0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (13)
  • R250 - R500 (88)
  • R500+ (1,342)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Encryption for Organizations and Individuals - Basics of Contemporary and Quantum Cryptography (Paperback, 1st ed.): Robert... Encryption for Organizations and Individuals - Basics of Contemporary and Quantum Cryptography (Paperback, 1st ed.)
Robert Ciesla
R1,623 R1,321 Discovery Miles 13 210 Save R302 (19%) Ships in 10 - 15 working days

Cryptography and encryption aren't just for geeks and spies-they're also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers. You will uncover the concepts of digital encryption and examine key digital encryption algorithms and their various applications. Gauging cryptography from an enterprise perspective, you will get an in-depth look at common attacks that can occur in your systems and lean how to counter them Moving on to quantum computing, you will discover how it differs from the current computing paradigm and understand its potential for the future. After clearing the basics, you will take a close look at how quantum computers work in practice. Shifting focus to quantum cryptography, you will learn more about quantum key distribution (QKD) and how it differs from present-day encryption methodologies. You will also consider the current implementations of QKD, including distribution systems by SwissQuantum and QKD-distribution networks provided by the DARPA Quantum Network. Ultimately, you will learn the means of defending against cryptographic attacks in the up-and-coming quantum age, such as utilizing zero-knowledge proof (ZKP) systems. Deepen your knowledge of cryptographic concepts and be introduced to the new paradigm of quantum cryptography with this book. What You Will Learn Appreciate how digital encryption algorithms work Secure your infrastructure from cryptographic attacks Understand the basics of quantum information science Discover how cryptography relates to quantum computing Implement Quantum Key Distribution (QKD) Who This Book Is For This book is aimed at readers who have an interest in both well-established and up-and-coming types of cryptography, as well as members of organizations to whom privacy is a top priority.

CompTIA A+(r) Certification All-in-One For Dummies (r), 5th Edition (Paperback, 5th Edition): Ge Clarke CompTIA A+(r) Certification All-in-One For Dummies (r), 5th Edition (Paperback, 5th Edition)
Ge Clarke
R1,039 R960 Discovery Miles 9 600 Save R79 (8%) Ships in 12 - 19 working days

Fully updated to cover the 2019 exam release! CompTIA's A+ certification is an essential certification to building a successful IT career. Test takers must pass both 90-question exams to be certified, and this book--plus online test bank--will help you reach your certification goal. The 9 minibooks map to the exam's objectives, and include new content on Windows 10, Scripting, Linux, and mobile devices. You'll learn about how computers work, networking, computer repair and troubleshooting, security, permissions, and customer service. You'll also find test-taking advice and a review of the types of questions you'll see on the exam. Use the online test bank to test your knowledge and prepare for the exam Get up to speed on operating system basics Find out how to manage the operating system Discover maintenance and troubleshooting tips Inside is all the knowledge you need to pass the new A+ exam!

CEH v11 - Certified Ethical Hacker Version 11 Practice Tests (Paperback, 2nd Edition): R Messier CEH v11 - Certified Ethical Hacker Version 11 Practice Tests (Paperback, 2nd Edition)
R Messier
R734 Discovery Miles 7 340 Ships in 12 - 19 working days

Master CEH v11 and identify your weak spots CEH: Certified Ethical Hacker Version 11 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence--and skills--you need to pass. These tests cover all section sections of the exam blueprint, allowing you to test your knowledge of Background, Analysis/Assessment, Security, Tools/Systems/Programs, Procedures/Methodology, Regulation/Policy, and Ethics. Coverage aligns with CEH version 11, including material to test your knowledge of reconnaissance and scanning, cloud, tablet, and mobile and wireless security and attacks, the latest vulnerabilities, and the new emphasis on Internet of Things (IoT). The exams are designed to familiarize CEH candidates with the test format, allowing them to become more comfortable apply their knowledge and skills in a high-pressure test setting. The ideal companion for the Sybex CEH v11 Study Guide, this book is an invaluable tool for anyone aspiring to this highly-regarded certification. Offered by the International Council of Electronic Commerce Consultants, the Certified Ethical Hacker certification is unique in the penetration testing sphere, and requires preparation specific to the CEH exam more than general IT security knowledge. This book of practice tests help you steer your study where it needs to go by giving you a glimpse of exam day while there's still time to prepare. Practice all seven sections of the CEH v11 exam Test your knowledge of security, tools, procedures, and regulations Gauge your understanding of vulnerabilities and threats Master the material well in advance of exam day By getting inside the mind of an attacker, you gain a one-of-a-kind perspective that dramatically boosts your marketability and advancement potential. If you're ready to attempt this unique certification, the CEH: Certified Ethical Hacker Version 11 Practice Tests are the major preparation tool you should not be without.

Steganography Techniques for Digital Images (Paperback, Softcover reprint of the original 1st ed. 2019): Abid Yahya Steganography Techniques for Digital Images (Paperback, Softcover reprint of the original 1st ed. 2019)
Abid Yahya
R3,365 Discovery Miles 33 650 Ships in 10 - 15 working days

This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding. Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption; Provides a variety of methods to achieve characteristic region Steganography synchronization; Shows how Steganography improves upon cryptography by using obscurity features.

Computational Intelligence, Communications, and Business Analytics - Second International Conference, CICBA 2018, Kalyani,... Computational Intelligence, Communications, and Business Analytics - Second International Conference, CICBA 2018, Kalyani, India, July 27-28, 2018, Revised Selected Papers, Part II (Paperback, 1st ed. 2019)
Jyotsna Kumar Mandal, Somnath Mukhopadhyay, Paramartha Dutta, Kousik Dasgupta
R1,589 Discovery Miles 15 890 Ships in 10 - 15 working days

The two volume set CCIS 1030 and 1031 constitutes the refereed proceedings of the Second International Conference on Computational Intelligence, Communications, and Business Analytics, CICBA 2018, held in Kalyani, India, in July 2018. The 76 revised full papers presented in the two volumes were carefully reviewed and selected from 240 submissions. The papers are organized in topical sections on computational intelligence; signal processing and communications; microelectronics, sensors, and intelligent networks; data science & advanced data analytics; intelligent data mining & data warehousing; and computational forensics (privacy and security).

Introduction to Security Reduction (Paperback, Softcover reprint of the original 1st ed. 2018): Fuchun Guo, Willy Susilo, Yi Mu Introduction to Security Reduction (Paperback, Softcover reprint of the original 1st ed. 2018)
Fuchun Guo, Willy Susilo, Yi Mu
R4,594 Discovery Miles 45 940 Ships in 10 - 15 working days

This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography.

Blockchain Technology and Applications (Hardcover): Ahmed Banafa Blockchain Technology and Applications (Hardcover)
Ahmed Banafa
R2,719 Discovery Miles 27 190 Ships in 12 - 19 working days

Blockchain is an emerging technology that can radically improve security in transaction networks, it provides the basis for a dynamic distributed ledger that can be applied to save time when recording transactions between parties, remove costs associated with intermediaries, and reduce risks of fraud and tampering. This book explores the fundamentals and applications of Blockchain technology; the transparent, secure, immutable and distributed database used currently as the underlying technology for Cryptocurrency. Decentralized peer-to-peer network, distributed ledger and the trust model that defines Blockchain technology will be explained. Components of Blockchain, its operations, underlying algorithms, and essentials of trust will be defined. Types of Blockchain networks including private and public Blockchain networks will be introduced. Concepts of smart contracts, proof of work and proof of stack will be clarified. The relationship between Blockchain technology, Internet of Things (IoT), Artificial Intelligence (AI), Cybersecurity and Digital Transformation will be explored in this book. Myths about Blockchain will be exposed and a look at the future of Blockchain will be presented. Topics will be covered in this book: Blockchain technology, Smart contracts, Hashing, SHA-256 Hash, Verification, Validation, Consensus models, Digital Mining, Hard fork, Soft fork, Bitcoin, Ethereum, Proof of work, Proof of stack, Myths about Blockchain, Decentralized peer-to-peer network, Types of Blockchain networks, Hot and Cold Wallets, Double Spend, Decentralized Applications, Transaction networks, Sidechains, 51% attack, Cryptocurrency, Digital transformation, Internet of Things (IoT), Artificial Intelligence (AI), Cybersecurity and the Future of Blockchain.

Progress in Cryptology - INDOCRYPT 2018 - 19th International Conference on Cryptology in India, New Delhi, India, December... Progress in Cryptology - INDOCRYPT 2018 - 19th International Conference on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings (Paperback, 1st ed. 2018)
Debrup Chakraborty, Tetsu Iwata
R1,559 Discovery Miles 15 590 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 19th International Conference on Cryptology in India, INDOCRYPT 2018, held in New Delhi, India, in December 2018. The 20 revised full papers presented in this book were carefully reviewed and selected from 60 submissions. The focus of the conference includes works on outsourced computation and searchable encryption; symmetric key cryptography and format preserving encryption; fault attacks and Hash functions; post quantum cryptography; asymmetric key cryptography and cryptanalysis; symmetric key cryptanalysis; theory; and secure computations and protocols.

Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected... Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers (Paperback, 1st ed. 2018)
Feng Liu, Shouhuai Xu, Moti Yung
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the proceedings of the First International Conference on Science of Cyber Security, SciSec 2018, held in Beijing, China, in August 2018. The 11 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 54 submissions. The papers focus on science of security; cybersecurity dynamics; attacks and defenses; network security; security metrics and measurements; and performance enhancements.

Advances in Computing and Data Sciences - Second International Conference, ICACDS 2018, Dehradun, India, April 20-21, 2018,... Advances in Computing and Data Sciences - Second International Conference, ICACDS 2018, Dehradun, India, April 20-21, 2018, Revised Selected Papers, Part I (Paperback, 1st ed. 2018)
Mayank Singh, P.K. Gupta, Vipin Tyagi, Jan Flusser, Tuncer OEren
R1,605 Discovery Miles 16 050 Ships in 10 - 15 working days

This two-volume set (CCIS 905 and CCIS 906) constitutes the refereed proceedings of the Second International Conference on Advances in Computing and Data Sciences, ICACDS 2018, held in Dehradun, India, in April 2018. The 110 full papers were carefully reviewed and selected from 598 submissions. The papers are centered around topics like advanced computing, data sciences, distributed systems organizing principles, development frameworks and environments, software verification and validation, computational complexity and cryptography, machine learning theory, database theory, probabilistic representations.

Cybersecurity in Humanities and Social Sciences - A Research Methods Approach (Hardcover): H Loiseau Cybersecurity in Humanities and Social Sciences - A Research Methods Approach (Hardcover)
H Loiseau
R4,325 R4,027 Discovery Miles 40 270 Save R298 (7%) Ships in 12 - 19 working days

The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology, law, information science, security studies, surveillance studies, strategic studies, polemology. There is, however, no actual cybersecurity studies. After two decades of scientific production on this subject, we thought it essential to take stock of the research methods that could be mobilized, imagined and invented by the researchers. The research methodology on the subject "cybersecurity" has, paradoxically, been the subject of relatively few publications to date. This dimension is essential. It is the initial phase by which any researcher, seasoned or young doctoral student, must pass, to define his subject of study, delimit the contours, ask the research questions, and choose the methods of treatment. It is this methodological dimension that our book proposes to treat. The questions the authors were asked to answer were: how can cybersecurity be defined? What disciplines in the humanities and social sciences are studying, and how, cybersecurity? What is the place of pluralism or interdisciplinarity? How are the research topics chosen, the questions defined? How, concretely, to study cybersecurity: tools, methods, theories, organization of research, research fields, data ...? How are discipline-specific theories useful for understanding and studying cybersecurity? Has cybersecurity had an impact on scientific theories?

Cryptology and Network Security - 17th International Conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018,... Cryptology and Network Security - 17th International Conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018, Proceedings (Paperback, 1st ed. 2018)
Jan Camenisch, Panos Papadimitratos
R1,591 Discovery Miles 15 910 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17th International Conference on Cryptology and Network Security, CANS 2018, held in Naples, Italy, in September/October 2018. The 26 full papers were carefully reviewed and selected from 79 submissions. The papers are organized in the following topical sections: privacy; Internet misbehavior and protection; malware; symmetric key cryptography; signatures; cryptanalysis; cryptographic primitives; and cryptographic protocols.

Electronic Voting - Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings... Electronic Voting - Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings (Paperback, 1st ed. 2018)
Robert Krimmer, Melanie Volkamer, Veronique Cortier, Rajeev Gore, Manik Hapsara, …
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Joint Conference on Electronic Voting, E-Vote-ID 2018, held in Bregenz, Austria, in October 2018. The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The papers deal with topics connected with electronic voting including experiences and revisions of the real uses of E-voting systems and corresponding processes in elections.

Cellular Automata - 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy,... Cellular Automata - 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy, September 17-21, 2018, Proceedings (Paperback, 1st ed. 2018)
Giancarlo Mauri, Samira El Yacoubi, Alberto Dennunzio, Katsuhiro Nishinari, Luca Manzoni
R1,594 Discovery Miles 15 940 Ships in 10 - 15 working days

This book constitutes the proceedings of the 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, held in Como, Italy, in September 2018. The 47 full papers presented in this volume were carefully reviewed and selected from 64 submissions.This volume contains invited contributions and accepted papers from the main track and from the three organized workshops. The volume is organized in the following topics: biological systems modeling; simulation and other applications of CA; multi-agent systems; pedestrian and traffic dynamics; synchronization and control; theory and cryptography; asynchronous cellular automata; and crowds, traffic and cellular automata.

Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23,... Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part III (Paperback, 1st ed. 2018)
Hovav Shacham, Alexandra Boldyreva
R3,019 Discovery Miles 30 190 Ships in 10 - 15 working days

The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.

Cryptology Transmitted Message Protection - From Deterministic Chaos up to Optical Vortices (Paperback, Softcover reprint of... Cryptology Transmitted Message Protection - From Deterministic Chaos up to Optical Vortices (Paperback, Softcover reprint of the original 1st ed. 2016)
Igor Izmailov, Boris Poizner, Ilia Romanov, Sergey Smolskiy
R3,947 Discovery Miles 39 470 Ships in 10 - 15 working days

This book presents methods to improve information security for protected communication. It combines and applies interdisciplinary scientific engineering concepts, including cryptography, chaos theory, nonlinear and singular optics, radio-electronics and self-changing artificial systems. It also introduces additional ways to improve information security using optical vortices as information carriers and self-controlled nonlinearity, with nonlinearity playing a key "evolving" role. The proposed solutions allow the universal phenomenon of deterministic chaos to be discussed in the context of information security problems on the basis of examples of both electronic and optical systems. Further, the book presents the vortex detector and communication systems and describes mathematical models of the chaos oscillator as a coder in the synchronous chaotic communication and appropriate decoders, demonstrating their efficiency both analytically and experimentally. Lastly it discusses the cryptologic features of analyzed systems and suggests a series of new structures for confident communication.

Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29 - December 1,... Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Howon Kim, Dong-Chan Kim
R2,572 Discovery Miles 25 720 Ships in 10 - 15 working days

This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017. The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security.

Digital Signatures (Hardcover, 1st ed. 2010): Jonathan Katz Digital Signatures (Hardcover, 1st ed. 2010)
Jonathan Katz
R2,989 Discovery Miles 29 890 Ships in 10 - 15 working days

As a beginning graduate student, I recall being frustrated by a general lack of acces sible sources from which I could learn about (theoretical) cryptography. I remember wondering: why aren't there more books presenting the basics of cryptography at an introductory level? Jumping ahead almost a decade later, as a faculty member my graduate students now ask me: what is the best resource for learning about (various topics in) cryptography? This monograph is intended to serve as an answer to these 1 questions - at least with regard to digital signature schemes. Given the above motivation, this book has been written with a beginninggraduate student in mind: a student who is potentially interested in doing research in the ?eld of cryptography, and who has taken an introductory course on the subject, but is not sure where to turn next. Though intended primarily for that audience, I hope that advanced graduate students and researchers will ?nd the book useful as well. In addition to covering various constructions of digital signature schemes in a uni?ed framework, this text also serves as a compendium of various "folklore" results that are, perhaps, not as well known as they should be. This book could also serve as a textbook for a graduate seminar on advanced cryptography; in such a class, I expect the entire book could be covered at a leisurely pace in one semester with perhaps some time left over for excursions into related topics.

Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30-December 2, 2017,... Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30-December 2, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Srdjan Capkun, Sherman S.M. Chow
R1,601 Discovery Miles 16 010 Ships in 10 - 15 working days

This book contains revised versions of all the papers presented at the 16th International Conference on Cryptology and Network Security, CANS 2017, held in Hong Kong, China, in November/ December 2017. The 20 full papers presented together with 8 short papers were carefully reviewed and selected from 88 submissions. The full papers are organized in the following topical sections: foundation of applied cryptography; processing encrypted data; predicate encryption; credentials and authentication; web security; Bitcoin and blockchain; embedded system security; anonymous and virtual private networks; and wireless and physical layer security.

Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018,... Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings (Paperback, 1st ed. 2018)
David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, …
R3,031 Discovery Miles 30 310 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.

Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22,... Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings (Paperback, 1st ed. 2018)
Itai Dinur, Shlomi Dolev, Sachin Lodha
R1,523 Discovery Miles 15 230 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018. The 16 full and 6 short papers presented in this volume were carefully reviewed and selected from 44 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in the scope.

Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I... Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I (Paperback, 1st ed. 2017)
Yael Kalai, Leonid Reyzin
R3,024 Discovery Miles 30 240 Ships in 10 - 15 working days

The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017. The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Security for Ubiquitous Computing (Hardcover, Annotated Ed): F. Stajano Security for Ubiquitous Computing (Hardcover, Annotated Ed)
F. Stajano
R2,861 Discovery Miles 28 610 Ships in 12 - 19 working days

Ubiquitous computing (ubicomp) is about networked microprocessors embedded in everyday objects: not just cellphones and home appliances but also books, bookshelves, bus stops and bathtubs. This future is closer than you might imagine.

The insecurity of networked PCs is notorious. If we deployed ubicomp systems as vulnerable as PCs, the risks for society would be catastrophic. How can we do better, and what are the new problems? In a very accessible style, this book provides a coherent framework to make sense of the many issues at stake.

Features include:

  • An introduction to the state of the art in ubicomp research.
  • A readable primer on security and cryptology.
  • An up-to-date technical treatment of ubicomp security, including a sceptical look at Bluetooth and 802.11.
  • "Peer-to-peer" and ad-hoc networking.
  • An in-depth discussion of specific, cutting-edge solutions.
  • An extensively annotated bibliography.
Security for Ubiquitous Computing combines clarity, brevity and authority. It will appeal to developers and researchers in ubiquitous computing, wireless and ad-hoc networking, wearable computing and related areas. Because it is readable and self-contained, it will also prove valuable to managers, analysts, technology watchers and end users who want to understand the new opportunities and risks of ubicomp.

Secure and Trustworthy Transportation Cyber-Physical Systems (Paperback, 1st ed. 2017): Yunchuan Sun, Houbing Song Secure and Trustworthy Transportation Cyber-Physical Systems (Paperback, 1st ed. 2017)
Yunchuan Sun, Houbing Song
R1,963 Discovery Miles 19 630 Ships in 10 - 15 working days

This book comprehensively reviews the cyber security and privacy issues in transportation cyber-physical systems (TCPSs). It examines theories and various state-of-the-art technologies and methodologies. Starting with a survey of the latest solutions in TCPSs, it introduces a smart-transport-system architecture design based on cyber-physical systems. It then discusses in detail the principles and metrics of evaluating safety and privacy in TCPSs and elaborates the verification and analysis of secure, robust and trustworthy TCPSs. Moreover, it demonstrates the advanced and novel tools commonly used in practice by several researchers. Lastly it provides an exhaustive case study on the authentication and attestation in TCPSs. This book is of interest not only to readers in the field of TCPSs, but also to those in interdisciplinary fields, such as energy, healthcare, bio-engineering etc.

Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings... Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings (Paperback, 1st ed. 2017)
Maire O'Neill
R2,629 Discovery Miles 26 290 Ships in 10 - 15 working days

This book constitutes the proceedings of the 16th IMA International Conference on Cryptography and Coding, IMACC 2017, held at Oxford, UK, in December 2017. The 19 papers presented were carefully reviewed and selected from 32 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,573 Discovery Miles 35 730
TLS Mastery
Michael W Lucas Hardcover R970 R875 Discovery Miles 8 750
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R834 Discovery Miles 8 340
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R539 Discovery Miles 5 390
Information Security Management-Global…
Gurpreet Dhillon Paperback R2,006 Discovery Miles 20 060
Cryptocurrencies and Blockchain…
Keizer Soeze Hardcover R1,469 R1,221 Discovery Miles 12 210
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R673 Discovery Miles 6 730
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R819 Discovery Miles 8 190
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,692 Discovery Miles 66 920
Information Security - Foundations…
Ali Ismail Awad, Michael Fairhurst Hardcover R3,728 R3,357 Discovery Miles 33 570

 

Partners