0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (4)
  • R100 - R250 (96)
  • R250 - R500 (333)
  • R500+ (2,297)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)

Formal Methods for Open Object-Based Distributed Systems - 7th IFIP WG 6.1 International Conference, FMOODS 2005, Athens,... Formal Methods for Open Object-Based Distributed Systems - 7th IFIP WG 6.1 International Conference, FMOODS 2005, Athens, Greece, June 15-17, 2005, Proceedings (Paperback, 2005 ed.)
Martin Steffen, Gianluigi Zavattaro
R1,517 Discovery Miles 15 170 Ships in 18 - 22 working days

This volume contains the proceedings of FMOODS2005, the 7th IFIPWG6. 1 International Conference on Formal Methods for Open Object-Based Distributed Systems. The conference was held in Athens, Greece on June 15-17, 2005. The eventwasthe seventhmeeting ofthis conferenceseries, whichis held roughly- eryyearandahalf, withtheearliereventsheldrespectivelyinParis, Canterbury, Florence, Stanford, Twente, and Paris. ThegoaloftheFMOODSseriesofconferencesistobringtogetherresearchers whose work encompasses three important and related ?elds: - formal methods; - distributed systems; - object-based technology. Sucha convergenceis representativeofrecentadvancesin the?eld ofdistributed systems, and provides links between several scienti?c and technological com- nities, as represented by the conferences FORTE, CONCUR, and ECOOP. The objective of FMOODS is to provide an integrated forum for the pres- tation of research in the above-mentioned ?elds, and the exchange of ideas and experiences in the topics concerned with the formal methods support for open object-based distributed systems. For the call for papers, aspects of interest - cluded, but were not limited to: formal models; formal techniques for speci?- tion, design, or analysis; veri?cation, testing, and validation; component-based design; formal aspects of service-oriented computing; semantics and type s- tems for programming, coordination, or modelling languages; behavioraltyping; multiple viewpoint modelling and consistency between di?erent models; tra- formations of models; integration of quality-of-service requirements into formal models; formal models for security; formal approachesto distributed component frameworks;andapplications andexperience, carefullydescribed. Work onthese aspects of (o?cial and de facto) standardnotation and languagesfor serviceo- ented design, e. g. web services orchestration languages, was explicitly welc

Data and Applications Security XIX - 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT,... Data and Applications Security XIX - 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings (Paperback, 2005 ed.)
Sushil Jajodia, Duminda Wijesekera
R1,532 Discovery Miles 15 320 Ships in 18 - 22 working days

The 19th Annual IFIP Working Group 11.3 Working Conference on Data and Applications Security was held August 7-10, 2005 at the University of C- necticut in Storrs, Connecticut. The objectives of the working conference were to discuss in depth the current state of the researchand practice in data and - plicationsecurity, enableparticipantstobene?tfrompersonalcontactwithother researchers and expand their knowledge, support the activities of the Working Group, and disseminate the research results. This volume contains the 24 papers that were presented at the working c- ference. These papers, which had been selected from 54 submissions, were rig- ously reviewed by the Working Group members. The volume is o?ered both to document progressand to provideresearcherswith a broadperspective of recent developments in data and application security. A special note of thanks goes to the many volunteers whose e?orts made the working conference a success. We wish to thank Divesh Srivastava for agreeing to deliver the invited talk, Carl Landwehr and David Spooner for organizing the panel, the authors for their worthy contributions, and the referees for their time and e?ort in reviewing the papers. We are grateful to T. C. Ting for serving as the General Chair, Steven Demurjian and Charles E. Phillips, Jr. for their hard work as Local Arrangements Chairs, and Pierangela Samarati, Working Group Chair, for managing the IFIP approval process. We would also like to acknowledge Sabrina De Capitani di Vimercati for managing the conference's Web site.

Guide to Assembly Language Programming in Linux (Paperback, 2005 ed.): Sivarama P Dandamudi Guide to Assembly Language Programming in Linux (Paperback, 2005 ed.)
Sivarama P Dandamudi
R4,059 Discovery Miles 40 590 Ships in 18 - 22 working days

This text provides comprehensive coverage of the key elements of Assembly language programming, specifically targeting professionals and students who would like to learn Assembly and intend to move to the Linux operating system.

Advanced .NET Remoting (Paperback, 2nd Corrected ed., Corr. 3rd printing): Mario Szpuszta, Ingo Rammer Advanced .NET Remoting (Paperback, 2nd Corrected ed., Corr. 3rd printing)
Mario Szpuszta, Ingo Rammer
R1,401 R1,179 Discovery Miles 11 790 Save R222 (16%) Ships in 18 - 22 working days

* Proven best-seller and award winner on the market. Insiders highly recommended this title. * More than 150 pages of new material plus a preview of changes for Whidbey (Visual Studio 2005). * Goes far beyond any documentation, white papers and specialist documents available on the subject.

Data and Applications Security XX - 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia... Data and Applications Security XX - 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings (Paperback, 2006 ed.)
Ernesto Damiani, Peng Liu
R1,417 Discovery Miles 14 170 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 20th Annual Working Conference on Data and Applications Security held in Sophia Antipolis, France, in July/August 2006.

The 22 revised full papers presented were carefully reviewed and selected from 56 submissions. The papers present theory, technique, applications, and practical experience of data and application security covering a number of diverse research topics such as access control, privacy, and identity management.

Distributed Applications and Interoperable Systems - 5th IFIP WG 6.1 International Conference, DAIS 2005, Athens, Greece, June... Distributed Applications and Interoperable Systems - 5th IFIP WG 6.1 International Conference, DAIS 2005, Athens, Greece, June 15-17, 2005, Proceedings (Paperback, 2005 ed.)
Lea Kutvonen
R1,468 Discovery Miles 14 680 Ships in 18 - 22 working days

ThisvolumecontainstheproceedingsoftheIFIPWG6. 1InternationalWorking Conference on Distributed Applications and Interoperable Systems V held in Athens, Greece, on June 15-17, 2005. The conference program presented the state of the art in research concerning distributed and interoperable systems. The emergence of 4th-generation c- munication systems, the evolution of Internet technologies, the convergence of telecom and datacom, wireless and ?xed communication systems and appli- tions pave the path for ubiquitous service and application provision. Innovative solutions are required for the development, implementation and operation of distributed applications in complex IT environments full of diversity and h- erogeneity. Today, the emerging wide spectrum of distributed systems - ranging from ambient intelligence to global computing scenarios - lacks systematic - plication development support. Following the evolution of the ?eld, DAIS 2005 focuses on models, technologies and platforms for interoperable, scalable and adaptable distributed applications within all kinds of computing environments. The papers presented at DAIS 2005 cover methodological aspects of building and architecting distributed and interoperable services, interoperability te- nologies, context- and location-based applications, con?gurability of commu- cation services, performance issues, data-integration issues, and Web services. In comparison to earlier events, the submissions showed increased interest towards methodological aspects and large-scale system interoperability. These proceedings contain 16 regular and 5 short papers, which were - lected in a careful, international reviewing process.

Regular Expression Recipes for Windows Developers - A Problem-Solution Approach (Paperback, 1st ed.): Nathan Good Regular Expression Recipes for Windows Developers - A Problem-Solution Approach (Paperback, 1st ed.)
Nathan Good
R942 R820 Discovery Miles 8 200 Save R122 (13%) Ships in 18 - 22 working days

Regular expressions are an essential part of programming, but they can be difficult to cope with. Enter "Regular Expression Recipes for Windows Developers." This is the only book of its kind that presents material in a functional, concise manner. It contains over 100 of the most popular regular expressions, along with explanations of how to use each one. It also covers all of the major development languages, including JavaScript, VB, VB .NET, and C#.

Author -->Nathan A. Good -->teaches by example and provides concise syntax references as necessary throughout the book. You're sure to find his examples accurate and relevant. This book is an ideal solutions guide for you to keep in a handy place for quick reference.-->Table of Contents-->Words and Text URLs and Paths CSV and Tab-Delimited Files Formatting and Validating HTML and XML Source Code

Engineering Self-Organising Systems - Methodologies and Applications (Paperback, 2005 ed.): Sven A. Brueckner, Giovanna Di... Engineering Self-Organising Systems - Methodologies and Applications (Paperback, 2005 ed.)
Sven A. Brueckner, Giovanna Di Marzo Serugendo, Anthony Karageorgos, Radhika Nagpal
R1,412 Discovery Miles 14 120 Ships in 18 - 22 working days

Self-organisation, self-regulation, self-repair, and self-maintenance are promising conceptual approaches to deal with the ever increasing complexity of distributed interacting software and information handling systems. Self-organising applications are able to dynamically change their functionality and structure without direct user intervention to respond to changes in requirements and the environment.

This book comprises revised and extended papers presented at the International Workshop on Engineering Self-Organising Applications, ESOA 2004, held in New York, NY, USA in July 2004 at AAMAS as well as invited papers from leading researchers. The papers are organized in topical sections on state of the art, synthesis and design methods, self-assembly and robots, stigmergy and related topics, and industrial applications.

Operational Semantics for Timed Systems - A Non-standard Approach to Uniform Modeling of Timed and Hybrid Systems (Paperback,... Operational Semantics for Timed Systems - A Non-standard Approach to Uniform Modeling of Timed and Hybrid Systems (Paperback, 2005 ed.)
Heinrich Rust
R1,463 Discovery Miles 14 630 Ships in 18 - 22 working days

This monograph is dedicated to a novel approach for uniform modelling of timed and hybrid systems. Heinrich Rust presents a time model which allows for both the description of discrete time steps and continuous processes with a dense real-number time model. The proposed time model is well suited to express synchronicity of events in a real-number time model as well as strict causality by using uniform discrete time steps. Thus it integrates and reconciles two views of time that are commonly used separately in di?erent application domains. In many discrete systems time is modelled by discrete steps of uniform length, in continuous systems time is seen as a dense ?ow. Themainideatointegratethesedi?erentviewsisadiscretizationofthedense real-number time structure by using constant in?nitesimal time steps within each real-number point in time. The underlying mathematical structure of this time model is based on concepts of Non-standard Analysis as proposed by Abraham Robinson in the 1950s. The discrete modelling, i.e., the descr- tion of sequential discrete algorithms at di?erent abstraction levels, is done with Abstract State Machines along the formalisms developed by Yuri Gu- vich and temporal logic. These ingredients produce a rich formal basis for describing a large variety of systems with quantitative linear time prop- ties, by seamless integration, re?nement and embedding of continuous and discrete models into one uniform semantic framework called Non-standard Timed Abstract State Machines (NTASM)."

Pervasive Computing - Third International Conference, PERVASIVE 2005, Munich, Germany, May 8-13, 2005, Proceedings (Paperback,... Pervasive Computing - Third International Conference, PERVASIVE 2005, Munich, Germany, May 8-13, 2005, Proceedings (Paperback, 2005 ed.)
Hans W. Gellersen, Roy Want, Albrecht Schmidt
R1,532 Discovery Miles 15 320 Ships in 18 - 22 working days

WelcometotheproceedingsofPervasive2005, The3rdInternationalConference on Pervasive Computing. We were honored to serve as chairs in this conference series, which was founded in 2002 and is now emerging as one of the most respected venues for publication of research on pervasive and ubiquitous c- puting. The conference is attracting research submissions of very high quality from all over the world, and from researchers representing a variety of disciplines and perspectives. We thank everybody who submitted their papers to Pervasive, demonstrating the extensive work going on in this area; and the Program C- mittee and our external reviewers who spent countless hours providing feedback and guidance in order to create the ?nal program. This year we received 130 submissions. By the end of the review process, we had 566 reviews on ?le, as well as long email discussion threads for each paper. In an initial phase we had each paper reviewed by two members of the Program Committee and two external reviewers. In a second phase, each paper wasdiscussedbyitsfourreviewerstoreachconsensusastoitstechnicalmerit. At the end of this phase, the top-rated papers as well as those that were found to be most controversial were selected for discussion at the PC meeting and reviewed by an additional PC member. The result being that each paper discussed in the PC meeting had 5 reviews and was read by three people who participated in the meeting, leading to a very informed and lively discussion

Wired/Wireless Internet Communications - Third International Conference, WWIC 2005, Xanthi, Greece, May 11-13, 2005,... Wired/Wireless Internet Communications - Third International Conference, WWIC 2005, Xanthi, Greece, May 11-13, 2005, Proceedings (Paperback, 2005 ed.)
Torsten Braun, Georg Carle, Yevgeni Koucheryavy, Vassilis Tsaoussidis
R1,543 Discovery Miles 15 430 Ships in 18 - 22 working days

Welcome to the 3rd International Conference on Wired/Wireless Internet C- munications (WWIC). After a successful start in Las Vegas and a selective c- ference in Germany, this year s WWIC demonstrated the event s maturity. The conference was supported by several sponsors, both international and local, and became the o?cial venue for COST Action 290. That said, WWIC has now been established as a top-quality conference to promote research on the convergence of wired and wireless networks. This year we received 117 submissions, which allowed us to organize an - citing program with excellent research results, but required more e?ort from the 54 members of the international Program Committee and the 51 additional reviewers. For each of the 117 submitted papers we asked three independent - viewers to provide their evaluation. Based on an online ballot phase and a TPC meeting organized in Colmar (France), we selected 34 high-quality papers for presentation at the conference. Thus, the acceptance rate for this year was 29%."

Embedded Systems Design - The ARTIST Roadmap for Research and Development (Paperback, 2005 ed.): Bruno Bouyssounouse, Joseph... Embedded Systems Design - The ARTIST Roadmap for Research and Development (Paperback, 2005 ed.)
Bruno Bouyssounouse, Joseph Sifakis
R2,857 Discovery Miles 28 570 Ships in 18 - 22 working days

Embedded systems now include a very large proportion of the advanced products designed in the world, spanning transport (avionics, space, automotive, trains), electrical and electronic appliances (cameras, toys, televisions, home appliances, audio systems, and cellular phones), process control (energy production and distribution, factory automation and optimization), telecommunications (satellites, mobile phones and telecom networks), and security (e-commerce, smart cards), etc. The extensive and increasing use of embedded systems and their integration in everyday products marks a significant evolution in information science and technology. We expect that within a short timeframe embedded systems will be a part of nearly all equipment designed or manufactured in Europe, the USA, and Asia. There is now a strategic shift in emphasis for embedded systems designers: from simply achieving feasibility, to achieving optimality. Optimal design of embedded systems means targeting a given market segment at the lowest cost and delivery time possible. Optimality implies seamless integration with the physical and electronic environment while respecting real-world constraints such as hard deadlines, reliability, availability, robustness, power consumption, and cost. In our view, optimality can only be achieved through the emergence of embedded systems as a discipline in its own right.

Honeypots for Windows (Paperback, 1st ed.): Roger A. Grimes Honeypots for Windows (Paperback, 1st ed.)
Roger A. Grimes
R1,048 R902 Discovery Miles 9 020 Save R146 (14%) Ships in 18 - 22 working days

* Talks about hardening a Windows host before deploying Honeypot * Covers how to create your own emulated services to fool hackers * Discusses physical setup of Honeypot and network necessary to draw hackers to Honeypot * Discusses how to use Snort to co-exist with Honeypot * Discusses how to use a Unix-style Honeypot to mimic a Windows host * Discusses how to fine-tune a Honeypot * Discusses OS fingerprinting, ARP tricks, packet sniffing, and exploit signatures

Security in Pervasive Computing - Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings... Security in Pervasive Computing - Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings (Paperback, 2005 ed.)
Dieter Hutter, Markus Ullmann
R1,470 Discovery Miles 14 700 Ships in 18 - 22 working days

This volume contains the papers presented at the 2nd International Conference on Se- rityinPervasiveComputing(SPC2005)heldApril6-8,2005inBoppard, Germany.The objective of this second conference was to develop new security concepts for complex application scenarios based on systems like handhelds, phones, smartcards, RFID-chips andsmartlabelshandinhandwiththeemergingtechnologyofubiquitousandpervasive computing. In particular the conference focused on methods and technologies conce- ing the identi?cation of risks, the de?nition of security policies, and the development of security and privacy measures, especially cryptographic protocols that are related to speci?c aspects of ubiquitous and pervasive computing like mobility, location-based services, adhocnetworking, resourceallocation/restriction, invisibility, andsecureha- ware/software platforms. We received 48 submissions. Each submission was reviewed by three independent reviewers and an electronic Program Committee meeting was held via the Internet. We are very grateful to the Program Committee members for their ef?ciency in processing the work and also for the quality of their reviews and discussions. Finally the Program Committee decided to accept 14 long papers and 3 short papers. Apart from the Program Committee, we would like to thank also the other persons who contributed to the success of this conference: the additional referees for revi- ing the papers, the authors for submitting the papers, and the local organizers, and in particular Hans-Peter Wagner, for the local organization of the conference in Boppard. SPC 2005 was hosted by the Bundesakademie fur ] of ] fentlicheVerwaltung of the Federal Ministry of the Interior, and was sponsored by the DFKI and BS

Construction and Analysis of Safe, Secure, and Interoperable Smart Devices - Second International Workshop, CASSIS 2005, Nice,... Construction and Analysis of Safe, Secure, and Interoperable Smart Devices - Second International Workshop, CASSIS 2005, Nice, France, March 8-11, 2005, Revised Selected Papers (Paperback, 2006 ed.)
Gilles Barthe, Benjamin Gregoire, Marieke Huisman, Jean-Luis Lanet
R1,438 Discovery Miles 14 380 Ships in 18 - 22 working days

This book constitutes the refereed post-proceedings of the Second International Workshop on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, CASSIS 2005. The 9 revised full papers presented were carefully selected during two rounds of reviewing and improvement from about 30 workshop talks. The papers are organized in topical sections on research trends in smart devices, Web services, virtual machine technology, security, validation and formal methods, proof-carrying code, and embedded devices.

Systems Aspects in Organic and Pervasive Computing - ARCS 2005 - 18th International Conference on Architecture of Computing... Systems Aspects in Organic and Pervasive Computing - ARCS 2005 - 18th International Conference on Architecture of Computing Systems, Innsbruck, Austria, March 14-17, 2005, Proceedings (Paperback, 2005 ed.)
Michael Beigl, Paul Lukowicz
R1,485 Discovery Miles 14 850 Ships in 18 - 22 working days

The keychallengeforfuture computersystemis dealingwithcomplexity.Onone hand this involves internal system complexity which has increased exponentially over recent years. Here the main objectives are to maintain system reliability and to keep the design and maintenance e?ort manageable, while at the same timecontinuingtoprovidenewfunctionalityandincreasingsystemperformance. This hasbeenthe focus ofso-calledautonomouscomputing, whichaimsto bring self-con?guration and repair to a wide range of computing systems. On the other hand future computer systems are more and more becoming integrated into the fabric of everyday life and thus have to deal with the c- plexities of the real world. They will become smaller, more appropriate for their use, integrated into everyday objects, and often virtually or physically invisible to the users.They will alsobe deployedin a muchhigher quantity andpenetrate many moreapplicationareasthan traditional notionsof computer systems.This requirescomputersystemstobeadaptablewithinamuchwiderrangeofpossible tasks, subjected to much harsher conditions. To provide such features and functionality, computer devices will become tinieryetstillincreaseinsystemcomplexity;theymustconsumelesspower, while still supporting advanced computation and communications, such that they are highlyconnectedyetstilloperateasautonomousunits.Pervasiveandubiquitous computing researchaddressessuchissues by developingconcepts and technology for interweaving computers into our everyday life. The principal approach is to enhance system functionality and adaptability by recognizing context and situations in the environment

Digital Watermarking - Third International Workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected... Digital Watermarking - Third International Workshop, IWDW 2004, Seoul, Korea, October 30 - November 1, 2004, Revised Selected Papers (Paperback, 2005 ed.)
Ingemar J. Cox, Ton Kalker, Heung-Kyu Lee
R1,507 Discovery Miles 15 070 Ships in 18 - 22 working days

We are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004. Since its modern reappearance in the academic community in the early 1990s, great progress has been made in understanding both the capabilities and the weaknesses of digital watermarking. On the theoretical side, we all are now well aware of the fact that digital watermarking is best viewed as a form of communication using side information. In the case of digital watermarking the side information in question is the document to be watermarked. This insight has led to a better understanding of the limits of the capacity and robustness of digital watermarking algorithms. It has also led to new and improved watermarking algorithms, both in terms of capacity and imperceptibility. Similarly, the role of human perception, and models thereof, has been greatly enhanced in the study and design of digital watermarking algorithms and systems. On the practical side, applications of watermarking are not yet abundant. The original euphoria on the role of digital watermarking in copy protection and copyright protection has not resulted in widespread use in practical systems. With hindsight, a number of reasons can be given for this lack of practical applications.

Engineering Self-Organising Systems - Third International Workshop, ESOA 2005, Utrecht, The Netherlands, July 25, 2005, Revised... Engineering Self-Organising Systems - Third International Workshop, ESOA 2005, Utrecht, The Netherlands, July 25, 2005, Revised Selected Papers (Paperback, 2006 ed.)
Sven A. Brueckner, Giovanni Di Marzo Serugendo, David Hales
R1,474 Discovery Miles 14 740 Ships in 18 - 22 working days

This book constitutes the refereed post-proceedings of the Third International Workshop on Engineering Self-Organising Applications, ESOA 2005, held in July 2005 as an associated event of AAMAS 2005. The 12 revised full papers and 6 revised short papers presented are organized in topical sections on novel self-organising mechanisms, methodologies, models and tools for self-organising applications, and specific applications of self-organising mechanisms.

Compiler Construction - 15th International Conference, CC 2006, Held as Part of the Joint European Conferences on Theory and... Compiler Construction - 15th International Conference, CC 2006, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2006, Vienna, Austria, March 30-31, 2006, Proceedings (Paperback, 2006 ed.)
Alan Mycroft, Andreas Zeller
R1,492 Discovery Miles 14 920 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 15th International Conference on Compiler Construction, CC 2006, held in March 2006 as part of ETAPS. The 17 revised full papers presented together with three tool demonstration papers and one invited paper were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections.

Python Distilled (Paperback, 5th edition): David Beazley Python Distilled (Paperback, 5th edition)
David Beazley
R1,013 Discovery Miles 10 130 Ships in 10 - 15 working days

Expert insight for modern Python (3.6+) coding from the author of Python Essential Reference Python educator Dave Beazley's concise handbook focuses on the essential core of the Python programming language, with code examples to illuminate how Python works and how to structure programs that can be more easily explained, tested, and debugged. Rather than trying to cover every possible feature and quirk of a 30-year-old language, this pragmatic guide provides a concise narrative related to fundamental programming topics that form the foundation for Python projects of any size including Data abstraction Control flow Program structure Functions: master functions and functional programming idioms Objects: control objects and master the "protocols" that define their behavior Modules: plan for project growth by understanding modules and packages Generators Classes: understand classes from both high-level and technical perspectives I/O handling: proper techniques and abstractions Dicts "This is a pragmatic book that presents some of the most important topics about the Python programming language in a concise form, designed to make it easier to find out the most relevant information bits in a context where resources abound and frequently are just too overwhelming." -Victor Domingos, Software Developer, Slim Business Solutions, The No Title (R) Tech Blog

Topics in Cryptology -- CT-RSA 2006 - The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February... Topics in Cryptology -- CT-RSA 2006 - The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005, Proceedings (Paperback, 2006 ed.)
David Pointcheval
R1,541 Discovery Miles 15 410 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2006, CT-RSA 2006, held in San Jose, CA, USA in February 2006. The book presents 24 papers organized in topical sections on attacks on AES, identification, algebra, integrity, public key encryption, signatures, side-channel attacks, CCA encryption, message authentication, block ciphers, and multi-party computation.

Information Security Practice and Experience - Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006,... Information Security Practice and Experience - Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings (Paperback, 2006 ed.)
Kefei Chen, Robert Deng, Xuejia Lai, Jianying Zhou
R1,555 Discovery Miles 15 550 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Information Security Practice and Experience Conference, ISPEC 2006, held in Hangzhou, China, in April 2006. The 35 revised full papers presented were carefully reviewed and selected from 307 submissions. The papers are organized in topical sections.

Formal Aspects in Security and Trust - Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005,... Formal Aspects in Security and Trust - Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers (Paperback, 2006 ed.)
Theo Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve Schneider
R1,481 Discovery Miles 14 810 Ships in 18 - 22 working days


This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Formal Aspects in Security and Trust, FAST 2005, held in Newcastle upon Tyne, UK in July 2005.

The 17 revised papers presented together with the extended abstract of 1 invited paper were carefully reviewed and selected from 37 submissions. The papers focus on formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and ID issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, GRID security, security risk assessment, and case studies.

Pro DNS and BIND (Paperback, 1st ed.): Ron Aitchison Pro DNS and BIND (Paperback, 1st ed.)
Ron Aitchison
R1,410 R1,188 Discovery Miles 11 880 Save R222 (16%) Ships in 18 - 22 working days

The Domain Name System (DNS) is the system created to map domain names to IP addresses, and is largely responsible for the widespread popularity of the Internet due to the convenience it offers in calling system resources by an easily recognizable name rather than a cryptic number. Given the critical nature of this technology for ensuring smooth operation of Internet-based resources such as Web and mail servers, ita (TM)s imperative that users fully understand key configuration, management and security principles.

Pro DNS and BIND guides readers through the often challenging array of features surrounding DNS with a special focus on the Worlda (TM)s most diffuse DNS implementation, BIND (Berkeley Internet Name Domain). Readers will learn not only about key DNS concepts, but also how to effectively install, configure, deploy and manage BIND in enterprise environments.

Foundation Mac OS X Web Development (Paperback, Softcover reprint of the original 1st ed.): Phil Sherry Foundation Mac OS X Web Development (Paperback, Softcover reprint of the original 1st ed.)
Phil Sherry
R831 R735 Discovery Miles 7 350 Save R96 (12%) Ships in 18 - 22 working days

This book aims to teach all the essentials of developing dynamic Web sites in OS X in a linear style. This book is not for hardcore developers, but rather for those new to the OS or the Mac, and looking for a primer on Web site development. Typical readers are Web development professionals who are exploring development on the Mac for the first time and Mac-loyal designers expanding from print into Web design.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, … Hardcover R1,285 Discovery Miles 12 850
Linux for Hackers - A Comprehensive…
William Vance Hardcover R576 R530 Discovery Miles 5 300
PowerShell - A Comprehensive Guide to…
Sam Griffin Hardcover R566 R520 Discovery Miles 5 200
Microsoft Windows 10 Tips & Tricks
Joan Lambert Fold-out book or chart R229 Discovery Miles 2 290
Android Boot Camp for Developers Using…
Corinne Hoisington Paperback R1,256 R1,170 Discovery Miles 11 700
Essential Windows 10: 1st Anniversary…
Kevin Wilson Paperback R431 R271 Discovery Miles 2 710
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright Paperback R1,491 Discovery Miles 14 910
IBM Mainframe Developer Training and…
Robert Wingate Hardcover R1,674 R1,402 Discovery Miles 14 020
Mike Meyers' CompTIA A+ Guide to 802…
Mike Meyers Paperback R1,201 Discovery Miles 12 010
PowerShell - The Ultimate Beginners…
Mark Reed Hardcover R567 R521 Discovery Miles 5 210

 

Partners