0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 19 of 19 matches in All Departments

Empty Earth - Graphic Reluctant Reader: Kris Knight Empty Earth - Graphic Reluctant Reader
Kris Knight; Illustrated by Sara Foresti
R221 R181 Discovery Miles 1 810 Save R40 (18%) Ships in 9 - 15 working days
Batman's Most Wanted: Michael Anthony Steele Batman's Most Wanted
Michael Anthony Steele; Illustrated by Sara Foresti
R221 R181 Discovery Miles 1 810 Save R40 (18%) Ships in 9 - 15 working days

When Gotham City’s biggest baddies gather to plan a heist, they tell Harley to go wait with the goons! What?! But the joke is on them after Batman busts in and she sneaks out holding blueprints that show the way to the crooked payday. Can the jilted jester pull off a solo steal while dodging the criminal bosses on her tail? Find out in this action-packed chapter book for DC Super Hero and Super-Villain fans!

The Riddler and the Jinx: Michael Anthony Steele The Riddler and the Jinx
Michael Anthony Steele; Illustrated by Sara Foresti
R221 R181 Discovery Miles 1 810 Save R40 (18%) Ships in 9 - 15 working days

When Harley ruins the Riddler’s carefully constructed scheme to capture Batman, she’s determined to show the calculating crook that she’s no bad-luck jinx. She’ll use her brilliantly bonkers mind to write confounding rhymes of her own! In this battle of wits, can the jolly jester prove there’s a method to her madness? Find out in this action-packed chapter book for DC Super Hero and Super-Villain fans!

Jinx (Graphic Reluctant Reader) (Paperback): Chloe Lewis Jinx (Graphic Reluctant Reader) (Paperback)
Chloe Lewis; Illustrated by Sara Foresti 1
R213 R173 Discovery Miles 1 730 Save R40 (19%) Ships in 9 - 15 working days
The Joker Hideout Heist (Paperback): Steve Brezenoff The Joker Hideout Heist (Paperback)
Steve Brezenoff; Illustrated by Sara Foresti
R216 R175 Discovery Miles 1 750 Save R41 (19%) Ships in 9 - 15 working days

When Harley's hyenas are taken hostage, it's no laughing matter! The culprit is the Clown Prince of Crime, and landing a punch line on her part-time partner won't be easy. Can Harley find a way to crash the Joker's hideout, free her beloved pets, and prove, once and for all, that the joke is really on him? Find out in this action-packed chapter book for DC Super Hero and Super-Villain fans!

Poison Ivy's Big Boss in Bloom (Paperback): Michael Anthony Steele Poison Ivy's Big Boss in Bloom (Paperback)
Michael Anthony Steele; Illustrated by Sara Foresti
R216 R175 Discovery Miles 1 750 Save R41 (19%) Ships in 9 - 15 working days

When Harley springs Poison Ivy from Arkham Asylum, the jaunty jester expects a little payback. After all, there's no limit to the criminal empire she could grow with the Queen of Green's help. But will Harley bloom into the big boss she's always wanted to become, or will her villainous dreams wilt on the vine? Find out in this action-packed chapter book for DC Super Hero and Super-Villain fans!

Batman's Most Wanted (Hardcover): Michael Anthony Steele Batman's Most Wanted (Hardcover)
Michael Anthony Steele; Illustrated by Sara Foresti
R688 R558 Discovery Miles 5 580 Save R130 (19%) Ships in 10 - 15 working days
Sally Snowboarder (Paperback): Amit Tayal Sally Snowboarder (Paperback)
Amit Tayal; Nancy Harris; Illustrated by Sara Foresti
R195 Discovery Miles 1 950 Ships in 12 - 17 working days

Everyone in her family loves to ski, except Sally. Will Sally ever fit in or will she find her own way to shine on the slopes?

Treasure of the Gold Dragon: A Branches Book (Dragon Masters #12) - Volume 12 (Paperback): Tracey West Treasure of the Gold Dragon: A Branches Book (Dragon Masters #12) - Volume 12 (Paperback)
Tracey West; Illustrated by Sara Foresti 1
R147 R123 Discovery Miles 1 230 Save R24 (16%) Ships in 10 - 15 working days

The race is on to find the Gold Key! Pick a book. Grow a Reader! This series is part of Scholastic's early chapter book line, Branches, aimed at newly independent readers. With easy-to-read text, high-interest content, fast-paced plots, and illustrations on every page, these books will boost reading confidence and stamina. Branches books help readers grow. In the 12th book of this fantasy series, Maldred is after the powerful Gold Key! Drake and Rori travel to the lair of the Gold Dragon to help protect the key. There, they meet a new Dragon Master named Darma. If dark wizard Maldred gets his hands on the Gold Key, he will be one step closer to controlling a powerful Earthquake Dragon. Can the Dragon Masters stop him before it's too late? The action is nonstop in this exciting, heavily illustrated early chapter book series!

Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA,... Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Noseong Park, Kun Sun, Sara Foresti, Kevin Butler, Nitesh Saxena
R3,037 Discovery Miles 30 370 Ships in 10 - 15 working days

This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020. The conference was held virtually due to COVID-19 pandemic. The 60 full papers were carefully reviewed and selected from 120 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.

Preserving Privacy in Data Outsourcing (Paperback, 2011 ed.): Sara Foresti Preserving Privacy in Data Outsourcing (Paperback, 2011 ed.)
Sara Foresti
R2,957 Discovery Miles 29 570 Ships in 10 - 15 working days

Foreword by Pierangela Samarati

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release.

Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data; it allows the data owner to outsource not only the data but the security policy itself. The last section of this book investigates the problem of executing queries over possible data distributed at different servers. Case Studies will be provided.

About this book:

Exclusively focuses on addressing protection of confidential information in the emerging data outsourcing scenarios.

Presents relevant and critical novel problems and novel techniques, a precious reference point to students, researchers, and developers in this field.

Provides a comprehensive overview of the data protection problem in outsourcing scenarios, as well as a rigorous analysis and formalization of the problem and solutions to it.

Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.

Computer Security -- ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12,... Computer Security -- ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings (Paperback, 2012 ed.)
Sara Foresti, Moti Yung, Fabio Martinelli
R1,753 Discovery Miles 17 530 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security.

Preserving Privacy in Data Outsourcing (Hardcover, 2011 Ed.): Sara Foresti Preserving Privacy in Data Outsourcing (Hardcover, 2011 Ed.)
Sara Foresti
R3,075 Discovery Miles 30 750 Ships in 10 - 15 working days

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release.

Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data, allowing the data owner to outsource not only the data but the security policy itself. To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to protect privacy of data associations and provide fragmentation as a complementary means for protecting privacy: associations broken by fragmentation will be visible only to users authorized (by knowing the proper key) to join fragments. The book finally investigates the problem of executing queries over possible data distributed at different servers and which must be controlled to ensure sensitive information and sensitive associations be visible only to parties authorized for that. Case Studies are provided throughout the book.

Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.

Treasure of the Gold Dragon: A Branches Book (Dragon Masters #12) - Volume 12 (Hardcover, Library ed.): Tracey West Treasure of the Gold Dragon: A Branches Book (Dragon Masters #12) - Volume 12 (Hardcover, Library ed.)
Tracey West; Illustrated by Sara Foresti
R435 R412 Discovery Miles 4 120 Save R23 (5%) Ships in 10 - 15 working days
Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA,... Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Noseong Park, Kun Sun, Sara Foresti, Kevin Butler, Nitesh Saxena
R1,624 Discovery Miles 16 240 Ships in 10 - 15 working days

This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020. The conference was held virtually due to COVID-19 pandemic. The 60 full papers were carefully reviewed and selected from 120 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.

Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings... Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings (Paperback, 1st ed. 2016)
Sara Foresti, Giuseppe Persiano
R1,710 Discovery Miles 17 100 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016. The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: cryptanalysis of symmetric key; side channel attacks and implementation; lattice-based cryptography, virtual private network; signatures and hash; multi party computation; symmetric cryptography and authentication; system security, functional and homomorphic encryption; information theoretic security; malware and attacks; multi party computation and functional encryption; and network security, privacy, and authentication.

Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece,... Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings (Paperback, 1st ed. 2016)
Sara Foresti, Javier Lopez
R2,380 Discovery Miles 23 800 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the 10th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2016, held in Heraklion, Crete, Greece, in September 2016. The 13 revised full papers and 5 short papers presented together in this book were carefully reviewed and selected from 29 submissions. WISTP 2016 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. The papers are organized in topical sections on authentication and key management; secure hardware systems; attacks to software and network systems; and access control and data protection.

Security and Trust Management - 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings... Security and Trust Management - 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings (Paperback, 1st ed. 2015)
Sara Foresti
R2,442 Discovery Miles 24 420 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management, STM 2015, held in Vienna, Austria, in September 2015, in conjunction with the 20th European Symposium Research in Computer Security, ESORICS 2015. The 15 revised full papers were carefully reviewed and selected from 38 submissions. They are organized in topical sections as security metrics and classification; data protection; intrusion detection and software vulnerabilities; cryptographic protocols; controlling data release; and security analysis, risk management and usability.

The President Wears Pink (Hardcover): Mandana Vetto The President Wears Pink (Hardcover)
Mandana Vetto; Illustrated by Sara Foresti
R505 Discovery Miles 5 050 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Singapore Then and Now (R)
Vaughan Grylls Hardcover R515 R400 Discovery Miles 4 000
The Half Life of Love
Brianna Bourne Paperback R218 Discovery Miles 2 180
Dynamic Auditing - A Student Edition
B. Marx, A. van der Watt, … Paperback R1,231 R1,094 Discovery Miles 10 940
Disruptive Thinking - A Daring Strategy…
T.D. Jakes Paperback R299 R246 Discovery Miles 2 460
Hue 1968 - A Turning Point of the…
Mark Bowden Paperback R652 R572 Discovery Miles 5 720
The Boy Who Got Accidentally Famous
David Baddiel Paperback R329 Discovery Miles 3 290
Business Logistics Management
Wessel Pienaar, John Vogt, … Paperback R599 R554 Discovery Miles 5 540
Bite Risk: Caught Dead
S.J. Wills Paperback R240 R165 Discovery Miles 1 650
Supplier Relationship Management…
Jonathan O'Brien Hardcover R4,785 Discovery Miles 47 850
Rolling Back the Years
Chris Barber and His Jazz Band, Acker Bilk and His Paramount Jazz Band, … CD R89 Discovery Miles 890

 

Partners