0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (2)
  • R500+ (316)
  • -
Status
Format
Author / Contributor
Publisher

Books > Professional & Technical > Civil engineering, surveying & building > Building construction & materials > Security & fire alarm systems

Ten Laws for Security (Paperback, Softcover reprint of the original 1st ed. 2016): Eric Diehl Ten Laws for Security (Paperback, Softcover reprint of the original 1st ed. 2016)
Eric Diehl
R2,342 Discovery Miles 23 420 Ships in 10 - 15 working days

In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. The informal style draws on his experience in the area of video protection and DRM, while the text is supplemented with introductions to the core formal technical ideas. It will be of interest to professionals and researchers engaged with information security.

The Global Cyber-Vulnerability Report (Paperback, Softcover reprint of the original 1st ed. 2015): V.S. Subrahmanian, Michael... The Global Cyber-Vulnerability Report (Paperback, Softcover reprint of the original 1st ed. 2015)
V.S. Subrahmanian, Michael Ovelgonne, Tudor Dumitras, Aditya Prakash
R2,877 Discovery Miles 28 770 Ships in 10 - 15 working days

This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general. The Global Cyber-Vulnerability Report targets researchers and professionals including government and military workers, policy-makers and law-makers working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference.

Cross-Cultural Dialogue as a Conflict Management Strategy (Paperback, Softcover reprint of the original 1st ed. 2018): J.... Cross-Cultural Dialogue as a Conflict Management Strategy (Paperback, Softcover reprint of the original 1st ed. 2018)
J. Martin Ramirez, Gracia Abad-Quintanal
R3,341 Discovery Miles 33 410 Ships in 10 - 15 working days

This book contributes to the current knowledge and research on conflict and cross-cultural dialogue, emphasizing how respect, tolerance and dialogue may be quite effective tools for bridging the diverse cultures and, consequently, for solving many of the conflicts of today's world, characterized by a dynamic interchange of populations with very diverse cultural and ethnic backgrounds. For this purpose, we rely on reputed scholars from ten different countries, and from different cultures and fields of expertise, which allows for diverse contributions from a valuable interdisciplinary perspective. The first section of the book deals with the correlation between cultural differences and conflict, while also showing how such conflicts can be prevented and, should they arise, managed and solved. The second section addresses a different, more specific issue: how cultural expression means and tools for cultural communication may lead to conflict whereas they may help to avoid it as well. Finally, the third section analyzes how legal and justice systems deal with cross-cultural conflicts as well as with situations which may lead to cross-cultural conflicts, thus assessing to which extent such systems contribute to avoid and/or solve such kind of conflicts.

Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference - Science as the first countermeasure for CBRNE and... Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference - Science as the first countermeasure for CBRNE and Cyber threats (Paperback, Softcover reprint of the original 1st ed. 2018)
Andrea Malizia, Marco D'Arienzo
R2,925 Discovery Miles 29 250 Ships in 10 - 15 working days

This book presents the proceedings of SICC 2017, a conference devoted to promoting the dissemination of the different methodologies, techniques, theories, strategies, technologies and best practices on the prevention and mitigation of CBRNE risks. As the first scientific international conference on safety & security issues in the CBRNE field, SICC 2017 attracted contributions resulting from fruitful inter-professional collaborations between university and military experts, specialized operators, decision makers and the industry. As such, these proceedings are primarily intended for academics and professionals from public, private and military entities. It is the first trans-disciplinary collection of scientific papers from the numerous fields related to CBRNE.

Concrete Structures Under Projectile Impact (Paperback, Softcover reprint of the original 1st ed. 2017): Qin Fang, Hao Wu Concrete Structures Under Projectile Impact (Paperback, Softcover reprint of the original 1st ed. 2017)
Qin Fang, Hao Wu
R7,236 Discovery Miles 72 360 Ships in 10 - 15 working days

In this book, the authors present their theoretical, experimental and numerical investigations into concrete structures subjected to projectile and aircraft impacts in recent years. Innovative approaches to analyze the rigid, mass abrasive and eroding projectile penetration and perforation are proposed. Damage and failure analyses of nuclear power plant containments impacted by large commercial aircrafts are numerically and experimentally analyzed. Ultra-high performance concrete materials and structures against the projectile impact are developed and their capacities of resisting projectile impact are evaluated. This book is written for the researchers, engineers and graduate students in the fields of protective structures and terminal ballistics.

Practical Lock Picking - A Physical Penetration Tester's Training Guide (Paperback, 2nd edition): Deviant Ollam Practical Lock Picking - A Physical Penetration Tester's Training Guide (Paperback, 2nd edition)
Deviant Ollam
R1,277 R923 Discovery Miles 9 230 Save R354 (28%) Ships in 12 - 19 working days

Practical Lock Picking, Second Edition, is an instructional manual that covers everything from straightforward lockpicking to quick-entry techniques such as shimming, bumping, and bypassing. Written by Deviant Ollam, one of the security industry's best-known lockpicking teachers, and winner of the Best Book Bejtlich Read in 2010 award, this book contains detailed photos that make learning as easy as picking a lock. Material is offered in easy-to-follow lessons that allow even beginners to acquire the knowledge very quickly. Whether the student will be hired at some point to penetrate security or simply trying to harden his or her own defenses, this book is essential. This edition has been updated to reflect the changing landscape of tools and tactics which have emerged in recent years. It consists of 6 chapters that discuss topics such as the fundamentals of pin tumbler and wafer locks; the basics of picking, with emphasis on how to exploit weaknesses; tips for beginners on how to get very good and very fast in picking locks; advanced training; quick-entry tricks about shimming, bumping, and bypassing; and pin tumblers in other configurations. This book is geared specifically toward penetration testers, security consultants, IT security professionals, and hackers.

Mobile and Wireless Technology 2015 (Paperback, Softcover reprint of the original 1st ed. 2015): Kuinam J. Kim, Naruemon... Mobile and Wireless Technology 2015 (Paperback, Softcover reprint of the original 1st ed. 2015)
Kuinam J. Kim, Naruemon Wattanapongsakorn
R4,348 Discovery Miles 43 480 Ships in 10 - 15 working days

This book provides a snapshot of the current state-of-the-art in the fields of mobile and wireless technology, security and applications.  The proceedings of the 2nd International Conference on Mobile and Wireless Technology (ICMWT2015), it represents the outcome of a unique platform for researchers and practitioners from academia and industry to share cutting-edge developments in the field of mobile and wireless science technology, including those working on data management and mobile security. The contributions presented here describe the latest academic and industrial research from the international mobile and wireless community.  The scope covers four major topical areas: mobile and wireless networks and applications; security in mobile and wireless technology; mobile data management and applications; and mobile software.  The book will be a valuable reference for current researchers in academia and industry, and a useful resource for graduate-level students working on mobile and wireless technology.

Battlefield Acoustics (Paperback, Softcover reprint of the original 1st ed. 2015): Thyagaraju Damarla Battlefield Acoustics (Paperback, Softcover reprint of the original 1st ed. 2015)
Thyagaraju Damarla
R3,379 Discovery Miles 33 790 Ships in 10 - 15 working days

This book presents all aspects of situational awareness using acoustic signals. It starts by presenting the science behind understanding and interpretation of sound signals. The book then goes on to provide various signal processing techniques used in acoustics to find the direction of sound source, localize gunfire, track vehicles and detect people. The necessary mathematical background and various classification and fusion techniques are presented. The book contains majority of the things one would need to process acoustic signals for all aspects of situational awareness in one location. The book also presents array theory, which is pivotal in finding the direction of arrival of acoustic signals. In addition, the book presents techniques to fuse the information from multiple homogeneous/heterogeneous sensors for better detection. MATLAB code is provided for majority of the real application, which is a valuable resource in not only understanding the theory but readers can also use the code as a spring-board to develop their own application based software code.

Railway Infrastructure Security (Paperback, Softcover reprint of the original 1st ed. 2015): Roberto Setola, Antonio Sforza,... Railway Infrastructure Security (Paperback, Softcover reprint of the original 1st ed. 2015)
Roberto Setola, Antonio Sforza, Valeria Vittorini, Concetta Pragliola
R3,579 Discovery Miles 35 790 Ships in 10 - 15 working days

This comprehensive monograph addresses crucial issues in the protection of railway systems, with the objective of enhancing the understanding of railway infrastructure security. Based on analyses by academics, technology providers and railway operators, it explains how to assess terrorist and criminal threats, design countermeasures, and implement effective security strategies. In so doing, it draws upon a range of experiences from different countries in Europe and beyond. The book is the first to be devoted entirely to this subject. It will serve as a timely reminder of the attractiveness of the railway infrastructure system as a target for criminals and terrorists and, more importantly, as a valuable resource for stakeholders and professionals in the railway security field aiming to develop effective security based on a mix of methodological, technological and organizational tools. Besides researchers and decision makers in the field, the book will appeal to students interested in critical infrastructure protection.

Security Issues in Mobile NFC Devices (Paperback, Softcover reprint of the original 1st ed. 2015): Michael Roland Security Issues in Mobile NFC Devices (Paperback, Softcover reprint of the original 1st ed. 2015)
Michael Roland
R3,653 Discovery Miles 36 530 Ships in 10 - 15 working days

This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with NFC tags and on card emulation. The current security architectures of NFC-enabled cellular phones are evaluated with regard to the identified security aspects.

Cybercrime, Digital Forensics and Jurisdiction (Paperback, Softcover reprint of the original 1st ed. 2015): Mohamed Chawki,... Cybercrime, Digital Forensics and Jurisdiction (Paperback, Softcover reprint of the original 1st ed. 2015)
Mohamed Chawki, Ashraf Darwish, Mohammad Ayoub Khan, Sapna Tyagi
R3,784 Discovery Miles 37 840 Ships in 10 - 15 working days

The purpose of law is to prevent the society from harm by declaring what conduct is criminal, and prescribing the punishment to be imposed for such conduct. The pervasiveness of the internet and its anonymous nature make cyberspace a lawless frontier where anarchy prevails. Historically, economic value has been assigned to visible and tangible assets. With the increasing appreciation that intangible data disseminated through an intangible medium can possess economic value, cybercrime is also being recognized as an economic asset. The Cybercrime, Digital Forensics and Jurisdiction disseminate knowledge for everyone involved with understanding and preventing cybercrime - business entities, private citizens, and government agencies. The book is firmly rooted in the law demonstrating that a viable strategy to confront cybercrime must be international in scope.

Disaster Management: Enabling Resilience (Paperback, Softcover reprint of the original 1st ed. 2015): Anthony Masys Disaster Management: Enabling Resilience (Paperback, Softcover reprint of the original 1st ed. 2015)
Anthony Masys
R5,564 Discovery Miles 55 640 Ships in 10 - 15 working days

The present work will discuss relevant theoretical frameworks and applications pertaining to enabling resilience within the risk, crisis and disaster management domain. The contributions to this book focus on resilience thinking along 4 broad themes: Urban Domain; Cyber Domain; Organizational/Social domain; and Socio-ecological domain. This book would serve as a valuable reference for courses on risk, crisis and disaster management, international development, social innovation and resilience. This will be of particular interest to those working in the risk, crisis and disaster management domain as it will provide valuable insights into enabling resilience. This book will be well positioned to inform disaster management professionals, policy makers and academics on strategies and perspectives regarding disaster resilience.

Physics of Societal Issues - Calculations on National Security, Environment, and Energy (Paperback, Softcover reprint of the... Physics of Societal Issues - Calculations on National Security, Environment, and Energy (Paperback, Softcover reprint of the original 2nd ed. 2014)
David Hafemeister
R1,706 Discovery Miles 17 060 Ships in 10 - 15 working days

This book provides the reader with essential tools needed to analyze complex societal issues and demonstrates the transition from physics to modern-day laws and treaties. This second edition features new equation-oriented material and extensive data sets drawing upon current information from experts in their fields. Problems to challenge the reader and extend discussion are presented on three timely issues: * National Security: Weapons, Offense, Defense, Verification, Nuclear Proliferation, Terrorism * Environment: Air/Water, Nuclear, Climate Change, EM Fields/Epidemiology * Energy: Current Energy Situation, Buildings, Solar Buildings, Renewable Energy, Enhanced End-Use Efficiency, Transportation, Economics Praise for the first edition: "This insight is needed in Congress and the Executive Branch. Hafemeister, a former Congressional fellow with wide Washington experience, has written a book for physicists, chemists and engineers who want to learn science and policy on weapons, energy, and the environment. Scientists who want to make a difference will want this book." Richard Scribner, first Director, Congressional Science and Engineering Fellow Program, AAAS "Hafemeister shows how much one can understand about nuclear weapons and missile issues through simple back-of-the-envelope calculations. He also provides compact explanations of the partially successful attempts that have been made over the past 60 years to control these weapons of mass destruction. Hopefully, Physics of Societal Issues will help interest a new generation of physicists in continuing this work." Frank von Hippel, Professor, Princeton, former Assistant Director, National Security, White House, OSTP "Energy policy must be quantitative. People who don't calculate economic tradeoffs often champion simplistic hardware. 'The solution is more... nuclear power, or electric cars, or photovoltaics, etc.' Some simple physics will show that the true solution matches supply and demand as an 'integrated resource plan.' Physics of Societal Issues is a good place to begin this journey." Arthur Rosenfeld, former California Energy Commissioner, Professor-emeritus, U. of California-Berkeley

Ear Biometrics in 2D and 3D - Localization and Recognition (Paperback, Softcover reprint of the original 1st ed. 2015): Surya... Ear Biometrics in 2D and 3D - Localization and Recognition (Paperback, Softcover reprint of the original 1st ed. 2015)
Surya Prakash, Phalguni Gupta
R3,200 Discovery Miles 32 000 Ships in 10 - 15 working days

This book presents the state-of-the-art techniques and recent research progress on Ear Biometrics. Among the various physiological traits, the reasons for the ear to gain much attention in recent years are many folds. It has been found to be a reliable biometrics for human verification and identification. Ears are remarkably consistent and unlike face, it does not change shape with different expressions or age, and remain fixed in the middle of the side of the head against a predictable background. The book contains figures, tables and plots to illustrate the techniques in an easy and lucid manner. The book also provides an extensive literature on the subject, where readers have the benefit of receiving all the relevant material at one place in a very comprehensive manner. This book caters students, academics, researchers, practitioners who are interested in the field of Ear Biometrics and its applications in face recognition and security.

Fundamentals of Speaker Recognition (Paperback, Softcover reprint of the original 1st ed. 2011): Homayoon Beigi Fundamentals of Speaker Recognition (Paperback, Softcover reprint of the original 1st ed. 2011)
Homayoon Beigi
R3,081 Discovery Miles 30 810 Ships in 10 - 15 working days

An emerging technology, Speaker Recognition is becoming well-known for providing voice authentication over the telephone for helpdesks, call centres and other enterprise businesses for business process automation. "Fundamentals of Speaker Recognition" introduces Speaker Identification, Speaker Verification, Speaker (Audio Event) Classification, Speaker Detection, Speaker Tracking and more. The technical problems are rigorously defined, and a complete picture is made of the relevance of the discussed algorithms and their usage in building a comprehensive Speaker Recognition System. Designed as a textbook with examples and exercises at the end of each chapter, "Fundamentals of Speaker Recognition" is suitable for advanced-level students in computer science and engineering, concentrating on biometrics, speech recognition, pattern recognition, signal processing and, specifically, speaker recognition. It is also a valuable reference for developers of commercial technology and for speech scientists. Please click on the link under "Additional Information" to view supplemental information including the Table of Contents and Index.

Physically Unclonable Functions - Constructions, Properties and Applications (Paperback, Softcover reprint of the original 1st... Physically Unclonable Functions - Constructions, Properties and Applications (Paperback, Softcover reprint of the original 1st ed. 2013)
Roel Maes
R2,078 Discovery Miles 20 780 Ships in 10 - 15 working days

Physically unclonable functions (PUFs) are innovative physical security primitives that produce unclonable and inherent instance-specific measurements of physical objects; in many ways they are the inanimate equivalent of biometrics for human beings. Since they are able to securely generate and store secrets, they allow us to bootstrap the physical implementation of an information security system. In this book the author discusses PUFs in all their facets: the multitude of their physical constructions, the algorithmic and physical properties which describe them, and the techniques required to deploy them in security applications. The author first presents an extensive overview and classification of PUF constructions, with a focus on so-called intrinsic PUFs. He identifies subclasses, implementation properties, and design techniques used to amplify submicroscopic physical distinctions into observable digital response vectors. He lists the useful qualities attributed to PUFs and captures them in descriptive definitions, identifying the truly PUF-defining properties in the process, and he also presents the details of a formal framework for deploying PUFs and similar physical primitives in cryptographic reductions. The author then describes a silicon test platform carrying different intrinsic PUF structures which was used to objectively compare their reliability, uniqueness, and unpredictability based on experimental data. In the final chapters, the author explains techniques for PUF-based entity identification, entity authentication, and secure key generation. He proposes practical schemes that implement these techniques, and derives and calculates measures for assessing different PUF constructions in these applications based on the quality of their response statistics. Finally, he presents a fully functional prototype implementation of a PUF-based cryptographic key generator, demonstrating the full benefit of using PUFs and the efficiency of the processing techniques described. This is a suitable introduction and reference for security researchers and engineers, and graduate students in information security and cryptography.

International Cooperation for Enhancing Nuclear Safety, Security, Safeguards and Non-proliferation - Proceedings of the XIX... International Cooperation for Enhancing Nuclear Safety, Security, Safeguards and Non-proliferation - Proceedings of the XIX Edoardo Amaldi Conference, Accademia Nazionale dei Lincei, Rome, Italy, March 30-31, 2015 (Paperback, Softcover reprint of the original 1st ed. 2016)
Luciano Maiani, Said Abousahl, Wolfango Plastino
R3,258 Discovery Miles 32 580 Ships in 10 - 15 working days

This book, comprising contributions presented at the XIX Edoardo Amaldi Conference, examines important aspects of international cooperation aimed at enhancing nuclear safety, security, safeguards (the "3S"), and non-proliferation, thereby assisting in the development and maintenance of the verification regime and progress toward a nuclear weapon-free world. The Conference served as a forum where eminent scientists, diplomats, and policymakers could compare national perspectives and update international collaborations. The book opens by addressing the political, institutional, and legal dimensions of the 3S and non-proliferation; current challenges are discussed and attempts made to identify possible solutions and future improvements. Subsequent sections consider scientific developments that can contribute to increased effectiveness in the implementation of international regimes, particularly in critical areas, technology foresight, and the ongoing evaluation of current capabilities. The closing sections discuss scientific and technical challenges to the effective implementation of the 3S approach and the role of international cooperation and scientific community actions in leading the world toward peace and security.

The Risks of Nuclear Energy Technology - Safety Concepts of Light Water Reactors (Paperback, Softcover reprint of the original... The Risks of Nuclear Energy Technology - Safety Concepts of Light Water Reactors (Paperback, Softcover reprint of the original 1st ed. 2014)
Gunter Kessler, Anke Veser, Franz-Hermann Schluter, Wolfgang Raskob, Claudia Landman, …
R4,158 Discovery Miles 41 580 Ships in 10 - 15 working days

The book analyses the risks of nuclear power stations. The security concept of reactors is explained. Measures against the spread of radioactivity after a severe accident, accidents of core melting and a possible crash of an air plane on reactor containment are discussed. The book covers three scientific subjects of the safety concepts of Light Water Reactors: - A first part describes the basic safety design concepts of operating German Pressurized Water Reactors and Boiling Water Reactors including accident management measures introduced after the reactor accidents of Three Mile Island and Chernobyl. These safety concepts are also compared with the experiences of the Fukushima accidents. In addition, the safety design concepts of the future modern European Pressurized Water Reactor (EPR) and of the future modern Boiling Water Reactor SWR-1000 (KERENA) are presented. These are based on new safety research results of the past decades. - In a second, part the possible crash of military or heavy commercial air planes on reactor containment is analyzed. It is shown that reactor containments can be designed to resist to such an airplane crash. - In a third part, an online decision system is presented. It allows to analyze the distribution of radioactivity in the atmosphere and to the environment after a severe reactor accident. It provides data for decisions to be taken by authorities for the minimization of radiobiological effects to the population. This book appeals to readers who have an interest in save living conditions and some understanding for physics or engineering.

Design of Low Power and Low Area Passive Sigma Delta Modulators for Audio Applications (Paperback, 1st ed. 2017): David Fouto,... Design of Low Power and Low Area Passive Sigma Delta Modulators for Audio Applications (Paperback, 1st ed. 2017)
David Fouto, Nuno Paulino
R1,722 Discovery Miles 17 220 Ships in 10 - 15 working days

This book presents the study, design, modulation, optimization and implementation of low power, passive DT- Ms for use in audio applications. The high gain and bandwidth amplifier normally used for integration in modulation, is replaced by passive, switched-capacitor branches working under the Ultra Incomplete Settling (UIS) condition, leading to a reduction of the consumed power. The authors describe a design process that uses high level models and an optimization process based in genetic algorithms to achieve the desired performance.

Networks and Network Analysis for Defence and Security (Paperback, Softcover reprint of the original 1st ed. 2014): Anthony J.... Networks and Network Analysis for Defence and Security (Paperback, Softcover reprint of the original 1st ed. 2014)
Anthony J. Masys
R3,706 Discovery Miles 37 060 Ships in 10 - 15 working days

Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic and cyber domains. Threats to national security, such as that against critical infrastructures not only stem from man-made acts but also from natural hazards. Katrina (2005), Fukushima (2011) and Hurricane Sandy (2012) are examples highlighting the vulnerability of critical infrastructures to natural hazards and the crippling effect they have on the social and economic well-being of a community and a nation. With this dynamic and complex threat landscape, network analysis has emerged as a key enabler in supporting defence and security. With the advent of ‘big data’ and increasing processing power, network analysis can reveal insights with regards to structural and dynamic properties thereby facilitating greater understanding of complex networks, their entities, interdependencies, vulnerabilities to produce insights for creative solutions. This book will be well positioned to inform defence, security and intelligence professionals and researchers with regards to leading methodologies and approaches.

Forensic GIS - The Role of Geospatial Technologies for Investigating Crime and Providing Evidence (Paperback, Softcover reprint... Forensic GIS - The Role of Geospatial Technologies for Investigating Crime and Providing Evidence (Paperback, Softcover reprint of the original 1st ed. 2014)
Gregory A. Elmes, George Roedl, Jamison Conley
R5,215 Discovery Miles 52 150 Ships in 10 - 15 working days

A variety of disciplines and professions have embraced geospatial technologies for collecting, storing, manipulating, analyzing and displaying spatial data to investigate crime, prosecute and convict offenders, exonerate suspects and submit evidence in civil lawsuits. The applications, acceptability and relevance and procedural legality of each geospatial technologies vary. The purpose of this book is to explain the nature of geospatial technologies, demonstrate a variety of geospatial applications used to investigate and litigate civil and criminal activities and to provide a reference of current acceptability of geospatial technology in the production of evidence. This book is an introductory overview designed to appeal to researchers and practitioners across disciplinary boundaries. The authors of this book are researchers and practitioners across disciplines and professions, experts in the field.

Cryptography Made Simple (Paperback, Softcover reprint of the original 1st ed. 2016): Nigel Smart Cryptography Made Simple (Paperback, Softcover reprint of the original 1st ed. 2016)
Nigel Smart
R3,246 Discovery Miles 32 460 Ships in 10 - 15 working days

In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by "secure" is as important as creating something that achieves that goal, and security definitions are central to the discussion throughout. The author balances a largely non-rigorous style - many proofs are sketched only - with appropriate formality and depth. For example, he uses the terminology of groups and finite fields so that the reader can understand both the latest academic research and "real-world" documents such as application programming interface descriptions and cryptographic standards. The text employs colour to distinguish between public and private information, and all chapters include summaries and suggestions for further reading. This is a suitable textbook for advanced undergraduate and graduate students in computer science, mathematics and engineering, and for self-study by professionals in information security. While the appendix summarizes most of the basic algebra and notation required, it is assumed that the reader has a basic knowledge of discrete mathematics, probability, and elementary calculus.

Introduction to Public Key Infrastructures (Paperback, Softcover reprint of the original 1st ed. 2013): Johannes A. Buchmann,... Introduction to Public Key Infrastructures (Paperback, Softcover reprint of the original 1st ed. 2013)
Johannes A. Buchmann, Evangelos Karatsiolis, Alexander Wiesmaier
R2,324 Discovery Miles 23 240 Ships in 10 - 15 working days

The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding so-called public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC. In this book the authors explain the most important concepts underlying PKIs and discuss relevant standards, implementations, and applications. The book is structured into chapters on the motivation for PKI, certificates, trust models, private keys, revocation, validity models, certification service providers, certificate policies, certification paths, and practical aspects of PKI. This is a suitable textbook for advanced undergraduate and graduate courses in computer science, mathematics, engineering, and related disciplines, complementing introductory courses on cryptography. The authors assume only basic computer science prerequisites, and they include exercises in all chapters and solutions in an appendix. They also include detailed pointers to relevant standards and implementation guidelines, so the book is also appropriate for self-study and reference by industrial and academic researchers and practitioners.

Fire Behavior and Fire Protection in Timber Buildings (Paperback, Softcover reprint of the original 1st ed. 2014): Roza Aseeva,... Fire Behavior and Fire Protection in Timber Buildings (Paperback, Softcover reprint of the original 1st ed. 2014)
Roza Aseeva, Boris Serkov, Andrey Sivenkov
R5,157 Discovery Miles 51 570 Ships in 10 - 15 working days

This volume describes fire behavior and fire protection of timbers in outdoors and indoors application mainly in construction industry. The Authors' novel approach considers the relationship between various species and age of timbers and its fire behavior at different thermal and fire loads. Quantitative data of ignition speed and flame propagation as well as generation of heat, smoke and toxic products are discussed. Analysis of fire resistance of various types of building materials based on timber of different species as well as the novel data on the effect of natural and accelerated aging of timbers on its fire behavior are discussed. The main practical methods of fire protection of new and ancient timber buildings and structures to increase its fire resistance are considered. The book should be useful for a wide range of readers: chemists, physicists, material scientists, architects, engineers, constructors and restorers.

The Hash Function BLAKE (Paperback, Softcover reprint of the original 1st ed. 2014): Jean-Philippe Aumasson, Willi Meier,... The Hash Function BLAKE (Paperback, Softcover reprint of the original 1st ed. 2014)
Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan, Luca Henzen
R2,862 Discovery Miles 28 620 Ships in 10 - 15 working days

This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers. It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using BLAKE, with a focus on software implementation. In the first two chapters, the authors offer a short introduction to cryptographic hashing, the SHA3 competition and BLAKE. They review applications of cryptographic hashing, they describe some basic notions such as security definitions and state-of-the-art collision search methods and they present SHA1, SHA2 and the SHA3 finalists. In the chapters that follow, the authors give a complete description of the four instances BLAKE-256, BLAKE-512, BLAKE-224 and BLAKE-384; they describe applications of BLAKE, including simple hashing with or without a salt and HMAC and PBKDF2 constructions; they review implementation techniques, from portable C and Python to AVR assembly and vectorized code using SIMD CPU instructions; they describe BLAKE’s properties with respect to hardware design for implementation in ASICs or FPGAs; they explain BLAKE's design rationale in detail, from NIST’s requirements to the choice of internal parameters; they summarize the known security properties of BLAKE and describe the best attacks on reduced or modified variants; and they present BLAKE2, the successor of BLAKE, starting with motivations and also covering its performance and security aspects. The book concludes with detailed test vectors, a reference portable C implementation of BLAKE, and a list of third-party software implementations of BLAKE and BLAKE2. The book is oriented towards practice – engineering and craftsmanship – rather than theory. It is suitable for developers, engineers and security professionals engaged with BLAKE and cryptographic hashing in general and for applied cryptography researchers and students who need a consolidated reference and a detailed description of the design process, or guidelines on how to design a cryptographic algorithm.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Black Tax - Burden Or Ubuntu?
Niq Mhlongo Paperback  (2)
R325 R290 Discovery Miles 2 900
Ghosts of Boston - Haunts of the Hub
Sam Baltrusis Paperback R482 R447 Discovery Miles 4 470
Probiotics - Current Knowledge and…
Shymaa Enany Hardcover R3,334 Discovery Miles 33 340
Ethical Practice of Statistics and Data…
Rochelle Tractenberg Hardcover R2,550 Discovery Miles 25 500
Probiotic Bacteria and Enteric…
J.J. Malago, J.F.J.G. Koninkx, … Hardcover R5,862 Discovery Miles 58 620
Windows 10, Essentials for…
William R. Stanek Hardcover R1,809 Discovery Miles 18 090
The Political Economy of International…
Gerald A. Epstein Hardcover R3,479 Discovery Miles 34 790
Translating Controversial Texts in East…
Adam Zulawnik Hardcover R1,632 Discovery Miles 16 320
Tiny Houses - The ultimate guide to tiny…
Damon Jones Hardcover R601 R544 Discovery Miles 5 440
Audiovisual Translation in a Global…
Jorge Diaz-Cintas, Rocio Banos Pinero Hardcover R4,237 Discovery Miles 42 370

 

Partners