0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (16)
  • R250 - R500 (91)
  • R500+ (1,348)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Mobile Computation with Functions (Hardcover, 2002 ed.): Zeliha Dilsun Kirli Mobile Computation with Functions (Hardcover, 2002 ed.)
Zeliha Dilsun Kirli
R3,013 Discovery Miles 30 130 Ships in 10 - 15 working days

The advanced state of computer networking and telecommunications technology makes it possible to view computers as parts of a global computation platform, sharing their resources in terms of hardware, software and data. The possibility of exploiting the resources on a global scale has given rise to a new paradigm - the mobile computation paradigm - for computation in large scale distributed networks. The key characteristic of this paradigm is to give programmers control over the mobility of code or active computations across the network by providing appropriate language features. The dynamism and flexibility offered by mobile computation however, brings about a set of problems, the most challenging of which are relevant to safety and security. Several recent experiences prove that identifying the causes of these problems usually requires a rigorous investigation using formal methods.

Functional languages are known for their well-understood computational models and their amenability to formal reasoning. They also have strong expressive power due to higher-order features. Functions can flow from one program point to another as other first-class values. These facts suggest that functional languages can provide the core of mobile computation language. Functions that represent mobile agents and formal systems for reasoning about functional programs can be further exploited to reason about the behavior of agents.

Mobile Computation with Functions explores distributed computation with languages which adopt functions as the main programming abstraction and support code mobility through the mobility of functions between remote sites. It aims to highlight the benefits of using languages of this family in dealing with the challenges of mobile computation. The possibility of exploiting existing static analysis techniques suggests that having functions at the core of mobile code language is a particularly apt choice. A range of problems which have impact on the safety, security and performance are discussed. It is shown that types extended with effects and other annotations can capture a significant amount of information about the dynamic behavior of mobile functions, and offer solutions to the problems under investigation. This book includes a survey of the languages Concurrent ML, Facile and PLAN which inherit the strengths of the functional paradigm in the context of concurrent and distributed computation. The languages which are defined in the subsequent chapters have their roots in these languages.

Mobile Computation with Functions is designed to meet the needs of a professional audience composed of researchers and practitioners in industry and graduate level students in Computer Science.

Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks (Hardcover, 1st ed. 2022): Ikram Ali, Yong Chen, Mohammad... Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks (Hardcover, 1st ed. 2022)
Ikram Ali, Yong Chen, Mohammad Faisal, Meng Li
R4,136 Discovery Miles 41 360 Ships in 12 - 17 working days

This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a single logical step. To provide readers to study the schemes that securely and efficiently process a message and multiple messages in vehicle to vehicle and vehicle to infrastructure communications is the main benefit of this book. In addition, it can benefit researchers, engineers, and graduate students in the fields of security and privacy of VANETs, Internet of vehicles securty, wireless body area networks security, etc.

The Cyber Security Handbook - Prepare For, Respond to and Recover from Cyber Attacks (Paperback): IT Governance The Cyber Security Handbook - Prepare For, Respond to and Recover from Cyber Attacks (Paperback)
IT Governance
R1,496 Discovery Miles 14 960 Ships in 10 - 15 working days

In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book. Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences. Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each. Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them. Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available. Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book. Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success. Make sure you understand the threats and vulnerabilities your organisation faces and how the Cyber Resilience Framework can help you tackle them. Start your journey to cyber security now - buy this book today!

Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback): Jeff Stapleton Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback)
Jeff Stapleton
R1,163 Discovery Miles 11 630 Ships in 9 - 15 working days

Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.

Identity Theft - Breakthroughs in Research and Practice (Hardcover): Information Resources Management Association Identity Theft - Breakthroughs in Research and Practice (Hardcover)
Information Resources Management Association
R9,443 Discovery Miles 94 430 Ships in 12 - 17 working days

The preservation of private data is a main concern of governments, organizations, and individuals alike. For individuals, a breach in personal information can mean dire consequences for an individual's finances, medical information, and personal property. Identity Theft: Breakthroughs in Research and Practice highlights emerging perspectives and critical insights into the preservation of personal data and the complications that can arise when one's identity is compromised. This critical volume features key research on methods and technologies for protection, the problems associated with identity theft, and outlooks for the future. This publication is an essential resource for information security professionals, researchers, and graduate-level students in the fields of criminal science, business, and computer science.

Selected Areas in Cryptography (Hardcover, Reprinted from Designs, Codes and > ed.): Evangelos Kranakis, Paul C.Van Oorschot Selected Areas in Cryptography (Hardcover, Reprinted from Designs, Codes and > ed.)
Evangelos Kranakis, Paul C.Van Oorschot
R2,987 Discovery Miles 29 870 Ships in 10 - 15 working days

Selected Areas in Cryptography brings together in one place important contributions and up-to-date research results in this fast moving area. Selected Areas in Cryptography serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

Integrity and Internal Control in Information Systems - Strategic Views on the Need for Control (Hardcover, 2000 ed.): Margaret... Integrity and Internal Control in Information Systems - Strategic Views on the Need for Control (Hardcover, 2000 ed.)
Margaret E. van Biene-Hershey, Leon A. M. Strous
R4,510 Discovery Miles 45 100 Ships in 12 - 17 working days

This publication is a collection of papers from the Third International Working Conference of IFIP TC-11 Working group 11.5 on "Integrity and Internal Control in Information systems". IFIP TC-11 Working Group 11.5 explores the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support the corporate governance codes. We want to recommend this book to security specialists, IT auditors and researchers who want to learn more about the business concerns related to integrity. Those same security specialists, IT auditors and researchers will also value this book for the papers presenting research into new techniques and methods for obtaining the desired level of integrity. The third conference represents a continuation of the dialogue between information security specialists, internal control specialists and the business community. The conference objectives are: * To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; * To present the results of research that may in future be used to increase the level of integrity or help management maintain the desired level of integrity; * To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general.

Systems and Human Science - For Safety, Security and Dependability - Selected Papers of the 1st International Symposium SSR... Systems and Human Science - For Safety, Security and Dependability - Selected Papers of the 1st International Symposium SSR 2003, Osaka, Japan, November 2003 (Hardcover)
Shigeru Yamamoto, Kazuhisa Makino, Tatsuo Arai
R6,202 Discovery Miles 62 020 Ships in 12 - 17 working days

Our society keeps growing with a large number of complicated machines and systems, while we are spending our diverse lives. The number of aged people has been increasing in the society. It is more likely than ever that we are involved in dangers, accidents, crimes, and disasters. Securing and supporting our daily life, building reliable infrastructures against large scale disasters, and preventing unexpected human errors are crucial issues in our highly developed complex society.
The systems theory can provide "modelling, decision analysis and management for safety and security" as well as "fault detection and reliable control for the design of fail-safe, fool-proof machines and systems."
If the human nature is analyzed and treated properly in the process of designing machines and systems, we could create safer, more reliable, and more intelligent machines and systems that can support our society and give us no anxiety and no uneasiness. "Hybrid systems modelling human behaviours" and "services for human" could give proper examples in this respect.
"Robotics for safety and security," "safety recovery systems," "visual surveillance and monitoring," and "transportation systems for safety and security," those will provide powerful tools for safe, secure, and reliable systems to achieve peaceful society.
Key features:
- Towards a new science and its practical applications
- Analysis of humans contributing to system designs
- Evaluations of systems in the aspects of sense of security and feeling of easiness.
.Towards a new science and its practical applications
.Analysis of humans contributing to system designs
.Evaluations of systems in the aspects of sense of security and feeling of easiness"

Optical and Digital Techniques for Information Security (Hardcover, and and): Bahram Javidi Optical and Digital Techniques for Information Security (Hardcover, and and)
Bahram Javidi
R2,981 Discovery Miles 29 810 Ships in 10 - 15 working days

There are wide-ranging implications in information security beyond national defense. Securing our information has implications for virtually all aspects of our lives, including protecting the privacy of our ?nancial transactions and medical records, facilitating all operations of government, maintaining the integrity of national borders, securing important facilities, ensuring the safety of our food and commercial products, protecting the safety of our aviation system-even safeguarding the integrity of our very identity against theft. Information security is a vital element in all of these activities, particularly as information collection and distribution become ever more connected through electronic information delivery systems and commerce. This book encompasses results of research investigation and technologies that can be used to secure, protect, verify, and authenticate objects and inf- mation from theft, counterfeiting, and manipulation by unauthorized persons and agencies. The book has drawn on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information p- cessing, mathematical algorithms, quantum optics, computer-based infor- tion systems, sensors, detectors, and biometrics to report novel technologies that can be applied to information-security issues. The book is unique because it has diverse contributions from the ?eld of optics, which is a new emerging technology for security, and digital techniques that are very accessible and can be interfaced with optics to produce highly e?ective security systems.

CryptoGraphics - Exploiting Graphics Cards For Security (Hardcover, 2006 ed.): Debra Cook, Angelos D. Keromytis CryptoGraphics - Exploiting Graphics Cards For Security (Hardcover, 2006 ed.)
Debra Cook, Angelos D. Keromytis
R3,015 Discovery Miles 30 150 Ships in 10 - 15 working days

Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes.

CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. As the processing power of GPUs increases, research involving the use of GPUs for general purpose computing has arisen. This work extends such research by considering the use of a GPU as a parallel processor for encrypting data. The authors evaluate the operations found in symmetric and asymmetric key ciphers to determine if encryption can be programmed in existing GPUs. A detailed description for a GPU based implementation of AES is provided. The feasibility of GPU-based encryption allows the authors to explore the use of a GPU as a trusted system component. Unencrypted display data can be confined to the GPU to avoid exposing it to any malware running on the operating system.

Cryptography Made Simple (Hardcover, 1st ed. 2016): Nigel Smart Cryptography Made Simple (Hardcover, 1st ed. 2016)
Nigel Smart
R1,352 R918 Discovery Miles 9 180 Save R434 (32%) Ships in 12 - 17 working days

In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by "secure" is as important as creating something that achieves that goal, and security definitions are central to the discussion throughout. The author balances a largely non-rigorous style - many proofs are sketched only - with appropriate formality and depth. For example, he uses the terminology of groups and finite fields so that the reader can understand both the latest academic research and "real-world" documents such as application programming interface descriptions and cryptographic standards. The text employs colour to distinguish between public and private information, and all chapters include summaries and suggestions for further reading. This is a suitable textbook for advanced undergraduate and graduate students in computer science, mathematics and engineering, and for self-study by professionals in information security. While the appendix summarizes most of the basic algebra and notation required, it is assumed that the reader has a basic knowledge of discrete mathematics, probability, and elementary calculus.

Cryptography - Breakthroughs in Research and Practice (Hardcover): Information Resources Management Association Cryptography - Breakthroughs in Research and Practice (Hardcover)
Information Resources Management Association
R11,087 Discovery Miles 110 870 Ships in 12 - 17 working days

Advances in technology have provided numerous innovations that make people's daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks also increase. The field of cryptography has become a solution to this ever-increasing problem. Applying strategic algorithms to cryptic issues can help save time and energy in solving the expanding problems within this field. Cryptography: Breakthroughs in Research and Practice examines novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data. Highlighting a range of topics such as cyber security, threat detection, and encryption, this publication is an ideal reference source for academicians, graduate students, engineers, IT specialists, software engineers, security analysts, industry professionals, and researchers interested in expanding their knowledge of current trends and techniques within the cryptology field.

Database Security X - Status and prospects (Hardcover, 1997 ed.): Pierangela Samarati, Ravi Sandhu Database Security X - Status and prospects (Hardcover, 1997 ed.)
Pierangela Samarati, Ravi Sandhu
R4,538 Discovery Miles 45 380 Ships in 12 - 17 working days

The purpose of this book is to discuss, in depth, the current state of research and practice in database security, to enable readers to expand their knowledge. The book brings together contributions from experts in the field throughout the world. Database security is still a key topic in mist businesses and in the public sector, having implications for the whole of society.

Information Systems Security - Facing the information society of the 21st century (Hardcover, 1996 ed.): Sokratis Katsikas Information Systems Security - Facing the information society of the 21st century (Hardcover, 1996 ed.)
Sokratis Katsikas
R6,010 Discovery Miles 60 100 Ships in 10 - 15 working days

This book presents a state-of-the-art review of current perspectives in information systems security in view of the information society of the 21st century. It will be essential reading for information technology security specialists, computer professionals, EDP managers, EDP auditors, managers, researchers and students working on the subject.

Database Security IX - Status and prospects (Hardcover, 1996 ed.): David L. Spooner, Steven Demurjian, John Dobson Database Security IX - Status and prospects (Hardcover, 1996 ed.)
David L. Spooner, Steven Demurjian, John Dobson
R5,949 Discovery Miles 59 490 Ships in 10 - 15 working days

This book documents progress and presents a broad perspective of recent developments in database security. It also discusses in depth the current state-of-the-art in research in the field. A number of topics are explored in detail including: current reseearch in database security and the state of security controls in present commercial database systems. Database Security IX will be essential reading for advanced students working in the area of database security research and development in for industrial researchers in this technical area.

Distributed Denial of Service Attacks - Concepts, Mathematical and Cryptographic Solutions (Hardcover): Rajeev Singh, Mangey Ram Distributed Denial of Service Attacks - Concepts, Mathematical and Cryptographic Solutions (Hardcover)
Rajeev Singh, Mangey Ram
R4,623 Discovery Miles 46 230 Ships in 12 - 17 working days

Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of mathematics and mathematical tools such as optimization techniques, finite element methods, differential equations, fluid dynamics, mathematical modelling, and simulation. Neither optimization in engineering, nor the performance of safety-critical system and system security; nor high assurance software architecture and design would be possible without the development of mathematical applications. De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences (AMEIS) focusses on the latest applications of engineering and information technology that are possible only with the use of mathematical methods. By identifying the gaps in knowledge of engineering applications the AMEIS series fosters the international interchange between the sciences and keeps the reader informed about the latest developments.

Network Security Metrics (Hardcover, 1st ed. 2017): Lingyu Wang, Sushil Jajodia, Anoop Singhal Network Security Metrics (Hardcover, 1st ed. 2017)
Lingyu Wang, Sushil Jajodia, Anoop Singhal
R4,110 Discovery Miles 41 100 Ships in 12 - 17 working days

This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since "you cannot improve what you cannot measure", a network security metric is essential to evaluating the relative effectiveness of potential network security solutions. The authors start by examining the limitations of existing solutions and standards on security metrics, such as CVSS and attack surface, which typically focus on known vulnerabilities in individual software products or systems. The first few chapters of this book describe different approaches to fusing individual metric values obtained from CVSS scores into an overall measure of network security using attack graphs. Since CVSS scores are only available for previously known vulnerabilities, such approaches do not consider the threat of unknown attacks exploiting the so-called zero day vulnerabilities. Therefore, several chapters of this book are dedicated to develop network security metrics especially designed for dealing with zero day attacks where the challenge is that little or no prior knowledge is available about the exploited vulnerabilities, and thus most existing methodologies for designing security metrics are no longer effective. Finally, the authors examine several issues on the application of network security metrics at the enterprise level. Specifically, a chapter presents a suite of security metrics organized along several dimensions for measuring and visualizing different aspects of the enterprise cyber security risk, and the last chapter presents a novel metric for measuring the operational effectiveness of the cyber security operations center (CSOC). Security researchers who work on network security or security analytics related areas seeking new research topics, as well as security practitioners including network administrators and security architects who are looking for state of the art approaches to hardening their networks, will find this book helpful as a reference. Advanced-level students studying computer science and engineering will find this book useful as a secondary text.

Information Security - the Next Decade (Hardcover, 1995 ed.): Jan H.P. Eloff, Sebastian Von Solms Information Security - the Next Decade (Hardcover, 1995 ed.)
Jan H.P. Eloff, Sebastian Von Solms
R6,083 Discovery Miles 60 830 Ships in 10 - 15 working days

These are the proceedings of the Eleventh International Information Security Conference which was held in Cape Town, South Africa, May 1995. This conference addressed the information security requirements of the next decade and papers were presented covering a wide range of subjects including current industry expectations and current research aspects. The evolutionary development of information security as a professional and research discipline was discussed along with security in open distributed systems and security in groupware.

Data and Application Security - Developments and Directions (Hardcover, 2001 ed.): B. Thuraisingham, Reind van de Riet, Klaus... Data and Application Security - Developments and Directions (Hardcover, 2001 ed.)
B. Thuraisingham, Reind van de Riet, Klaus R. Dittrich, Zahir Tari
R5,933 Discovery Miles 59 330 Ships in 10 - 15 working days

New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the whole of society. Data and Applications Security covers issues related to security and privacy of information in a wide range of applications, including: Electronic Commerce, XML and Web Security; Workflow Security and Role-based Access Control; Distributed Objects and Component Security; Inference Problem, Data Mining and Intrusion Detection; Language and SQL Security; Security Architectures and Frameworks; Federated and Distributed Systems Security; Encryption, Authentication and Security Policies. This book contains papers and panel discussions from the Fourteenth Annual Working Conference on Database Security, which is part of the Database Security: Status and Prospects conference series sponsored by the International Federation for Information Processing (IFIP). The conference was held in Schoorl, The Netherlands in August 2000.

Heterogeneous Cyber Physical Systems of Systems (Hardcover): Ioannis Papaefstathiou, Alkis Hatzopoulos Heterogeneous Cyber Physical Systems of Systems (Hardcover)
Ioannis Papaefstathiou, Alkis Hatzopoulos
R2,783 R1,684 Discovery Miles 16 840 Save R1,099 (39%) Ships in 9 - 15 working days

Cyber-physical systems are the natural extension of the so-called "Internet of Things". They are "systems of collaborating computational elements controlling physical entities". Cyber Physical Systems of Systems (CPSoS) are considered "The Next Computing Revolution" after Mainframe computing (60's-70's), Desktop computing & Internet (80's-90's) and Ubiquitous computing (00's); because all aspects of daily life are rapidly evolving towards humans interacting amongst themselves as well as their environment via computational devices (often mobile), and because in most cases systems will employ their computational capabilities to interact amongst themselves. CPSoS enable the physical world to merge with the cyber one. Using sensors, the embedded systems monitor and collect data from physical processes, such as the steering of a vehicle, energy consumption or human health functions. The systems are networked making the data globally available. CPSoS make it possible for software applications to directly interact with events in the physical world, for example to measure and react to changes in blood pressure or peaks in energy consumption. Embedded hardware and software systems crucially expand the functionality and competitiveness of vehicles, aircraft, medical equipment, production plants and household appliances. Connecting these systems to a virtual environment of globally networked services and information systems opens completely new areas of innovation and novel business platforms. Future CPSoS will have many sophisticated, interconnected parts that must instantaneously exchange, parse, and act on detailed data in a highly coordinated manner. Continued advances in science and engineering will be necessary to enable advances in design and development of these complex systems. Multi- scale, multi-layer, multi-domain, and multi-system integrated infrastructures will require new foundations in system science and engineering. Scientists and engineers with an understanding of otherwise physical systems will need to work in tandem with computer and information scientists to achieve effective, workable designs. In this tutorial, basic and advanced issues on the design of the future heterogeneous CPSoS are presented including relevant Blockchain technologies, reconfigurable systems, advanced sensor interfaces and human-centered design processes. Certain advanced tools for the design and implementation of the cyber parts of the CPSoS (i.e. FPGA design tools from Xilinx) are also covered.

Blockchain-based New Financial Infrastructures - Theory, Practice and Regulation (Hardcover, 1st ed. 2022): Qian YAO Blockchain-based New Financial Infrastructures - Theory, Practice and Regulation (Hardcover, 1st ed. 2022)
Qian YAO
R2,933 Discovery Miles 29 330 Ships in 10 - 15 working days

This book focuses on development of blockchain-based new-generation financial infrastructures, in which a systematic, complete theoretical framework is proposed to explore blockchain-based securities trading platform, central securities depository (CSD), securities settlement system (SSS), central counterparty (CCP), payment system (PS) and trade repository (TR). The blockchain-based new FMI has attracted much attention in the securities industry. At present, the cross-border depository receipt (DR) business faces a dilemma between efficiency and security. In this book, the author proposes a blockchain-based new DR solution, manifesting the potential for using blockchain technology in the FMI field. In addition, using Hashed Timelock Contract (HTLC) as the underlying technology in the DR scenario, specific process and operations are proposed for delivery versus payment (DvP), delivery versus delivery (DvD) or payment versus payment (PvP) and other exchange-of-value methods. This book further studies how to carry out opening positions, end-of-day settlement of margin, forced liquidation and settlement at maturity, for exchange-traded derivatives, such as futures and options, under the blockchain-based technological framework. Blockchain technology not only naturally fits into the decentralized or non-centralized characteristic of the OTC market but also can effectively address the pain points and difficulties of the OTC market. This book provides an in-depth analysis of existing specific issues in China's bond market, regional equity markets and asset management market, among other OTC markets, and proposes relevant blockchain-based solutions. Blockchain technology does not change the public policy objectives for FMI. The blockchain-based new FMIs are still subject to compliance, safety and efficiency requirements. This book provides a comprehensive assessment of the applicability of the Principles for Financial Market Infrastructures (PFMI) to them, in particular, analyzes their legal basis, off-chain governance and system security.

Advances in Digital Forensics - IFIP International Conference on Digital Forensics, National Center for Forensic Science,... Advances in Digital Forensics - IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, 2005 (Hardcover, 2005 ed.)
Mark Pollitt, Sujeet Shenoi
R3,124 Discovery Miles 31 240 Ships in 10 - 15 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance a" investigations of security breaches yield valuable information that can be used to design more secure systems.

Advances in Digital Forensics describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include:

  • Themes and Issues in Digital Forensics
  • Investigative Techniques
  • Network Forensics
  • Portable Electronic Device Forensics
  • Linux and File System Forensics
  • Applications and Techniques

This book is the first volume of a new series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-five edited papers from the First Annual IFIP WG11.9 Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in February 2005.

Advances in Digital Forensics is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

Mark Pollitt is President of Digital Evidence Professional Services, Inc., Ellicott City, Maryland, USA. Mr. Pollitt, who is retired from the Federal Bureau of Investigation (FBI), served as the Chief of the FBI's Computer Analysis Response Team, and Director of the Regional Computer Forensic Laboratory National Program.

Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.

For more information about the 300 other books in the IFIP series, please visit www.springeronline.com.

For more information about IFIP, please visit www.ifip.org.

Principles of Secure Network Systems Design (Hardcover, 2002 ed.): H. Lawson Principles of Secure Network Systems Design (Hardcover, 2002 ed.)
H. Lawson; Sumit Ghosh
R1,555 Discovery Miles 15 550 Ships in 10 - 15 working days

This new book establishes a comprehensive framework for network security design, unifying the many concepts and aspects of network security and enabling all users to employ a common security foundation. It is presented from the perspective of fundamental principles underlying networking, network control algorithms and security. Using an accessible style and careful explanations, the principles and methodology address design concepts for current and future security concerns for networks. "Principles of Secure Network Systems Design" presents the topic in three basic parts. Part one covers the basic background of network security and the current scope for security in all types of networks and organizations. Part two focuses on the essential nature of network security and a scientific methodology for secure network design. Lastly, part three discusses concrete applications of the design concepts with real world networks, using three comprehensive case studies oriented around ATM networks. Topics and Features: * Holistic view of network security design, going beyond cryptographic issues * Comprehensive framework for a scientific basis of network security design * Integrated view of network security with networks¿ operational and management processes * Extensive case study through modeling & large-scale distributed simulation of ATM network * New approach to both security attack detection and strengthening networks against security attacks and vulnerabilities The book is an essential and practical resource for all professionals, policy makers, practitioners, and advanced students in networking, information systems, computer engineering & science, communications engineering, network design, and security consultants seeking a comprehensive framework for secure network systems design. It is also suitable for self-study purposes by professionals, as well as for advanced course use in network security.

Information Security for Global Information Infrastructures - IFIP TC11 Sixteenth Annual Working Conference on Information... Information Security for Global Information Infrastructures - IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22-24, 2000, Beijing, China (Hardcover, 2000 ed.)
Sihan Qing, Jan H.P. Eloff
R6,016 Discovery Miles 60 160 Ships in 10 - 15 working days

IFIP/SEC2000, being part of the 16th IFIP World Computer Congress (WCC2000), is being held in Beijing, China from August 21 to 25, 2000. SEC2000 is the annual conference of TCll (Information Security) of the International Federation of Information Processing. The conference focuses on the seamless integration of information security services as an integral part of the Global Information Infrastructure in the new millenniUm. SEC2000 is sponsored by the China Computer Federation (CCF), IFIP/TCll, and Engineering Research Centre for Information Security Technology, Chinese Academy of Sciences (ERCIST, CAS). There were 180 papers submitted for inclusion, 50 papers among them have been accepted as long papers and included in this proceeding, 81 papers have been accepted as short papers and published in another proceeding. All papers presented in this conference were reviewed blindly by a minimum of two international reviewers. The authors' affiliations of the 180 submissions and the accepted 131 papers range over 26 and 25 countries or regions, respectively. We would like to appreciate all who have submitted papers to IFIP/SEC2000, and the authors of accepted papers for their on-time preparation of camera-ready fmal versions. Without their contribution there would be no conference. We wish to express our gratitude to all program committee members and other reviewers for their hard work in reviewing the papers in a short time and for contributing to the conference in different ways. We would like to thank Rein Venter for his time and expertise in compiling the fmal version of the proceedings.

Security for Ubiquitous Computing (Hardcover, Annotated Ed): F. Stajano Security for Ubiquitous Computing (Hardcover, Annotated Ed)
F. Stajano
R2,992 Discovery Miles 29 920 Ships in 12 - 17 working days

Ubiquitous computing (ubicomp) is about networked microprocessors embedded in everyday objects: not just cellphones and home appliances but also books, bookshelves, bus stops and bathtubs. This future is closer than you might imagine.

The insecurity of networked PCs is notorious. If we deployed ubicomp systems as vulnerable as PCs, the risks for society would be catastrophic. How can we do better, and what are the new problems? In a very accessible style, this book provides a coherent framework to make sense of the many issues at stake.

Features include:

  • An introduction to the state of the art in ubicomp research.
  • A readable primer on security and cryptology.
  • An up-to-date technical treatment of ubicomp security, including a sceptical look at Bluetooth and 802.11.
  • "Peer-to-peer" and ad-hoc networking.
  • An in-depth discussion of specific, cutting-edge solutions.
  • An extensively annotated bibliography.
Security for Ubiquitous Computing combines clarity, brevity and authority. It will appeal to developers and researchers in ubiquitous computing, wireless and ad-hoc networking, wearable computing and related areas. Because it is readable and self-contained, it will also prove valuable to managers, analysts, technology watchers and end users who want to understand the new opportunities and risks of ubicomp.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R777 R668 Discovery Miles 6 680
Intelligent Security Systems - How…
L. Reznik Hardcover R2,639 Discovery Miles 26 390
Cybersecurity in Smart Homes…
Khatoun Hardcover R3,773 Discovery Miles 37 730
Trojans, Worms, and Spyware - A Computer…
Michael Erbschloe Paperback R1,218 Discovery Miles 12 180
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R819 Discovery Miles 8 190
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,834 Discovery Miles 68 340
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,834 Discovery Miles 68 340
Conflicts, Crimes and Regulations in…
SY Laurent Hardcover R4,141 Discovery Miles 41 410
TLS Mastery
Michael W Lucas Hardcover R995 R876 Discovery Miles 8 760
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R834 Discovery Miles 8 340

 

Partners