0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 11 of 11 matches in All Departments

Finding American - Stories of Immigration from the 50 States (Hardcover): Colin Boyd Shafer Finding American - Stories of Immigration from the 50 States (Hardcover)
Colin Boyd Shafer; Foreword by Ali Noorani
R855 Discovery Miles 8 550 Ships in 12 - 17 working days

A captivating photographic portrait of the diverse experiences of immigrants in the United States, depicting the resilience and realities of building a home in a new place. Disturbed by the increasingly hostile views of immigrants that arose in the United States during the 2016 presidential election, photographer Colin Boyd Shafer set out on a road trip to meet hundreds of families and individuals with roots abroad who now live in America. The result, after a year of travel covering fifty thousand miles, is this collection of striking photos and moving stories that form a portrait of the nation’s complex and shifting relationship to immigration. Some of the participants chose to make America home; others were displaced by crises. Some were warmly welcomed and granted citizenship; others battled the immigration system for years and still live with fear and uncertainty. Their circumstances and origins vary, but all are united by a willingness to share their stories—of harrowing journeys, intense love, separated families, passionate activism—in hopes of adding nuance and depth to a vital issue that continues to polarize Americans.

You Are Touch (Paperback): Colin Boyd You Are Touch (Paperback)
Colin Boyd
R398 Discovery Miles 3 980 Ships in 10 - 15 working days
Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings... Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings (Paperback, 2013 ed.)
Colin Boyd, Leonie Simpson
R1,606 Discovery Miles 16 060 Ships in 10 - 15 working days

This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized in technical sessions, covering topics of Cryptanalysis, RSA, Lattices and Security Proofs, Public Key Cryptography, Hashing, Signatures, Passwords, Mobile Security, and Secret Sharing.

Information Security and Privacy - 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings... Information Security and Privacy - 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings (Paperback, 2009 ed.)
Colin Boyd, Juan Gonzalez Nieto
R1,616 Discovery Miles 16 160 Ships in 10 - 15 working days

The 2009 Australasian Conference on Information Security and Privacy was the 14th in an annual series that started in 1996. Over the years ACISP has grown froma relativelysmall conferencewith a largeproportionof paperscoming from Australia into a truly international conference with an established reputation. ACISP 2009 was held at Queensland University of Technology in Brisbane, d- ing July 1-3, 2009. This year there were 106 paper submissions and from those 30 papers were accepted for presentation, but one was subsequently withdrawn. Authors of - cepted papers came from 17 countries and 4 continents, illustrating the inter- tional ?avorof ACISP. We would like to extend our sincere thanks to all authors who submitted papers to ACISP 2009. The contributed papers were supplemented by two invited talks from e- nent researchers in information security. Basie von Solms (University of Joh- nesburg), currently President of IFIP, raised the question of how well dressed is the information security king. L. Jean Camp (Indiana University) talked about how to harden the network from the friend within. We are grateful to both of them for sharing their extensive knowledge and setting challenging questions for the ACISP 2009 delegates. We were fortunate to have an energetic team of experts who formed the Program Committee. Their names may be found overleaf, and we thank them warmly for their considerable e?orts. This team was helped by an even larger number of individuals who reviewedpapers in their particularareasof expertise.

Information Security and Privacy - 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings... Information Security and Privacy - 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings (Paperback, 2005 ed.)
Colin Boyd, Juan M. Gonzalez Nieto
R1,855 Discovery Miles 18 550 Ships in 10 - 15 working days

The 2005 Australasian Conference on Information Security and Privacy was the tenth in the annual series that started in 1996.Over the yearsACISP has grown from a relativelysmallconferencewith a largeproportionof paperscoming from Australia into a truly international conference with an established reputation. ACISP 2005 was held at Queensland University of Technology in Brisbane, d- ing July 4-6, 2005. This year there were 185 paper submissions and from these 45 papers were accepted. Accepted papers came from 13 countries, with the largest proportions coming from Australia (12), China (8) and Japan (6). India and Korea both contributed 2 papers and one came from Singapore. There were also 11 papers from European countries and 3 from North America. We would like to extend our sincere thanks to all authors who submitted papers to ACISP 2005. The contributed papers were supplemented by four invited talks from e- nent researchers in information security. The father-and-son team of Prof. and Dr. Bob Blakley (Texas A&M University and IBM) gave a talk entitled "All Sail, No Anchor III," following up on a theme started at their ACISP 2000 - vited talk. Adrian McCullagh (Phillips Fox Lawyers and QUT) talked on the bene?t and perils of Internet banking. Ted Dunstone (Biometix) enlightened us on multimodal biometric systems. Yvo Desmedt (University College London) elucidated the growing gap between theory and practice in information security.

Information Security - 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings (Paperback, 2003... Information Security - 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings (Paperback, 2003 ed.)
Colin Boyd, Wenbo Mao
R1,764 Discovery Miles 17 640 Ships in 10 - 15 working days

The 2003 Information Security Conference was the sixth in a series that started with the InformationSecurity Workshopin 1997.A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend continued in the program of this year s conference. There were 133 paper submissions to ISC 2003. From these submissions the 31papersintheseproceedingswereselectedbytheprogramcommittee, covering a wide range of technical areas. These papers are supplemented by two invited papers;athirdinvitedtalkwaspresentedattheconferencebutisnotrepresented by a written paper. We would like to extend our sincere thanks to all the authors that submitted papers to ISC 2003, and we hope that those whose papers were declined will be able to ?nd an alternative forum for their work. We are also very grateful to the three eminent invited speakers at the conference: Paul van Oorschot (Carleton University, Canada), Ueli Maurer (ETH Zur ] ich, Switzerland), and Andy Clark (Inforenz Limited, UK). We were fortunate to have an energetic team of experts who took onthe task of the program committee. Their names may be found overleaf, and we thank them warmly for their considerable e?orts. This team was helped by an even larger number of individuals who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete."

Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9-13, 2001. Proceedings (Paperback, 2001 ed.)
Colin Boyd
R1,664 Discovery Miles 16 640 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001, held in Gold Coast, Australia in December 2001.The 33 revised full papers presented together with an invited paper were carefully reviewed and selected from 153 submissions. The papers are organized in topical sections on lattice based cryptography, human identification, practical public key cryptography, cryptography based on coding theory, block ciphers, provable security, threshold cryptography, two-party protocols, zero knowledge, cryptographic building blocks, elliptic curve cryptography, and anonymity.

Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings... Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings (Paperback)
Ed Dawson, Andrew Clark, Colin Boyd
R1,787 Discovery Miles 17 870 Ships in 10 - 15 working days

ACISP 2000, the Fifth Australasian Conference on Information Security and Privacy, was held in Brisbane, Australia, 10-12 July, 2000. The conference was sponsored by the Information Security Research Centre at Queensland Univ- sity of Technology, the Australian Computer Society, Telstra, Boeing Australia Limited, SecureGate Limited, and RSA Security Pty Ltd. We are grateful to all these organizations for their support of the conference. The conference brought together researchers, designers, implementors, and users of information security systems. The aim of the conference is to have a series of technical refereed and invited papers to discuss all di?erent aspects of information security. The program committee invited seven distinguished sp- kers: Mike Burmester, G. R. Blakley, Bob Blakley, Brian Denehy, Roger Lyle, John Snare, and Alan Underwood. Mike Burmester from Royal Holloway C- lege, UniversityofLondonpresentedapaperentitled"ASurveyofKeyDistri- tion"; G. R. Blakley from Texas A&M University and Bob Blakley from the IBM Tivoli Security Business Unit presented a paper entitled "All Sail, No Anchor, I: Cryptography, Risk, and e-Commerce"; Brian Denehy from SecureGate Limited presented a paper entitled "Secure Networks or Network Security - Approaches toBoth";RogerLylefromStandardsAustraliaandJohnSnarefromTelstrap- sented a paper entitled "Perspectives on Australia's New Information Security Management Standard"; and Alan Underwood from the Australian Computer Societypresentedapaperentitled"ProfessionalEthicsinaSecurityandPrivacy Context - The Perspective of a National Computing Society." There were 81 technical papers submitted to the conference from an int- national authorship. These papers were refereed by the program committee and 37 papers were accepted for the conference.

Information Security and Privacy - Third Australasian Conference, ACISP'98, Brisbane, Australia July 13-15, 1998,... Information Security and Privacy - Third Australasian Conference, ACISP'98, Brisbane, Australia July 13-15, 1998, Proceedings (Paperback)
Colin Boyd, Ed Dawson
R1,751 Discovery Miles 17 510 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third Australasian Conference on Information Security and Privacy, ACISP'98, held in Brisbane, Australia, in Kuly 1998.
The volume presents 35 revised full papers selected from a total of 66 submissions; also included are two invited contributions. The book is divided in sections on network security, block ciphers, stream ciphers, authorization codes and Boolean functions, software security and electronic commerce, public key cryptography, hardware, access control, protocols, secret sharing, and digital signatures.

Cryptography and Coding - Fifth IMA Conference; Cirencester, UK, December 1995. Proceedings (Paperback, 1995 ed.): Colin Boyd Cryptography and Coding - Fifth IMA Conference; Cirencester, UK, December 1995. Proceedings (Paperback, 1995 ed.)
Colin Boyd
R1,664 Discovery Miles 16 640 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th IMA Conference on Cryptography and Coding, held in Cirencester, UK in December 1995.
The volume presents 22 full revised papers selected from 48 submissions together with five invited full papers and three abstracts on the mathematical theory and practice of cryptography and coding; continuing advances in these strongly related areas are crucial for the security and reliability of data communication, processing, and storage. Among the topics addressed are linear codes, error-correcting codes, decoding, key distribution, authentication, hash functions, block ciphers, cryptanalysis, and electronic cash.

Protocols for Authentication and Key Establishment (Hardcover, 2003 ed.): Colin Boyd, Anish Mathuria Protocols for Authentication and Key Establishment (Hardcover, 2003 ed.)
Colin Boyd, Anish Mathuria
R2,994 Discovery Miles 29 940 Ships in 10 - 15 working days

Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly.This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature.As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Budget Compact Mirror [Blue]
R9 Discovery Miles 90
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Unicorn Maestro 100 Flights (SA Flag…
R29 R17 Discovery Miles 170
Poor Things
Emma Stone, Mark Ruffalo, … DVD R449 R329 Discovery Miles 3 290
The Creator
John David Washington, Gemma Chan, … DVD R624 R299 Discovery Miles 2 990
White Glo Smokers' Formula Toothpaste…
R60 R54 Discovery Miles 540
Tom Ford Tobacco Vanille Eau De Parfum…
R7,552 Discovery Miles 75 520
Sony PlayStation 4 Slim Console Bundle…
R8,799 Discovery Miles 87 990
Sudocrem Skin & Baby Care Barrier Cream…
R117 Discovery Miles 1 170

 

Partners