0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Security, Privacy and User Interaction (Hardcover, 1st ed. 2020): Markus Jakobsson Security, Privacy and User Interaction (Hardcover, 1st ed. 2020)
Markus Jakobsson
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails. This book goes on to explain, using a series of examples, how to rethink security solutions to take users into consideration. By understanding the limitations and habits of users - including malicious users, aiming to corrupt the system - this book Illustrates how better security technologies are made possible. Traditional security books focus on one of the following areas: cryptography, security protocols, or existing standards. They rarely consider the end user as part of the security equation, and when they do, it is in passing. This book considers the end user as the most important design consideration, and then shows how to build security and privacy technologies that are both secure and which offer privacy. This reduces the risk for social engineering and, in general, abuse. Advanced-level students interested in software engineering, security and HCI (Human Computer Interaction) will find this book useful as a study guide. Engineers and security practitioners concerned with abuse and fraud will also benefit from the methodologies and techniques in this book.

Understanding Social Engineering Based Scams (Paperback, Softcover reprint of the original 1st ed. 2016): Markus Jakobsson Understanding Social Engineering Based Scams (Paperback, Softcover reprint of the original 1st ed. 2016)
Markus Jakobsson
R3,212 Discovery Miles 32 120 Ships in 10 - 15 working days

This book describes trends in email scams and offers tools and techniques to identify such trends. It also describes automated countermeasures based on an understanding of the type of persuasive methods used by scammers. It reviews both consumer-facing scams and enterprise scams, describing in-depth case studies relating to Craigslist scams and Business Email Compromise Scams. This book provides a good starting point for practitioners, decision makers and researchers in that it includes alternatives and complementary tools to the currently deployed email security tools, with a focus on understanding the metrics of scams. Both professionals working in security and advanced-level students interested in privacy or applications of computer science will find this book a useful reference.

Understanding Social Engineering Based Scams (Hardcover, 1st ed. 2016): Markus Jakobsson Understanding Social Engineering Based Scams (Hardcover, 1st ed. 2016)
Markus Jakobsson
R3,602 Discovery Miles 36 020 Ships in 10 - 15 working days

This book describes trends in email scams and offers tools and techniques to identify such trends. It also describes automated countermeasures based on an understanding of the type of persuasive methods used by scammers. It reviews both consumer-facing scams and enterprise scams, describing in-depth case studies relating to Craigslist scams and Business Email Compromise Scams. This book provides a good starting point for practitioners, decision makers and researchers in that it includes alternatives and complementary tools to the currently deployed email security tools, with a focus on understanding the metrics of scams. Both professionals working in security and advanced-level students interested in privacy or applications of computer science will find this book a useful reference.

Mobile Authentication - Problems and Solutions (Paperback, 2013 ed.): Markus Jakobsson Mobile Authentication - Problems and Solutions (Paperback, 2013 ed.)
Markus Jakobsson
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

"Mobile Authentication: Problems and Solutions" looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the old days of computer security-before 2000, the human component was all but disregarded. It was either assumed that people should and would be able to follow instructions, or that end users were hopeless and would always make mistakes. The truth, of course, is somewhere in between, which is exactly what makes this topic so enticing. We cannot make progress with human-to-machine authentication without understanding both humans and machines. Mobile security is not simply security ported to a handset. Handsets have different constraints than traditional computers, and are used in a different way. Text entry is more frustrating, and therefore, it is tempting to use shorter and less complex passwords. It is also harder to detect spoofing. We need to design with this in mind. We also need to determine how exactly to integrate biometric readers to reap the maximum benefits from them. This book addresses all of these issues, and more.

Applied Cryptography and Network Security - Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11,... Applied Cryptography and Network Security - Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings (Paperback, 2004 ed.)
Markus Jakobsson, Moti Yung, Jianying Zhou
R3,207 Discovery Miles 32 070 Ships in 10 - 15 working days

The second International Conference on Applied Cryptography and Network Security (ACNS 2004) was sponsored and organized by ICISA (the International Communications and Information Security Association). It was held in Yellow Mountain, China, June 8-11, 2004. The conference proceedings, representing papers from the academic track, are published in this volume of the Lecture Notes in Computer Science (LNCS) of Springer-Verlag. The area of research that ACNS covers has been gaining importance in recent years due to the development of the Internet, which, in turn, implies global exposure of computing resources. Many ?elds of research were covered by the program of this track, presented in this proceedings volume. We feel that the papers herein indeed re?ect the state of the art in security and cryptography research, worldwide. The program committee of the conference received a total of 297 submissions from all over the world, of which 36 submissions were selected for presentation during the academic track. In addition to this track, the conference also hosted a technical/industrial track of presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas.

Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta,... Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers (Paperback, 1st ed. 2017)
Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y. A. Ryan, …
R3,545 Discovery Miles 35 450 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of 5 workshops held at the 21st International Conference on Financial Cryptography and Data Security, FC 2017, in Sliema, Malta, in April 2017.The 39 full papers presented were carefully reviewed and selected from 96 submissions. They feature the outcome of the 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2017, the 4th Workshop on Bitcoin and Blockchain Research, BITCOIN 2017, the Second Workshop on Secure Voting Systems, VOTING 2017, the First Workshop on Trusted Smart Contracts, WTSC 2017, and the First Workshop on Targeted Attacks, TA 2017.The papers are grouped in topical sections named: encrypted computing and applied homomorphic cryptography; bitcoin and blockchain research; advances in secure electronic voting schemes; trusted smart contracts; targeted attacks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Multi Colour Jungle Stripe Neckerchief
R119 Discovery Miles 1 190
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Bug-A-Salt 3.0 Black Fly
 (1)
R999 Discovery Miles 9 990
Silicone Cellphone Card Holder [Black]
R10 Discovery Miles 100
Jane's Delicious A-Z Of Herbs - A Guide…
Jane Griffiths Paperback  (2)
R350 R280 Discovery Miles 2 800
Cricut Joy Machine
 (6)
R4,854 Discovery Miles 48 540
Fisher-Price Laugh & Learn Smart Stages…
 (1)
R499 R399 Discovery Miles 3 990
Wildberry Bath Mat (Blue)
R89 R40 Discovery Miles 400
The Walking Dead - Season 1 / 2 / 3 / 4
Andrew Lincoln Blu-ray disc  (1)
R288 Discovery Miles 2 880
Harry's House
Harry Styles CD  (1)
R238 R197 Discovery Miles 1 970

 

Partners