|
|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
 |
Decision and Game Theory for Security
- 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings
(Paperback, 1st ed. 2015)
Arman (MHR) Khouzani, Emmanouil Panaousis, George Theodorakopoulos
|
R2,375
Discovery Miles 23 750
|
Ships in 18 - 22 working days
|
|
|
This book constitutes the refereed proceedings of the 6th
International Conference on Decision and Game Theory for Security,
GameSec 2015, held in London, UK, in November 2015. The 16 revised
full papers presented together with 5 short papers were carefully
reviewed and selected from 37 submissions. Game and decision theory
has emerged as a valuable systematic framework with powerful
analytical tools in dealing with the intricacies involved in making
sound and sensible security decisions. For instance, game theory
provides methodical approaches to account for interdependencies of
security decisions, the role of hidden and asymmetric information,
the perception of risks and costs in human behaviour, the
incentives/limitations of the attackers, and much more. Combined
with our classical approach to computer and network security, and
drawing from various fields such as economic, social and
behavioural sciences, game and decision theory is playing a
fundamental role in the development of the pillars of the "science
of security".
 |
Cloud Computing and Security
- Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I
(Paperback, 1st ed. 2016)
Xingming Sun, Alex Liu, Han-Chieh Chao, Elisa Bertino
|
R2,714
Discovery Miles 27 140
|
Ships in 18 - 22 working days
|
|
|
This two volume set LNCS 10039 and LNCS 10040 constitutes the
thoroughly refereed post-conference proceedings of the Second
International Conference on Cloud Computing and Security, ICCCS
2016, held in Nanjing, China, during July 29-31, 2016. The 97
papers of these volumes were carefully reviewed and selected from
272 submissions. The papers are organized in topical sections such
as: Information Hiding, Cloud Computing, Cloud Security, IOT
Applications, Multimedia Applications, Multimedia Security and
Forensics.
 |
Cloud Computing and Security
- Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part II
(Paperback, 1st ed. 2016)
Xingming Sun, Alex Liu, Han-Chieh Chao, Elisa Bertino
|
R3,095
Discovery Miles 30 950
|
Ships in 18 - 22 working days
|
|
|
This two volume set LNCS 10039 and 10040 constitutes the refereed
post-conference proceedings of the Second International Conference
on Cloud Computing and Security, ICCCS 2016, held in Nanjing,
China, during July 29-31, 2016. The 97 papers of these volumes were
carefully reviewed and selected from 272 submissions. The papers
are organized in topical sections such as: Information Hiding,
Cloud Computing, Cloud Security, IOT Applications, Multimedia
Applications, Multimedia Security and Forensics.
 |
Future Data and Security Engineering
- Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings
(Paperback, 1st ed. 2016)
Tran Khanh Dang, Roland Wagner, Josef Kung, Nam Thoai, Makoto Takizawa, …
|
R2,534
Discovery Miles 25 340
|
Ships in 18 - 22 working days
|
|
|
This book constitutes the refereed proceedings of the Third
International Conference on Future Data and Security Engineering,
FDSE 2016, held in Can Tho City, Vietnam, in November 2016. The 27
revised full papers and 2 short papers presented were carefully
reviewed and selected from 115 submissions. They have been
organized in the following topical sections: Big Data Analytics and
Cloud Data Management; Internet of Things and Applications;
Security and Privacy Engineering; Data Protection and Data Hiding;
Advances in Authentication and Data Access Control; Access Control
in NoSQL and Big Data; Context-based Data Analysis and
Applications; Emerging Data Management Systems and Applications.
This book constitutes the refereed proceedings of the 10th
International Conference on Provable Security, ProvSec 2016, held
in Nanjing, China, in November 2016. The 17 full papers and 6 short
papers presented were carefully reviewed and selected from 79
submissions. The papers are grouped in topical sections on
attribute/role-based cryptography, data in cloud, searchable
encryption, key management, encryption, leakage analysis,
homomorphic encryption.
The two-volume set LNCS 10031 and LNCS 10032 constitutes the
refereed proceedings of the 22nd International Conference on the
Theory and Applications of Cryptology and Information Security,
ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67
revised full papers and 2 invited talks presented were carefully
selected from 240 submissions. They are organized in topical
sections on Mathematical Analysis; AES and White-Box; Hash
Function; Randomness; Authenticated Encryption; Block Cipher; SCA
and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography;
Provable Security; Digital Signature; Functional and Homomorphic
Cryptography; ABE and IBE; Foundation; Cryptographic Protocol;
Multi-Party Computation.
 |
Decision and Game Theory for Security
- 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings
(Paperback, 1st ed. 2016)
Quanyan Zhu, Tansu Alpcan, Emmanouil Panaousis, Milind Tambe, William Casey
|
R2,661
Discovery Miles 26 610
|
Ships in 18 - 22 working days
|
|
|
This book constitutes the refereed proceedings of the 7th
International Conference on Decision and Game Theory for Security,
GameSec 2016, held in New York, NY, USA, in November 2016. The 18
revised full papers presented together with 8 short papers and 5
poster papers were carefully reviewed and selected from 40
submissions. The papers are organized in topical sections on
network security; security risks and investments; special
track-validating models; decision making for privacy; security
games; incentives and cybersecurity mechanisms; and intrusion
detection and information limitations in security.
Rely on this practical, comprehensive guide to significantly
improve your cyber safety and data privacy. This book was written
expressly for regular, everyday people -- though even technically
savvy readers will find many useful tips here. This book contains
everything you need to protect yourself-step by step, without
judgment, and with as little jargon as possible. Protecting your
digital domain is much like defending a medieval castle. Wide
moats, towering walls and trained guards provide defense in depth,
safeguarding the people and property within against the most common
threats. But attempting to dragon-proof your castle would be
counterproductive and costly. The goal of this book is to keep your
devices and data safe from the most likely and impactful hazards -
not a targeted attack by the NSA. Like wearing seat belts and
sunscreen in the real world, there are dozens of simple, effective
precautions we need to take in the virtual world. Author Carey
Parker has structured this book to give you maximum benefit with
minimum effort. If you just want to know what you need to do, each
chapter includes a detailed checklist of expert tips. But the book
also explains why you need to do these things, using entertaining
analogies and straightforward explanations. This revised and
expanded fifth edition includes: Updated for Windows 11, macOS 13
(Ventura), iOS 16 and Android 13. Updated recommendations for most
secure and private products. Over 200 tips with complete
step-by-step instructions and screenshots. What You Will Learn
Maximize your computer and smartphone security. Minimize your
vulnerabilities and data footprint. Solve your password problems
and use two-factor authentication. Browse the web safely and
confidently with a secure, private browser. Shop and bank online
with maximum security and peace of mind. Defend against identity
theft, ransomware and online scams. Safeguard your children online,
at home and in school. Block online tracking, data mining and
malicious online ads. Send files and messages with end-to-end
encryption. Secure your home network and keep your smart devices
from spying on you. Create automated backups of all your devices.
Learn how to deal with account hacks, data. breaches and viruses.
Understand how computers, the internet, VPNs and encryption really
work And much more!
In this contributed volume, leading international researchers
explore configuration modeling and checking, vulnerability and risk
assessment, configuration analysis, and diagnostics and discovery.
The authors equip readers to understand automated security
management systems and techniques that increase overall network
assurability and usability. These constantly changing networks
defend against cyber attacks by integrating hundreds of security
devices such as firewalls, IPSec gateways, IDS/IPS, authentication
servers, authorization/RBAC servers, and crypto systems. Automated
Security Management presents a number of topics in the area of
configuration automation. Early in the book, the chapter authors
introduce modeling and validation of configurations based on
high-level requirements and discuss how to manage the security risk
as a result of configuration settings of network systems. Later
chapters delve into the concept of configuration analysis and why
it is important in ensuring the security and functionality of a
properly configured system. The book concludes with ways to
identify problems when things go wrong and more. A wide range of
theoretical and practical content make this volume valuable for
researchers and professionals who work with network systems.
This book constitutes the thoroughly refereed post-conference
proceedings of the 6th International Workshop, COSADE 2015, held in
Berlin, Germany, in April 2015. The 17 revised full papers
presented were carefully selected from 48 submissions. the focus of
this workshop was on following topics: side-channel attacks, FPGA
countermeasures, timing attacks and countermeasures, fault attacks,
countermeasures, and Hands-on Side-channel analysis.
 |
Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security
- 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings
(Paperback, 1st ed. 2015)
Hamid Jahankhani, Alex Carlile, Babak Akhgar, Amie Taal, Ali G. Hessami, …
|
R2,354
Discovery Miles 23 540
|
Ships in 18 - 22 working days
|
|
|
This book constitutes the refereed proceedings of the 10th
International Conference on Global Security, Safety and
Sustainability, ICGS3 2015, held in London, UK, in September 2015.
The 31 revised full papers presented were carefully reviewed and
selected from 57 submissions. The papers focus on the challenges of
complexity, rapid pace of change and risk/opportunity issues
associated with the 21st century living style, systems and
infrastructures.
This book constitutes revised selected papers from the First
International Conference on Cryptography and Information Security
in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in
October 2014. The 15 papers presented in this volume were carefully
reviewed and selected from 36 submissions. They were organized in
topical sections named: symmetric cryptography, cryptographic
hardware, cryptographic protocols and public key cryptography. The
book also contains one invited talk in full paper length.
 |
Trustworthy Computing and Services
- International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected papers
(Paperback, 2015 ed.)
Lu Yueming, Wu Xu, Zhang XI
|
R2,491
Discovery Miles 24 910
|
Ships in 18 - 22 working days
|
|
|
This book constitutes the refereed proceedings of the International
Standard Conference on Trustworthy Computing and Services, ISCTCS
2014, held in Beijing, China, in November 2014. The 51 revised full
papers presented were carefully reviewed and selected from 279
submissions. The topics covered are architecture for trusted
computing systems; trusted computing platform; trusted system
building; network and protocol security; mobile network security;
network survivability, other critical theories and standard
systems; credible assessment; credible measurement and metrics;
trusted systems; trusted networks; trusted mobile networks; trusted
routing; trusted software; trusted operating systems; trusted
storage; fault-tolerant computing and other key technologies;
trusted e-commerce and e-government; trusted logistics; trusted
internet of things; trusted cloud and other trusted services and
applications.
How we lost control of the internet-and how to win it back. The
internet has become a battleground. Although it was unlikely to
live up to the hype and hopes of the 1990s, only the most skeptical
cynics could have predicted the World Wide Web as we know it today:
commercial, isolating, and full of, even fueled by, bias. This was
not inevitable. The Gentrification of the Internet argues that much
like our cities, the internet has become gentrified, dominated by
the interests of business and capital rather than the interests of
the people who use it. Jessa Lingel uses the politics and debates
of gentrification to diagnose the massive, systemic problems
blighting our contemporary internet: erosions of privacy and
individual ownership, small businesses wiped out by wealthy
corporations, the ubiquitous paywall. But there are still steps we
can take to reclaim the heady possibilities of the early internet.
Lingel outlines actions that internet activists and everyday users
can take to defend and secure more protections for the individual
and to carve out more spaces of freedom for the people-not
businesses-online.
New technology is always evolving and companies must have
appropriate security for their business to be able to keep
up-to-date with the changes. With the rapid growth in internet and
www facilities, database security will always be a key topic in
business and in the public sector and has implications for the
whole of society. Database Security Volume XII covers issues
related to security and privacy of information in a wide range of
applications, including: * Electronic Commerce * Informational
Assurances * Workflow * Privacy * Policy Modeling * Mediation *
Information Warfare Defense * Multilevel Security * Role-based
Access Controls * Mobile Databases * Inference * Data Warehouses
and Data Mining. This book contains papers and panel discussions
from the Twelfth Annual Working Conference on Database Security,
organized by the International Federation for Information
Processing (IFIP) and held July 15-17, 1998 in Chalkidiki, Greece.
Database Security Volume XII will prove invaluable reading for
faculty and advanced students as well as for industrial researchers
and practitioners working in the area of database security research
and development.
Most of the devices in the Internet of Things will be battery
powered sensor devices. All the operations done on battery powered
devices require minimum computation. Secure algorithms like RSA
become useless in the Internet of Things environment. Elliptic
curve based cryptography emerges as a best solution for this
problem because it provides higher security in smaller key size
compare to RSA. This book focuses on the use of Elliptic Curve
Cryptography with different authentication architectures and
authentication schemes using various security algorithms. It also
includes a review of the math required for security and
understanding Elliptic Curve Cryptography.
The Blackstone's Guide Series delivers concise and accessible books
covering the latest legislation changes and amendments. Published
within weeks of an Act, they offer expert commentary by leading
names on the effects, extent and scope of the legislation, plus a
full copy of the Act itself. They offer a cost-effective solution
to key information needs and are the perfect companion for any
practitioner needing to get up to speed with the latest changes.
The Identity Cards Act 2006 is a major piece of legislation which
will fundamentally change the relationship between the state and
the individual for people of all nationalities residing in the UK
for more than three months. The Act will affect the operation of
much existing legislation, including; the Data Protection Act 1998;
the Police and Criminal Evidence Act 1984; the Regulation of
Investigatory Powers Act 2000; the Race Relations Act 1976; the
Immigration and Asylum Act 1999, and the Asylum and Immigration
(Treatment of Claimants) Act 2004. The Act will have an impact on a
wide range of legal areas, including; asylum and immigration; data
protection and freedom of information; privacy; criminal; human
rights; and civil liberties; and will introduce the following; - A
complex range of new civil and criminal penalties - a new
Commissioner's Office - New ways of working for those providing
public services, such as the police, the NHS, the Passport Service,
and benefit workers This Guide is written by two experienced
practitioners currently based at Liberty, the National Council for
Civil Liberties. Structured in a clear and logical way following
the parts of the Act, it provides an up-to-date and informative
guide, making it an essential purchase for practitioners and
organisations working in a number of legal areas.
|
You may like...
Underworld
Fanie Viljoen
Paperback
R295
R277
Discovery Miles 2 770
|