0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (99)
  • R500+ (1,352)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Provable Security - First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings... Provable Security - First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings (Paperback, 2007 ed.)
Willy Susilo, Joseph K. Liu, Yi Mu
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, held in Wollongong, Australia, October 31 - November 2, 2007.

The 10 revised full papers presented together with 7 short papers were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on Authentication, Asymmetric Encryption, Signature, Protocol and Proving Technique, Authentication and Symmetric Encryption, Signature and Asymmetric Encryption.

Information Systems Security - Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings... Information Systems Security - Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings (Paperback, 2007 ed.)
Patrick McDaniel, Shyam K. Gupta
R1,482 Discovery Miles 14 820 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS 2007, held in Delhi, India, in December 2007.

The 18 revised full papers and 5 short papers presented together with 4 keynote papers were carefully reviewed and selected from 78 submissions. The submitted topics in cryptography, intrusion detection, network security, information flow systems, Web security, and many others offer a detailed view of the state of the art in information security. The papers are organized in topical sections on network security, cryptography, architectures and systems, cryptanalysis, protocols, detection and recognition, as well as short papers.

Information and Communications Security - 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007,... Information and Communications Security - 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings (Paperback, 2007 ed.)
Hideki Imai, Guilin Wang
R1,537 Discovery Miles 15 370 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ICICS 2007, held in Zhengzhou, China, in December 2007.

The 38 revised full papers presented were carefully reviewed and selected from 222 submissions. The papers are organized in topical sections on authentication and key exchange, digital signatures, applications, watermarking, fast implementations, applied cryptography, cryptanalysis, formal analysis, system security, and network security.

Information Security and Cryptology - ICISC 2007 - 10th International Conference, Seoul, Korea, November 29-30, 2007,... Information Security and Cryptology - ICISC 2007 - 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings (Paperback)
Kil-Hyun Nam, Gwangsoo Rhee
R1,496 Discovery Miles 14 960 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ICISC 2007, held in Seoul, Korea, November 29-30, 2007.

The 28 revised full papers presented have gone through two rounds of reviewing and improvement and were selected from 123 submissions. The papers are organized in topical sections on cryptoanalysis, access control, system security, biometrics, cryptographic protocols, hash functions, block and stream ciphers, copyright protection, smart/java cards, elliptic curve cryptosystems as well as authentication and authorization.

Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Nara, Japan, October ... Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings (Paperback, 2. Aufl.)
Hiroaki Kikuchi, Kai Rannenberg
R1,523 Discovery Miles 15 230 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Workshop on Security, IWSEC 2007, held in Nara, Japan, October 29-31, 2007.

The 30 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, E-commerce and Voting, Operating systems, Security and Information management, Anonymity and Privacy and Digital signatures, Hash function and Protocol.

Progress in Cryptology - INDOCRYPT 2007 - 8th International Conference on Cryptology in India, Chennai, India, December 9-13,... Progress in Cryptology - INDOCRYPT 2007 - 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings (Paperback, 2007 ed.)
K. Srinathan, C. Pandu Rangan, Moti Yung
R1,512 Discovery Miles 15 120 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, held in Chennai, India, in December 2007.

The 22 revised full papers and 11 revised short papers presented together with 3 invited lectures were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on hashing, elliptic curve, cryptoanalysis, information theoretic security, elliptic curve cryptography, signature, side channel attack, symmetric cryptosystem, asymmetric cryptosystem, and short papers.

Information Security - 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings (Paperback,... Information Security - 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007, Proceedings (Paperback, 2007 ed.)
Juan Garay, Arjen K. Lenstra, Masahiro Mambo, Rene Peralta
R1,516 Discovery Miles 15 160 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Information Security Conference, ISC 2007, held in Valparaiso, Chile, October 9-12, 2007.

The 28 revised full papers presented were carefully reviewed and selected from 116 submissions. The topics include Intrusion Detection, Digital Rights Management, Symmetric-Key Cryptography, Cryptographic Protocols and Schemes, Identity-Based Schemes, Cryptanalysis, DoS Protection, Software Obfuscation, Public-Key Cryptosystems, Elliptic Curves and Applications and Security Issues in Databases.

Computer Security - ESORICS 2007 - 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 -... Computer Security - ESORICS 2007 - 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 - 26, 2007, Proceedings (Paperback, 2007 ed.)
Joachim Biskup
R2,891 Discovery Miles 28 910 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th European Symposium on Research in Computer Security, ESORICS 2007, held in Dresden, Germany in September 2007.

The 39 revised full papers presented were carefully reviewed and selected from 164 submissions. ESORICS is confirmed as the European research event in computer security; it presents original research contributions, case studies and implementation experiences addressing any aspect of computer security - in theory, mechanisms, applications, or practical experience.

Cryptographic Hardware and Embedded Systems - CHES 2007 - 9th International Workshop, Vienna, Austria, September 10-13, 2007,... Cryptographic Hardware and Embedded Systems - CHES 2007 - 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings (Paperback, 2007 ed.)
Pascal Paillier, Ingrid Verbauwhede
R1,525 Discovery Miles 15 250 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2007. The 31 revised full papers cover side channels, low resources, hardware attacks and countermeasures, special purpose hardware, efficient algorithms for embedded processors, efficient hardware, trusted computing.

Fast Software Encryption - 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected... Fast Software Encryption - 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers (Paperback, 2007 ed.)
Alex Biryukov
R1,524 Discovery Miles 15 240 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 14th International Workshop on Fast Software Encryption, FSE 2007, held in Luxembourg, Luxembourg in March 2007.

The 28 revised full papers presented were carefully reviewed and selected from 104 submissions. The papers address all current aspects of fast and secure primitives for symmetric cryptology and they are organized in topical sections on hash function cryptanalysis and design, stream ciphers cryptanalysis, theory, block cipher cryptanalysis, block cipher design, theory of stream ciphers, side channel attacks, as well as macs and small block ciphers.

Foundations of Security Analysis and Design - FOSAD 2006/2007 Turtorial Lectures (Paperback, 2007 ed.): Alessandro Aldini,... Foundations of Security Analysis and Design - FOSAD 2006/2007 Turtorial Lectures (Paperback, 2007 ed.)
Alessandro Aldini, Roberto Gorrieri
R1,481 Discovery Miles 14 810 Ships in 10 - 15 working days

overviewofthebestindustrialpracticesinITsecurityanalysis.Inparticular, the paperpresentsrecentresearchresultsinthe areaofformalfoundations andpow- erfultoolsforsecurityanalysis.ThecontributionbyUlfarErlingssonoutlinesthe general issues of low-level software security. Concrete details of low-level attacks anddefensesaregiveninthe caseof CandC++softwarecompiledinto machine code. Fabio Martinelli and Paolo Mori describe a solution to improve the Java native security support. Two examples of the application of the proposed so- tion, with history-based monitoring of the application behavior, are given in the case of grid computing and mobile devices. The purpose of the chapter by Javier Lopez, Cristina Alcaraz, and Rodrigo Roman is to review and discuss critical information infrastructures, and show how to protect their functionalities and performance against attacks. As an example, the chapter also discusses the role of wireless sensor networks technology in the protection of these infrastructures. The paper by Liqun Chen is a survey in the area of asymmetric key cryp- graphic methodologies for identity-based cryptography. Audun Josang gives an overviewofthebackground, currentstatus, andfuturetrendoftrustandrepu- tionsystems.Inthefollowingchapter, MarcinCzenko, SandroEtalle, DongyiLi, and William H. Winsborough present the trust management approach to access controlindistributed systems.Inparticular, they focus onthe RT family ofro- based trust management languages. Chris Mitchell and Eimear Gallery report on the trusted computing technology for the next-generation mobile device

Selected Areas in Cryptography - 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected... Selected Areas in Cryptography - 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected Papers (Paperback, 2007 ed.)
Eli Biham, Amr M. Youssef
R1,630 Discovery Miles 16 300 Ships in 10 - 15 working days

This volume constitutes the refereed post-proceedings of the 13th International Workshop on Selected Areas in Cryptography. Twenty-five full papers are presented along with two important invited talks. The papers are organized into topical sections covering block cipher cryptanalysis, stream cipher cryptanalysis, block and stream ciphers, side-channel attacks, efficient implementations, message authentication codes, and hash functions.

Recent Advances in Intrusion Detection - 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007,... Recent Advances in Intrusion Detection - 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, Proceedings (Paperback, 2007 ed.)
Christopher Kruegel, Richard Lippmann, Andrew Clark
R1,486 Discovery Miles 14 860 Ships in 10 - 15 working days

Here are the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection. The 17 full papers were carefully reviewed. Each one represents an important contribution to the study of intrusion detection. Papers cover anomaly detection, attacks, system evaluation and threat assessment, malware collection and analysis, anomaly- and specification-based detection, and network intrusion detection.

Information Hiding - 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Seleceted Papers... Information Hiding - 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006, Revised Seleceted Papers (Paperback, 2007 ed.)
Jan Camenisch, Christian Collberg, Neil F. Johnson, Phil Sallee
R1,513 Discovery Miles 15 130 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Information Hiding, IH 2006, held in Alexandria, VA, USA in July 2006.

The 25 revised full papers presented were carefully selected from over 70 papers submitted. The papers are organized in topical sections on watermarking, information hiding and networking, data hiding in unusual content, fundamentals, software protection, steganalysis, steganography, and subliminal channels.

The Best Damn Cybercrime and Digital Forensics Book Period (Paperback): Jack Wiles, Anthony Reyes The Best Damn Cybercrime and Digital Forensics Book Period (Paperback)
Jack Wiles, Anthony Reyes
R1,351 R1,245 Discovery Miles 12 450 Save R106 (8%) Ships in 12 - 17 working days

Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference has increased in size by almost 50% in its second year; another example of the rapid growth in the market.
This book is the first to combine cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. Everything needed for analyzing forensic data and recovering digital evidence can be found in one place, including instructions for building a digital forensics lab.
* Digital investigation and forensics is a growing industry
* Corporate I.T. departments needing to investigate incidents related to corporate espionage or other criminal activities are learning as they go and need a comprehensive step-by-step guide to e-discovery
* Appeals to law enforcement agencies with limited budgets

Advances in Cryptology - CRYPTO 2007 - 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23,... Advances in Cryptology - CRYPTO 2007 - 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings (Paperback, 2007 ed.)
Alfred Menezes
R2,892 Discovery Miles 28 920 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 27th Annual International Cryptology Conference, CRYPTO 2007, held in Santa Barbara, CA, USA in August 2007.

The 33 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 186 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications.

Beginning Information Cards and CardSpace - From Novice to Professional (Paperback, 1st ed.): Marc Mercuri Beginning Information Cards and CardSpace - From Novice to Professional (Paperback, 1st ed.)
Marc Mercuri
R1,043 R868 Discovery Miles 8 680 Save R175 (17%) Ships in 10 - 15 working days

If you work at all with Internet-facing solutions, you know that the lack of an identity metasystem is a critical vulnerability in the design. Various consortiums have worked to define a system of identitya platform-agnostic way of communicating and validating claims of identity. If you work with identity solutions or structures, you will find "Beginning Information Cards and CardSpace: From Novice to Professional" essential to understanding and successfully implementing CardSpace solutions.

Topics range from fundamental discussion of identityincluding identity concepts, laws of identity, and the identity metasystemto comprehensive coverage of Windows CardSpace. You'll learn what CardSpace is all about, where you can and should use it, and how you would implement it. Additionally, multiple case studies showcase different scenarios where the technology is employed.Youll learn the technology from someone who's done real implementations with major customersAuthor Marc Mercurri works directly with the Windows CardSpace product groupHigh-quality demos with universal themes are applicable to your own work

Detection of Intrusions and Malware, and Vulnerability Assessment - 4th International Conference, DIMVA 2007 Lucerne,... Detection of Intrusions and Malware, and Vulnerability Assessment - 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings (Paperback, 2007 ed.)
Bernhard Hammerli, Robin Sommer
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

OnbehalfoftheProgramCommittee, itisourpleasuretopresenttoyouthep- ceedings of the 4th GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Each year DIMVA brings - gether internationalexperts from academia, industry andgovernmentto present and discuss novel security research. DIMVA is organized by the special interest group Security-Intrusion Detection and Response of the German Informatics Society (GI). The DIMVA 2007 Program Committee received 57 submissions from 20 d- ferentcountries. Allsubmissions werecarefullyreviewedbyProgramCommittee members and external experts according to the criteria of scienti?c novelty, - portance to the ?eld and technical quality. The ?nal selection took place at a Program Committee meeting held on March 31, 2007, at Universit a Campus Bio-Medico di Roma, Italy. Twelve full papers and two extended abstracts were selectedforpresentationatthe conferenceandpublicationin theconferencep- ceedings. The conference took place during July 12-13, 2007, at the University of Applied Sciences and Arts Lucerne (HTA Lucerne) in Switzerland. The p- gram featured both theoretical and practical research results grouped into ?ve sessions. ThekeynotespeechwasgivenbyVern Paxson, InternationalComputer Science Institute and Lawrence Berkeley National Laboratory. Another invited talk was presented by Marcelo Masera, InstitutefortheProtection and Security of the Citizen. Peter Trachsel, Deputy Head of the Federal Strategic Unit for IT in Switzerland, gave a speech during the conference dinner. The conference programfurther included a rump sessionorganizedby Sven Dietrich of Carnegie Mellon University; and it was complemented by the third instance of the Eu- pean capture-the-?ag contest CIPHER, organized by Lexi Pimenidis of RWTH Aache

InfoSecurity 2008 Threat Analysis (Paperback): Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg InfoSecurity 2008 Threat Analysis (Paperback)
Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg; Contributions by Paul Schooping
R1,215 R1,121 Discovery Miles 11 210 Save R94 (8%) Ships in 12 - 17 working days

An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking.
Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions.
* Provides IT Security Professionals with a first look at likely new threats to their enterprise
* Includes real-world examples of system intrusions and compromised data
* Provides techniques and strategies to detect, prevent, and recover
* Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence

Public Key Infrastructure - 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30,... Public Key Infrastructure - 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings (Paperback, 2007 ed.)
Pierangela Samarati, Josep L. Ferrer
R1,497 Discovery Miles 14 970 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2007, held in Palma de Mallorca, Spain in June 2007.

The 21 revised full papers and 8 short papers presented were carefully reviewed and selected from 77 submissions. The papers address all current issues in PKI, ranging from theoretical and foundational topics to applications and regulatory issues in various contexts.

Data and Applications Security XXI - 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo... Data and Applications Security XXI - 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings (Paperback, 2007 ed.)
Steve Barker, Gail-Joon Ahn
R1,472 Discovery Miles 14 720 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 21st Annual Working Conference on Data and Applications Security held in Redondo Beach, CA, USA in July 2007.

The 18 revised full papers and 2 revised short papers presented were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based security, temporal access control and usage control, as well as system security issues.

Security and Privacy in Ad-hoc and Sensor Networks - 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007,... Security and Privacy in Ad-hoc and Sensor Networks - 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings (Paperback, 2007 ed.)
Frank Stajano, Catherine Meadows, Srdjan Capkun, Tyler Moore
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks, ESAS 2007, held in Cambridge, UK, in July 2007.

The 17 revised full papers presented were carefully reviewed and selected from 87 submissions. The papers present original research on all aspects of security and privacy in wireless ad hoc and sensor networks and addressing current topics of network security, cryptography, and wireless networking communities. The papers are organized in topical sections on device pairing, key management, location verification and location privacy, secure routing and forwarding, physical security, as well as detection of compromise, and revocation.

Advances in Cryptology - EUROCRYPT 2007 - 26th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2007 - 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings (Paperback, 2007 ed.)
Moni Naor
R1,745 Discovery Miles 17 450 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2007, held in Barcelona, Spain in May 2007.

The 33 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications.

Information Security Applications - 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised... Information Security Applications - 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers (Paperback, 2007 ed.)
Jae-Kwang Lee, Okyeon Yi, Moti Yung
R1,507 Discovery Miles 15 070 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Island, Korea in August 2006.

The 30 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 146 submissions. The papers are organized in topical sections on public key crypto applications and virus protection, cyber indication and intrusion detection, biometrics and security trust management, secure software and systems, smart cards and secure hardware, mobile security, DRM, information hiding, ubiquitous computing security, P2P security, pre-authentication for fast handoff in wireless mesh networks including mobile APs.

Il Futuro Dell'information & Communication Technology - Tecnologie, Timori E Scenari Futuri Della Global Network... Il Futuro Dell'information & Communication Technology - Tecnologie, Timori E Scenari Futuri Della Global Network Revolution (Italian, Hardcover, 2009 ed.)
Antonio Teti
R388 Discovery Miles 3 880 Ships in 12 - 17 working days

Negli ultimi decenni il rapido sviluppo delle tecnologie IT ha influito in maniera determinante nella vita dell'uomo, trasformando, spesso inconsapevolmente il suo lavoro, le sue abitudini, il suo modo di interagire con il mondo che lo circonda. Il fenomeno della "globalizzazione" dei mercati e solo una delle trasformazioni che l'intero pianeta sta attraversando. Anche se i vantaggi derivanti dall'utilizzo delle moderne tecnologie di comunicazione ci facilitano nel lavoro e nella attivita ludiche e personali, molte sono le perplessita e i dubbi che attanagliano tutti coloro che le utilizzano. Se l'Information Technology rappresenta il "combustibile" indispensabile per la sopravvivenza delle aziende e delle attivita dell'uomo, nel contempo puo generare problematicita di grande rilievo. Il testo tratta alcune delle problematiche che destano preoccupazioni rilevanti nel mondo intero come il consumo energetico dei sistemi informatici (incontrollabili e inquinanti), il problema della garanzia della privacy e dell'integrita dei dati su Internet, l'utilizzo della rete Internet come strumento di controllo delle masse, la possibile sparizione degli attuali sistemi operativi che potranno essere sostituiti dal sistema operativo Web Operating System."

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R798 Discovery Miles 7 980
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,512 Discovery Miles 65 120
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,154 Discovery Miles 31 540
Technical Articles about the Voynich…
National Security Agency Hardcover R568 Discovery Miles 5 680
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,512 Discovery Miles 65 120
Cryptocurrencies and Blockchain…
Keizer Soeze Hardcover R1,469 R1,178 Discovery Miles 11 780
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R784 Discovery Miles 7 840
Democratizing Cryptography - The Work of…
Rebecca Slayton Hardcover R3,096 Discovery Miles 30 960
Codes and Ciphers - A History Of…
Alexander d'Agapeyeff Hardcover R927 Discovery Miles 9 270
Ransomware Revolution: The Rise of a…
Matthew Ryan Hardcover R4,897 Discovery Miles 48 970

 

Partners