0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (18)
  • R2,500 - R5,000 (3)
  • R5,000 - R10,000 (3)
  • -
Status
Brand

Showing 1 - 24 of 24 matches in All Departments

Proceedings of the Ninth International Conference on Mathematics and Computing - ICMC 2023 (1st ed. 2023): Debasis Giri, Dieter... Proceedings of the Ninth International Conference on Mathematics and Computing - ICMC 2023 (1st ed. 2023)
Debasis Giri, Dieter Gollmann, S. Ponnusamy, Sakurai Kouichi, Predrag S. Stanimirović, …
R6,559 Discovery Miles 65 590 Ships in 10 - 15 working days

This book features selected papers from the 9th International Conference on Mathematics and Computing (ICMC 2023), organized at BITS Pilani K. K. Birla Goa Campus, India, during 6–8 January 2023. It covers recent advances in the field of mathematics, statistics, and scientific computing. The book presents innovative work by leading academics, researchers, and experts from industry in mathematics, statistics, cryptography, network security, cybersecurity, machine learning, data analytics, and blockchain technology in computer science and information technology.

Secure IT Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings (Paperback,... Secure IT Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings (Paperback, 2013 ed.)
Hanne Riis Nielsen, Dieter Gollmann
R1,570 Discovery Miles 15 700 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th Nordic Conference on Secure IT Systems, NordSec 2013, held in Ilulissat, Greenland, in October 2013. The 18 revised regular papers together with 3 short papers and one invited talk were carefully reviewed and selected from 35 submissions. The papers are organized in topical sections on formal analysis of security protocols, cyber-physical systems, security policies, information flow, security experiences, Web security, and network security.

Insider Threats in Cyber Security (Paperback, 2010 ed.): Christian W. Probst, Jeffrey Hunker, Matt Bishop, Dieter Gollmann Insider Threats in Cyber Security (Paperback, 2010 ed.)
Christian W. Probst, Jeffrey Hunker, Matt Bishop, Dieter Gollmann
R2,957 Discovery Miles 29 570 Ships in 10 - 15 working days

Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Monica van Huystee, Senior Policy Advisor at MCI, Ontario, Canada comments "The book will be a must read, so of course I'll need a copy." Insider Threats in Cyber Security covers all aspects of insider threats, from motivation to mitigation. It includes how to monitor insider threats (and what to monitor for), how to mitigate insider threats, and related topics and case studies. Insider Threats in Cyber Security is intended for a professional audience composed of the military, government policy makers and banking; financing companies focusing on the Secure Cyberspace industry. This book is also suitable for advanced-level students and researchers in computer science as a secondary text or reference book.

Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012, Proceedings (Paperback,... Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012, Proceedings (Paperback, 2012 ed.)
Dieter Gollmann, Felix C. Freiling
R1,595 Discovery Miles 15 950 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 15th International Conference on Information Security, ISC 2015, held in Passau, Germany, in September 2012. The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security, and models for risk and revocation.

Quality Of Protection - Security Measurements and Metrics (Paperback, Softcover reprint of hardcover 1st ed. 2006): Dieter... Quality Of Protection - Security Measurements and Metrics (Paperback, Softcover reprint of hardcover 1st ed. 2006)
Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin
R5,758 Discovery Miles 57 580 Ships in 10 - 15 working days

Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano, Italy (September 2005). This volume discusses how security research can progress towards quality of protection in security comparable to quality of service in networking and software measurements, and metrics in empirical software engineering. Information security in the business setting has matured in the last few decades. Standards such as IS017799, the Common Criteria (ISO15408), and a number of industry certifications and risk analysis methodologies have raised the bar for good security solutions from a business perspective.

Designed for a professional audience composed of researchers and practitioners in industry, Quality of Protection: Security Measurements and Metrics is also suitable for advanced-level students in computer science.

Smart Card Research and Advanced Applications - 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany,... Smart Card Research and Advanced Applications - 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010, Proceedings (Paperback, Edition.)
Dieter Gollmann, Jean-Louis Lanet, Julien Iguchi-Cartigny
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

TheseproceedingscontainthepapersselectedforpresentationatCARDIS 2010, the 9th IFIP Conference on Smart Card Research and Advanced Application hosted by the Institute of IT-Security and Security Law (ISL) of the University ofPassau, Germany.CARDISisorganizedbyIFIPWorkingGroupsWG8.8and WG 11.2. Since 1994, CARDIS has been the foremost international conference dedicated to smart card research and applications. Every second year leading researchers and practitioners meet to present new ideas and discuss recent - velopments in smart card technologies. Thefastevolutioninthe?eldofinformationsecurityrequiresadequatemeans for representing the user in human-machine interactions. Smart cards, and by extension smart devices with their processing power and their direct association with the user, are considered the ?rst choice for this purpose. A wide range of areas including hardware design, operating systems, systems modelling, cr- tography, and distributed systems contribute to this fast-growing technology. The submissions to CARDIS were reviewed by at least three members of the ProgramCommittee, followedbyatwo-weekdiscussionphaseheldelectronically, wherecommittee memberscouldcomment onall papersand allreviews.Finally, 16 papers were selected for presentation at CARDIS. There aremany volunteerswho o?ered their time and energy to put together the symposium and who deserve our acknowledgment. We want to thank all the members of the Program Committee and the external reviewers for their hard work in evaluating and discussing the submissions. We are also very grateful to JoachimPosegga, the GeneralChairof CARDIS 2010, andhisteam for thelocal conference management. Last, but certainly not least, our thanks go to all the authors who submitted papers and all the attendees. We hope you ?nd the proceedings stimulat

Insider Threats in Cyber Security (Hardcover, 2010 ed.): Christian W. Probst, Jeffrey Hunker, Matt Bishop, Dieter Gollmann Insider Threats in Cyber Security (Hardcover, 2010 ed.)
Christian W. Probst, Jeffrey Hunker, Matt Bishop, Dieter Gollmann
R3,113 Discovery Miles 31 130 Ships in 10 - 15 working days

Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Monica van Huystee, Senior Policy Advisor at MCI, Ontario, Canada comments "The book will be a must read, so of course I'll need a copy."

Insider Threats in Cyber Security covers all aspects of insider threats, from motivation to mitigation. It includes how to monitor insider threats (and what to monitor for), how to mitigate insider threats, and related topics and case studies.

Insider Threats in Cyber Security is intended for a professional audience composed of the military, government policy makers and banking; financing companies focusing on the Secure Cyberspace industry. This book is also suitable for advanced-level students and researchers in computer science as a secondary text or reference book.

Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks - Second IFIP WG 11.2... Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks - Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 (Paperback, 2008 ed.)
Jose A. Onieva, Damien Sauveron, Serge Chaumette, Dieter Gollmann, Konstantinos Markantonakis
R1,518 Discovery Miles 15 180 Ships in 10 - 15 working days

With the rapid development of information technologies and the transition to next-generation networks, computer systems and in particular embedded s- tems are becoming more and more mobile and ubiquitous. They also strongly interact with the physical world. Ensuring the security of these complex and resource-constrained systems is a really challenging research topic. Therefore this Workshop in Information Security Theory and Practices was organized to bring together researchers and practitioners in related areas, and to encourage cooperation between the research and the industrial communities. This was the second edition of WISTP, after the ?rst event in Heraklion, Greece, in 2007. This year again we had a signi?cant number of high-quality submissions coming from many di?erent countries. These submissions re?ected the major topics of the conference, i. e. , smart devices, convergence, and ne- generation networks. Submissions were reviewed by at least three reviewers, in most cases by four, and at least by ?ve for the papers involving Program C- mittee members. This long and rigorousprocess could be achievedthanks to the hard work of the Program Committee members and additional reviewers, listed in the following pages. This led to the selection of high-quality papers that made up the workshop program and are published in these proceedings. A number of posters and short papers were also selected for presentation at the conference. The process was very selective and we would like to thank all those authors who submitted contributions that could not be selected.

Computer Security - ESORICS 2006 - 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20,... Computer Security - ESORICS 2006 - 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings (Paperback, 2006 ed.)
Eugene Asarin, Dieter Gollmann, Jan Meier, Andrei Sabelfeld
R3,041 Discovery Miles 30 410 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. The 32 revised full papers presented were carefully reviewed and selected from 160 submissions. ESORICS is confirmed as the European research event in computer security; it presents original research contributions, case studies and implementation experiences addressing any aspect of computer security - in theory, mechanisms, applications, or practical experience.

Computer Security - ESORICS 2005 - 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14,... Computer Security - ESORICS 2005 - 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings (Paperback, 2005 ed.)
Sabrina de Capitani di Vimercati, Paul Syverson, Dieter Gollmann
R1,802 Discovery Miles 18 020 Ships in 10 - 15 working days

Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security (ESORICS), held S- tember 12 14, 2005 in Milan, Italy. In response to the call for papers 159 papers were submitted to the conf- ence. These paperswere evaluated on the basis of their signi?cance, novelty, and technical quality. Each paper was reviewed by at least three members of the program committee. The program committee meeting was held electronically, holding intensive discussion over a period of two weeks. Of the papers subm- ted, 27 were selected for presentation at the conference, giving an acceptance rate of about 16%. The conference program also includes an invited talk by Barbara Simons. There is a long list of people who volunteered their time and energy to put together the symposiom and who deserve acknowledgment. Thanks to all the members of the program committee, and the external reviewers, for all their hard work in evaluating and discussing papers. We are also very grateful to all those people whose work ensured a smooth organizational process: Pierangela Samarati, who served as General Chair, Claudio Ardagna, who served as P- licity Chair, Dieter Gollmann who served as Publication Chair and collated this volume, and Emilia Rosti and Olga Scotti for helping with local arrangements. Last, but certainly not least, our thanks go to all the authors who submitted papers and all the attendees. We hope you ?nd the program stimulating."

Computer Security - ESORICS 2004 - 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September... Computer Security - ESORICS 2004 - 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings (Paperback, 2004 ed.)
Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva
R1,768 Discovery Miles 17 680 Ships in 10 - 15 working days

ForewordfromtheProgramChairs These proceedings contain the papers selected for presentation at the 9th - ropean Symposium on Research in Computer Security (ESORICS), held during September 13 15, 2004 in Sophia Antipolis, France. In response to the call for papers 159 papers were submitted to the conference. These papers were evaluated on the basis of their signi?cance, novelty, and te- nicalquality. Eachpaper wasreviewedby at leastthree members of the program committee. The program committee meeting was held electronically; there was an intensive discussion over a period of two weeks. Of the papers submitted, 27 were selected for presentation at the conference, giving an acceptance rate lower than 17%. The conference program also included an invited talk. A workshop like this does not just happen; it depends on the volunteer e?orts of ahostofindividuals. Thereisalonglistofpeoplewhovolunteeredtheirtimeand energy to put together the workshopand who deserve special thanks. Thanks to all the members of the program committee, and the external reviewers, for all their hardwork in the paper evaluation. Due to the large number of submissions the program committee members were really required to work hard in a short time frame, and we are very thankful to them for the commitment they showed with their active participation in the electronic discussion."

Information and Communications Security - 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003,... Information and Communications Security - 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings (Paperback, 2003 ed.)
Petra Perner, Dieter Gollmann, Jianying Zhou
R1,745 Discovery Miles 17 450 Ships in 10 - 15 working days

ICICS 2003, the Fifth International Conference on Information and C- munication Security, was held in Huhehaote city, Inner Mongolia, China, 10 13 October 2003. Among the preceding conferences, ICICS 97 was held in B- jing, China, ICICS 99 in Sydney, Australia, ICICS 2001 in Xi an, China, and ICICS 2002, in Singapore.TheproceedingswerereleasedasVolumes1334,1726, 2229, and 2513 of the LNCS series of Springer-Verlag, respectively. ICICS 2003 was sponsored by the Chinese Academy of Sciences (CAS), the National Natural Science Foundation of China, and the China Computer F- eration. The conference was organized by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Communications and Information Security Association (ICISA). The aim of the ICICS conferences has been to o?er the attendees the - portunity to discuss the state-of-the-art technology in theoretical and practical aspects of information and communications security. The response to the Call forPaperswassurprising.WhenwewerepreparingtheconferencebetweenApril and May, China, including the conference venue, Huhehaote City, was ?ghting against SARS. Despite this 176 papers were submitted to the conference from 22 countries and regions, and after a competitive selection process, 37 papers from 14 countries and regions were accepted to appear in the proceedings and be presented at ICICS 2003. We would like to take this opportunity to thank all those who submitted papers to ICICS 2003 for their valued contribution to the conference."

Computer Security - ESORICS 2003 - 8th European Symposium on Research in Computer Security, Gjovik, Norway, October 13-15,... Computer Security - ESORICS 2003 - 8th European Symposium on Research in Computer Security, Gjovik, Norway, October 13-15, 2003, Proceedings (Paperback, 2003 ed.)
Einar Snekkenes, Dieter Gollmann
R1,698 Discovery Miles 16 980 Ships in 10 - 15 working days

ESORICS, the European Symposium On Research In Computer Security, is the leading research-oriented conference on the theory and practice of computer - curity in Europe. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together - searchersinthisarea, bypromotingtheexchangeofideaswithsystemdevelopers and by encouraging links with researchers in related areas. ESORICS is coordinated by an independent steering committee. In the past it took place every two years at various locations throughout Europe. Starting this year, it will take place annually. ESORICS 2003 was organized by Gjovik University College, and took place in Gjovik, Norway, October 13-15, 2003. The program committee received 114 submissions, originating from 26 co- tries on all continents. Half the papers originated in Europe (57). The most dominant countries were: UK (16), USA (14), Germany (6), South Korea (6), Sweden (6), Italy (5), France (4) and Poland (4). Each submission was reviewed by at least three program committee members or other experts. The program committee chair and co-chair were not allowed to submit papers. The ?nal sel- tion of papers was made at a program committee meeting followed by a week of e-mail discussions. Out of the 114 papers received, only 19 got accepted (17%). In comparison, ESORICS 2000and 2002received 75and 83papersand accepted 19% and 16%, respectively. The program re?ected the full range of security research, including access control, cryptographic protocols, privacy enhancing technologies, security m- els, authentication, and intrusion detection."

Computer Security -- ESORICS 2002 - 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14-16,... Computer Security -- ESORICS 2002 - 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14-16, 2002, Proceedings (Paperback, 2002 ed.)
Dieter Gollmann, Gunter Karjoth, Michael Waidner
R1,664 Discovery Miles 16 640 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th European Symposium on Research in Computer Security, ESORICS 2002, held in Zurich, Switzerland, in October 2002.The 16 revised full papers presented were carefully reviewed and selected for inclusion in the proceedings. Among the topics addressed are confidentiality, probabilistic non-inference, auctions, inference control, authentication, attacks on cryptographic hardware, privacy protection, model checking protocols, mobile code, formal security analysis, access control, and fingerprints and intrusion detection.

Computer Security - ESORICS 2000 - 6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000... Computer Security - ESORICS 2000 - 6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000 Proceedings (Paperback, 2000 ed.)
Frederic Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner
R1,685 Discovery Miles 16 850 Ships in 10 - 15 working days

his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000.The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents.

Computer Security - ESORICS 98 - 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September... Computer Security - ESORICS 98 - 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings (Paperback, 1998)
Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann
R1,719 Discovery Miles 17 190 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th European Symposium on Research in Computer Security, ESORICS 98, held in Louvain-la-Neuve, Belgium, in September 1998.
The 24 revised full papers presented were carefully reviewed and selected from a total of 57 submissions. The papers provide current results from research and development in design and specification of security policies, access control modelling and protocol analysis, mobile systems and anonymity, Java and mobile code, watermarking, intrusion detection and prevention, and specific threads.

Fast Software Encryption - Third International Workshop, Cambridge, UK, February 21 - 23, 1996. Proceedings (Paperback, 1996... Fast Software Encryption - Third International Workshop, Cambridge, UK, February 21 - 23, 1996. Proceedings (Paperback, 1996 ed.)
Dieter Gollmann
R1,620 Discovery Miles 16 200 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Workshop on Fast Software Encryption; this workshop was held in conjunction with the program on computer security, cryptology, and coding theory at the Isaac Newton Institute in Cambridge, UK in February 1996.
The 18 revised papers presented were carefully selected for inclusion in the volume by the program committee. They report the state of the art in the field of fast encryption algorithms and are organized in sections on block cipher analysis, applications, hash functions, block cipher proposals, correlation analysis, and design criteria for block ciphers.

Computer Security - ESORICS 94 - Third European Symposium on Research in Computer Security, Brighton, United Kingdom, November... Computer Security - ESORICS 94 - Third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7 - 9, 1994. Proceedings (Paperback, 1994 ed.)
Dieter Gollmann
R1,779 Discovery Miles 17 790 Ships in 10 - 15 working days

This volume constitutes the proceedings of the Third European Symposium on Research in Computer Security, held in Brighton, UK in November 1994.
The 26 papers presented in the book in revised versions were carefully selected from a total of 79 submissions; they cover many current aspects of computer security research and advanced applications. The papers are grouped in sections on high security assurance software, key management, authentication, digital payment, distributed systems, access control, databases, and measures.

Information and Communications Security - 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24-26, 2020,... Information and Communications Security - 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings (Paperback, 1st ed. 2020)
Weizhi Meng, Dieter Gollmann, Christian D. Jensen, Jianying Zhou
R1,661 Discovery Miles 16 610 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020. The 33 revised full papers were carefully selected from 139 submissions. The papers focus in topics about computer and communication security, and are organized in topics of security and cryptography. *The conference was held virtually due to the COVID-19 pandemic.

Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15,... Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I (Paperback, 1st ed. 2017)
Simon N. Foley, Dieter Gollmann, Einar Snekkenes
R1,625 Discovery Miles 16 250 Ships in 10 - 15 working days

The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017. The 54 revised full papers presented were carefully reviewed and selected from 338 submissions. The papers address issues such as data protection; security protocols; systems; web and network security; privacy; threat modeling and detection; information flow; and security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.

Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15,... Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Simon N. Foley, Dieter Gollmann, Einar Snekkenes
R1,652 Discovery Miles 16 520 Ships in 10 - 15 working days

The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017. The 54 revised full papers presented were carefully reviewed and selected from 338 submissions. The papers address issues such as data protection; security protocols; systems; web and network security; privacy; threat modeling and detection; information flow; and security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.

Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017,... Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings (Paperback, 1st ed. 2017)
Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi
R1,694 Discovery Miles 16 940 Ships in 10 - 15 working days

This book constitutes the proceedings of the 15th International Conference on Applied Cryptology and Network Security, ACNS 2017, held in Kanazawa, Japan, in July 2017. The 34 papers presented in this volume were carefully reviewed and selected from 149 submissions. The topics focus on innovative research and current developments that advance the areas of applied cryptography, security analysis, cyber security and privacy, data and server security.

Quality Of Protection - Security Measurements and Metrics (Hardcover, 2006 ed.): Dieter Gollmann, Fabio Massacci, Artsiom... Quality Of Protection - Security Measurements and Metrics (Hardcover, 2006 ed.)
Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin
R5,884 Discovery Miles 58 840 Ships in 10 - 15 working days

Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano, Italy (September 2005). This volume discusses how security research can progress towards quality of protection in security comparable to quality of service in networking and software measurements, and metrics in empirical software engineering. Information security in the business setting has matured in the last few decades. Standards such as IS017799, the Common Criteria (ISO15408), and a number of industry certifications and risk analysis methodologies have raised the bar for good security solutions from a business perspective.

Designed for a professional audience composed of researchers and practitioners in industry, Quality of Protection: Security Measurements and Metrics is also suitable for advanced-level students in computer science.

Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems - 7th IFIP WG 11.2 International... Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems - 7th IFIP WG 11.2 International Workshop, WIST 2013, Heraklion, Greece, May 28-30, 2013, Proceedings (Paperback, 2013 ed.)
Lorenzo Cavallaro, Dieter Gollmann
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2013, held in Heraklion, Crete, Greece, in May 2013. The 9 revised full papers presented together with two keynote speeches were carefully reviewed and selected from 19 submissions. The scope of the workshop spans the theoretical aspects of cryptography and cryptanalysis, mobile security, smart cards and embedded devices.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Sharp EL-W506T Scientific Calculator…
R599 R449 Discovery Miles 4 490
An Evening With Silk Sonic
Bruno Mars, Anderson .Paak, … CD  (2)
R155 Discovery Miles 1 550
Oh My My
OneRepublic CD  (4)
R59 Discovery Miles 590
Johnson's Baby Oil (125ml)
R40 Discovery Miles 400
Pet Mall Pet Bed Rectangle Fur 100cm X…
R2,822 Discovery Miles 28 220
Russell Hobbs Supreme Glide+ Steam…
R348 Discovery Miles 3 480
Mellerware Swiss - Plastic Floor Fan…
R368 Discovery Miles 3 680
Comfort Food From Your Slow Cooker - 100…
Sarah Flower Paperback R550 R455 Discovery Miles 4 550
Brother LX27NT Portable Free Arm Sewing…
R3,999 R2,999 Discovery Miles 29 990
The Missus
E. L. James Paperback R240 R99 Discovery Miles 990

 

Partners