0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (100)
  • R500+ (1,348)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Fundamentals of Cryptology - A Professional Reference and Interactive Tutorial (Mixed media product, 2000 ed.): Henk C.A. van... Fundamentals of Cryptology - A Professional Reference and Interactive Tutorial (Mixed media product, 2000 ed.)
Henk C.A. van Tilborg
R1,591 Discovery Miles 15 910 Ships in 12 - 17 working days

The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g. adding a signature to an electronic document.Cryptology addresses the above issues - it is at the foundation of all information security. The techniques employed to this end have become increasingly mathematical in nature. Fundamentals of Cryptology serves as an introduction to modern cryptographic methods. After a brief survey of classical cryptosystems, it concentrates on three main areas. First, stream ciphers and block ciphers are discussed. These systems have extremely fast implementations, but sender and receiver must share a secret key. Second, the book presents public key cryptosystems, which make it possible to protect data without a prearranged key. Their security is based on intractable mathematical problems, such as the factorization of large numbers. The remaining chapters cover a variety of topics, including zero-knowledge proofs, secret sharing schemes and authentication codes. Two appendices explain all mathematical prerequisites in detail: one presents elementary number theory (Euclid's Algorithm, the Chinese Remainder Theorem, quadratic residues, inversion formulas, and continued fractions) and the other introduces finite fields and their algebraic structure.Fundamentals of Cryptology is an updated and improved version of An Introduction to Cryptology, originally published in 1988. Apart from a revision of the existing material, there are many new sections, and two new chapters on elliptic curves and authentication codes, respectively. In addition, the book is accompanied by a full text electronic version on CD-ROM as an interactive Mathematica manuscript.Fundamentals of Cryptology will be of interest to computer scientists, mathematicians, and researchers, students, and practitioners in the area of cryptography.

Information Security in Research and Business - Proceedings of the IFIP TC11 13th international conference on Information... Information Security in Research and Business - Proceedings of the IFIP TC11 13th international conference on Information Security (SEC '97): 14-16 May 1997, Copenhagen, Denmark (Hardcover, 1997 ed.)
Louise Yngstroem, Jan Carlsen
R5,710 Discovery Miles 57 100 Ships in 10 - 15 working days

Recently, IT has entered all important areas of society. Enterprises, individuals and civilisations all depend on functioning, safe and secure IT. Focus on IT security has previously been fractionalised, detailed and often linked to non-business applicaitons. The aim of this book is to address the current and future prospects of modern IT security, functionality in business, trade, industry, health care and government. The main topic areas covered include existing IT security tools and methodology for modern IT environments, laws, regulations and ethics in IT security environments, current and future prospects in technology, infrastructures, technique and methodology and IT security in retrospective.

Feistel Ciphers - Security Proofs and Cryptanalysis (Hardcover, 1st ed. 2017): Valerie Nachef, Jacques Patarin, Emmanuel Volte Feistel Ciphers - Security Proofs and Cryptanalysis (Hardcover, 1st ed. 2017)
Valerie Nachef, Jacques Patarin, Emmanuel Volte
R5,331 Discovery Miles 53 310 Ships in 12 - 17 working days

This book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers are widely used in cryptography in order to obtain pseudorandom permutations and secret-key block ciphers. In Part 1, we describe Feistel ciphers and their variants. We also give a brief story of these ciphers and basic security results. In Part 2, we describe generic attacks on Feistel ciphers. In Part 3, we give results on DES and specific Feistel ciphers. Part 4 is devoted to improved security results. We also give results on indifferentiability and indistinguishability.

Database Security (Paperback, New edition): Melissa Zgola, Alfred Basta Database Security (Paperback, New edition)
Melissa Zgola, Alfred Basta
R1,191 R1,066 Discovery Miles 10 660 Save R125 (10%) Ships in 10 - 15 working days

As a society that relies on technology to thrive, we face a growing number of potentially catastrophic threats to network security daily. DATABASE SECURITY delivers the know-how and skills IT Professionals must have to protect technology infrastructures, intellectual property, and the company's prosperity. From database installation and testing to auditing and SQL Injection, DATABASE this text delves into the essential processes and protocols that prevent intrusions, while reinforcing each topic with eye-opening, real-world examples. Unlike most texts on database security, which take a computer scientist's analytical approach, Database Security focuses on implementation, and was written expressly for the expanding field of Information Technology careers.

Variation Principle in Informational Macrodynamics (Hardcover, 2003 ed.): Vladimir S. Lerner Variation Principle in Informational Macrodynamics (Hardcover, 2003 ed.)
Vladimir S. Lerner
R2,949 Discovery Miles 29 490 Ships in 10 - 15 working days

Information Macrodynamics (IMD) belong to an interdisciplinary science that represents a new theoretical and computer-based methodology for a system informational descriptionand improvement, including various activities in such areas as thinking, intelligent processes, communications, management, and other nonphysical subjects with their mutual interactions, informational superimposition, and theinformation transferredbetweeninteractions. The IMD is based on the implementation of a single concept by a unique mathematical principle and formalism, rather than on an artificial combination of many arbitrary, auxiliary concepts and/or postulates and different mathematical subjects, such as the game, automata, catastrophe, logical operations theories, etc. This concept is explored mathematically using classical mathematics as calculus of variation and the probability theory, which are potent enough, without needing to developnew, specifiedmathematical systemicmethods. The formal IMD model automatically includes the related results from other fields, such as linear, nonlinear, collective and chaotic dynamics, stability theory, theory of information, physical analogies of classical and quantum mechanics, irreversible thermodynamics, andkinetics. The main IMD goal is to reveal the information regularities, mathematically expressed by the considered variation principle (VP), as a mathematical tool to extractthe regularities and define the model, whichdescribes theregularities. The IMD regularities and mechanisms are the results of the analytical solutions and are not retained by logical argumentation, rational introduction, and a reasonable discussion. The IMD's information computer modeling formalism includes a human being (as an observer, carrier and producer ofinformation), with a restoration of the model during the objectobservations.

Communications and Multimedia Security II (Hardcover, 1996 ed.): Patrick Horster Communications and Multimedia Security II (Hardcover, 1996 ed.)
Patrick Horster
R4,331 Discovery Miles 43 310 Ships in 12 - 17 working days

In multimedia and communication environments all documents must be protected against attacks. The movie Forrest Gump showed how multimedia documents can be manipulated. The required security can be achieved by a number of different security measures. This book provides an overview of the current research in Multimedia and Communication Security. A broad variety of subjects are addressed including: network security; attacks; cryptographic techniques; healthcare and telemedicine; security infrastructures; payment systems; access control; models and policies; auditing and firewalls. This volume contains the selected proceedings of the joint conference on Communications and Multimedia Security; organized by the International Federation for Information processing and supported by the Austrian Computer Society, Gesellschaft fuer Informatik e.V. and TeleTrust Deutschland e.V. The conference took place in Essen, Germany, in September 1996

Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference, May 30... Security and Privacy in the Age of Ubiquitous Computing - IFIP TC11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, Japan (Hardcover, 2005 ed.)
Ryoichi Sasaki, Eiji Okamoto, Hiroshi Yoshiura
R4,400 Discovery Miles 44 000 Ships in 12 - 17 working days

Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In addition, we need to deal with new issues such as security in the P2P environment, privacy issues in the use of smart cards, and RFID systems. Security and Privacy in the Age of Ubiquitous Computing addresses these issues and more by exploring a wide scope of topics. The volume presents a selection of papers from the proceedings of the 20th IFIP International Information Security Conference held from May 30 to June 1, 2005 in Chiba, Japan. Topics covered include cryptography applications, authentication, privacy and anonymity, DRM and content security, computer forensics, Internet and web security, security in sensor networks, intrusion detection, commercial and industrial security, authorization and access control, information warfare and critical protection infrastructure. These papers represent the most current research in information security, including research funded in part by DARPA and the National Science Foundation.

The Block Cipher Companion (Hardcover, 2011): Lars R. Knudsen, Matthew Robshaw The Block Cipher Companion (Hardcover, 2011)
Lars R. Knudsen, Matthew Robshaw
R2,186 Discovery Miles 21 860 Ships in 12 - 17 working days

Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key. Block ciphers are fundamental to modern cryptography, in fact they are the most widely used cryptographic primitive - useful in their own right, and in the construction of other cryptographic mechanisms.

In this book the authors provide a technically detailed, yet readable, account of the state of the art of block cipher analysis, design, and deployment. The authors first describe the most prominent block ciphers and give insights into their design. They then consider the role of the cryptanalyst, the adversary, and provide an overview of some of the most important cryptanalytic methods.

The book will be of value to graduate and senior undergraduate students of cryptography and to professionals engaged in cryptographic design. An important feature of the presentation is the authors' exhaustive bibliography of the field, each chapter closing with comprehensive supporting notes.

Communications and Multimedia Security Issues of the New Century - IFIP TC6 / TC11 Fifth Joint Working Conference on... Communications and Multimedia Security Issues of the New Century - IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS'01) May 21-22, 2001, Darmstadt, Germany (Hardcover, 2001 ed.)
Ralf Steinmetz, Jana Dittmann, Martin Steinebach
R5,684 Discovery Miles 56 840 Ships in 10 - 15 working days

The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany. The conference is arranged jointly by the Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP) The name "Communications and Multimedia Security" was first used in 1995, Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the previously national (Austrian) "IT Sicherheit" conferences held in Klagenfurt (1993) and Vienna (1994). In 1996, the CMS took place in Essen, Germany; in 1997 the conference moved to Athens, Greece. The CMS 1999 was held in Leuven, Belgium. This conference provides a forum for presentations and discussions on issues which combine innovative research work with a highly promising application potential in the area of security for communication and multimedia security. State-of-the-art issues as well as practical experiences and new trends in the areas were topics of interest again, as it has already been the case at previous conferences. This year, the organizers wanted to focus the attention on watermarking and copyright protection for e commerce applications and multimedia data. We also encompass excellent work on recent advances in cryptography and their applications. In recent years, digital media data have enormously gained in importance."

Integrity and Internal Control in Information Systems - IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and... Integrity and Internal Control in Information Systems - IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results Warrenton, Virginia, USA November 19-20, 1998 (Hardcover, 1998 ed.)
Sushil Jajodia, William List, Graeme W. McGregor, Leon A. M. Strous
R5,600 Discovery Miles 56 000 Ships in 10 - 15 working days

Integrity and Internal Control in Information Systems is a state-of-the-art book that establishes the basis for an ongoing dialogue between the IT security specialists and the internal control specialists so that both may work more effectively together to assist in creating effective business systems in the future. Building on the issues presented in the preceding volume of this series, this book seeks further answers to the following questions: What precisely do business managers need in order to have confidence in the integrity of their information systems and their data? What is the status quo of research and development in this area? Where are the gaps between business needs on the one hand and research/development on the other; what needs to be done to bridge these gaps? Integrity and Internal Control in Information Systems contains the selected proceedings of the Second Working Conference on Integrity and Internal Control in Information Systems, sponsored by the International Federation for Information Processing (IFIP) and held in Warrenton, Virginia, USA, in November 1998. It will be essential reading for academics and practitioners in computer science, information technology, business informatics, accountancy and edp-auditing.

Information Hiding Techniques for Steganography and Digital Watermarking (Hardcover): Stefan Katzenbeisser, Fabien Peticolas Information Hiding Techniques for Steganography and Digital Watermarking (Hardcover)
Stefan Katzenbeisser, Fabien Peticolas; Fabien Petitcolas, Stefan Katzenbeisser; Edited by F. Petticolas
R2,884 Discovery Miles 28 840 Ships in 10 - 15 working days

Steganography, a means by which two or more parties may communicate using "invisible" or "subliminal" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This is a comprehensive survey of steganography and watermarking and their application to modern communications and multimedia. It helps the reader to understand steganography, the history of this previously neglected element of cryptography, the hurdles of international law on strong cryptographic techniques, and a description of the methods you can use to hide information in modern media. Included in this discussion is an overview of "steganalysis", methods which can be used to break stenographic communication. This resource also includes an introduction to and survey of watermarking methods, and discusses this method's similarities to and differences from steganography. The reader should gain a working knowledge of watermarking's pros and cons, and learn the legal implications of watermarking and copyright issues on the Internet.

Technology for Success - Computer Concepts (Paperback, New edition): Mark Ciampa, Jill West, Steven Freund, Jennifer Campbell,... Technology for Success - Computer Concepts (Paperback, New edition)
Mark Ciampa, Jill West, Steven Freund, Jennifer Campbell, Mark Frydenberg, … 1
R1,223 R1,098 Discovery Miles 10 980 Save R125 (10%) Ships in 10 - 15 working days

Gain a thorough understanding of today's sometimes daunting, ever-changing world of technology as you learn how to apply the latest technology to your academic, professional and personal life with TECHNOLOGY FOR SUCCESS: COMPUTER CONCEPTS. Written by a team of best-selling technology authors and based on extensive research and feedback from students like you, this edition breaks each topic into brief, inviting lessons that address the "what, why and how" behind digital advancements to ensure deep understanding and application to today's real world. Optional online MindTap and SAM (Skills Assessment Manager) learning tools offer hands-on and step-by-step training, videos that cover the more difficult concepts and simulations that challenge you to solve problems in the actual world. You leave this course able to read the latest technology news and understand its impact on your daily life, the economy and society.

Secret Colors (Hardcover): Martin Kleppmann Secret Colors (Hardcover)
Martin Kleppmann; Illustrated by Mitch Seymour
R558 Discovery Miles 5 580 Ships in 12 - 17 working days
Chaos-based Cryptography - Theory, Algorithms and Applications (Hardcover, Edition.): Ljupco Kocarev, Shiguo Lian Chaos-based Cryptography - Theory, Algorithms and Applications (Hardcover, Edition.)
Ljupco Kocarev, Shiguo Lian
R4,306 Discovery Miles 43 060 Ships in 10 - 15 working days

Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics. The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.

Communications and Multimedia Security - Volume 3 (Hardcover, 1997 ed.): Sokratis Katsikas Communications and Multimedia Security - Volume 3 (Hardcover, 1997 ed.)
Sokratis Katsikas
R4,331 Discovery Miles 43 310 Ships in 12 - 17 working days

This book presents a state-of-the art review of current perspectives on Communications and Multimedia Security. It contains the Proceedings of the 3rd Joint Working Conference of IFIP TC6 and TC11, arranged by the International Federation for Information Processing and held in Athens, Greece in September 1997. The book aims to cover the subject of Communications and Multimedia Systems Security, as fully as possible. It constitutes an essential reading for information technology security specialists; computer professionals; communication systems professionals; EDP managers; EDP auditors; managers, researchers and students working on the subject.

Computer and Network Security Essentials (Hardcover, 1st ed. 2018): Kevin Daimi Computer and Network Security Essentials (Hardcover, 1st ed. 2018)
Kevin Daimi; Contributions by Guillermo Francia, Levent Ertaul, Luis Hernandez Encinas, Eman El-Sheikh
R5,134 Discovery Miles 51 340 Ships in 10 - 15 working days

This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is a security problem. The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management, Information Assurance, Security Applications, Computer Security, Hardware Security, and Biometrics and Forensics. It introduces the concepts, techniques, methods, approaches, and trends needed by security specialists to improve their security skills and capabilities. Further, it provides a glimpse into future directions where security techniques, policies, applications, and theories are headed. The book represents a collection of carefully selected and reviewed chapters written by diverse security experts in the listed fields and edited by prominent security researchers. Complementary slides are available for download on the book's website at Springer.com.

Hardware IP Security and Trust (Hardcover, 1st ed. 2017): Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor Hardware IP Security and Trust (Hardcover, 1st ed. 2017)
Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor
R4,415 Discovery Miles 44 150 Ships in 12 - 17 working days

This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.

The Era of NFTs - A Beginner's Guide To Understanding The Utility & Investment Opportunity Of Non-Fungible Tokens (NFTs)... The Era of NFTs - A Beginner's Guide To Understanding The Utility & Investment Opportunity Of Non-Fungible Tokens (NFTs) (Hardcover)
Alex Caine, Matthew Thrush
R688 Discovery Miles 6 880 Ships in 12 - 17 working days
World Conference on Computers in Education VI - WCCE '95 Liberating the Learner, Proceedings of the sixth IFIP World... World Conference on Computers in Education VI - WCCE '95 Liberating the Learner, Proceedings of the sixth IFIP World Conference on Computers in Education, 1995 (Hardcover, 1995 ed.)
David Tinsley, Tom J. Van Weert
R8,201 Discovery Miles 82 010 Ships in 12 - 17 working days

In this book about a hundred papers are presented. These were selected from over 450 papers submitted to WCCE95. The papers are of high quality and cover many aspects of computers in education. Within the overall theme of "Liberating the learner" the papers cover the following main conference themes: Accreditation, Artificial Intelligence, Costing, Developing Countries, Distance Learning, Equity Issues, Evaluation (Formative and Summative), Flexible Learning, Implications, Informatics as Study Topic, Information Technology, Infrastructure, Integration, Knowledge as a Resource, Learner Centred Learning, Methodologies, National Policies, Resources, Social Issues, Software, Teacher Education, Tutoring, Visions. Also included are papers from the chairpersons of the six IFIP Working Groups on education (elementary/primary education, secondary education, university education, vocational education and training, research on educational applications and distance learning). In these papers the work in the groups is explained and a basis is given for the work of Professional Groups during the world conference. In the Professional Groups experts share their experience and expertise with other expert practitioners and contribute to a postconference report which will determine future actions of IFIP with respect to education. J. David Tinsley J. van Weert Tom Editors Acknowledgement The editors wish to thank Deryn Watson of Kings College London for organizing the paper reviewing process. The editors also wish to thank the School of Informatics, Faculty of Mathematics and Informatics of the Catholic University of Nijmegen for its support in the production of this document.

Security of Data and Transaction Processing - A Special Issue of Distributed and Parallel Databases Volume 8, No. 1 (2000)... Security of Data and Transaction Processing - A Special Issue of Distributed and Parallel Databases Volume 8, No. 1 (2000) (Hardcover, Reprinted from DISTRIBUTED AND PARALLEL DATABASES, 8:1, 2000)
Vijay Atluri, Pierangela Samarati
R2,870 Discovery Miles 28 700 Ships in 10 - 15 working days

Security of Data and Transaction Processing brings together in one place important contributions and up-to-date research results in this fast moving area. Security of Data and Transaction Processing serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

Automated Security Management (Hardcover, 2013 ed.): Ehab Al-Shaer, Xinming Ou, Geoffrey Xie Automated Security Management (Hardcover, 2013 ed.)
Ehab Al-Shaer, Xinming Ou, Geoffrey Xie
R2,997 R1,821 Discovery Miles 18 210 Save R1,176 (39%) Ships in 12 - 17 working days

In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.

Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security... Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26-27, 2001, Leuven, Belgium (Hardcover, 2002 ed.)
Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
R4,305 Discovery Miles 43 050 Ships in 12 - 17 working days

The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP), focuseson variousstate of the art concepts in the field of Network and Dis tributedSystemsSecurity. Oursocietyisrapidly evolvingand irreversibly set onacourse governedby electronicinteractions. Wehave seen thebirthofe mail in the early seventies, and are now facing new challenging applicationssuchase commerce, e government, ....Themoreour societyrelies on electronicforms ofcommunication, themorethe securityofthesecommunicationnetworks isessentialforitswell functioning. Asaconsequence, researchonmethodsandtechniques toimprove network security iso fparam ount importance. ThisWorking Conference bringstogetherresearchersandprac tionersofvariousdisciplines, organisationsandcountries, todiscuss thelatestdevelopmentsinsecurity protocols, secure software engin eering, mobileagentsecurity, e commercesecurityandsecurityfor distributedcomputing. Wearealsopleasedtohaveattractedtwointernationalspeakers topresenttwo case studies, one dealing withBelgium'sintentionto replacetheidentity card ofitscitizensbyanelectronicversion, and theotherdiscussingtheimplicationsofthesecuritycertificationin amultinationalcorporation. ThisWorking Conference s houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof which can be summarizedas follows: topromoteresearch on technical measures forsecuringcom puternetworks, including bothhardware andsoftware based techniques. to promote dissemination of research results in the field of network security in real lifenetworks in industry, academia and administrative ins titutions. viii topromoteeducationintheapplicationofsecuritytechniques, andtopromotegeneral awarenessa boutsecurityproblems in thebroadfieldofinformationtechnology. Researchers and practioners who want to get involved in this Working Group, are kindlyrequestedtocontactthechairman. MoreinformationontheworkingsofWG11.4isavailable from the officialIFIP website: http: //www.ifip.at.org/. Finally, wewish toexpressour gratitudetoallthosewho have contributedtothisconference in one wayoranother. Wearegr ate fultothe internationalrefereeboard whoreviewedallthe papers andtotheauthorsandinvitedspeakers, whosecontributionswere essential to the successof the conference. We would alsoliketo thanktheparticipantswhosepresenceand interest, togetherwith thechangingimperativesofsociety, willprovea drivingforce for futureconferen

Risk Management Processes for Software Engineering Models (Hardcover): Marian Myerson Risk Management Processes for Software Engineering Models (Hardcover)
Marian Myerson
R2,087 Discovery Miles 20 870 Ships in 10 - 15 working days

Learn how applying risk management to each stage of the software engineering model can help the entire development process run on time and on budget. This practical guide identifies the potential threats associated with software development, explains how to establish an effective risk management program, and details the six critical steps involved in applying the process. It also explores the pros and cons of software and organizational maturity, discusses various software metrics approaches you can use to measure software quality, and highlights procedures for implementing a successful metrics program.

Cryptographic Methods (Hardcover): Abdul Razaque, Fathi Amsaad, Abrar Alajlan Cryptographic Methods (Hardcover)
Abdul Razaque, Fathi Amsaad, Abrar Alajlan
R1,394 Discovery Miles 13 940 Ships in 10 - 15 working days
Cryptographic Applications of Analytic Number Theory - Complexity Lower Bounds and Pseudorandomness (Hardcover, 2003 ed.): Igor... Cryptographic Applications of Analytic Number Theory - Complexity Lower Bounds and Pseudorandomness (Hardcover, 2003 ed.)
Igor Shparlinski
R3,036 Discovery Miles 30 360 Ships in 10 - 15 working days

The book introduces new techniques that imply rigorous lower bounds on the com plexity of some number-theoretic and cryptographic problems. It also establishes certain attractive pseudorandom properties of various cryptographic primitives. These methods and techniques are based on bounds of character sums and num bers of solutions of some polynomial equations over finite fields and residue rings. Other number theoretic techniques such as sieve methods and lattice reduction algorithms are used as well. The book also contains a number of open problems and proposals for further research. The emphasis is on obtaining unconditional rigorously proved statements. The bright side of this approach is that the results do not depend on any assumptions or conjectures. On the downside, the results are much weaker than those which are widely believed to be true. We obtain several lower bounds, exponential in terms of logp, on the degrees and orders of o polynomials; o algebraic functions; o Boolean functions; o linear recurrence sequences; coinciding with values of the discrete logarithm modulo a prime p at sufficiently many points (the number of points can be as small as pI/2+O: ). These functions are considered over the residue ring modulo p and over the residue ring modulo an arbitrary divisor d of p - 1. The case of d = 2 is of special interest since it corresponds to the representation of the rightmost bit of the discrete logarithm and defines whether the argument is a quadratic residue."

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Information Security and Ethics - Social…
Marian Quigley Hardcover R2,171 Discovery Miles 21 710
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R494 Discovery Miles 4 940
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,321 R1,183 Discovery Miles 11 830
Codes and Ciphers - A History Of…
Alexander d'Agapeyeff Hardcover R927 Discovery Miles 9 270
Technical Articles about the Voynich…
National Security Agency Hardcover R568 Discovery Miles 5 680
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,154 Discovery Miles 31 540
Lattice-Based Public-Key Cryptography in…
Sujoy Sinha Roy, Ingrid Verbauwhede Hardcover R1,535 Discovery Miles 15 350
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,512 Discovery Miles 65 120
Blockchain 2035 - The Digital DNA of…
Andrew D Knapp, Jared C Tate Hardcover R1,410 Discovery Miles 14 100
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R784 Discovery Miles 7 840

 

Partners