0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (205)
  • R250 - R500 (613)
  • R500+ (5,094)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Information Security: Principles and New Concepts (Volume II) (Hardcover): Fiona Hobbs Information Security: Principles and New Concepts (Volume II) (Hardcover)
Fiona Hobbs
R3,164 R2,867 Discovery Miles 28 670 Save R297 (9%) Ships in 18 - 22 working days
An Interdisciplinary Approach to Modern Network Security (Hardcover): Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia,... An Interdisciplinary Approach to Modern Network Security (Hardcover)
Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le
R3,295 Discovery Miles 32 950 Ships in 9 - 17 working days

An Interdisciplinary Approach to Modern Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts and technology specialists interested in the simulation and application of computer network protection. It presents theoretical frameworks and the latest research findings in network security technologies, while analyzing malicious threats which can compromise network integrity. It discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing and intrusion detection, this edited collection emboldens the efforts of researchers, academics and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, web security and much more. Information and communication systems are an essential component of our society, forcing us to become dependent on these infrastructures. At the same time, these systems are undergoing a convergence and interconnection process that has its benefits, but also raises specific threats to user interests. Citizens and organizations must feel safe when using cyberspace facilities in order to benefit from its advantages. This book is interdisciplinary in the sense that it covers a wide range of topics like network security threats, attacks, tools and procedures to mitigate the effects of malware and common network attacks, network security architecture and deep learning methods of intrusion detection.

Adversary-Aware Learning Techniques and Trends in Cybersecurity (Hardcover, 1st ed. 2021): Prithviraj Dasgupta, Joseph B.... Adversary-Aware Learning Techniques and Trends in Cybersecurity (Hardcover, 1st ed. 2021)
Prithviraj Dasgupta, Joseph B. Collins, Ranjeev Mittu
R3,799 Discovery Miles 37 990 Ships in 18 - 22 working days

This book is intended to give researchers and practitioners in the cross-cutting fields of artificial intelligence, machine learning (AI/ML) and cyber security up-to-date and in-depth knowledge of recent techniques for improving the vulnerabilities of AI/ML systems against attacks from malicious adversaries. The ten chapters in this book, written by eminent researchers in AI/ML and cyber-security, span diverse, yet inter-related topics including game playing AI and game theory as defenses against attacks on AI/ML systems, methods for effectively addressing vulnerabilities of AI/ML operating in large, distributed environments like Internet of Things (IoT) with diverse data modalities, and, techniques to enable AI/ML systems to intelligently interact with humans that could be malicious adversaries and/or benign teammates. Readers of this book will be equipped with definitive information on recent developments suitable for countering adversarial threats in AI/ML systems towards making them operate in a safe, reliable and seamless manner.

Cyber Adversary Characterization - Auditing the Hacker Mind (Paperback): Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz Cyber Adversary Characterization - Auditing the Hacker Mind (Paperback)
Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz
R1,501 Discovery Miles 15 010 Ships in 10 - 15 working days

The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? "Inside the Mind of a Criminal Hacker" sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemy s mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy.
* This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels.
* This book is essential to those who need to truly "know thy enemy" in order to prepare the best defense.
* . The breadth of material in "Inside the Criminal Mind" will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face."

Architectural Wireless Networks Solutions and Security Issues (Hardcover, 1st ed. 2021): Santosh Kumar Das, Sourav Samanta,... Architectural Wireless Networks Solutions and Security Issues (Hardcover, 1st ed. 2021)
Santosh Kumar Das, Sourav Samanta, Nilanjan Dey, Bharat S. Patel, Aboul Ella Hassanien
R4,733 Discovery Miles 47 330 Ships in 18 - 22 working days

This book presents architectural solutions of wireless network and its variations. It basically deals with modeling, analysis, design and enhancement of different architectural parts of wireless network. The main aim of this book is to enhance the applications of wireless network by reducing and controlling its architectural issues. The book discusses efficiency and robustness of wireless network as a platform for communication and data transmission and also discusses some challenges and security issues such as limited hardware resources, unreliable communication, dynamic topology of some wireless networks, vulnerability and unsecure environment. This book is edited for users, academicians and researchers of wireless network. Broadly, topics include modeling of security enhancements, optimization model for network lifetime, modeling of aggregation systems and analyzing of troubleshooting techniques.

Handbook of Research on Cyber Crime and Information Privacy, VOL 2 (Hardcover): Maria Manuela Cruz Cunha, Nuno Ricardo... Handbook of Research on Cyber Crime and Information Privacy, VOL 2 (Hardcover)
Maria Manuela Cruz Cunha, Nuno Ricardo Mateus-Coelho
R7,087 Discovery Miles 70 870 Ships in 18 - 22 working days
Security of Ubiquitous Computing Systems - Selected Topics (Hardcover, 1st ed. 2021): Gildas Avoine, Julio Hernandez-Castro Security of Ubiquitous Computing Systems - Selected Topics (Hardcover, 1st ed. 2021)
Gildas Avoine, Julio Hernandez-Castro
R1,546 Discovery Miles 15 460 Ships in 18 - 22 working days

The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license.

Data Governance and Data Management - Contextualizing Data Governance Drivers, Technologies, and Tools (Hardcover, 1st ed.... Data Governance and Data Management - Contextualizing Data Governance Drivers, Technologies, and Tools (Hardcover, 1st ed. 2021)
Rupa Mahanti
R2,376 Discovery Miles 23 760 Ships in 10 - 15 working days

This book delves into the concept of data as a critical enterprise asset needed for informed decision making, compliance, regulatory reporting and insights into trends, behaviors, performance and patterns. With good data being key to staying ahead in a competitive market, enterprises capture and store exponential volumes of data. Considering the business impact of data, there needs to be adequate management around it to derive the best value. Data governance is one of the core data management related functions. However, it is often overlooked, misunderstood or confused with other terminologies and data management functions. Given the pervasiveness of data and the importance of data, this book provides comprehensive understanding of the business drivers for data governance and benefits of data governance, the interactions of data governance function with other data management functions and various components and aspects of data governance that can be facilitated by technology and tools, the distinction between data management tools and data governance tools, the readiness checks to perform before exploring the market to purchase a data governance tool, the different aspects that must be considered when comparing and selecting the appropriate data governance technologies and tools from large number of options available in the marketplace and the different market players that provide tools for supporting data governance. This book combines the data and data governance knowledge that the author has gained over years of working in different industrial and research programs and projects associated with data, processes and technologies with unique perspectives gained through interviews with thought leaders and data experts. This book is highly beneficial for IT students, academicians, information management and business professionals and researchers to enhance their knowledge and get guidance on implementing data governance in their own data initiatives.

Algorithms for Data and Computation Privacy (Hardcover, 1st ed. 2021): Alex X. Liu, Rui Li Algorithms for Data and Computation Privacy (Hardcover, 1st ed. 2021)
Alex X. Liu, Rui Li
R3,686 Discovery Miles 36 860 Ships in 10 - 15 working days

This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for breaking privacy, and gives intuition on how to design algorithm to counter privacy attacks. Some well-designed differential privacy algorithms are also included in this book. Driven by lower cost, higher reliability, better performance, and faster deployment, data and computing services are increasingly outsourced to clouds. In this computing paradigm, one often has to store privacy sensitive data at parties, that cannot fully trust and perform privacy sensitive computation with parties that again cannot fully trust. For both scenarios, preserving data privacy and computation privacy is extremely important. After the Facebook-Cambridge Analytical data scandal and the implementation of the General Data Protection Regulation by European Union, users are becoming more privacy aware and more concerned with their privacy in this digital world. This book targets database engineers, cloud computing engineers and researchers working in this field. Advanced-level students studying computer science and electrical engineering will also find this book useful as a reference or secondary text.

Advances in Wireless Communications and Applications - Smart Communications: Interactive Methods and Intelligent Algorithms,... Advances in Wireless Communications and Applications - Smart Communications: Interactive Methods and Intelligent Algorithms, Proceedings of 3rd ICWCA 2019 (Hardcover, 1st ed. 2021)
Roumen Kountchev, Aniket Mahanti, Shen Chong, Srikanta Patnaik, Margarita Favorskaya
R4,031 Discovery Miles 40 310 Ships in 18 - 22 working days

This book features selected papers presented at the 3rd International Conference on Wireless Communications and Applications (ICWCA 2019), held at Hainan University, China. Focusing on applications of the latest smart theories and approaches, and recent advances in the field, it covers topics such as OFDM and multi-carrier techniques; smart antenna and space-time signal processing; MIMO, multi-user MIMO, and massive MIMO; modulation, coding, and diversity techniques; dynamic spectrum access and cognitive radio; interference management and radio resource allocation; equalization techniques; synchronization, estimation, and detection techniques; and wireless multiple access (e.g. CDMA, OFDMA, NOMA, ).

Developments in Information Security and Cybernetic Wars (Hardcover): Muhammad Sarfraz Developments in Information Security and Cybernetic Wars (Hardcover)
Muhammad Sarfraz
R5,580 Discovery Miles 55 800 Ships in 18 - 22 working days

As internet technologies continue to advance, new types and methods of data and security breaches threaten national security. These potential breaches allow for information theft and can provide footholds for terrorist and criminal organizations. Developments in Information Security and Cybernetic Wars is an essential research publication that covers cyberwarfare and terrorism globally through a wide range of security-related areas. Featuring topics such as crisis management, information security, and governance, this book is geared toward practitioners, academicians, government officials, military professionals, and industry professionals.

Network and Information Systems (Nis) Regulations - A Pocket Guide for Digital Service Providers (Paperback): IT Governance Network and Information Systems (Nis) Regulations - A Pocket Guide for Digital Service Providers (Paperback)
IT Governance
R391 Discovery Miles 3 910 Ships in 10 - 15 working days

This pocket guide is a primer for any DSPs (digital service providers) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them. An introduction to the new NIS Regulations 2018 that bring the EU's NIS Directive and Implementing Regulation into UK law. This guide outlines the key requirements, details exactly which digital service providers are within scope, and explains how the security objectives from ENISA's Technical Guidelines and international standards can help DSPs achieve compliance. This guide will help you: Clarify how to identify if you are within the scope of the NIS Regulations Gain an insight into the NIS Directive Unravel the key definitions, authorities and points of contact Understand the benefits of a good cyber resilience plan Your essential guide to understanding the NIS Regulations - buy this book today and get the help and guidance you need

SmartData - Privacy Meets Evolutionary Robotics (Hardcover, 2013 ed.): Inman Harvey, Ann Cavoukian, George Tomko, Don Borrett,... SmartData - Privacy Meets Evolutionary Robotics (Hardcover, 2013 ed.)
Inman Harvey, Ann Cavoukian, George Tomko, Don Borrett, Hon Kwan, …
R5,202 R4,610 Discovery Miles 46 100 Save R592 (11%) Ships in 10 - 15 working days

SmartData empowers personal data by wrapping it in a cloak of intelligence such that it now becomes the individual's virtual proxy in cyberspace. No longer will personal data be shared or stored in the cloud as merely data, encrypted or otherwise; it will now be stored and shared as a constituent of the binary string specifying the entire SmartData agent. This agent proactively builds-in privacy, security and user preferences, right from the outset, not as an afterthought. SmartData: Privacy Meets Evolutionary Robotics includes the advances made in the technology of simulating virtual worlds, together with the ideas emerging from fields of evolutionary robotics and embodied cognition within a framework of dynamical systems as an approach toward this ultimate goal. The book brings together top researchers in the field and addresses current personal data privacy challenges in the online-world.

Proceedings of International Conference on Smart Computing and Cyber Security - Strategic Foresight, Security Challenges and... Proceedings of International Conference on Smart Computing and Cyber Security - Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2020) (Hardcover, 1st ed. 2021)
Prasant Kumar Pattnaik, Mangal Sain, Ahmed A. Al-Absi, Pardeep Kumar
R7,688 Discovery Miles 76 880 Ships in 18 - 22 working days

This book presents high-quality research papers presented at the International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2020) held during July 7-8, 2020, in the Department of Smart Computing, Kyungdong University, Global Campus, South Korea. The book includes selected works from academics and industrial experts in the field of computer science, information technology, and electronics and telecommunication. The content addresses challenges of cyber security.

A Concise Introduction to the NIS Directive - A Pocket Guide for Digital Service Providers (Paperback): IT Governance A Concise Introduction to the NIS Directive - A Pocket Guide for Digital Service Providers (Paperback)
IT Governance
R442 Discovery Miles 4 420 Ships in 18 - 22 working days

This pocket guide is an introduction to the EU's NIS Directive (Directive on security of network and information systems). It outlines the key requirements, details which digital service providers are within scope, and explains how the security objectives from ENISA's Technical Guidelines and international standards can help DSPs achieve compliance. This pocket guide is a primer for any DSP that needs to comply with the NIS Directive. The pocket guide helps DSPs: Gain insight into the NIS Directive and who is regulating it; Identify if they are within the scope of the Directive; Understand the key requirements; and Understand how guidance from international standards and ENISA can help them comply. Your essential guide to understanding the EU's NIS Directive - buy this book today and get the help and guidance you need.

International Symposium on Mathematics, Quantum Theory, and Cryptography - Proceedings of MQC 2019 (Hardcover, 1st ed. 2021):... International Symposium on Mathematics, Quantum Theory, and Cryptography - Proceedings of MQC 2019 (Hardcover, 1st ed. 2021)
Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, …
R1,547 Discovery Miles 15 470 Ships in 18 - 22 working days

This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography.

Information Security: Principles and New Concepts (Volume I) (Hardcover): Fiona Hobbs Information Security: Principles and New Concepts (Volume I) (Hardcover)
Fiona Hobbs
R3,163 R2,865 Discovery Miles 28 650 Save R298 (9%) Ships in 18 - 22 working days
Reversible Steganography and Authentication via Transform Encoding (Hardcover, 1st ed. 2020): Jyotsna Kumar Mandal Reversible Steganography and Authentication via Transform Encoding (Hardcover, 1st ed. 2020)
Jyotsna Kumar Mandal
R4,279 Discovery Miles 42 790 Ships in 18 - 22 working days

This book focuses on reversible steganography and authentication via transform encoding, fully discussing in detail the reversibility computation of six transformation techniques: DFT, DCT, wavelets, Z, binomial and grouplet, as well as chaos-based authentication. The book also describes algorithmic approaches based on all transformations along with implementation details and results. Further topics include embedding and extraction into the spatial domain, tuning using GA-based approaches and embedding into imaginary coefficients of the Z domain. Featuring detailed algorithms for encryption and descriptions of all techniques, including embedding techniques for all transform-based steganographic processes, the book also explores the adjustment of pixel values after embedding and presents numerical examples of reversible computations. In the context of chaos-based authentication, it also describes testing the quality of generator is using Monobit, Serial and Poker tests. The book then outlines 15 test cases recommended by NIST fifteen test cases, along with their implementation on six evolutionary algorithms for neural cryptographic systems in the context of wireless computations - TPM, KSOMSCT, DHLPSCT, CHDLPSCT, CTHLPSCT and CGTHLPSCT - and verifies their satisfiability based on the implementations of these six techniques. Lastly it presents various metrics of image processing systems. This book is a valuable reference resource for research scholars, PG/UG students and practicing engineers

Information Assurance and Security Technologies for Risk Assessment and Threat Management - Advances (Hardcover): Te-Shun Chou Information Assurance and Security Technologies for Risk Assessment and Threat Management - Advances (Hardcover)
Te-Shun Chou
R4,948 Discovery Miles 49 480 Ships in 18 - 22 working days

The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by those attackers who are not authorized to access to the information. Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances details current trends and advances in information assurance and security, as well as explores emerging applications. The book aims to provides the readers with an opportunity to build a strong, fundamental understanding of theory and methods and, thus, to find solutions for many of today s most interesting and challenging problems regarding information assurance and security.

Principles of Secure Network Systems Design (Hardcover, 2002 ed.): H. Lawson Principles of Secure Network Systems Design (Hardcover, 2002 ed.)
H. Lawson; Sumit Ghosh
R1,421 Discovery Miles 14 210 Ships in 18 - 22 working days

This new book establishes a comprehensive framework for network security design, unifying the many concepts and aspects of network security and enabling all users to employ a common security foundation. It is presented from the perspective of fundamental principles underlying networking, network control algorithms and security. Using an accessible style and careful explanations, the principles and methodology address design concepts for current and future security concerns for networks. "Principles of Secure Network Systems Design" presents the topic in three basic parts. Part one covers the basic background of network security and the current scope for security in all types of networks and organizations. Part two focuses on the essential nature of network security and a scientific methodology for secure network design. Lastly, part three discusses concrete applications of the design concepts with real world networks, using three comprehensive case studies oriented around ATM networks. Topics and Features: * Holistic view of network security design, going beyond cryptographic issues * Comprehensive framework for a scientific basis of network security design * Integrated view of network security with networks¿ operational and management processes * Extensive case study through modeling & large-scale distributed simulation of ATM network * New approach to both security attack detection and strengthening networks against security attacks and vulnerabilities The book is an essential and practical resource for all professionals, policy makers, practitioners, and advanced students in networking, information systems, computer engineering & science, communications engineering, network design, and security consultants seeking a comprehensive framework for secure network systems design. It is also suitable for self-study purposes by professionals, as well as for advanced course use in network security.

Multimedia Security Using Chaotic Maps: Principles and Methodologies (Hardcover, 1st ed. 2020): Khalid M. Hosny Multimedia Security Using Chaotic Maps: Principles and Methodologies (Hardcover, 1st ed. 2020)
Khalid M. Hosny
R2,677 Discovery Miles 26 770 Ships in 18 - 22 working days

This comprehensive book is primarily intended for researchers, engineers, mathematicians and computer security specialists who are interested in multimedia security, steganography, encryption, and related research fields. It is also a valuable reference resource for postgraduate and senior undergraduate students who are studying multimedia, multimedia security, and information security, as well as for professionals in the IT industry.

Network and Information Systems (Nis) Regulations - A Pocket Guide for Operators of Essential Services (Paperback): IT... Network and Information Systems (Nis) Regulations - A Pocket Guide for Operators of Essential Services (Paperback)
IT Governance
R391 Discovery Miles 3 910 Ships in 10 - 15 working days

This pocket guide is a primer for any OES (operators of essential services) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them. An introduction to the new NIS Regulations 2018 that bring the EU's NIS Directive and Implementing Regulation into UK law. This guide outlines the requirements for operators of essential services based on the Cyber Assessment Framework established by the National Cyber Security Centre (NCSC), including an explanation of the objectives, principles and indicators of good practice, and offers implementation guidance. This guide will help you: Understand how to comply with NIS Regulations, and avoid penalties associated with non-compliance Unravel the key definitions, authorities and points of contact Learn the benefits of a good Cyber Resilience plan Interpret and ensure compliance with the Cyber Assessment Framework Establish the NCSC's cyber security objectives, principles and indicators of good practice Your essential guide to understanding the NIS Regulations - buy this book today and get the help and guidance you need.

Information Security Education. Information Security in Action - 13th IFIP WG 11.8 World Conference, WISE 13, Maribor,... Information Security Education. Information Security in Action - 13th IFIP WG 11.8 World Conference, WISE 13, Maribor, Slovenia, September 21-23, 2020, Proceedings (Hardcover, 1st ed. 2020)
Lynette Drevin, Sune Von Solms, Marianthi Theocharidou
R1,414 Discovery Miles 14 140 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th IFIP WG 11.8 World Conference on Information Security Education, WISE 13, held in Maribor, Slovenia, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 13 full papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in the following topical sections: teaching methods and tools; cybersecurity knowledge within the organization; and teaching of detection and forensics.

Security and Privacy - Select Proceedings of ICSP 2020 (Hardcover, 1st ed. 2021): Pantelimon Stanica, Sugata Gangopadhyay,... Security and Privacy - Select Proceedings of ICSP 2020 (Hardcover, 1st ed. 2021)
Pantelimon Stanica, Sugata Gangopadhyay, Sumit Kumar Debnath
R2,654 Discovery Miles 26 540 Ships in 18 - 22 working days

This book consists of refereed selected papers from the International Conference on Security & Privacy - ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy. In this book, a wide variety of basic security primitives are discussed along with recent developments in some advanced topics like functional encryption, two-party/multi-party computation, bitcoin, cryptocurrency, and post-quantum security.

Trusted Computing - Principles and Applications (Hardcover): Dengguo Feng Trusted Computing - Principles and Applications (Hardcover)
Dengguo Feng; Contributions by Tsinghua University Press
R3,650 Discovery Miles 36 500 Ships in 10 - 15 working days

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Imray Chart B - Martinique to Trinidad…
Imray Paperback R625 Discovery Miles 6 250
Tower C10 Round Col. Code Labels…
R31 R25 Discovery Miles 250
Little Boats with Sails - The History of…
Nicole L Mays, Colin Grazules, … Hardcover R1,286 Discovery Miles 12 860
Geometric Design of Linkages
J. Michael McCarthy, Gim Song Soh Hardcover R2,908 Discovery Miles 29 080
Twelve Secrets
Robert Gold Paperback R391 R361 Discovery Miles 3 610
Agent-oriented Methodologies
Hardcover R2,404 Discovery Miles 24 040
The Case Against William
Mark Gimenez Paperback  (1)
R317 R288 Discovery Miles 2 880
Tower C32 Round Col. Code Labels…
R31 R25 Discovery Miles 250
Between a Rock and a Camera Lens - The…
Robert Deaves Hardcover R790 Discovery Miles 7 900
Tower C10 Round Col. Code Labels - Blue…
R31 R25 Discovery Miles 250

 

Partners