0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (211)
  • R250 - R500 (608)
  • R500+ (5,105)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Secondary Liability of Internet Service Providers (Hardcover, 2017 ed.): Graeme B. Dinwoodie Secondary Liability of Internet Service Providers (Hardcover, 2017 ed.)
Graeme B. Dinwoodie
R5,122 Discovery Miles 51 220 Ships in 10 - 15 working days

This book analyses the doctrinal structure and content of secondary liability rules that hold internet service providers liable for the conduct of others, including the safe harbours (or immunities) of which they may take advantage, and the range of remedies that can be secured against such providers. Many such claims involve intellectual property infringement, but the treatment extends beyond that field of law. Because there are few formal international standards which govern the question of secondary liability, comprehension of the international landscape requires treatment of a broad range of national approaches. This book thus canvasses numerous jurisdictions across several continents, but presents these comparative studies thematically to highlight evolving commonalities and trans-border commercial practices that exist despite the lack of hard international law. The analysis presented in this book allows exploration not only of contemporary debates about the appropriate policy levers through which to regulate intermediaries, but also about the conceptual character of secondary liability rules.

Sustainable Interdependent Networks II - From Smart Power Grids to Intelligent Transportation Networks (Hardcover, 1st ed.... Sustainable Interdependent Networks II - From Smart Power Grids to Intelligent Transportation Networks (Hardcover, 1st ed. 2019)
M. Hadi Amini, Kianoosh G. Boroojeni, S.S. Iyengar, Panos M. Pardalos, Frede Blaabjerg, …
R2,690 Discovery Miles 26 900 Ships in 18 - 22 working days

This book paves the way for researchers working on the sustainable interdependent networks spread over the fields of computer science, electrical engineering, and smart infrastructures. It provides the readers with a comprehensive insight to understand an in-depth big picture of smart cities as a thorough example of interdependent large-scale networks in both theory and application aspects. The contributors specify the importance and position of the interdependent networks in the context of developing the sustainable smart cities and provide a comprehensive investigation of recently developed optimization methods for large-scale networks. There has been an emerging concern regarding the optimal operation of power and transportation networks. In the second volume of Sustainable Interdependent Networks book, we focus on the interdependencies of these two networks, optimization methods to deal with the computational complexity of them, and their role in future smart cities. We further investigate other networks, such as communication networks, that indirectly affect the operation of power and transportation networks. Our reliance on these networks as global platforms for sustainable development has led to the need for developing novel means to deal with arising issues. The considerable scale of such networks, due to the large number of buses in smart power grids and the increasing number of electric vehicles in transportation networks, brings a large variety of computational complexity and optimization challenges. Although the independent optimization of these networks lead to locally optimum operation points, there is an exigent need to move towards obtaining the globally-optimum operation point of such networks while satisfying the constraints of each network properly. The book is suitable for senior undergraduate students, graduate students interested in research in multidisciplinary areas related to future sustainable networks, and the researchers working in the related areas. It also covers the application of interdependent networks which makes it a perfect source of study for audience out of academia to obtain a general insight of interdependent networks.

Social Computing in Homeland Security - Disaster Promulgation and Response (Hardcover): Amy Wenxuan Ding Social Computing in Homeland Security - Disaster Promulgation and Response (Hardcover)
Amy Wenxuan Ding
R4,210 Discovery Miles 42 100 Ships in 18 - 22 working days

The sequence of major events that occurred after entering the twenty-first century have all pointed to an effective emergency response as one of the most complex challenges many countries now face. ""Social Computing in Homeland Security: Disaster Promulgation and Response"" presents a theoretical framework addressing how to enhance national response capabilities and ready the public in the presence of human-made or natural disasters. A practical reference for those involved in disaster response and management, this book explores fascinating topics including designing effective threat warning advisories, quantifying public reactions to and confidence in warning advisories, and assessing how anxiety and fear translate into impacts on effective response and social productivity.

Computer-Mediated Communication (Hardcover): Indrakshi Dey Computer-Mediated Communication (Hardcover)
Indrakshi Dey
R3,069 Discovery Miles 30 690 Ships in 18 - 22 working days
Security-Aware Design for Cyber-Physical Systems - A Platform-Based Approach (Hardcover, 1st ed. 2017): Chungwei Lin, Alberto... Security-Aware Design for Cyber-Physical Systems - A Platform-Based Approach (Hardcover, 1st ed. 2017)
Chungwei Lin, Alberto Sangiovanni-Vincentelli
R3,106 Discovery Miles 31 060 Ships in 18 - 22 working days

Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet security requirements, but there are many challenges of applying security mechanisms to cyber-physical systems including open environments, limited resources, strict timing requirements, and large number of devices. Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science.

Cyber Security in Business and Management (Hardcover): Stephen Mason Cyber Security in Business and Management (Hardcover)
Stephen Mason
R3,055 R2,770 Discovery Miles 27 700 Save R285 (9%) Ships in 18 - 22 working days
Physical Unclonable Functions in Theory and Practice (Hardcover, 2013 ed.): Christoph Boehm, Maximilian Hofer Physical Unclonable Functions in Theory and Practice (Hardcover, 2013 ed.)
Christoph Boehm, Maximilian Hofer
R4,190 R3,389 Discovery Miles 33 890 Save R801 (19%) Ships in 10 - 15 working days

In "Physical Unclonable Functions in Theory and Practice," the authorspresent an in-depth overview ofvarious topics concerning PUFs, providing theoretical background and application details. This book concentrates on the practical issues of PUF hardware design, focusing on dedicated microelectronic PUF circuits.

Additionally, the authors discuss the whole process of circuit design, layout and chip verification. The book also offers coverage of: Different published approaches focusing on dedicated microelectronic PUF circuits Specification of PUF circuits General design issues Minimizing error rate from the circuit s perspective Transistor modeling issues of Montecarlo mismatch simulation and solutions Examples of PUF circuits including an accurate description of the circuits and testing/measurement resultsDifferent error rate reducing pre-selection techniques

This monographgives insight into PUFs in general and provides knowledge in the field of PUF circuit design and implementation. It could be of interest for all circuit designers confronted with PUF design, and also for professionals and students being introduced to the topic."

Computer Communication, Networking and Internet Security - Proceedings of IC3T 2016 (Hardcover, 1st ed. 2017): Suresh Chandra... Computer Communication, Networking and Internet Security - Proceedings of IC3T 2016 (Hardcover, 1st ed. 2017)
Suresh Chandra Satapathy, Vikrant Bhateja, K Srujan Raju, B. Janakiramaiah
R7,758 Discovery Miles 77 580 Ships in 18 - 22 working days

The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, web intelligence, etc. As such, it offers readers a valuable and unique resource.

Cyber-security and Global Information Assurance - Threat Analysis and Response Solutions (Hardcover): Kenneth J. Knapp Cyber-security and Global Information Assurance - Threat Analysis and Response Solutions (Hardcover)
Kenneth J. Knapp
R4,977 Discovery Miles 49 770 Ships in 18 - 22 working days

Foreword by Merrill Warkentin, Mississippi State University, USA. The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community. Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource for academicians and practitioners by addressing the most pressing issues facing cyber-security from both a national and global perspective. This reference source takes a holistic approach to cyber security and information assurance by treating both the technical as well as managerial sides of the field.

CISSP All-in-One Exam Guide, Ninth Edition (Paperback, 9th edition): Fernando Maymi, Shon Harris CISSP All-in-One Exam Guide, Ninth Edition (Paperback, 9th edition)
Fernando Maymi, Shon Harris
R1,216 Discovery Miles 12 160 Ships in 10 - 15 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. A new edition of Shon Harris' bestselling exam prep guide fully updated for the 2021 version of the CISSP exam This up-to-date self-study guide fully prepares candidates for the challenging CISSP exam and offers 100% coverage of all eight exam domains. This edition has been thoroughly revised to cover the 2021 CISSP Common Body of Knowledge and reengineered to better support self-determined learning. Shorter, more focused chapters break down large domains into modules that can be tackled in one sitting. Meanwhile, plenty of examples place issues in real-world contexts and dozens of new figures illustrate complex concepts. Through it all, the book maintains the conversational tone that has made previous editions a favorite for so many readers. Written by leading experts in information security certification and training, CISSP All-in-One Exam Guide, Ninth Edition is based on proven pedagogy and features special elements that teach and reinforce practical skills. Beyond exam prep, the guide also serves as an ideal on-the-job reference for IT security professionals. Fully updated to cover the CISSP 2021 Common Body of Knowledge Revised Table of Contents with modular approach Online content includes 1600 practice exam questions in the Total Tester exam engine

Privacy-Respecting Intrusion Detection (Hardcover, 2007 ed.): Ulrich Flegel Privacy-Respecting Intrusion Detection (Hardcover, 2007 ed.)
Ulrich Flegel
R2,690 Discovery Miles 26 900 Ships in 18 - 22 working days

Effective response to misuse or abusive activity in IT systems requires the capability to detect and understand improper activity. Intrusion Detection Systems observe IT activity, record these observations in audit data, and analyze the collected audit data to detect misuse. Privacy-Respecting Intrusion Detection introduces the concept of technical purpose binding, which restricts the linkability of pseudonyms in audit data to the amount necessary for misuse detection. Also, it limits the recovery of personal data to pseudonyms involved in a detected misuse scenario. The book includes case studies demonstrating this theory, and solutions that are constructively validated by providing algorithms.

Anti-Spam Measures - Analysis and Design (Hardcover, 2007 ed.): Guido Schryen Anti-Spam Measures - Analysis and Design (Hardcover, 2007 ed.)
Guido Schryen
R1,419 Discovery Miles 14 190 Ships in 18 - 22 working days

This book examines anti-spam measures in terms of their potentials, limitations, advantages, and drawbacks. These factors determine to which extent the measures can contribute to the reduction of spam in the long run. It examines legislative, organizational, behavioral, and technological anti-spam measures, including an insight into their effectiveness. In addition, it presents the conceptual development and analysis of an infrastructural e-mail framework, which features such a complementary application, and considers deployment issues.

Operational Semantics and Verification of Security Protocols (Hardcover, 2011): Cas Cremers, Sjouke Mauw Operational Semantics and Verification of Security Protocols (Hardcover, 2011)
Cas Cremers, Sjouke Mauw
R1,747 Discovery Miles 17 470 Ships in 18 - 22 working days

Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols.

The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data. The methodology can be used to prove that protocols satisfy these properties. Based on the model they have developed a tool set called Scyther that can automatically find attacks on security protocols or prove their correctness. In case studies they show the application of the methodology as well as the effectiveness of the analysis tool.

The methodology s strong mathematical basis, the strong separation of concerns in the model, and the accompanying tool set make it ideally suited both for researchers and graduate students of information security or formal methods and for advanced professionals designing critical security protocols.

"

Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security... Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26-27, 2001, Leuven, Belgium (Hardcover, 2002 ed.)
Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
R4,125 Discovery Miles 41 250 Ships in 18 - 22 working days

The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP), focuseson variousstate of the art concepts in the field of Network and Dis tributedSystemsSecurity. Oursocietyisrapidly evolvingand irreversibly set onacourse governedby electronicinteractions. Wehave seen thebirthofe mail in the early seventies, and are now facing new challenging applicationssuchase commerce, e government, ....Themoreour societyrelies on electronicforms ofcommunication, themorethe securityofthesecommunicationnetworks isessentialforitswell functioning. Asaconsequence, researchonmethodsandtechniques toimprove network security iso fparam ount importance. ThisWorking Conference bringstogetherresearchersandprac tionersofvariousdisciplines, organisationsandcountries, todiscuss thelatestdevelopmentsinsecurity protocols, secure software engin eering, mobileagentsecurity, e commercesecurityandsecurityfor distributedcomputing. Wearealsopleasedtohaveattractedtwointernationalspeakers topresenttwo case studies, one dealing withBelgium'sintentionto replacetheidentity card ofitscitizensbyanelectronicversion, and theotherdiscussingtheimplicationsofthesecuritycertificationin amultinationalcorporation. ThisWorking Conference s houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof which can be summarizedas follows: topromoteresearch on technical measures forsecuringcom puternetworks, including bothhardware andsoftware based techniques. to promote dissemination of research results in the field of network security in real lifenetworks in industry, academia and administrative ins titutions. viii topromoteeducationintheapplicationofsecuritytechniques, andtopromotegeneral awarenessa boutsecurityproblems in thebroadfieldofinformationtechnology. Researchers and practioners who want to get involved in this Working Group, are kindlyrequestedtocontactthechairman. MoreinformationontheworkingsofWG11.4isavailable from the officialIFIP website: http: //www.ifip.at.org/. Finally, wewish toexpressour gratitudetoallthosewho have contributedtothisconference in one wayoranother. Wearegr ate fultothe internationalrefereeboard whoreviewedallthe papers andtotheauthorsandinvitedspeakers, whosecontributionswere essential to the successof the conference. We would alsoliketo thanktheparticipantswhosepresenceand interest, togetherwith thechangingimperativesofsociety, willprovea drivingforce for futureconferen

Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives (Hardcover, New): Raghu Santanam Cyber Security, Cyber Crime and Cyber Forensics - Applications and Perspectives (Hardcover, New)
Raghu Santanam
R4,568 Discovery Miles 45 680 Ships in 18 - 22 working days

Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational and policy-making perspectives. Technological advances address challenges in information sharing, surveillance and analysis, but organizational advances are needed to foster collaboration between federal, state and local agencies as well as the private sector. Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives provides broad coverage of technical and socio-economic perspectives for utilizing information and communication technologies and developing practical solutions in cyber security, cyber crime and cyber forensics.

Spyware and Adware (Hardcover, 2011 ed.): John Aycock Spyware and Adware (Hardcover, 2011 ed.)
John Aycock
R2,732 Discovery Miles 27 320 Ships in 18 - 22 working days

"Spyware and Adware" introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field.

"Spyware and Adware" is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry.

A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Paperback): Kutub Thakur,... A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols (Paperback)
Kutub Thakur, Abu Kamruzzaman, Al-Sakib Khan Pathan
R1,531 Discovery Miles 15 310 Ships in 9 - 17 working days

This book, divided into three parts, describes the detailed concepts of Digital Communication, Security, and Privacy protocols. In Part One, the first chapter provides a deeper perspective on communications, while Chapters 2 and 3 focus on analog and digital communication networks. Part Two then delves into various Digital Communication protocols. Beginning first in Chapter 4 with the major Telephony protocols, Chapter 5 then focuses on important Data Communication protocols, leading onto the discussion of Wireless and Cellular Communication protocols in Chapter 6 and Fiber Optic Data Transmission protocols in Chapter 7. Part Three covers Digital Security and Privacy protocols including Network Security protocols (Chapter 8), Wireless Security protocols (Chapter 9), and Server Level Security systems (Chapter 10), while the final chapter covers various aspects of privacy related to communication protocols and associated issues. This book will offer great benefits to graduate and undergraduate students, researchers, and practitioners. It could be used as a textbook as well as reference material for these topics. All the authors are well-qualified in this domain. The authors have an approved textbook that is used in some US, Saudi, and Bangladeshi universities since Fall 2020 semester - although used in online lectures/classes due to COVID-19 pandemic.

Security for Web Services and Service-Oriented Architectures (Hardcover, 2010 ed.): Elisa Bertino, Lorenzo Martino, Federica... Security for Web Services and Service-Oriented Architectures (Hardcover, 2010 ed.)
Elisa Bertino, Lorenzo Martino, Federica Paci, Anna Squicciarini
R2,098 Discovery Miles 20 980 Ships in 18 - 22 working days

Web services technologies are advancing fast and being extensively deployed in many di?erent application environments. Web services based on the eXt- sible Markup Language (XML), the Simple Object Access Protocol (SOAP), andrelatedstandards, anddeployedinService-OrientedArchitectures(SOAs) are the key to Web-based interoperability for applications within and across organizations. Furthermore, they are making it possible to deploy appli- tions that can be directly used by people, and thus making the Web a rich and powerful social interaction medium. The term Web 2.0 has been coined to embrace all those new collaborative applications and to indicate a new, "social" approach to generating and distributing Web content, characterized by open communication, decentralization of authority, and freedom to share and reuse. For Web services technologies to hold their promise, it is crucial that - curity of services and their interactions with users be assured. Con?dentiality, integrity, availability, anddigitalidentitymanagementareallrequired.People need to be assured that their interactions with services over the Web are kept con?dential and the privacy of their personal information is preserved. People need to be sure that information they use for looking up and selecting s- vicesiscorrectanditsintegrityisassured.Peoplewantservicestobeavailable when needed. They also require interactions to be convenient and person- ized, in addition to being private. Addressing these requirements, especially when dealing with open distributed applications, is a formidable challenge.

Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso... Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R9,436 Discovery Miles 94 360 Ships in 18 - 22 working days
Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Hardcover, 2nd edition): Nick Catrantzos Managing the Insider Threat - No Dark Corners and the Rising Tide Menace (Hardcover, 2nd edition)
Nick Catrantzos
R3,852 R3,296 Discovery Miles 32 960 Save R556 (14%) Ships in 9 - 17 working days

* Provides evidence, examples, and explanation of the developing tactics-illustrated recently in politics in particular-of embedding internal saboteurs bent on dismantling their own institutions from within * Presents numerous case studies to examine instances of insider compromises, including the circumstances and warning signs that led to events * Outlines solutions on how to train organizations and individuals on recognizing, reporting, mitigating, and deterring insider threats

Architecting User-Centric Privacy-as-a-Set-of-Services - Digital Identity-Related Privacy Framework (Hardcover, 2014 ed.):... Architecting User-Centric Privacy-as-a-Set-of-Services - Digital Identity-Related Privacy Framework (Hardcover, 2014 ed.)
Ghazi Ben Ayed
R3,824 R3,294 Discovery Miles 32 940 Save R530 (14%) Ships in 10 - 15 working days

How could privacy play a key role in protecting digital identities? How could we merge privacy law, policies, regulations and technologies to protect our digital identities in the context of connected devices and distributed systems? In this book, the author addresses major issues of identity protection and proposes a service-oriented layered framework to achieve interoperability of privacy and secure distributed systems. The framework is intended to distill privacy-related digital identity requirements (business interoperability) into a set of services, which in turn can be implemented on the basis of open standards (technical interoperability). The adoption of the proposed framework in security projects and initiatives would decrease complexities and foster understanding and collaborations between business and technical stakeholders. This work is a step toward implementing the author's vision of delivering cyber security as a set of autonomous multi-platform hosted services that should be available upon user request and on a pay-per-use basis.

Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks (Hardcover, 1st ed. 2019): Zhong-Hua... Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks (Hardcover, 1st ed. 2019)
Zhong-Hua Pang, Guoping Liu, Donghua Zhou, Dehui Sun
R2,667 Discovery Miles 26 670 Ships in 18 - 22 working days

This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deception attacks and denial-of-service attacks) are considered. For the former, it proposes several networked predictive control (NPC) methods based on input-output models and state-space models respectively. For the latter, it designs secure NPC schemes from the perspectives of information security and real-time control. Furthermore, it uses practical experiments to demonstrate the effectiveness and applicability of all the methods, bridging the gap between control theory and practical applications. The book is of interest to academic researchers, R&D engineers, and graduate students in control engineering, networked control systems and cyber-physical systems.

Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion,... Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012, Proceedings (Hardcover)
Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou
R2,764 Discovery Miles 27 640 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012. The 42 revised full papers presented together with 11 short papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on attacks and malicious code, security architectures, system security, access control, database security, privacy attitudes and properties, social networks and social engineering, applied cryptography, anonymity and trust, usable security, security and trust models, security economics, and authentication and delegation.

Security Trends for FPGAS - From Secured to Secure Reconfigurable Systems (Hardcover, Edition.): Benoit Badrignans, Jean-Luc... Security Trends for FPGAS - From Secured to Secure Reconfigurable Systems (Hardcover, Edition.)
Benoit Badrignans, Jean-Luc Danger, Viktor Fischer, Guy Gogniat, Lionel Torres
R2,659 Discovery Miles 26 590 Ships in 18 - 22 working days

In Security Trends for FPGA's the authors present an analysis of current threats against embedded systems and especially FPGAs. They discuss about requirements according to the FIPS standard in order to build a secure system. This point is of paramount importance as it guarantees the level of security of a system. Also highlighted are current vulnerabilities of FPGAs at all the levels of the security pyramid. It is essential from a design point of view to be aware of all the levels in order to provide a comprehensive solution. The strength of a system is defined by its weakest point; there is no reason to enhance other protection means, if the weakest point remains untreated. Many severe attacks have considered this weakness in order not to face brute force attack complexity. Several solutions are proposed in Security Trends for FPGA's especially at the logical, architecture and system levels in order to provide a global solution.

Computational Intelligence for Privacy and Security (Hardcover, 2012 ed.): David A. Elizondo, Agusti Solanas, Antoni... Computational Intelligence for Privacy and Security (Hardcover, 2012 ed.)
David A. Elizondo, Agusti Solanas, Antoni Martinez-Balleste
R4,033 Discovery Miles 40 330 Ships in 18 - 22 working days

The book is a collection of invited papers on Computational Intelligence for Privacy and Security. The majority of the chapters are extended versions of works presented at the special session on Computational Intelligence for Privacy and Security of the International Joint Conference on Neural Networks (IJCNN-2010) held July 2010 in Barcelona, Spain. The book is devoted to Computational Intelligence for Privacy and Security. It provides an overview of the most recent advances on the Computational Intelligence techniques being developed for Privacy and Security. The book will be of interest to researchers in industry and academics and to post-graduate students interested in the latest advances and developments in the field of Computational Intelligence for Privacy and Security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Biometric Security and Privacy…
Richard Jiang, Somaya Al-Maadeed, … Hardcover R4,834 Discovery Miles 48 340
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R647 Discovery Miles 6 470
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Research Anthology on Business Aspects…
Information Resources Management Association Hardcover R11,427 Discovery Miles 114 270
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R5,931 Discovery Miles 59 310
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R7,752 Discovery Miles 77 520
Investigations and the Art of the…
Inge Sebyan Black, Lawrence Fennelly Paperback R1,661 Discovery Miles 16 610
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420

 

Partners