0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

Secure Broadcast Communication - In Wired and Wireless Networks (Hardcover, 2003 ed.): Adrian Perrig, J. D. Tygar Secure Broadcast Communication - In Wired and Wireless Networks (Hardcover, 2003 ed.)
Adrian Perrig, J. D. Tygar
R3,010 Discovery Miles 30 100 Ships in 10 - 15 working days

Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including:
*key distribution for access control,
*source authentication of transmissions, and
*non-repudiation of streams.

This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network.

This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.

SCION: A Secure Internet Architecture (Hardcover, 1st ed. 2017): Adrian Perrig, Pawel Szalachowski, Raphael M. Reischuk,... SCION: A Secure Internet Architecture (Hardcover, 1st ed. 2017)
Adrian Perrig, Pawel Szalachowski, Raphael M. Reischuk, Laurent Chuat
R2,546 R2,244 Discovery Miles 22 440 Save R302 (12%) Ships in 12 - 19 working days

This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security and high availability. Among its core features, SCION also provides route control, explicit trust information, multipath communication, scalable quality-of-service guarantees, and efficient forwarding. The book includes functional specifications of the network elements, communication protocols among these elements, data structures, and configuration files. In particular, the book offers a specification of a working prototype. The authors provide a comprehensive description of the main design features for achieving a secure Internet architecture. They facilitate the reader throughout, structuring the book so that the technical detail gradually increases, and supporting the text with a glossary, an index, a list of abbreviations, answers to frequently asked questions, and special highlighting for examples and for sections that explain important research, engineering, and deployment features. The book is suitable for researchers, practitioners, and graduate students who are interested in network security.

Information Security Applications - 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised... Information Security Applications - 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers (Paperback, 2014)
Yongdae Kim, Heejo Lee, Adrian Perrig
R2,296 Discovery Miles 22 960 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 14th International Workshop on Information Security Applications, WISA 2013, held on Jeju Island, Korea, in August 2013. The 15 revised full papers and 2 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections such as cryptography, social network security, mobile security, network security, future applications and privacy.

Secure Broadcast Communication - In Wired and Wireless Networks (Paperback, Softcover reprint of the original 1st ed. 2003):... Secure Broadcast Communication - In Wired and Wireless Networks (Paperback, Softcover reprint of the original 1st ed. 2003)
Adrian Perrig, J. D. Tygar
R2,858 Discovery Miles 28 580 Ships in 10 - 15 working days

Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including:
*key distribution for access control,
*source authentication of transmissions, and
*non-repudiation of streams.

This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network.

This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.

Bootstrapping Trust in Modern Computers (Paperback, Edition.): Bryan Parno, Jonathan M. McCune, Adrian Perrig Bootstrapping Trust in Modern Computers (Paperback, Edition.)
Bryan Parno, Jonathan M. McCune, Adrian Perrig
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data). Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer. We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans. This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security.

The Complete Guide to SCION - From Design Principles to Formal Verification (1st ed. 2022): Laurent Chuat, Markus Legner, David... The Complete Guide to SCION - From Design Principles to Formal Verification (1st ed. 2022)
Laurent Chuat, Markus Legner, David Basin, David Hausheer, Samuel Hitz, …
R2,740 Discovery Miles 27 400 Ships in 10 - 15 working days

When the SCION project started in 2009, the goal was to create an architecture offering high availability and security for basic point-to-point communication. In the five years since the publication of SCION: A Secure Internet Architecture, this next-generation Internet architecture has evolved in terms of both design and deployment. On the one hand, there has been development of exciting new concepts and systems, including a new global time-synchronization system, an inter-domain approach for bandwidth reservations called COLIBRI, and Green Networking, which allows combating global climate change on three fronts. On the other hand, SCION is now also in production use by the Swiss financial ecosystem, and enables participants such as the Swiss National Bank, the Swiss provider of clearing services (SIX), and all Swiss financial institutes to communicate securely and reliably with each other via the Secure Swiss Finance Network. This unique guidebook provides an updated description of SCION's main components, covering new research topics and the most recent deployments. In particular, it presents in-depth discussion of formal verification efforts. Importantly, it offers a comprehensive, thorough description of the current SCION system: Describes the principles that guided SCION's design as a secure and robust Internet architecture Provides a comprehensive description of the next evolution in the way data finds its way through the Internet Explains how SCION can contribute to reducing carbon emissions, by introducing SCION Green Networking Demonstrates how SCION not only functions in academic settings but also works in production deployments Discusses additional use cases for driving SCION's adoption Presents the approaches for formal verification of protocols and code  Illustrated with many colorful figures, pictures, and diagrams, allowing easy access to the concepts and use cases  Assembled by a team with extensive experience in the fields of computer networks and security, this text/reference is suitable for researchers, practitioners, and graduate students interested in network security. Also, readers with limited background in computer networking but with a desire to know more about SCION will benefit from an overview of relevant chapters in the beginning of the book.

The Complete Guide to SCION - From Design Principles to Formal Verification (Hardcover, 1st ed. 2022): Laurent Chuat, Markus... The Complete Guide to SCION - From Design Principles to Formal Verification (Hardcover, 1st ed. 2022)
Laurent Chuat, Markus Legner, David Basin, David Hausheer, Samuel Hitz, …
R3,946 R3,238 Discovery Miles 32 380 Save R708 (18%) Ships in 12 - 19 working days

When the SCION project started in 2009, the goal was to create an architecture offering high availability and security for basic point-to-point communication. In the five years since the publication of SCION: A Secure Internet Architecture, this next-generation Internet architecture has evolved in terms of both design and deployment. On the one hand, there has been development of exciting new concepts and systems, including a new global time-synchronization system, an inter-domain approach for bandwidth reservations called COLIBRI, and Green Networking, which allows combating global climate change on three fronts. On the other hand, SCION is now also in production use by the Swiss financial ecosystem, and enables participants such as the Swiss National Bank, the Swiss provider of clearing services (SIX), and all Swiss financial institutes to communicate securely and reliably with each other via the Secure Swiss Finance Network. This unique guidebook provides an updated description of SCION's main components, covering new research topics and the most recent deployments. In particular, it presents in-depth discussion of formal verification efforts. Importantly, it offers a comprehensive, thorough description of the current SCION system: Describes the principles that guided SCION's design as a secure and robust Internet architecture Provides a comprehensive description of the next evolution in the way data finds its way through the Internet Explains how SCION can contribute to reducing carbon emissions, by introducing SCION Green Networking Demonstrates how SCION not only functions in academic settings but also works in production deployments Discusses additional use cases for driving SCION's adoption Presents the approaches for formal verification of protocols and code Illustrated with many colorful figures, pictures, and diagrams, allowing easy access to the concepts and use cases Assembled by a team with extensive experience in the fields of computer networks and security, this text/reference is suitable for researchers, practitioners, and graduate students interested in network security. Also, readers with limited background in computer networking but with a desire to know more about SCION will benefit from an overview of relevant chapters in the beginning of the book.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Effective Blended Learning Practices…
Elizabeth Stacey (Deakin University, Burwood, Victoria, Australia), Philippa Gerbic Hardcover R5,371 Discovery Miles 53 710
Camp Abahati - A Place, A Destination, A…
Ronald Richards Hardcover R628 Discovery Miles 6 280
Cases on Global E-learning Practices…
Hardcover R2,585 Discovery Miles 25 850
Falling Monuments, Reluctant Ruins - The…
Hilton Judin Paperback R395 R365 Discovery Miles 3 650
Apprentice In Wonderland - How Donald…
Ramin Setoodeh Hardcover R669 R585 Discovery Miles 5 850
The Soulful Home Design Guide - Fill…
Natalia Kaylin Hardcover R687 R619 Discovery Miles 6 190
Precarious Power - Compliance And…
Susan Booysen Paperback  (4)
R380 R351 Discovery Miles 3 510
The Dump Files Bathroom Guest Book…
Midnight Mornings Media Hardcover R921 Discovery Miles 9 210
Bismuth-Containing Compounds
Handong Li, Zhiming M. Wang Hardcover R5,147 Discovery Miles 51 470
The Amazing Spider-Man
Stan Lee, Steve Ditko Hardcover R1,356 R913 Discovery Miles 9 130

 

Partners