0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (110)
  • R250 - R500 (360)
  • R500+ (2,308)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer software packages > General

Radio Frequency Identification: Security and Privacy Issues - 8th International Workshop, RFIDSec 2012, Nijmegen, The... Radio Frequency Identification: Security and Privacy Issues - 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Jaap-Henk Hoepman, Ingrid Verbauwhede
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012. The 12 revised full papers presented were carefully reviewed and selected from 29 submissions for inclusion in the book. The papers focus on approaches to solve security and data protection issues in advanced contactless technologies.

Mobile Computing - Implementing Pervasive Information and Communications Technologies (Paperback, Softcover reprint of the... Mobile Computing - Implementing Pervasive Information and Communications Technologies (Paperback, Softcover reprint of the original 1st ed. 2002)
Shambhu Upadhyaya, Abhijit Chaudhury, Kevin Kwiat, Mark Weiser
R2,637 Discovery Miles 26 370 Ships in 18 - 22 working days

Mobil Computing: Implementing Pervasive Information and Communication Technologies is designed to address some of the business and technical challenges of pervasive computing that encompass current and emerging technology standards, infrastructures and architectures, and innovative and high impact applications of mobile technologies in virtual enterprises. The various articles examine a host of issues including: the challenges and current solutions in mobile connectivity and coordination; management infrastructures; innovative architectures for fourth generation wireless and Ad-hoc networks; error-free frequency assignments for wireless communication; cost-effective wavelength assignments in optical communication networks; data and transaction modeling in a mobile environment, and bandwidth issues and data routing in mobile Ad-hoc networks.

Privacy Technologies and Policy - Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, Proceedings... Privacy Technologies and Policy - Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, Proceedings (Paperback, 2014 ed.)
Bart Preneel, Demosthenes Ikonomou
R1,899 Discovery Miles 18 990 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second Annual Privacy Forum, APF 2014, held in Athens, Greece, in May 2014. The 12 revised papers presented in this volume were carefully reviewed and selected from 21 submissions. The topics include: the concept and implementation of "privacy by design," with applications to encrypted databases; the study of video surveillance architectures and new networking concepts and innovative solutions for identity management. The papers address the technical, legal, and economic aspects of these problems.

Context-Aware Systems and Applications - Second International Conference, ICCASA 2013, Phu Quoc Island, Vietnam, November... Context-Aware Systems and Applications - Second International Conference, ICCASA 2013, Phu Quoc Island, Vietnam, November 25-26, 2013, Revised Selected Papers (Paperback, 2014 ed.)
Phan Cong-Vinh, Vangalur Alagar, Emil Vassev, Ashish Khare
R2,417 Discovery Miles 24 170 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed proceedings of the Second International Conference on Context-Aware Systems and Applications, ICCASA 2013, held in Phu Quoc Island, Vietnam in November 2013. The 36 revised full papers presented were carefully selected and reviewed from over 100 submissions and cover a wide spectrum of issues in the area of context-aware systems (CAS) and context-based recommendation systems.

Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences... Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013, Proceedings (Paperback, 2013 ed.)
David Basin, John C. Mitchell
R1,411 Discovery Miles 14 110 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2013, in Rome, Italy, in March 2013. The 14 papers included in this volume were carefully reviewed and selected from 59 submissions. They deal with the theoretical and foundational aspects of security and trust such as new theoretical results, practical applications of existing foundational ideas, and innovative theoretical approaches stimulated by pressing practical problems.

Cybercrimes: A Multidisciplinary Analysis (Paperback, 2011 ed.): Sumit Ghosh, Elliot Turrini Cybercrimes: A Multidisciplinary Analysis (Paperback, 2011 ed.)
Sumit Ghosh, Elliot Turrini
R5,612 Discovery Miles 56 120 Ships in 18 - 22 working days

Designed to serve as a reference work for practitioners, academics, and scholars worldwide, this book is the first of its kind to explain complex cybercrimes from the perspectives of multiple disciplines (computer science, law, economics, psychology, etc.) and scientifically analyze their impact on individuals, society, and nations holistically and comprehensively. In particular, the book shows: How multiple disciplines concurrently bring out the complex, subtle, and elusive nature of cybercrimes How cybercrimes will affect every human endeavor, at the level of individuals, societies, and nations How to legislate proactive cyberlaws, building on a fundamental grasp of computers and networking, and stop reacting to every new cyberattack How conventional laws and traditional thinking fall short in protecting us from cybercrimes How we may be able to transform the destructive potential of cybercrimes into amazing innovations in cyberspace that can lead to explosive technological growth and prosperity

Web Information Systems and Technologies - 8th International Conference, WEBIST 2012, Porto, Portugal, April 18-21, 2012,... Web Information Systems and Technologies - 8th International Conference, WEBIST 2012, Porto, Portugal, April 18-21, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Jose Cordeiro, Karl-Heinz Krempels
R1,436 Discovery Miles 14 360 Ships in 18 - 22 working days

This book contains the thoroughly refereed and revised best papers from the 8th International Conference on Web Information Systems and Technologies, WEBIST 2012, held in Porto, Portugal, in April 2012, and organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), in collaboration with ACM SIGMIS.

The 23 papers presented in this book were carefully reviewed and selected from 184 submissions. The papers were selected from those with the best reviews also taking into account the quality of their presentation at the conference. The papers are grouped into parts on Internet Technology; Web Interfaces and Applications; Society, e-Business, and e-Government; Web Intelligence; and Mobile Information Systems.

Smart Card Research and Advanced Applications - IFIP TC8 / WG8.8 Fourth Working Conference on Smart Card Research and Advanced... Smart Card Research and Advanced Applications - IFIP TC8 / WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications September 20-22, 2000, Bristol, United Kingdom (Paperback, Softcover reprint of the original 1st ed. 2000)
Josep Domingo-Ferrer, David Chan, Anthony Watson
R5,173 Discovery Miles 51 730 Ships in 18 - 22 working days

Smart cards or IC cards offer a huge potential for information processing purposes. The portability and processing power of IC cards allow for highly secure conditional access and reliable distributed information processing. IC cards that can perform highly sophisticated cryptographic computations are already available. Their application in the financial services and telecom industries are well known. But the potential of IC cards go well beyond that. Their applicability in mainstream Information Technology and the Networked Economy is limited mainly by our imagination; the information processing power that can be gained by using IC cards remains as yet mostly untapped and is not well understood. Here lies a vast uncovered research area which we are only beginning to assess, and which will have a great impact on the eventual success of the technology. The research challenges range from electrical engineering on the hardware side to tailor-made cryptographic applications on the software side, and their synergies. This volume comprises the proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS 2000), which was sponsored by the International Federation for Information Processing (IFIP) and held at the Hewlett-Packard Labs in the United Kingdom in September 2000. CARDIS conferences are unique in that they bring together researchers who are active in all aspects of design of IC cards and related devices and environments, thus stimulating synergy between different research communities from both academia and industry. This volume presents the latest advances in smart card research and applications, and will be essential reading for smart card developers, smart card application developers, and computer science researchers involved in computer architecture, computer security, and cryptography.

Legal Programming - Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond... Legal Programming - Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond (Paperback, 2005 ed.)
Brian Subirana, Malcolm Bain
R2,890 Discovery Miles 28 900 Ships in 18 - 22 working days

Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond provides a process-oriented discussion of the legal concerns presented by agent-based technologies, processes and programming. It offers a general outline of the potential legal difficulties that could arise in relation to them, focusing on the programming of negotiation and contracting processes in a privacy, consumer and commercial context. The authors will elucidate how it is possible to create form of legal framework and design methodology for transaction agents, applicable in any environment and not just in a specific proprietary framework, that provides the right level of compliance and trust. Key elements considered include the design and programming of legally compliant methods, the determination of rights in respect of objects and variables, and ontologies and programming frameworks for agent interactions. Examples are used to illustrate the points made and provide a practical perspective.

Interactive Decision Aids in E-Commerce (Paperback, 2012 ed.): Jella Pfeiffer Interactive Decision Aids in E-Commerce (Paperback, 2012 ed.)
Jella Pfeiffer
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book gives recommendations on which interactive decision aids to offer in webstores. Interactive decision aids are tools that help online shoppers to compare and evaluate product information. Consumers can, for instance, exclude products that do not meet certain criteria, they can highlight certain information or they can assign ratings of different kinds. Interactive decision aids are important, because finding the preferred product in a short amount of time increases both the customers' satisfaction and, in turn, the sales volume.This book includes a detailed description of decision aids, closely studies how decision aids are related to the decision behavior of customers, and develops a comprehensive system of decision aids, which is very flexible, increases both customer satisfaction and confidence, and can be used intuitively. The close link between typical behaviors and the decision aids allows webstores to learn about customers' decision-making behavior by using a simple click stream analysis. The book is written in an easy-to-read style and provides both practical recommendations and knowledge about consumer behavior

Topics in Cryptology - CT- RSA 2013 - The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25-... Topics in Cryptology - CT- RSA 2013 - The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings (Paperback, 2013 ed.)
Ed Dawson
R1,441 Discovery Miles 14 410 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption.

Digital Forensics and Cyber Crime - Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011,... Digital Forensics and Cyber Crime - Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers (Paperback, 2012 ed.)
Pavel Gladyshev, Marcus K. Rogers
R1,412 Discovery Miles 14 120 Ships in 18 - 22 working days

This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 24 papers in this volume cover a variety of topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and the use of formal methods in digital investigations. There is a large section addressing forensics of mobile digital devices.

The Internet of Products - An Approach to Establishing Total Transparency in Electronic Markets (Paperback, 2013 ed.): Robert... The Internet of Products - An Approach to Establishing Total Transparency in Electronic Markets (Paperback, 2013 ed.)
Robert Neumann
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This study approaches the difficult problem of providing Internet users with a completely transparent view on electronic markets from a product information accessibility point of view. Robert Neumann analyzes economic, ecological, and societal gains of openly accessible product information in the form of theoretical models. Though many aspects of very different research disciplines have to be investigated to gain a holistic view on the Internet of Products, this thesis reduces the range of involved research topics to product information discoverability related questions."

Privacy Technologies and Policy - First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected... Privacy Technologies and Policy - First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers (Paperback, 2014 ed.)
Bart Preneel, Demosthenes Ikonomou
R1,849 Discovery Miles 18 490 Ships in 18 - 22 working days

This book constitutes revised selected papers from the First Annual Privacy Forum, APF 2012, held in Limassol, Cyprus, in October 2012. The 13 revised papers presented in this volume were carefully reviewed and selected from 26 submissions. They are organized in topical sections named: modelling; privacy by design; identity management and case studies.

Cooperative Internet Computing (Paperback, Softcover reprint of the original 1st ed. 2003): Alvin T. S. Chan, Stephen Chan,... Cooperative Internet Computing (Paperback, Softcover reprint of the original 1st ed. 2003)
Alvin T. S. Chan, Stephen Chan, Hong Va Leong, Vincent Ng
R4,005 Discovery Miles 40 050 Ships in 18 - 22 working days

The Second International Workshop on Cooperative Internet Computing (CIC2002) has brought together researchers, academics, and industry practitioners who are involved and interested in the development of advanced and emerging cooperative computing technologies. Cooperative computing is an important computing paradigm to enable different parties to work together towards a pre defined non-trivial goal. It encompasses important technological areas like computer supported cooperative work, workflow, computer assisted design and concurrent programming. As technologies continue to advance and evolve, there is an increasing need to research and develop new classes of middlewares and applications to leverage on the combined benefits of Internet and web to provide users and programmers with highly interactive and robust cooperative computing environment. It is the aim of this forum to promote close interactions and exchange of ideas among researchers, academics and practitioners on the state-of-the art researches in all of these exciting areas. We have partnered with Kluwer Acedamic Press this year to bring to you a book compilation of the papers that were presented at the CIC2002 workshop. The importance of the research area is reflected both in the quality and quantity of the submitted papers, where each paper was reviewed by at least three PC members. As a result, we were able to only accept 14 papers for full presentation at the workshop, while having to reject several excellent papers due to the limitations of the program schedule.

Algorithmic Game Theory - 6th International Symposium, SAGT 2013, Aachen, Germany, October 21-23, 2013, Proceedings (Paperback,... Algorithmic Game Theory - 6th International Symposium, SAGT 2013, Aachen, Germany, October 21-23, 2013, Proceedings (Paperback, 2013 ed.)
Berthold Voecking
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the proceedings of the 6th International Symposium on Algorithmic Game Theory, SAGT 2013, held in Aachen, Germany, in October 2013. The 25 papers presented in this volume were carefully reviewed and selected from 65 submissions. They cover various important aspects of algorithmic game theory, such as solution concepts in game theory, efficiency of equilibria and the price of anarchy, computational aspects of equilibria and game theoretical measures, repeated games and convergence of dynamics, evolution and learning in games, coordination and collective action, network games and graph-theoretic aspects of social networks, voting and social choice, as well as algorithmic mechanism design.

Virtual Corporate Universities - A Matrix of Knowledge and Learning for the New Digital Dawn (Paperback, Softcover reprint of... Virtual Corporate Universities - A Matrix of Knowledge and Learning for the New Digital Dawn (Paperback, Softcover reprint of the original 1st ed. 2003)
Walter R.J. Baets, Gert Van Der Linden
R2,639 Discovery Miles 26 390 Ships in 18 - 22 working days

Over the past years, business schools have been experimenting with distance learning and online education. In many cases this new technology has not brought the anticipated results. Questions raised by online education can be linked to the fundamental problem of education and teaching, and more specifically to the models and philosophy of education and teaching. Virtual Corporate Universities: A Matrix of Knowledge and Learning for the New Digital Dawn offers a source for new thoughts about those processes in view of the use of new technologies. Learning is considered as a key-strategic tool for new strategies, innovation, and significantly improving organizational effectiveness. The book blends the elements of knowledge management, as well as organizational and individual learning. The book is not just a treatment of technology, but a fusion of a novel dynamic learner (student)-driven learning concept, the management and creation of dynamic knowledge, and next-generation technologies to generic business, organizational and managerial processes, and the development of human capital. Obviously, the implications of online learning go far beyond the field of business as presented in this book.

Synchronizing E-Security (Paperback, Softcover reprint of the original 1st ed. 2004): Godfried B. Williams Synchronizing E-Security (Paperback, Softcover reprint of the original 1st ed. 2004)
Godfried B. Williams
R2,605 Discovery Miles 26 050 Ships in 18 - 22 working days

Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies. This book presents insights into the validity and credibility of current risk assessment methods that support electronic transactions in the global economy. Synchronizing E-Security focuses on a number of case studies of IT companies, within selected countries in West Africa, Europe, Asia and the United States. The foundation of this work is based on previous studies by Williams G., Avudzivi P.V (Hawaii 2002) on the retrospective view of information security management and the impact of tele-banking on the end-user.

Recent Advances in RSA Cryptography (Paperback, Softcover reprint of the original 1st ed. 2001): Stefan Katzenbeisser Recent Advances in RSA Cryptography (Paperback, Softcover reprint of the original 1st ed. 2001)
Stefan Katzenbeisser
R2,616 Discovery Miles 26 160 Ships in 18 - 22 working days

Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in RSA cryptography. Special emphasis is laid on the description and analysis of proposed attacks against the RSA cryptosystem. The first chapters introduce the necessary background information on number theory, complexity and public key cryptography. Subsequent chapters review factorization algorithms and specific properties that make RSA attractive for cryptographers. Most recent attacks against RSA are discussed in the third part of the book (among them attacks against low-exponent RSA, Hastad's broadcast attack, and Franklin-Reiter attacks). Finally, the last chapter reviews the use of the RSA function in signature schemes. Recent Advances in RSA Cryptography is of interest to graduate level students and researchers who will gain an insight into current research topics in the field and an overview of recent results in a unified way. Recent Advances in RSA Cryptography is suitable as a secondary text for a graduate level course, and as a reference for researchers and practitioners in industry.

Google Apps For Dummies (Paperback): R Teeter Google Apps For Dummies (Paperback)
R Teeter
R711 R640 Discovery Miles 6 400 Save R71 (10%) Ships in 18 - 22 working days

Google Apps are Web-based, low-cost (or free ) office productivity tools that do everything those expensive applications do -- and you can access them from any computer with an Internet connection. "Google Apps For Dummies" boosts your "app-titude" by giving you the low-down on choosing, setting up, and using these nifty and powerful gadgets for work or play.

Whether you're an individual who wants to take advantage of iGoogle or an organization looking for an enterprise-wide training solution for users at all levels, this comprehensive, practical guide brings you up to speed with all of the basic information and advanced tips and tricks you need to make good use of every Google Apps's tool and capability. Discover how to: Get productive fast with free or inexpensive Web-based appsDesign your perfect Start Page layoutChoose among the different editionsUse Gmail and Google TalkWork with Google Docs and spreadsheet documentsCreate and collaborate on documentsImport events into your calendarBuild dazzling presentationsUse Dashboard to create and manage user accountsCreate a Web page with a unique domain setting

Google Apps are poised to shatter the primacy of the current way of working with PCs, saving businesses, schools, government agencies, and individuals big bucks on software, network infrastructure, and administration. "Google Apps For Dummies" is your key to making this revolutionary new approach work for you and your organization.

Distributed Infrastructure Support for Electronic Commerce Applications (Paperback, Softcover reprint of the original 1st ed.... Distributed Infrastructure Support for Electronic Commerce Applications (Paperback, Softcover reprint of the original 1st ed. 2004)
Hans-Arno Jacobsen
R2,626 Discovery Miles 26 260 Ships in 18 - 22 working days

Distributed Infrastructure Support For E-Commerce And Distributed Applications is organized in three parts. The first part constitutes an overview, a more detailed motivation of the problem context, and a tutorial-like introduction to middleware systems. The second part is comprised of a set of chapters that study solutions to leverage the trade-off between a transparent programming model and application-level enabled resource control. The third part of this book presents three detailed distributed application case studies and demonstrates how standard middleware platforms fail to adequately cope with resource control needs of the application designer in these three cases: -An electronic commerce framework for software leasing over the World Wide Web; -A remote building energy management system that has been experimentally deployed on several building sites; -A wireless computing infrastructure for efficient data transfer to non-stationary mobile clients that have been experimentally validated.

Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3,... Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3, 2011. Revised Selected Papers (Paperback, 2012 ed.)
Chuankun Wu, Moti Yung, Dongdai Lin
R1,437 Discovery Miles 14 370 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications.

Radio Frequency Identification: Security and Privacy Issues - Security and Privacy Issues  9th International Workshop, RFIDsec... Radio Frequency Identification: Security and Privacy Issues - Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Michael Hutter, Joern-Marc Schmidt
R1,754 Discovery Miles 17 540 Ships in 18 - 22 working days

This book constitutes the proceedings of the 9th Workshop on RFID Security and Privacy, RFIDsec 2013, held in Graz, Austria, in July 2013. The 11 papers presented in this volume were carefully reviewed and selected from 23 submissions. RFIDsec deals with topics of importance to improving the security and privacy of RFID, NFC, contactless technologies, and the Internet of Things. RFIDsec bridges the gap between cryptographic researchers and RFID developers.

Network and System Security - 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedings... Network and System Security - 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedings (Paperback, 2012 ed.)
Li Xu, Elisa Bertino, Yi Mu
R1,476 Discovery Miles 14 760 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control.

Information Hiding: Steganography and Watermarking-Attacks and Countermeasures - Steganography and Watermarking - Attacks and... Information Hiding: Steganography and Watermarking-Attacks and Countermeasures - Steganography and Watermarking - Attacks and Countermeasures (Paperback, Softcover reprint of the original 1st ed. 2001)
Neil F. Johnson, Zoran Duric, Sushil Jajodia
R2,617 Discovery Miles 26 170 Ships in 18 - 22 working days

Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking). Steganography (literally, covered writing) explores methods to hide the existence of hidden messages. These methods include invisible ink, microdot, digital signature, covert channel, and spread spectrum communication. Digital watermarks represent a commercial application of steganography. Watermarks can be used to track the copyright and ownership of electronic media. In this volume, the authors focus on techniques for hiding information in digital media. They analyze the hiding techniques to uncover their limitations. These limitations are employed to devise attacks against hidden information. The goal of these attacks is to expose the existence of a secret message or render a digital watermark unusable. In assessing these attacks, countermeasures are developed to assist in protecting digital watermarking systems.Understanding the limitations of the current methods will lead us to build more robust methods that can survive various manipulation and attacks. The more information that is placed in the public's reach on the Internet, the more owners of such information need to protect themselves from theft and false representation. Systems to analyze techniques for uncovering hidden information and recover seemingly destroyed information will be useful to law enforcement authorities in computer forensics and digital traffic analysis. Information Hiding: Steganography and Watermarking - Attacks and Countermeasures presents the authors' research contributions in three fundamental areas with respect to image-based steganography and watermarking: analysis of data hiding techniques, attacks against hidden information, and countermeasures to attacks against digital watermarks. Information Hiding: Steganography and Watermarking -- Attacks and Countermeasures is suitable for a secondary text in a graduate level course, and as a reference for researchers and practitioners in industry.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Churchill & Smuts - The Friendship
Richard Steyn Paperback  (6)
R320 R286 Discovery Miles 2 860
Don't Upset ooMalume - A Guide To…
Hombakazi Mercy Nqandeka Paperback R280 R250 Discovery Miles 2 500
Koning Eenoog - 'n Migranteverhaal
Toef Jaeger Paperback R110 Discovery Miles 1 100
The Circle Of The Saints - Stories Of…
Shafiq Morton Paperback R300 R240 Discovery Miles 2 400
When Love Kills - The Tragic Tale Of AKA…
Melinda Ferguson Paperback  (1)
R439 Discovery Miles 4 390
Moord Op Stellenbosch - Twee Dekades Se…
Julian Jansen Paperback R340 R304 Discovery Miles 3 040
Ratels Aan Die Lomba - Die Storie Van…
Leopold Scholtz Paperback  (4)
R295 R264 Discovery Miles 2 640
Fighting And Writing - The Rhodesian…
Luise White Paperback  (1)
R300 R277 Discovery Miles 2 770
Our Long Walk To Economic Freedom - Why…
Johan Fourie Paperback R350 R312 Discovery Miles 3 120
Coloured - How Classification Became…
Tessa Dooms, Lynsey Ebony Chutel Paperback R295 R264 Discovery Miles 2 640

 

Partners