0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Analysis Techniques for Information Security (Paperback): Anupam Datta, Somesh Jha, Ninghui Li, David Melski, Thomas Reps Analysis Techniques for Information Security (Paperback)
Anupam Datta, Somesh Jha, Ninghui Li, David Melski, Thomas Reps
R1,097 Discovery Miles 10 970 Ships in 10 - 15 working days

Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher likelihood of accidental failures and malicious attacks. Disruption of services caused by such undesired events can have catastrophic effects, such as disruption of essential services and huge financial losses. The increased reliance of critical services on our cyberinfrastructure and the dire consequences of security breaches have highlighted the importance of information security. Authorization, security protocols, and software security are three central areas in security in which there have been significant advances in developing systematic foundations and analysis methods that work for practical systems. This book provides an introduction to this work, covering representative approaches, illustrated by examples, and providing pointers to additional work in the area. Table of Contents: Introduction / Foundations / Detecting Buffer Overruns Using Static Analysis / Analyzing Security Policies / Analyzing Security Protocols

Advances in Computer Science, Information Security and Privacy - 13th Asian Computing Science Conference, Seoul, Korea,... Advances in Computer Science, Information Security and Privacy - 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedings (Paperback, 2009 ed.)
Anupam Datta
R1,518 Discovery Miles 15 180 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009.

The 7 revised full papers and 3 revised short papers presented together with 2 invited talks were carefully reviewed and selected from 45 submissions. Focusing on the theory and practice of information security and privacy, the papers include topics of deducibility constraints, symmetric encryption modes, dynamic security domains and policies, cryptography, formal verification of quantum programs, decision of static equivalence, authenticated message and proxy signature scheme.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Clare - The Killing Of A Gentle Activist
Christopher Clark Paperback R360 R309 Discovery Miles 3 090
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Southpaw
Jake Gyllenhaal, Forest Whitaker, … DVD R99 R24 Discovery Miles 240
Chicco Natural Feeling Teat (Medium Flow…
R80 Discovery Miles 800
Baby Dove Soap Bar Rich Moisture 75g
R20 Discovery Miles 200
Large 1680D Boys & Girls Backpack…
R507 Discovery Miles 5 070
Bostik Clear on Blister Card (25ml)
R38 Discovery Miles 380
Bostik Easy Tear Tape (12mm x 33m)
R32 Discovery Miles 320
Bostik Double-Sided Tape (18mm x 10m…
 (1)
R31 Discovery Miles 310
Konix Naruto Gamepad for Nintendo Switch…
R699 R599 Discovery Miles 5 990

 

Partners