0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (16)
  • R250 - R500 (90)
  • R500+ (1,349)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security (Hardcover): Brij Gupta, Dharma P.... Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security (Hardcover)
Brij Gupta, Dharma P. Agrawal, Shingo Yamaguchi
R8,407 Discovery Miles 84 070 Ships in 12 - 17 working days

Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments. The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.

Information Warfare Principles and Operations (Hardcover): Edward Waltz Information Warfare Principles and Operations (Hardcover)
Edward Waltz
R4,241 Discovery Miles 42 410 Ships in 10 - 15 working days

A systems engineering-level introduction to the field of Information Warfare (IW), this text provides an overview of threats to commercial, civil and military information systems, and shows how these threats can be identified and systems protected.

Predictive Analytics in Cloud, Fog, and Edge Computing - Perspectives and Practices of Blockchain, IoT, and 5G (Hardcover, 1st... Predictive Analytics in Cloud, Fog, and Edge Computing - Perspectives and Practices of Blockchain, IoT, and 5G (Hardcover, 1st ed. 2023)
Hiren Kumar Thakkar, Chinmaya Kumar Dehury, Prasan Kumar Sahoo, Bharadwaj Veeravalli
R4,810 Discovery Miles 48 100 Ships in 12 - 17 working days

This book covers the relationship of recent technologies (such as Blockchain, IoT, and 5G) with the cloud computing as well as fog computing, and mobile edge computing. The relationship will not be limited to only architecture proposal, trends, and technical advancements. However, the book also explores the possibility of predictive analytics in cloud computing with respect to Blockchain, IoT, and 5G. The recent advancements in the internet-supported distributed computing i.e. cloud computing, has made it possible to process the bulk amount of data in a parallel and distributed. This has made it a lucrative technology to process the data generated from technologies such as Blockchain, IoT, and 5G. However, there are several issues a Cloud Service Provider (CSP) encounters, such as Blockchain security in cloud, IoT elasticity and scalability management in cloud, Service Level Agreement (SLA) compliances for 5G, Resource management, Load balancing, and Fault-tolerance. This edited book will discuss the aforementioned issues in connection with Blockchain, IoT, and 5G. Moreover, the book discusses how the cloud computing is not sufficient and one needs to use fog computing, and edge computing to efficiently process the data generated from IoT, and 5G. Moreover, the book shows how smart city, smart healthcare system, and smart communities are few of the most relevant IoT applications where fog computing plays a significant role. The book discusses the limitation of fog computing and the need for the edge computing to further reduce the network latency to process streaming data from IoT devices. The book also explores power of predictive analytics of Blockchain, IoT, and 5G data in cloud computing with its sister technologies. Since, the amount of resources increases day-by day, artificial intelligence (AI) tools are becoming more popular due to their capability which can be used in solving wide variety of issues, such as minimize the energy consumption of physical servers, optimize the service cost, improve the quality of experience, increase the service availability, efficiently handle the huge data flow, manages the large number of IoT devices, etc.

Cryptography and Computational Number Theory - Workshop in Singapore, 1999 (Hardcover): Igor E Shparlinski, Etc, Kwook-Yan Lam,... Cryptography and Computational Number Theory - Workshop in Singapore, 1999 (Hardcover)
Igor E Shparlinski, Etc, Kwook-Yan Lam, Wang, Huaxiong University of Wollongong, Australia), Chaoping Xing
R2,541 Discovery Miles 25 410 Ships in 12 - 17 working days

The fields of cryptography and computational number theory have recently witnessed a rapid development, which was the subject of the CCNT workshop in Singapore in November 1999. Its aim was to stimulate further research in information and computer security as well as the design and implementation of number theoretic cryptosystems and other related areas. Another achievement of the meeting was the collaboration of mathematicians, computer scientists, practical cryptographers and engineers in academia, industry and government. The present volume comprises a selection of refereed papers originating from this event, presenting either a survey of some area or original and new results. They concern many different aspects of the field such as theory, techniques, applications and practical experience. It provides a state-of-the-art report on some number theoretical issues of significance to cryptography.

Archives in the Digital Age - Protection and the Right to be Forgotten (Hardcover): A Mkadmi Archives in the Digital Age - Protection and the Right to be Forgotten (Hardcover)
A Mkadmi
R4,141 Discovery Miles 41 410 Ships in 10 - 15 working days

Archiving has become an increasingly complex process. The challenge is no longer how to store the data but how to store it intelligently, in order to exploit it over time, while maintaining its integrity and authenticity. Digital technologies bring about major transformations, not only in terms of the types of documents that are transferred to and stored in archives, in the behaviors and practices of the humanities and social sciences (digital humanities), but also in terms of the volume of data and the technological capacity for managing and preserving archives (Big Data). Archives in The Digital Age focuses on the impact of these various digital transformations on archives, and examines how the right to memory and the information of future generations is confronted with the right to be forgotten; a digital prerogative that guarantees individuals their private lives and freedoms.

Building Secure Cars - Assuring the Automotive Software Development Lifecycle (Hardcover): D Kengo Oka Building Secure Cars - Assuring the Automotive Software Development Lifecycle (Hardcover)
D Kengo Oka
R3,290 Discovery Miles 32 900 Ships in 12 - 17 working days

BUILDING SECURE CARS Explores how the automotive industry can address the increased risks of cyberattacks and incorporate security into the software development lifecycle While increased connectivity and advanced software-based automotive systems provide tremendous benefits and improved user experiences, they also make the modern vehicle highly susceptible to cybersecurity attacks. In response, the automotive industry is investing heavily in establishing cybersecurity engineering processes. Written by a seasoned automotive security expert with abundant international industry expertise, Building Secure Cars: Assuring the Automotive Software Development Lifecycle introduces readers to various types of cybersecurity activities, measures, and solutions that can be applied at each stage in the typical automotive development process. This book aims to assist auto industry insiders build more secure cars by incorporating key security measures into their software development lifecycle. Readers will learn to better understand common problems and pitfalls in the development process that lead to security vulnerabilities. To overcome such challenges, this book details how to apply and optimize various automated solutions, which allow software development and test teams to identify and fix vulnerabilities in their products quickly and efficiently. This book balances technical solutions with automotive technologies, making implementation practical. Building Secure Cars is: One of the first books to explain how the automotive industry can address the increased risks of cyberattacks, and how to incorporate security into the software development lifecycle An optimal resource to help improve software security with relevant organizational workflows and technical solutions A complete guide that covers introductory information to more advanced and practical topics Written by an established professional working at the heart of the automotive industry Fully illustrated with tables and visuals, plus real-life problems and suggested solutions to enhance the learning experience This book is written for software development process owners, security policy owners, software developers and engineers, and cybersecurity teams in the automotive industry. All readers will be empowered to improve their organizations' security postures by understanding and applying the practical technologies and solutions inside.

Introduction to Coding Theory (Paperback, 2nd edition): Jurgen Bierbrauer Introduction to Coding Theory (Paperback, 2nd edition)
Jurgen Bierbrauer
R1,431 Discovery Miles 14 310 Ships in 12 - 17 working days

This book is designed to be usable as a textbook for an undergraduate course or for an advanced graduate course in coding theory as well as a reference for researchers in discrete mathematics, engineering and theoretical computer science. This second edition has three parts: an elementary introduction to coding, theory and applications of codes, and algebraic curves. The latter part presents a brief introduction to the theory of algebraic curves and its most important applications to coding theory.

Domain Specific High-Level Synthesis for Cryptographic Workloads (Hardcover, 1st ed. 2019): Ayesha Khalid, Goutam Paul, Anupam... Domain Specific High-Level Synthesis for Cryptographic Workloads (Hardcover, 1st ed. 2019)
Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
R2,948 Discovery Miles 29 480 Ships in 10 - 15 working days

This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs). These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations.

The Truth Machine - The Blockchain and the Future of Everything (Paperback): Paul Vigna, Michael J. Casey The Truth Machine - The Blockchain and the Future of Everything (Paperback)
Paul Vigna, Michael J. Casey 1
R469 R405 Discovery Miles 4 050 Save R64 (14%) Ships in 10 - 15 working days
Advanced Communications and Multimedia Security - IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and... Advanced Communications and Multimedia Security - IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia (Hardcover, 2002 ed.)
Borka Jerman-Blazic, Tomaz Klobucar
R2,967 Discovery Miles 29 670 Ships in 10 - 15 working days

Security, trust and confidence can certainly be considered as the most important parts of the Information Society. Being protected when working, learning, shopping or doing any kind of e-commerce is of great value to citizens, students, business people, employees and employers. Commercial companies and their clients want to do business over the Internet in a secure way; business managers when having meetings by videoconferencing tools require the exchanged information to be protected; the publishing industry is concerned with the protection of copyright; hospital patients have a right to privacy; etc. There is no area in the Information Society that can proliferate without extensive use of services that provide satisfactory protection and privacy of data or personality.
Advanced Communications and Multimedia Security presents a state-of-the-art review of current perspectives as well as the latest developments in the area of communications and multimedia security. It examines requirements, issues and solutions pertinent to securing information networks, and identifies future security-related research challenges. A wide spectrum of topics is discussed, including:
-Applied cryptography;
-Biometry;
-Communication systems security;
-Applications security; Mobile security;
-Distributed systems security;
-Digital watermarking and digital signatures.
This volume comprises the proceedings of the sixth Joint Working Conference on Communications and Multimedia Security (CMS'02), which was sponsored by the International Federation for Information Processing (IFIP) and held in September 2002 in Portoroz, Slovenia. It constitutes essential reading for information security specialists, researchers and professionals working in the area of computer science and communication systems.

Advances in Information Security Management & Small Systems Security - IFIP TC11 WG11.1/WG11.2 Eighth Annual Working Conference... Advances in Information Security Management & Small Systems Security - IFIP TC11 WG11.1/WG11.2 Eighth Annual Working Conference on Information Security Management & Small Systems Security September 27-28, 2001, Las Vegas, Nevada, USA (Hardcover, 2001 ed.)
Jan H.P. Eloff, Les Labuschagne, Rossouw von Solms, Gurpreet Dhillon
R4,452 Discovery Miles 44 520 Ships in 10 - 15 working days

The Eighth Annual Working Conference of Information Security Management and Small Systems Security, jointly presented by WG11.1 and WG11.2 of the International Federation for Information Processing (IFIP), focuses on various state-of-art concepts in the two relevant fields. The conference focuses on technical, functional as well as managerial issues. This working conference brings together researchers and practitioners of different disciplines, organisations, and countries, to discuss the latest developments in (amongst others) information security methods, methodologies and techniques, information security management issues, risk analysis, managing information security within electronic commerce, computer crime and intrusion detection. We are fortunate to have attracted two highly acclaimed international speakers to present invited lectures, which will set the platform for the reviewed papers. Invited speakers will talk on a broad spectrum of issues, all related to information security management and small system security issues. These talks cover new perspectives on electronic commerce, security strategies, documentation and many more. All papers presented at this conference were reviewed by a minimum of two international reviewers. We wish to express our gratitude to all authors of papers and the international referee board. We would also like to express our appreciation to the organising committee, chaired by Gurpreet Dhillon, for all their inputs and arrangements. Finally, we would like to thank Les Labuschagne and Hein Venter for their contributions in compiling this proceeding for WG11.1 and WG 11.2.

The Encrypted Book of Passwords (Hardcover): Raef Meeuwisse The Encrypted Book of Passwords (Hardcover)
Raef Meeuwisse
R612 Discovery Miles 6 120 Ships in 12 - 17 working days
Computer Security in the 21st Century (Hardcover, 2005): D. T. Lee, S. P Shieh, J. Doug Tygar Computer Security in the 21st Century (Hardcover, 2005)
D. T. Lee, S. P Shieh, J. Doug Tygar
R2,955 Discovery Miles 29 550 Ships in 10 - 15 working days

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include presentations of:

- Fundamental new security

- Cryptographic protocols and design,

- A new way of measuring network vulnerability: attack surfaces,

- Network vulnerability and building impenetrable systems,

- Multimedia content protection including a new standard for photographic images, JPEG2000.

Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.

Security and Privacy in Dynamic Environments - Proceedings of the IFIP TC-11 21st International Information Security Conference... Security and Privacy in Dynamic Environments - Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden (Hardcover, 2006 ed.)
Simone Fischer-Hubner, Kai Rannenberg, Louise Yngstroem, Stefan Lindskog
R4,581 Discovery Miles 45 810 Ships in 12 - 17 working days

This book contains the Proceedings of the 21st IFIP TC-11 International Information Security Conference (IFIP/SEC 2006) on "Security and Privacy in Dynamic Environments." The papers presented here place a special emphasis on Privacy and Privacy Enhancing Technologies. Further topics addressed include security in mobile and ad hoc networks, access control for dynamic environments, new forms of attacks, security awareness, intrusion detection, and network forensics.

Building a Practical Information Security Program (Paperback): Jason Andress, Mark Leary Building a Practical Information Security Program (Paperback)
Jason Andress, Mark Leary
R1,623 R1,410 Discovery Miles 14 100 Save R213 (13%) Ships in 12 - 17 working days

Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing security programs, but also to build new business-driven security programs. In addition, the subject matter supports aspiring security engineers to forge a career path to successfully manage a security program, thereby adding value and reducing risk to the business. Readers learn how to translate technical challenges into business requirements, understand when to "go big or go home," explore in-depth defense strategies, and review tactics on when to absorb risks. This book explains how to properly plan and implement an infosec program based on business strategy and results.

Disseminating Security Updates at Internet Scale (Hardcover, 2003 ed.): Jun Li, Peter Reiher, Gerald J. Popek Disseminating Security Updates at Internet Scale (Hardcover, 2003 ed.)
Jun Li, Peter Reiher, Gerald J. Popek
R3,025 Discovery Miles 30 250 Ships in 10 - 15 working days

In 1775, Paul Revere, the folk hero of the American Revolution, galloped wildly on horseback through small towns to warn American colonists that the British were coming. In today's Internet age, how do we warn vast numbers of computers about impending cyber attacks?

Rapid and widespread dissemination of security updates throughout the Internet would be invaluable for many purposes, including sending early-warning signals, distributing new virus signatures, updating certificate revocation lists, dispatching event information for intrusion detection systems, etc. However, notifying a large number of machines securely, quickly, and with high assurance is very challenging. Such a system must compete with the propagation of threats, handle complexities in large-scale environments, address interruption attacks toward dissemination, and also secure itself.

Disseminating Security Updates at Internet Scale describes a new system, "Revere," that addresses these problems. "Revere" builds large-scale, self-organizing and resilient overlay networks on top of the Internet to push security updates from dissemination centers to individual nodes. "Revere" also sets up repository servers for individual nodes to pull missed security updates. This book further discusses how to protect this push-and-pull dissemination procedure and how to secure "Revere" overlay networks, considering possible attacks and countermeasures. Disseminating Security Updates at Internet Scale presents experimental measurements of a prototype implementation of "Revere" gathered using a large-scale oriented approach. These measurements suggest that "Revere" can deliver security updates at the required scale, speed and resiliency for a reasonable cost.

Disseminating Security Updates at Internet Scale is designed to meet the needs of researchers and practitioners in industry and graduate students in computer science. This book will also be helpful to those trying to design peer systems at large scale when security is a concern, since many of the issues faced by these designs are also faced by "Revere." The "Revere" solutions may not always be appropriate for other peer systems with very different goals, but the analysis of the problems and possible solutions discussed here will be helpful in designing a customized approach for such systems.

Integrity, Internal Control and Security in Information Systems - Connecting Governance and Technology (Hardcover, 2002 ed.):... Integrity, Internal Control and Security in Information Systems - Connecting Governance and Technology (Hardcover, 2002 ed.)
Michael Gertz, Erik Guldentops, Leon A. M. Strous
R3,053 Discovery Miles 30 530 Ships in 10 - 15 working days

IT Governance is finally getting the Board's and top management's attention. The value that IT needs to return and the associated risks that need to be managed, have become so important in many industries that enterprise survival depends on it. Information integrity is a significant part of the IT Governance challenge. Among other things, this conference will explore how Information Integrity contributes to the overall control and governance frameworks that enterprises need to put in place for IT to deliver business value and for corporate officers to be comfortable about the IT risks the enterprise faces. The goals for this international working conference are to find answers to the following questions: * what precisely do business managers need in order to have confidence in the integrity of their information systems and their data; * what is the status quo of research and development in this area; * where are the gaps between business needs on the one hand and research I development on the other; what needs to be done to bridge these gaps. The contributions have been divided in the following sections: * Refereed papers. These are papers that have been selected through a blind refereeing process by an international programme committee. * Invited papers. Well known experts present practice and research papers upon invitation by the programme committee. * Tutorial. Two papers describe the background, status quo and future development of CobiT as well as a case of an implementation of Co biT.

Build Your Own Blockchain - A Practical Guide to Distributed Ledger Technology (Hardcover, 1st ed. 2020): Daniel Hellwig, Goran... Build Your Own Blockchain - A Practical Guide to Distributed Ledger Technology (Hardcover, 1st ed. 2020)
Daniel Hellwig, Goran Karlic, Arnd Huchzermeier
R1,599 R1,004 Discovery Miles 10 040 Save R595 (37%) Ships in 12 - 17 working days

This book provides a comprehensive introduction to blockchain and distributed ledger technology. Intended as an applied guide for hands-on practitioners, the book includes detailed examples and in-depth explanations of how to build and run a blockchain from scratch. Through its conceptual background and hands-on exercises, this book allows students, teachers and crypto enthusiasts to launch their first blockchain while assuming prior knowledge of the underlying technology. How do I build a blockchain? How do I mint a cryptocurrency? How do I write a smart contract? How do I launch an initial coin offering (ICO)? These are some of questions this book answers. Starting by outlining the beginnings and development of early cryptocurrencies, it provides the conceptual foundations required to engineer secure software that interacts with both public and private ledgers. The topics covered include consensus algorithms, mining and decentralization, and many more. "This is a one-of-a-kind book on Blockchain technology. The authors achieved the perfect balance between the breadth of topics and the depth of technical discussion. But the real gem is the set of carefully curated hands-on exercises that guide the reader through the process of building a Blockchain right from Chapter 1." Volodymyr Babich, Professor of Operations and Information Management, McDonough School of Business, Georgetown University "An excellent introduction of DLT technology for a non-technical audience. The book is replete with examples and exercises, which greatly facilitate the learning of the underlying processes of blockchain technology for all, from students to entrepreneurs." Serguei Netessine, Dhirubhai Ambani Professor of Innovation and Entrepreneurship, The Wharton School, University of Pennsylvania "Whether you want to start from scratch or deepen your blockchain knowledge about the latest developments, this book is an essential reference. Through clear explanations and practical code examples, the authors take you on a progressive journey to discover the technology foundations and build your own blockchain. From an operations perspective, you can learn the principles behind the distributed ledger technology relevant for transitioning towards blockchain-enabled supply chains. Reading this book, you'll get inspired, be able to assess the applicability of blockchain to supply chain operations, and learn from best practices recognized in real-world examples." Ralf W. Seifert, Professor of Technology and Operations Management at EPFL and Professor of Operations Management at IMD

Information Security - Foundations, technologies and applications (Hardcover): Ali Ismail Awad, Michael Fairhurst Information Security - Foundations, technologies and applications (Hardcover)
Ali Ismail Awad, Michael Fairhurst
R3,826 R3,423 Discovery Miles 34 230 Save R403 (11%) Ships in 10 - 15 working days

The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our information systems and the information stored, processed and transmitted. This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security. Information Security: Foundations, technologies and applications is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security, and for professionals in sectors where information security is required.

Handbook of Elliptic and Hyperelliptic Curve Cryptography (Hardcover): Henri Cohen, Gerhard Frey, Roberto Avanzi, Christophe... Handbook of Elliptic and Hyperelliptic Curve Cryptography (Hardcover)
Henri Cohen, Gerhard Frey, Roberto Avanzi, Christophe Doche, Tanja Lange
R6,533 Discovery Miles 65 330 Ships in 9 - 15 working days

The discrete logarithm problem based on elliptic and hyperelliptic curves has gained a lot of popularity as a cryptographic primitive. The main reason is that no subexponential algorithm for computing discrete logarithms on small genus curves is currently available, except in very special cases. Therefore curve-based cryptosystems require much smaller key sizes than RSA to attain the same security level. This makes them particularly attractive for implementations on memory-restricted devices like smart cards and in high-security applications.

The Handbook of Elliptic and Hyperelliptic Curve Cryptography introduces the theory and algorithms involved in curve-based cryptography. After a very detailed exposition of the mathematical background, it provides ready-to-implement algorithms for the group operations and computation of pairings. It explores methods for point counting and constructing curves with the complex multiplication method and provides the algorithms in an explicit manner. It also surveys generic methods to compute discrete logarithms and details index calculus methods for hyperelliptic curves. For some special curves the discrete logarithm problem can be transferred to an easier one; the consequences are explained and suggestions for good choices are given. The authors present applications to protocols for discrete-logarithm-based systems (including bilinear structures) and explain the use of elliptic and hyperelliptic curves in factorization and primality proving. Two chapters explore their design and efficient implementations in smart cards. Practical and theoretical aspects of side-channel attacks and countermeasures and a chapter devoted to (pseudo-)random numbergeneration round off the exposition.

The broad coverage of all- important areas makes this book a complete handbook of elliptic and hyperelliptic curve cryptography and an invaluable reference to anyone interested in this exciting field.

Attribute-Based Encryption and Access Control (Paperback): Dijiang Huang, Qiuxiang Dong, Yan Zhu Attribute-Based Encryption and Access Control (Paperback)
Dijiang Huang, Qiuxiang Dong, Yan Zhu
R1,462 Discovery Miles 14 620 Ships in 12 - 17 working days

This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications. The goal is to provide in-depth knowledge usable for college students and researchers who want to have a comprehensive understanding of ABE schemes and novel ABE-enabled research and applications. The specific focus is to present the development of using new ABE features such as group-based access, ID-based revocation, and attributes management functions such as delegation, federation, and interoperability. These new capabilities can build a new ABE-based Attribute-Based Access Control (ABAC) solution that can incorporate data access policies and control into ciphertext. This book is also ideal for IT companies to provide them with the most recent technologies and research on how to implement data access control models for mobile and data-centric applications, where data access control does not need to rely on a fixed access control infrastructure. It's also of interested to those working in security, to enable them to have the most recent developments in data access control such as ICN and Blockchain technologies. Features Covers cryptographic background knowledge for ABE and ABAC Features various ABE constructions to achieve integrated access control capabilities Offers a comprehensive coverage of ABE-based ABAC Provides ABE applications with real-world examples Advances the ABE research to support new mobile and data-centric applications

Computer Security, Privacy and Politics - Current Issues, Challenges and Solutions (Hardcover): Ramesh Subramanian Computer Security, Privacy and Politics - Current Issues, Challenges and Solutions (Hardcover)
Ramesh Subramanian
R2,813 Discovery Miles 28 130 Ships in 12 - 17 working days

The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spyware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism - all of these have a profound effect on our daily computing operations and habits, with major political and social implications.""Computer Security, Privacy and Politics"" connects privacy and politics, offering a point-in-time review of recent developments of computer security, with a special focus on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations. An estimable addition to any library collection, this Premier Reference Source compiles high quality, timely content on such cutting-edge topics as reverse engineering of software, understanding emerging computer exploits, emerging lawsuits and cases, global and societal implications, and protection from attacks on privacy.

Advanced Security Solutions for Multimedia (Hardcover): Irshad Ahmad Ansari, Varun Bajaj Advanced Security Solutions for Multimedia (Hardcover)
Irshad Ahmad Ansari, Varun Bajaj; Contributions by Rishi Sinhal, Tarun Kumar Sharma, Esmaeil Najafi, …
R3,392 Discovery Miles 33 920 Ships in 12 - 17 working days
Cyber Defense Mechanisms - Security, Privacy, and Challenges (Paperback): Gautam Kumar, Dinesh Kumar Saini, Nguyen Ha Huy Cuong Cyber Defense Mechanisms - Security, Privacy, and Challenges (Paperback)
Gautam Kumar, Dinesh Kumar Saini, Nguyen Ha Huy Cuong
R1,439 Discovery Miles 14 390 Ships in 12 - 17 working days
Managing Information Systems Security and Privacy (Hardcover, 2006 ed.): Denis Trcek Managing Information Systems Security and Privacy (Hardcover, 2006 ed.)
Denis Trcek
R3,071 Discovery Miles 30 710 Ships in 10 - 15 working days

The book deals with the management of information systems security and privacy, based on a model that covers technological, organizational and legal views. This is the basis for a focused and methodologically structured approach that presents "the big picture" of information systems security and privacy, while targeting managers and technical profiles. The book addresses principles in the background, regardless of a particular technology or organization. It enables a reader to suit these principles to an organization's needs and to implement them accordingly by using explicit procedures from the book. Additionally, the content is aligned with relevant standards and the latest trends. Scientists from social and technical sciences are supposed to find a framework for further research in this broad area, characterized by a complex interplay between human factors and technical issues.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cryptocurrencies and Blockchain…
Keizer Soeze Hardcover R1,508 R1,231 Discovery Miles 12 310
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R819 Discovery Miles 8 190
Technical Articles about the Voynich…
National Security Agency Hardcover R593 Discovery Miles 5 930
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,834 Discovery Miles 68 340
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,321 R1,183 Discovery Miles 11 830
TLS Mastery
Michael W Lucas Hardcover R995 R876 Discovery Miles 8 760
Sockets, Shellcode, Porting, and Coding…
James C Foster Paperback R1,160 Discovery Miles 11 600
Providing Sound Foundations for…
Oded Goldreich Hardcover R3,332 Discovery Miles 33 320
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,834 Discovery Miles 68 340
Cybersecurity in Smart Homes…
Khatoun Hardcover R3,773 Discovery Miles 37 730

 

Partners