0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (8)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

Advances in Polymer Sciences and Technology - Select Papers from APA 2017 (Hardcover, 1st ed. 2018): Bhuvanesh Gupta, Anup K.... Advances in Polymer Sciences and Technology - Select Papers from APA 2017 (Hardcover, 1st ed. 2018)
Bhuvanesh Gupta, Anup K. Ghosh, Atsushi Suzuki, Sunita Rattan
R6,168 Discovery Miles 61 680 Ships in 10 - 15 working days

This book presents select papers presented at the annual meeting of the Asian Polymer Association. The chapters in this volume document and report on a wide range of significant recent results for various applications, as well as scientific developments in the areas of polymer science and engineering. The chapters include original research from all areas of polymer science and technology with a focus on the manufacture, processing, analysis and application of long chain polymer molecules. This book will be of interest to researchers in academia and industry alike.

E-Commerce Security and Privacy (Hardcover, 2001 ed.): Anup K. Ghosh E-Commerce Security and Privacy (Hardcover, 2001 ed.)
Anup K. Ghosh
R2,896 Discovery Miles 28 960 Ships in 10 - 15 working days

While e-commerce has experienced meteoric growth recently, security risks have similarly grown in scope and magnitude. Three major factors have driven the security risks in e-commerce: the growing reliance on the electronic medium for a company's core business, the growing complexity of the software systems needed to support e-commerce, and the value of the digital assets brought online to an inherently insecure medium - the Internet. While security has long been a primary concern in e-commerce, more recently privacy has also grown in importance to consumers. Many of the same Internet technologies that make e-commerce possible also make it possible to create detailed profiles of an individual's purchases, to spy on individual Web usage habits, and even to peer into confidential files that reside on an individual's machine. E-Commerce Security and Privacy is the first volume to pull together leading researchers and practitioners in diverse areas of computer science and software engineering to explore their technical innovations to problems in security and privacy in e-commerce. The information is drawn from selected papers presented at the first Workshop on Security and Privacy in E-Commerce (WSPEC'00) held in Athens, Greece, November 4, 2000. As such, E-Commerce Security and Privacy introduces both practitioners and researchers to innovations in secure and private e-commerce. Practitioners will gain great insight from the case studies, and researchers will learn about state-of-the-art protocols in secure and private e-commerce that will serve as the basis for future innovations in applied e-commerce technologies. E-Commerce Security and Privacy is suitable as a secondary text for agraduate level course, and as a reference for researchers and practitioners in industry.

Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Hardcover, 2013 ed.): Sushil Jajodia, Anup K.... Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Hardcover, 2013 ed.)
Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, …
R3,284 Discovery Miles 32 840 Ships in 12 - 17 working days

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing.

"Moving Target Defense II: Application of Game Theory and Adversarial Modeling "includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In thissecond volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems.

Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference."

Food Packaging - Materials,Techniques and Environmental Issues (Hardcover, 1st ed. 2022): N. C. Saha, Anup K. Ghosh, Meenakshi... Food Packaging - Materials,Techniques and Environmental Issues (Hardcover, 1st ed. 2022)
N. C. Saha, Anup K. Ghosh, Meenakshi Garg, Susmita Dey Sadhu; Contributions by Deepak Manchanda, …
R4,918 Discovery Miles 49 180 Ships in 12 - 17 working days

This comprehensive and authoritative book aims to encompass the best and current practices in the field of contemporary food packaging. It covers various aspects of packaging, including challenges and their solutions, innovations, and environmental concerns. Written by experts working in the field, the content is supported by technical/statistical data, practical examples, case studies, and real-life experiences of academicians and professionals working in the area of food packaging. The book covers challenges in food packaging, systems and materials for packaging, packaging design requirements of the food industry, technology machinery and system, printing and graphics, testing and regulatory aspects, advanced and smart packaging, distribution and logistics in a globalized environment, and sustainable and green packaging. This book will be useful for Packaging Technologists, food scientists, material scientists, policy makers, students, and researchers.

Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Hardcover, 2011 ed.): Sushil Jajodia, Anup K. Ghosh,... Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Hardcover, 2011 ed.)
Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X.Sean Wang
R3,617 Discovery Miles 36 170 Ships in 10 - 15 working days

"Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats" was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more.

"Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats" is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.

Food Packaging - Materials,Techniques and Environmental Issues (1st ed. 2022): N. C. Saha, Anup K. Ghosh, Meenakshi Garg,... Food Packaging - Materials,Techniques and Environmental Issues (1st ed. 2022)
N. C. Saha, Anup K. Ghosh, Meenakshi Garg, Susmita Dey Sadhu; Contributions by Deepak Manchanda, …
R3,526 Discovery Miles 35 260 Ships in 10 - 15 working days

This comprehensive and authoritative book aims to encompass the best and current practices in the field of contemporary food packaging. It covers various aspects of packaging, including challenges and their solutions, innovations, and environmental concerns. Written by experts working in the field, the content is supported by technical/statistical data, practical examples, case studies, and real-life experiences of academicians and professionals working in the area of food packaging. The book covers challenges in food packaging, systems and materials for packaging, packaging design requirements of the food industry, technology machinery and system, printing and graphics, testing and regulatory aspects, advanced and smart packaging, distribution and logistics in a globalized environment, and sustainable and green packaging. This book will be useful for Packaging Technologists, food scientists, material scientists, policy makers, students, and researchers.  

Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Paperback, 2013 ed.): Sushil Jajodia, Anup K.... Moving Target Defense II - Application of Game Theory and Adversarial Modeling (Paperback, 2013 ed.)
Sushil Jajodia, Anup K. Ghosh, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, …
R3,357 Discovery Miles 33 570 Ships in 10 - 15 working days

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing. Moving Target Defense II: Application of Game Theory and Adversarial Modeling includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In this second volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems. Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference.

Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Paperback, 2011 ed.): Sushil Jajodia, Anup K. Ghosh,... Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (Paperback, 2011 ed.)
Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X.Sean Wang
R2,549 Discovery Miles 25 490 Ships in 10 - 15 working days

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.

E-Commerce Security and Privacy (Paperback, Softcover reprint of the original 1st ed. 2001): Anup K. Ghosh E-Commerce Security and Privacy (Paperback, Softcover reprint of the original 1st ed. 2001)
Anup K. Ghosh
R2,759 Discovery Miles 27 590 Ships in 10 - 15 working days

While e-commerce has experienced meteoric growth recently, security risks have similarly grown in scope and magnitude. Three major factors have driven the security risks in e-commerce: the growing reliance on the electronic medium for a company's core business, the growing complexity of the software systems needed to support e-commerce, and the value of the digital assets brought online to an inherently insecure medium - the Internet. While security has long been a primary concern in e-commerce, more recently privacy has also grown in importance to consumers. Many of the same Internet technologies that make e-commerce possible also make it possible to create detailed profiles of an individual's purchases, to spy on individual Web usage habits, and even to peer into confidential files that reside on an individual's machine. E-Commerce Security and Privacy is the first volume to pull together leading researchers and practitioners in diverse areas of computer science and software engineering to explore their technical innovations to problems in security and privacy in e-commerce.The information is drawn from selected papers presented at the first Workshop on Security and Privacy in E-Commerce (WSPEC'00) held in Athens, Greece, November 4, 2000. As such, E-Commerce Security and Privacy introduces both practitioners and researchers to innovations in secure and private e-commerce. Practitioners will gain great insight from the case studies, and researchers will learn about state-of-the-art protocols in secure and private e-commerce that will serve as the basis for future innovations in applied e-commerce technologies. E-Commerce Security and Privacy is suitable as a secondary text for a graduate level course, and as a reference for researchers and practitioners in industry.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Alcolin Cold Glue (500ml)
R101 Discovery Miles 1 010
6mm Yoga Mat & Carry Bag [Blue]
R191 Discovery Miles 1 910
Goldair Oscillating Fan Heater
R459 R399 Discovery Miles 3 990
Samsung EO-IA500BBEGWW Wired In-ear…
R299 R249 Discovery Miles 2 490
Elvis
Baz Luhrmann Blu-ray disc R191 R171 Discovery Miles 1 710
Dig & Discover: Dinosaurs - Excavate 2…
Hinkler Pty Ltd Kit R256 R222 Discovery Miles 2 220
Home Classix Placemats - Beachwood (Set…
R59 R51 Discovery Miles 510
Microsoft Xbox Series X Console (1TB)
 (21)
R14,999 Discovery Miles 149 990
Blood Brothers - To Battleground…
Deon Lamprecht Paperback  (1)
R290 R195 Discovery Miles 1 950
Multi-Functional Bamboo Standing Laptop…
R1,399 R669 Discovery Miles 6 690

 

Partners