0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (1)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Authorization and Access Control - Foundations, Frameworks, and Applications (Hardcover): Parikshit N. Mahalle, Shashikant S.... Authorization and Access Control - Foundations, Frameworks, and Applications (Hardcover)
Parikshit N. Mahalle, Shashikant S. Bhong, Gitanjali R. Shinde
R1,542 Discovery Miles 15 420 Ships in 12 - 17 working days

Provides overview of security challenges of IoT and mitigation techniques with a focus on authorization and access control mechanisms Discusses behavioural analysis of threats and attacks using UML base modelling Covers use of Oauth2.0 Protocol and UMA for connecting web applications Includes Role Based Access Control (RBAC), Discretionary Access Control (DAC), Mandatory Access Control (MAC), and Permission Based Access Control (PBAC) Explores how to provide access to third party web applications through resource server by use of secured and reliable Oauth2.0 framework

VANET - Challenges and Opportunities (Hardcover): Sonali P. Botkar, Sachin P. Godse, Parikshit N. Mahalle, Gitanjali R. Shinde VANET - Challenges and Opportunities (Hardcover)
Sonali P. Botkar, Sachin P. Godse, Parikshit N. Mahalle, Gitanjali R. Shinde
R1,611 Discovery Miles 16 110 Ships in 12 - 17 working days

VANET (vehicular ad hoc network) is a subgroup of MANET (mobile ad hoc network). It enables communication among vehicles on the road and between related infrastructures. This book addresses the basic elements of VANET along with components involved in the communication with their functionalities and configurations. It contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms, and protocols, and addresses the different services provided by VANET with the help of a scenario showing a network tackling an emergency. Features: * Covers all important concepts of VANET for beginners and different road scenarios in VANET * Covers essential communication protocols in VANET * Introduces approaches for VANET implementation using simulators * Provides a classification of messages and a priority-based message forwarding strategy This book is aimed at undergraduates, postgraduates, industry, researchers, and research scholars in information and communications technology.

Security Issues and Privacy Threats in Smart Ubiquitous Computing (Paperback, 1st ed. 2021): Parikshit N. Mahalle, Gitanjali R.... Security Issues and Privacy Threats in Smart Ubiquitous Computing (Paperback, 1st ed. 2021)
Parikshit N. Mahalle, Gitanjali R. Shinde, Nilanjan Dey, Aboul Ella Hassanien
R5,242 Discovery Miles 52 420 Ships in 10 - 15 working days

This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing. The uniqueness of this book is the combination of important fields like the Internet of things and ubiquitous computing. It assumes that the readers' goal is to achieve a complete understanding of IoT, smart computing, security issues, challenges and possible solutions. It is not oriented towards any specific use cases and security issues; privacy threats in ubiquitous computing problems are discussed across various domains. This book is motivating to address privacy threats in new inventions for a wide range of stakeholders like layman to educated users, villages to metros and national to global levels. This book contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms and protocols. The main endeavour of this book is threat analysis and activity modelling of attacks in order to give an actual view of the ubiquitous computing applications. The unique approach will help readers for a better understanding.

The Underwater World for Digital Data Transmission (Paperback, 1st ed. 2021): Parikshit N. Mahalle, Pooja A. Shelar, Gitanjali... The Underwater World for Digital Data Transmission (Paperback, 1st ed. 2021)
Parikshit N. Mahalle, Pooja A. Shelar, Gitanjali R. Shinde, Nilanjan Dey
R1,345 Discovery Miles 13 450 Ships in 12 - 17 working days

This book covers all small details about Underwater Sensor Networks (UWSN). Researchers can use this book as a prerequisite before starting any research on underwater networks or underwater applications. This book covers the introduction, challenges, different architectural models for UWSN, various attacks on UWSN, underwater applications, and networking layers. The target audience includes professors and students in engineering, and researchers and engineers working on marine applications. In academic level, the book is helpful for students having Networking and Information Security as elective subject and doing projects in Wireless Networks. It is also helpful for spostgraduates and Ph.D. researchers to learn basics of Underwater Sensor Networks.

Security Issues and Privacy Threats in Smart Ubiquitous Computing (Hardcover, 1st ed. 2021): Parikshit N. Mahalle, Gitanjali R.... Security Issues and Privacy Threats in Smart Ubiquitous Computing (Hardcover, 1st ed. 2021)
Parikshit N. Mahalle, Gitanjali R. Shinde, Nilanjan Dey, Aboul Ella Hassanien
R3,548 Discovery Miles 35 480 Ships in 12 - 17 working days

This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing. The uniqueness of this book is the combination of important fields like the Internet of things and ubiquitous computing. It assumes that the readers' goal is to achieve a complete understanding of IoT, smart computing, security issues, challenges and possible solutions. It is not oriented towards any specific use cases and security issues; privacy threats in ubiquitous computing problems are discussed across various domains. This book is motivating to address privacy threats in new inventions for a wide range of stakeholders like layman to educated users, villages to metros and national to global levels. This book contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms and protocols. The main endeavour of this book is threat analysis and activity modelling of attacks in order to give an actual view of the ubiquitous computing applications. The unique approach will help readers for a better understanding.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cricut Joy Machine
 (6)
R4,285 Discovery Miles 42 850
Mellerware Swiss - Plastic Floor Fan…
R368 Discovery Miles 3 680
Cadac Handi Lite Gas Lamp
R599 R295 Discovery Miles 2 950
Bostik Glu Dots - Removable (64 Dots)
 (3)
R48 Discovery Miles 480
LocknLock Pet Food Container (180ml)
R47 Discovery Miles 470
Pristine Bamboo Lid Glass Jar (700ml)
R159 R75 Discovery Miles 750
Jurassic Park Trilogy Collection
Sam Neill, Laura Dern, … Blu-ray disc  (1)
R311 Discovery Miles 3 110
Pamper Fine Cuts in Jelly - Gourmet Meat…
R12 R11 Discovery Miles 110
Mellerware Plastic Oscilating Floor Fan…
R549 R497 Discovery Miles 4 970
The Lion King - Blu-Ray + DVD
Blu-ray disc R344 Discovery Miles 3 440

 

Partners