0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Security and Privacy in Mobile Information and Communication Systems - 4th International Conference, MobiSec 2012, Frankfurt am... Security and Privacy in Mobile Information and Communication Systems - 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Pevised Selected Papers (Paperback, 2012 ed.)
Andreas U. Schmidt, Giovanni Russello, Iovannis Krontiris, Shiguro Lian
R1,829 Discovery Miles 18 290 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the fourth International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2012) held in Frankfurt/Main, Germany, in June 2012. The 13 revised full papers were carefully selected from numerous submissions and cover the application layer of security, highlighting the practical importance of security of mobile devices in concrete usages. Contributions to MobiSec 2012 range from treatments on user privacy issues, over mobile application and app security, to mobile identity management, and NFC. With the orientation toward applications, MobiSec is a perfect interface between academia and industry in the field of mobile communications.

Long-Term & Dynamical Aspects of Information Security - Emerging Trends in Information & Communication Security (Hardcover):... Long-Term & Dynamical Aspects of Information Security - Emerging Trends in Information & Communication Security (Hardcover)
Andreas U. Schmidt, Michael Kreutzer, Rafael Accorsi
R3,822 R3,222 Discovery Miles 32 220 Save R600 (16%) Ships in 12 - 17 working days

The first six papers deal with computer security technology that operates in rapidly changing environments and has to adapt to their shifting conditions. The technology or application envisaged in the second six operates or assumes a static outcome that can, for instance, be used forensically. The second half of the book contains a proposal to quantify the time scales on which IT security lives may be a major contribution of this volume. The authors identify three main axes. First, the time scale of practical relevance. It denominates approximately the middle of the time range during which the problem treated by the technology becomes imminent to the IS&T community, through the demands of the market. Second, the technological research and development (R&D) time scale. It is a forecast of when the technological solution will be "there". This means in effect the first of two milestones in technology evolution: a) when a technology has made the breakthrough to be in principle, ie: theoretically and economically applicable and viable, and b) when it is matured to reach prevalence in IS&T, ie: to become textbook standard. The second point in time hinges obviously on external factors not amenable to analysis within the discipline proper. Third, we have the event horizon of the technology in question. That deals with the issue of the sustainability of the solution: May it be surpassed by the skills of attackers using advances in other areas? Can it be foreseen that it will be overcome by even better solutions?

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Efekto 77300-G Nitrile Gloves (M)(Green)
R63 Discovery Miles 630
Cable Guys Controller and Smartphone…
R399 R359 Discovery Miles 3 590
Poor Things
Emma Stone, Mark Ruffalo, … DVD R343 Discovery Miles 3 430
Pritt Wood & Craft Glue (100ml)
R42 Discovery Miles 420
Huntlea Original Two Tone Pillow Bed…
R650 R565 Discovery Miles 5 650
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Paint by Number Kids DIY Kit…
R280 R159 Discovery Miles 1 590
Baby Dove Lotion Sensitive 200ml
R50 Discovery Miles 500
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Aerolatte Cappuccino Art Stencils (Set…
R110 R95 Discovery Miles 950

 

Partners