0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (6)
  • R1,000 - R2,500 (6)
  • -
Status
Brand

Showing 1 - 12 of 12 matches in All Departments

The Good Soldier; a Selection of Soldiers' Letters, 1914-1918 (Paperback): N P Ed Dawson The Good Soldier; a Selection of Soldiers' Letters, 1914-1918 (Paperback)
N P Ed Dawson
R592 Discovery Miles 5 920 Ships in 10 - 15 working days
The Good Soldier, a Selection of Soldiers Letters (Paperback): N P Ed Dawson The Good Soldier, a Selection of Soldiers Letters (Paperback)
N P Ed Dawson
R592 Discovery Miles 5 920 Ships in 10 - 15 working days
The Good Soldier, a Selection of Soldiers Letters (Hardcover): N P Ed Dawson The Good Soldier, a Selection of Soldiers Letters (Hardcover)
N P Ed Dawson
R905 Discovery Miles 9 050 Ships in 10 - 15 working days
A Complete Guide to the Game of Draughts (checkers) (Hardcover): James D 1899 Lees, John W Ed Dawson A Complete Guide to the Game of Draughts (checkers) (Hardcover)
James D 1899 Lees, John W Ed Dawson
R910 Discovery Miles 9 100 Ships in 10 - 15 working days
Topics in Cryptology - CT- RSA 2013 - The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25-... Topics in Cryptology - CT- RSA 2013 - The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings (Paperback, 2013 ed.)
Ed Dawson
R1,596 Discovery Miles 15 960 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption.

A Complete Guide to the Game of Draughts (Checkers) (Paperback): James D 1899 [From Old Catalog] Lees, John W [From Old... A Complete Guide to the Game of Draughts (Checkers) (Paperback)
James D 1899 [From Old Catalog] Lees, John W [From Old Catalog] Ed Dawson
R706 Discovery Miles 7 060 Ships in 10 - 15 working days
Information Security Practice and Experience - Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007,... Information Security Practice and Experience - Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings (Paperback, 2007 ed.)
Ed Dawson, Duncan S. Wong
R1,584 Discovery Miles 15 840 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Information Security Practice and Experience Conference, ISPEC 2007, held in Hong Kong, China in May 2007.

The 24 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 135 submissions. The papers are organized in topical sections on cryptanalysis, signatures, network security and security management, privacy and applications, cryptographic algorithms and implementations, authentication and key management, as well as cryptosystems.

Progress in Cryptology - Mycrypt 2005 - First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia,... Progress in Cryptology - Mycrypt 2005 - First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings (Paperback, 2005 ed.)
Ed Dawson, Serge Vaudenay
R1,574 Discovery Miles 15 740 Ships in 10 - 15 working days

Mycrypt 2005 was the inaugural international conference on cryptology hosted in Malaysia. The conference was co-organized by the Information Security - search Lab at Swinburne University of Technology (Sarawak Campus), NISER (National ICT Security and Emergency Response Centre) and INSPEM (Ins- tute for MathematicalResearch)at UPM (UniversityPutra Malaysia).Mycrypt 2005 was held in Kuala Lumpur, Malaysia during September 28-30 2005, in conjunction with the e-Secure Malaysia 2005 convention. Therewere90paper submissionsfrom23 countriescoveringall areasof cr- tologic research, from which 19 were accepted. We would like to extend our thanks to all authors who submitted papers to Mycrypt 2005. Each paper was sentanonymouslytoatleast3membersoftheInternationalProgramCommittee for reviews and comments. The review comments were then followed by disc- sions among the Program Committee. A recipient of the Best Paper Award was also selected after voting among Program Committee members. The winning paper was "Distinguishing Attacks on T-functions" by Simon Kunzli ] (FH A- gau, Swizerland), Pascal Junod (Nagravision SA, Switzerland) and Willi Meier (FH Aargau, Swizerland). These proceedings contain revised versions of all the accepted papers. The conference program included three keynote papers: Hideki Imai (Tokyo University)presenteda paper entitled "TrendsandChallenges forSecurer Cr- tography in Practice." Moti Yung (Columbia University) presented a paper entitled "E?cient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers." Colin Boyd (QUT) presented a paper entitled "Security of Two-Party Identity-Based Key Agreement." We are extremely grateful for the time and e?ort of all the members of the Program Committee in the review process. Their names may be found overleaf."

Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings... Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings (Paperback)
Ed Dawson, Andrew Clark, Colin Boyd
R1,787 Discovery Miles 17 870 Ships in 10 - 15 working days

ACISP 2000, the Fifth Australasian Conference on Information Security and Privacy, was held in Brisbane, Australia, 10-12 July, 2000. The conference was sponsored by the Information Security Research Centre at Queensland Univ- sity of Technology, the Australian Computer Society, Telstra, Boeing Australia Limited, SecureGate Limited, and RSA Security Pty Ltd. We are grateful to all these organizations for their support of the conference. The conference brought together researchers, designers, implementors, and users of information security systems. The aim of the conference is to have a series of technical refereed and invited papers to discuss all di?erent aspects of information security. The program committee invited seven distinguished sp- kers: Mike Burmester, G. R. Blakley, Bob Blakley, Brian Denehy, Roger Lyle, John Snare, and Alan Underwood. Mike Burmester from Royal Holloway C- lege, UniversityofLondonpresentedapaperentitled"ASurveyofKeyDistri- tion"; G. R. Blakley from Texas A&M University and Bob Blakley from the IBM Tivoli Security Business Unit presented a paper entitled "All Sail, No Anchor, I: Cryptography, Risk, and e-Commerce"; Brian Denehy from SecureGate Limited presented a paper entitled "Secure Networks or Network Security - Approaches toBoth";RogerLylefromStandardsAustraliaandJohnSnarefromTelstrap- sented a paper entitled "Perspectives on Australia's New Information Security Management Standard"; and Alan Underwood from the Australian Computer Societypresentedapaperentitled"ProfessionalEthicsinaSecurityandPrivacy Context - The Perspective of a National Computing Society." There were 81 technical papers submitted to the conference from an int- national authorship. These papers were refereed by the program committee and 37 papers were accepted for the conference.

Information Security and Privacy - Third Australasian Conference, ACISP'98, Brisbane, Australia July 13-15, 1998,... Information Security and Privacy - Third Australasian Conference, ACISP'98, Brisbane, Australia July 13-15, 1998, Proceedings (Paperback)
Colin Boyd, Ed Dawson
R1,751 Discovery Miles 17 510 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third Australasian Conference on Information Security and Privacy, ACISP'98, held in Brisbane, Australia, in Kuly 1998.
The volume presents 35 revised full papers selected from a total of 66 submissions; also included are two invited contributions. The book is divided in sections on network security, block ciphers, stream ciphers, authorization codes and Boolean functions, software security and electronic commerce, public key cryptography, hardware, access control, protocols, secret sharing, and digital signatures.

Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings... Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings (Paperback, 2007 ed.)
Josef Pieprzyk, Hossein Ghodosi, Ed Dawson
R1,620 Discovery Miles 16 200 Ships in 10 - 15 working days

Here is a highly relevant book that covers a wide array of key aspects in information security. It constitutes the refereed proceedings of the 12th Australasian Conference on Information Security and Privacy held in Townsville, Australia in July 2007. The 33 revised full papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on stream ciphers, hashing, biometrics, secret sharing, cryptanalysis, public key cryptography, authentication, e-commerce, and security.

La Petite Ville (French, Paperback): L. -B (Louis-Benoit) 1769-1828 Picard, John C Ed Dawson La Petite Ville (French, Paperback)
L. -B (Louis-Benoit) 1769-1828 Picard, John C Ed Dawson
R663 R549 Discovery Miles 5 490 Save R114 (17%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Tenet
John David Washington, Robert Pattinson, … DVD R53 Discovery Miles 530
Not available
Britney Spears Fantasy Eau De Parfum…
R517 Discovery Miles 5 170
Bad Boy Men's Smoke Watch & Sunglass Set…
 (2)
R489 Discovery Miles 4 890
Johnson's Baby Oil (125ml)
R40 Discovery Miles 400
Snappy Tritan Bottle (1.5L)(Blue)
R229 R179 Discovery Miles 1 790
Cotton Wool (100g)
R32 Discovery Miles 320
Multi-Use Foldable Cart (Black, Large)
R2,499 R1,149 Discovery Miles 11 490
Blinde Mol Of Wyse Uil? - Hoe Om Met…
Susan Coetzer Paperback R270 R232 Discovery Miles 2 320
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300

 

Partners