMULUS, and SPECS. Cloud computing is a key technology that is being adopted progressively by companies and users across different application domains and industries. Yet, there are emerging issues such as security, privacy, and data protection. The 13 contributions included in this volume cover the state of the art and provide research insights into the following topics: accountability in the cloud; privacy and transparency in the cloud; empirical approaches for the cloud; socio-legal aspects of the cloud; cloud standards; and the accountability glossary of terms and definitions.

Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th... Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers (Paperback, 2015 ed.)
Joaquin Garcia-Alfaro, Jordi Herrera Joancomarti, Emil Lupu, Joachim Posegga, Alessandro Aldini, …
R2,322 Discovery Miles 23 220 Ships in 18 - 22 working days

This book constitutes the revised selected papers of the 9th International Workshop on Data Privacy Management, DPM 2014, the 7th International Workshop on Autonomous and Spontaneous Security, SETOP 2014, and the 3rd International Workshop on Quantitative Aspects in Security Assurance, held in Wroclaw, Poland, in September 2014, co-located with the 19th European Symposium on Research in Computer Security (ESORICS 2014). The volume contains 7 full and 4 short papers plus 1 keynote talk from the DPM workshop; 2 full papers and 1 keynote talk from the SETOP workshop; and 7 full papers and 1 keynote talk from the QASA workshop - selected out of 52 submissions. The papers are organized in topical sections on data privacy management; autonomous and spontaneous security; and quantitative aspects in security assurance.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
SIMD Programming Manual for Linux and…
Paul Cockshott, Kenneth Renfrew Hardcover R2,946 Discovery Miles 29 460
Cloud Technology - Concepts…
Irma Hardcover R17,858 Discovery Miles 178 580
Performance Evaluation, Prediction and…
Xingfu Wu Hardcover R4,195 Discovery Miles 41 950
Handbook of Distributed Sensor Networks…
Marvin Heather Hardcover R3,163 R2,865 Discovery Miles 28 650
Development and Deployment of…
'No Bugs' Hare Hardcover R947 R826 Discovery Miles 8 260
Multiprocessing - Trade-Offs in…
Vijay K. Naik Hardcover R2,770 Discovery Miles 27 700
Computation and Storage in the Cloud…
Dong Yuan, Yun Yang, … Paperback R986 R856 Discovery Miles 8 560
Automatic Performance Prediction of…
Thomas Fahringer Hardcover R2,808 Discovery Miles 28 080
Sensation and Measurement - Papers in…
H.R. Moskowitz, B. Scharf, … Hardcover R5,223 Discovery Miles 52 230
Concurrent Scientific Computing
Eric F. Van De Velde Hardcover R1,995 Discovery Miles 19 950

 

Partners