0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (213)
  • R250 - R500 (636)
  • R500+ (5,157)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Data Science for Fake News - Surveys and Perspectives (Hardcover, 1st ed. 2021): Deepak P, Tanmoy Chakraborty, Cheng Long,... Data Science for Fake News - Surveys and Perspectives (Hardcover, 1st ed. 2021)
Deepak P, Tanmoy Chakraborty, Cheng Long, Santhosh Kumar G
R4,272 Discovery Miles 42 720 Ships in 18 - 22 working days

This book provides an overview of fake news detection, both through a variety of tutorial-style survey articles that capture advancements in the field from various facets and in a somewhat unique direction through expert perspectives from various disciplines. The approach is based on the idea that advancing the frontier on data science approaches for fake news is an interdisciplinary effort, and that perspectives from domain experts are crucial to shape the next generation of methods and tools. The fake news challenge cuts across a number of data science subfields such as graph analytics, mining of spatio-temporal data, information retrieval, natural language processing, computer vision and image processing, to name a few. This book will present a number of tutorial-style surveys that summarize a range of recent work in the field. In a unique feature, this book includes perspective notes from experts in disciplines such as linguistics, anthropology, medicine and politics that will help to shape the next generation of data science research in fake news. The main target groups of this book are academic and industrial researchers working in the area of data science, and with interests in devising and applying data science technologies for fake news detection. For young researchers such as PhD students, a review of data science work on fake news is provided, equipping them with enough know-how to start engaging in research within the area. For experienced researchers, the detailed descriptions of approaches will enable them to take seasoned choices in identifying promising directions for future research.

ISO 27001 Controls - A Guide to Implementing and Auditing (Paperback): IT Governance ISO 27001 Controls - A Guide to Implementing and Auditing (Paperback)
IT Governance
R1,067 Discovery Miles 10 670 Ships in 10 - 15 working days

A must-have resource for anyone looking to establish, implement and maintain an ISMS. Ideal for information security managers, auditors, consultants and organisations preparing for ISO 27001 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001. Similarly, for anyone involved in internal or external audits, the book includes the definitive requirements that auditors must address when certifying organisations to ISO 27001. The book covers: Implementation guidance - what needs to be considered to fulfil the requirements of the controls from ISO/IEC 27001, Annex A. This guidance is aligned with ISO/IEC 27002, which gives advice on implementing the controls; Auditing guidance - what should be checked, and how, when examining the ISO/IEC 27001 controls to ensure that the implementation covers the ISMS control requirements. The implementation guidance gives clear descriptions covering what needs to be considered to achieve compliance against the requirements, with examples given throughout. The auditing guidance covers what evidence an auditor should look for in order to satisfy themselves that the requirement has been met. Useful for internal auditors and consultants, the auditing guidance will also be useful for information security managers and lead implementers as a means of confirming that their implementation and evidence to support it will be sufficient to pass an audit. This guide is intended to be used by those involved in: Designing, implementing and/or maintaining an ISMS; Preparing for ISMS audits and assessments; or Undertaking both internal and third-party ISMS audits and assessments About the author Bridget Kenyon (CISSP) is global CISO for Thales eSecurity. Her experience in information security started in 2000 with a role in network vulnerabilities at DERA, following which she has been a PCI Qualified Security Assessor, information security officer for Warwick University and head of information security for UCL, and has held a variety of roles in consultancy and academia. Bridget has been contributing to international standards since 2006, when she first joined BSI Panel 1, coordinating development of information security management system standards; she is currently editor for ISO/IEC 27014. Bridget has also co-authored three textbooks on information security. She strongly believes that "information security is fundamental to reliable business operations, not a nice-to-have". In 2018, she was named one of the top 25 women in tech by UK publication PCR.

Advances in Cyber Security and Intelligent Analytics (Hardcover): Abhishek Verma, Jitendra Kumar, Hari Mohan Gaur, Vrijendra... Advances in Cyber Security and Intelligent Analytics (Hardcover)
Abhishek Verma, Jitendra Kumar, Hari Mohan Gaur, Vrijendra Singh, Valentina Emilia Balas
R2,901 Discovery Miles 29 010 Ships in 9 - 17 working days

The proposed title intends to provide a comprehensive view of emerging paradigms of computer science. The initial chapters will introduce various emerging paradigms and discuss research challenges related to them. Then some of the chapters will focus on the research solutions to address the identified challenges. The last few chapters will provide a discussion on future research directions.

The California Consumer Privacy Act (CCPA) - An implementation guide (Paperback): Preston Bukaty The California Consumer Privacy Act (CCPA) - An implementation guide (Paperback)
Preston Bukaty
R780 Discovery Miles 7 800 Ships in 18 - 22 working days

Understand the CCPA (California Consumer Privacy Act) and how to implement strategies to comply with this privacy regulation. Established in June 2018, the CCPA was created to remedy the lack of comprehensive privacy regulation in the state of California. When it comes into effect on January 1, 2020, the CCPA will give California residents the right to: Learn what personal data a business has collected about them Understand who this data has been disclosed to Find out whether their personal data has been sold to third parties, and who these third parties are Opt-out of such data transactions, or request that the data be deleted. Many organizations that do business in the state of California must align to the provisions of the CCPA. Much like the EU's GDPR (General Data Protection Regulation), businesses that fail to comply with the CCPA will face economic penalties. Prepare your business for CCPA compliance with our implementation guide that: Provides the reader with a comprehensive understanding of the legislation by explaining key terms Explains how a business can implement strategies to comply with the CCPA Discusses potential developments of the CCPA to further aid compliance Your guide to understanding the CCPA and how you can implement a strategy to comply with this legislation - buy this book today to get the guidance you need! About the author Preston Bukaty is an attorney and consultant. He specializes in data privacy GRC projects, from data inventory audits to gap analyses, contract management, and remediation planning. His compliance background and experience operationalizing compliance in a variety of industries give him a strong understanding of the legal issues presented by international regulatory frameworks. Having conducted more than 3,000 data mapping audits, he also understands the practical realities of project management in operationalizing compliance initiatives. Preston's legal experience and enthusiasm for technology make him uniquely suited to understanding the business impact of privacy regulations such as the GDPR and the CCPA. He has advised more than 250 organizations engaged in businesses as varied as SaaS platforms, mobile geolocation applications, GNSS/telematics tools, financial institutions, fleet management software, architectural/engineering design systems, and web hosting. He also teaches certification courses on GDPR compliance and ISO 27001 implementation, and writes on data privacy law topics. Preston lives in Denver, Colorado. Prior to working as a data privacy consultant, he worked for an international GPS software company, advising business areas on compliance issues across 140 countries. Preston holds a juris doctorate from the University of Kansas School of Law, along with a basketball signed by Hall of Fame coach Bill Self.

Trends in Wireless Communication and Information Security - Proceedings of EWCIS 2020 (Hardcover, 1st ed. 2021): Mithun... Trends in Wireless Communication and Information Security - Proceedings of EWCIS 2020 (Hardcover, 1st ed. 2021)
Mithun Chakraborty, Raman Kr. Jha, Valentina Emilia Balas, Samarendra Nath Sur, Debdatta Kandar
R8,203 Discovery Miles 82 030 Ships in 10 - 15 working days

This book presents best selected papers presented at the International Conference on Emerging Wireless Communication Technologies and Information Security (EWCIS 2020), held from 8th & 9th October 2020 at Amity University Jharkhand, Ranchi, India. The book includes papers in the research area of wireless communications and intelligent systems, signal and image processing in engineering applications, data communication and information security, IoT and cloud computing. The contribution ranges from scientists, engineers and technologists from academia as well as from industry.

Cryptography - Breakthroughs in Research and Practice (Hardcover): Information Resources Management Association Cryptography - Breakthroughs in Research and Practice (Hardcover)
Information Resources Management Association
R9,422 Discovery Miles 94 220 Ships in 9 - 17 working days

Advances in technology have provided numerous innovations that make people's daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks also increase. The field of cryptography has become a solution to this ever-increasing problem. Applying strategic algorithms to cryptic issues can help save time and energy in solving the expanding problems within this field. Cryptography: Breakthroughs in Research and Practice examines novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data. Highlighting a range of topics such as cyber security, threat detection, and encryption, this publication is an ideal reference source for academicians, graduate students, engineers, IT specialists, software engineers, security analysts, industry professionals, and researchers interested in expanding their knowledge of current trends and techniques within the cryptology field.

Blockchain Systems and Communication Networks: From Concepts to Implementation (Hardcover, 1st ed. 2021): Mubashir Husain... Blockchain Systems and Communication Networks: From Concepts to Implementation (Hardcover, 1st ed. 2021)
Mubashir Husain Rehmani
R2,211 Discovery Miles 22 110 Ships in 10 - 15 working days

This book provides extensive insights on blockchain systems, starting from a historical perspective and moving towards building foundational knowledge, with focus on communication networks. It covers blockchain applications, algorithms, architectures, design and implementation, and security and privacy issues, providing the reader with a comprehensive overview. Further, it discusses blockchain systems and its integration to communication networks. The book includes hands-on, practical tutorials, self-assessment exercises, and review questions; tips and sample programs are also provided throughout. Complementary supporting material for instructors, including open source programming code for practical tutorials and exercises, is also available. The target audience includes graduate students, professionals, and researchers working in the areas of blockchain systems, distributed ledger technology, computer networks and communications, artificial intelligence, and cybersecurity.

Techniques and Applications for Advanced Information Privacy and Security - Emerging Organizational, Ethical, and Human Issues... Techniques and Applications for Advanced Information Privacy and Security - Emerging Organizational, Ethical, and Human Issues (Hardcover)
Hamid R. Nemati
R4,966 Discovery Miles 49 660 Ships in 18 - 22 working days

Advances in technology are causing new privacy concerns as an increasing number of citizens are engaging in online activities. ""Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues"" provides a thorough understanding of issues and concerns in information technology security. An advanced reference source covering topics such as security management, privacy preservation, and authentication, this book outlines the field and provides a basic understanding of the most salient issues in privacy concerns for researchers and practitioners.

Managing Cybersecurity Risk - Book 3 (Paperback): Jonathan Reuvid Managing Cybersecurity Risk - Book 3 (Paperback)
Jonathan Reuvid
R1,118 R923 Discovery Miles 9 230 Save R195 (17%) Ships in 10 - 15 working days
Information Security: Principles and New Concepts (Volume II) (Hardcover): Fiona Hobbs Information Security: Principles and New Concepts (Volume II) (Hardcover)
Fiona Hobbs
R3,164 R2,867 Discovery Miles 28 670 Save R297 (9%) Ships in 18 - 22 working days
Adversary-Aware Learning Techniques and Trends in Cybersecurity (Hardcover, 1st ed. 2021): Prithviraj Dasgupta, Joseph B.... Adversary-Aware Learning Techniques and Trends in Cybersecurity (Hardcover, 1st ed. 2021)
Prithviraj Dasgupta, Joseph B. Collins, Ranjeev Mittu
R3,799 Discovery Miles 37 990 Ships in 18 - 22 working days

This book is intended to give researchers and practitioners in the cross-cutting fields of artificial intelligence, machine learning (AI/ML) and cyber security up-to-date and in-depth knowledge of recent techniques for improving the vulnerabilities of AI/ML systems against attacks from malicious adversaries. The ten chapters in this book, written by eminent researchers in AI/ML and cyber-security, span diverse, yet inter-related topics including game playing AI and game theory as defenses against attacks on AI/ML systems, methods for effectively addressing vulnerabilities of AI/ML operating in large, distributed environments like Internet of Things (IoT) with diverse data modalities, and, techniques to enable AI/ML systems to intelligently interact with humans that could be malicious adversaries and/or benign teammates. Readers of this book will be equipped with definitive information on recent developments suitable for countering adversarial threats in AI/ML systems towards making them operate in a safe, reliable and seamless manner.

Recent Trends in Blockchain for Information Systems Security and Privacy (Hardcover): Amit Kumar Tyagi, Ajith Abraham Recent Trends in Blockchain for Information Systems Security and Privacy (Hardcover)
Amit Kumar Tyagi, Ajith Abraham
R3,047 Discovery Miles 30 470 Ships in 9 - 17 working days

Blockchain technology is an emerging distributed, decentralized architecture and computing paradigm, which has accelerated the development and application of cloud, fog and edge computing; artificial intelligence; cyber physical systems; social networking; crowdsourcing and crowdsensing; 5g; trust management and finance; and other many useful sectors. Nowadays, the primary blockchain technology uses are in information systems to keep information secure and private. However, many threats and vulnerabilities are facing blockchain in the past decade such 51% attacks, double spending attacks, etc. The popularity and rapid development of blockchain brings many technical and regulatory challenges for research and academic communities. The main goal of this book is to encourage both researchers and practitioners of Blockchain technology to share and exchange their experiences and recent studies between academia and industry. The reader will be provided with the most up-to-date knowledge of blockchain in mainstream areas of security and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and p2p applications are increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments). This book provides a detailed explanation of security and privacy with respect to blockchain for information systems, and will be an essential resource for students, researchers and scientists studying blockchain uses in information systems and those wanting to explore the current state of play.

Architectural Wireless Networks Solutions and Security Issues (Hardcover, 1st ed. 2021): Santosh Kumar Das, Sourav Samanta,... Architectural Wireless Networks Solutions and Security Issues (Hardcover, 1st ed. 2021)
Santosh Kumar Das, Sourav Samanta, Nilanjan Dey, Bharat S. Patel, Aboul Ella Hassanien
R4,733 Discovery Miles 47 330 Ships in 18 - 22 working days

This book presents architectural solutions of wireless network and its variations. It basically deals with modeling, analysis, design and enhancement of different architectural parts of wireless network. The main aim of this book is to enhance the applications of wireless network by reducing and controlling its architectural issues. The book discusses efficiency and robustness of wireless network as a platform for communication and data transmission and also discusses some challenges and security issues such as limited hardware resources, unreliable communication, dynamic topology of some wireless networks, vulnerability and unsecure environment. This book is edited for users, academicians and researchers of wireless network. Broadly, topics include modeling of security enhancements, optimization model for network lifetime, modeling of aggregation systems and analyzing of troubleshooting techniques.

Handbook of Research on Cyber Crime and Information Privacy, VOL 2 (Hardcover): Maria Manuela Cruz Cunha, Nuno Ricardo... Handbook of Research on Cyber Crime and Information Privacy, VOL 2 (Hardcover)
Maria Manuela Cruz Cunha, Nuno Ricardo Mateus-Coelho
R7,087 Discovery Miles 70 870 Ships in 18 - 22 working days
Security of Ubiquitous Computing Systems - Selected Topics (Hardcover, 1st ed. 2021): Gildas Avoine, Julio Hernandez-Castro Security of Ubiquitous Computing Systems - Selected Topics (Hardcover, 1st ed. 2021)
Gildas Avoine, Julio Hernandez-Castro
R1,546 Discovery Miles 15 460 Ships in 18 - 22 working days

The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license.

Exploring Careers in Cybersecurity and Digital Forensics (Hardcover): Lucy K. Tsado, Robert Osgood Exploring Careers in Cybersecurity and Digital Forensics (Hardcover)
Lucy K. Tsado, Robert Osgood
R954 Discovery Miles 9 540 Ships in 10 - 15 working days

Cybersecurity is a fairly new academic discipline. Therefore, most of the books written are mainly focused on classroom material and resources. To the best of our knowledge, there isn't a book that targets criminal justice and other nontechnical students from a career choice standpoint, while also providing needed guidance for a career in the field. Exploring Careers in Cybersecurity and Digital Forensics will guide students in understanding the unique opportunity that a career in digital forensics and cybersecurity provides, and a plan for how to navigate the vast amount of resources like formal education, digital forensics/cybersecurity certifications and other career building tools available. While the cybersecurity field and profession are fully aware of the skills gap and the opportunities that are available, other nontraditional students are not. Human behavioral disciplines like criminal justice, psychology, law and some other disciplines like business, engineering and political science are not aware that their skills are also relevant and lacking in the digital forensics/cybersecurity field. This book will draw awareness and attract the attention of those nontechnical students and professionals that would not typically be involved in cybersecurity education. Moreover, with the continued rise in cyberattacks, the need for technological and non-technological skills in responding to digital behavior that is criminal, as well as the requirement to respond, investigate, gather and preserve evidence is growing. Careers in Cybersecurity, Cyber Defense and Digital Forensics will therefore be a useful tool for both students and those who are in the position in helping them make career decisions. Counselors and school administrators in both high school and undergraduate programs will benefit from the information in this book.

Data Governance and Data Management - Contextualizing Data Governance Drivers, Technologies, and Tools (Hardcover, 1st ed.... Data Governance and Data Management - Contextualizing Data Governance Drivers, Technologies, and Tools (Hardcover, 1st ed. 2021)
Rupa Mahanti
R2,376 Discovery Miles 23 760 Ships in 10 - 15 working days

This book delves into the concept of data as a critical enterprise asset needed for informed decision making, compliance, regulatory reporting and insights into trends, behaviors, performance and patterns. With good data being key to staying ahead in a competitive market, enterprises capture and store exponential volumes of data. Considering the business impact of data, there needs to be adequate management around it to derive the best value. Data governance is one of the core data management related functions. However, it is often overlooked, misunderstood or confused with other terminologies and data management functions. Given the pervasiveness of data and the importance of data, this book provides comprehensive understanding of the business drivers for data governance and benefits of data governance, the interactions of data governance function with other data management functions and various components and aspects of data governance that can be facilitated by technology and tools, the distinction between data management tools and data governance tools, the readiness checks to perform before exploring the market to purchase a data governance tool, the different aspects that must be considered when comparing and selecting the appropriate data governance technologies and tools from large number of options available in the marketplace and the different market players that provide tools for supporting data governance. This book combines the data and data governance knowledge that the author has gained over years of working in different industrial and research programs and projects associated with data, processes and technologies with unique perspectives gained through interviews with thought leaders and data experts. This book is highly beneficial for IT students, academicians, information management and business professionals and researchers to enhance their knowledge and get guidance on implementing data governance in their own data initiatives.

Algorithms for Data and Computation Privacy (Hardcover, 1st ed. 2021): Alex X. Liu, Rui Li Algorithms for Data and Computation Privacy (Hardcover, 1st ed. 2021)
Alex X. Liu, Rui Li
R3,686 Discovery Miles 36 860 Ships in 10 - 15 working days

This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for breaking privacy, and gives intuition on how to design algorithm to counter privacy attacks. Some well-designed differential privacy algorithms are also included in this book. Driven by lower cost, higher reliability, better performance, and faster deployment, data and computing services are increasingly outsourced to clouds. In this computing paradigm, one often has to store privacy sensitive data at parties, that cannot fully trust and perform privacy sensitive computation with parties that again cannot fully trust. For both scenarios, preserving data privacy and computation privacy is extremely important. After the Facebook-Cambridge Analytical data scandal and the implementation of the General Data Protection Regulation by European Union, users are becoming more privacy aware and more concerned with their privacy in this digital world. This book targets database engineers, cloud computing engineers and researchers working in this field. Advanced-level students studying computer science and electrical engineering will also find this book useful as a reference or secondary text.

Advances in Wireless Communications and Applications - Smart Communications: Interactive Methods and Intelligent Algorithms,... Advances in Wireless Communications and Applications - Smart Communications: Interactive Methods and Intelligent Algorithms, Proceedings of 3rd ICWCA 2019 (Hardcover, 1st ed. 2021)
Roumen Kountchev, Aniket Mahanti, Shen Chong, Srikanta Patnaik, Margarita Favorskaya
R4,031 Discovery Miles 40 310 Ships in 18 - 22 working days

This book features selected papers presented at the 3rd International Conference on Wireless Communications and Applications (ICWCA 2019), held at Hainan University, China. Focusing on applications of the latest smart theories and approaches, and recent advances in the field, it covers topics such as OFDM and multi-carrier techniques; smart antenna and space-time signal processing; MIMO, multi-user MIMO, and massive MIMO; modulation, coding, and diversity techniques; dynamic spectrum access and cognitive radio; interference management and radio resource allocation; equalization techniques; synchronization, estimation, and detection techniques; and wireless multiple access (e.g. CDMA, OFDMA, NOMA, ).

Network Security - Private Communication in a Public World (Hardcover, 3rd edition): Charlie Kaufman, Radia Perlman, Mike... Network Security - Private Communication in a Public World (Hardcover, 3rd edition)
Charlie Kaufman, Radia Perlman, Mike Speciner, Ray Perlner
R1,894 R1,670 Discovery Miles 16 700 Save R224 (12%) Ships in 9 - 17 working days

The classic guide to cryptography and network security - now fully updated! "Alice and Bob are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes Network security protocol and cryptography basics Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) First-generation public key algorithms (RSA, Diffie-Hellman, ECC) How quantum computers work, and why they threaten the first-generation public key algorithms Quantum-safe public key algorithms: how they are constructed, and optimizations to make them practical Multi-factor authentication of people Real-time communication (SSL/TLS, SSH, IPsec) New applications (electronic money, blockchains) New cryptographic techniques (homomorphic encryption, secure multiparty computation)

Developments in Information Security and Cybernetic Wars (Hardcover): Muhammad Sarfraz Developments in Information Security and Cybernetic Wars (Hardcover)
Muhammad Sarfraz
R5,580 Discovery Miles 55 800 Ships in 18 - 22 working days

As internet technologies continue to advance, new types and methods of data and security breaches threaten national security. These potential breaches allow for information theft and can provide footholds for terrorist and criminal organizations. Developments in Information Security and Cybernetic Wars is an essential research publication that covers cyberwarfare and terrorism globally through a wide range of security-related areas. Featuring topics such as crisis management, information security, and governance, this book is geared toward practitioners, academicians, government officials, military professionals, and industry professionals.

Network and Information Systems (Nis) Regulations - A Pocket Guide for Digital Service Providers (Paperback): IT Governance Network and Information Systems (Nis) Regulations - A Pocket Guide for Digital Service Providers (Paperback)
IT Governance
R391 Discovery Miles 3 910 Ships in 10 - 15 working days

This pocket guide is a primer for any DSPs (digital service providers) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them. An introduction to the new NIS Regulations 2018 that bring the EU's NIS Directive and Implementing Regulation into UK law. This guide outlines the key requirements, details exactly which digital service providers are within scope, and explains how the security objectives from ENISA's Technical Guidelines and international standards can help DSPs achieve compliance. This guide will help you: Clarify how to identify if you are within the scope of the NIS Regulations Gain an insight into the NIS Directive Unravel the key definitions, authorities and points of contact Understand the benefits of a good cyber resilience plan Your essential guide to understanding the NIS Regulations - buy this book today and get the help and guidance you need

SmartData - Privacy Meets Evolutionary Robotics (Hardcover, 2013 ed.): Inman Harvey, Ann Cavoukian, George Tomko, Don Borrett,... SmartData - Privacy Meets Evolutionary Robotics (Hardcover, 2013 ed.)
Inman Harvey, Ann Cavoukian, George Tomko, Don Borrett, Hon Kwan, …
R5,202 R4,610 Discovery Miles 46 100 Save R592 (11%) Ships in 10 - 15 working days

SmartData empowers personal data by wrapping it in a cloak of intelligence such that it now becomes the individual's virtual proxy in cyberspace. No longer will personal data be shared or stored in the cloud as merely data, encrypted or otherwise; it will now be stored and shared as a constituent of the binary string specifying the entire SmartData agent. This agent proactively builds-in privacy, security and user preferences, right from the outset, not as an afterthought. SmartData: Privacy Meets Evolutionary Robotics includes the advances made in the technology of simulating virtual worlds, together with the ideas emerging from fields of evolutionary robotics and embodied cognition within a framework of dynamical systems as an approach toward this ultimate goal. The book brings together top researchers in the field and addresses current personal data privacy challenges in the online-world.

Proceedings of International Conference on Smart Computing and Cyber Security - Strategic Foresight, Security Challenges and... Proceedings of International Conference on Smart Computing and Cyber Security - Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2020) (Hardcover, 1st ed. 2021)
Prasant Kumar Pattnaik, Mangal Sain, Ahmed A. Al-Absi, Pardeep Kumar
R7,688 Discovery Miles 76 880 Ships in 18 - 22 working days

This book presents high-quality research papers presented at the International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2020) held during July 7-8, 2020, in the Department of Smart Computing, Kyungdong University, Global Campus, South Korea. The book includes selected works from academics and industrial experts in the field of computer science, information technology, and electronics and telecommunication. The content addresses challenges of cyber security.

The Theory of Hash Functions and Random Oracles - An Approach to Modern Cryptography (Hardcover, 1st ed. 2021): Arno... The Theory of Hash Functions and Random Oracles - An Approach to Modern Cryptography (Hardcover, 1st ed. 2021)
Arno Mittelbach, Marc Fischlin
R2,593 Discovery Miles 25 930 Ships in 18 - 22 working days

Hash functions are the cryptographer's Swiss Army knife. Even though they play an integral part in today's cryptography, existing textbooks discuss hash functions only in passing and instead often put an emphasis on other primitives like encryption schemes. In this book the authors take a different approach and place hash functions at the center. The result is not only an introduction to the theory of hash functions and the random oracle model but a comprehensive introduction to modern cryptography. After motivating their unique approach, in the first chapter the authors introduce the concepts from computability theory, probability theory, information theory, complexity theory, and information-theoretic security that are required to understand the book content. In Part I they introduce the foundations of hash functions and modern cryptography. They cover a number of schemes, concepts, and proof techniques, including computational security, one-way functions, pseudorandomness and pseudorandom functions, game-based proofs, message authentication codes, encryption schemes, signature schemes, and collision-resistant (hash) functions. In Part II the authors explain the random oracle model, proof techniques used with random oracles, random oracle constructions, and examples of real-world random oracle schemes. They also address the limitations of random oracles and the random oracle controversy, the fact that uninstantiable schemes exist which are provably secure in the random oracle model but which become insecure with any real-world hash function. Finally in Part III the authors focus on constructions of hash functions. This includes a treatment of iterative hash functions and generic attacks against hash functions, constructions of hash functions based on block ciphers and number-theoretic assumptions, a discussion of privately keyed hash functions including a full security proof for HMAC, and a presentation of real-world hash functions. The text is supported with exercises, notes, references, and pointers to further reading, and it is a suitable textbook for undergraduate and graduate students, and researchers of cryptology and information security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Imaginary Performances in Shakespeare
Aureliu Manea Paperback R746 Discovery Miles 7 460
Zwilling Fresh & Save Vacuum Bag Set…
R219 R200 Discovery Miles 2 000
Bosch MUM48CR1 600W Kitchen Machine…
 (30)
R3,899 R1,999 Discovery Miles 19 990
Beyonce and Beyond - 2013-2016
Naila Keleta-Mae Hardcover R1,552 Discovery Miles 15 520
Theatres of War - Contemporary…
Lauri Scheyer Hardcover R3,172 Discovery Miles 31 720
Performing Religion on the Secular Stage
Sharon Aronson-Lehavi Hardcover R4,194 Discovery Miles 41 940
Grace Kitchen Manual Hamburger Maker…
R6,913 Discovery Miles 69 130
Midea Kettle (1.7L) (Stainless Steel…
R653 Discovery Miles 6 530
2pc Magnetic Washing Machine Door Holder…
R439 R299 Discovery Miles 2 990
Grace Kitchen Meat Mincer (1500W)
R17,959 Discovery Miles 179 590

 

Partners