0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Analysis Techniques for Information Security (Paperback): Anupam Datta, Somesh Jha, Ninghui Li, David Melski, Thomas Reps Analysis Techniques for Information Security (Paperback)
Anupam Datta, Somesh Jha, Ninghui Li, David Melski, Thomas Reps
R1,079 Discovery Miles 10 790 Ships in 10 - 15 working days

Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher likelihood of accidental failures and malicious attacks. Disruption of services caused by such undesired events can have catastrophic effects, such as disruption of essential services and huge financial losses. The increased reliance of critical services on our cyberinfrastructure and the dire consequences of security breaches have highlighted the importance of information security. Authorization, security protocols, and software security are three central areas in security in which there have been significant advances in developing systematic foundations and analysis methods that work for practical systems. This book provides an introduction to this work, covering representative approaches, illustrated by examples, and providing pointers to additional work in the area. Table of Contents: Introduction / Foundations / Detecting Buffer Overruns Using Static Analysis / Analyzing Security Policies / Analyzing Security Protocols

Advances in Computer Science, Information Security and Privacy - 13th Asian Computing Science Conference, Seoul, Korea,... Advances in Computer Science, Information Security and Privacy - 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedings (Paperback, 2009 ed.)
Anupam Datta
R1,486 Discovery Miles 14 860 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009.

The 7 revised full papers and 3 revised short papers presented together with 2 invited talks were carefully reviewed and selected from 45 submissions. Focusing on the theory and practice of information security and privacy, the papers include topics of deducibility constraints, symmetric encryption modes, dynamic security domains and policies, cryptography, formal verification of quantum programs, decision of static equivalence, authenticated message and proxy signature scheme.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Yule - The Ultimate Guide to the Winter…
Mari Silva Hardcover R681 R608 Discovery Miles 6 080
The Library Thief
Kuchenga Shenje Paperback R395 R353 Discovery Miles 3 530
Linux - The Ultimate Beginner's Guide to…
Ryan Turner Hardcover R1,062 R891 Discovery Miles 8 910
The Bridge to the New Testament - A…
Denny Sissom Hardcover R2,121 Discovery Miles 21 210
And Another Thing ... - Douglas Adams…
Eoin Colfer Paperback  (2)
R337 R306 Discovery Miles 3 060
Toward Uniformly Accepted Principles for…
Nudrat Ejaz Piracha Hardcover R6,526 Discovery Miles 65 260
Neurological Complications of Systemic…
Herbert B. Newton, Mark G Malkin Hardcover R5,342 Discovery Miles 53 420
ZIF-8 Based Materials for Pharmaceutical…
Awais Ahmad, Muhammad Pervaiz, … Hardcover R5,101 Discovery Miles 51 010
Fi - A Memoir Of My Son
Alexandra Fuller Paperback R440 R393 Discovery Miles 3 930
Patriot Xporter Core USB 3.2 Gen 1 Flash…
R199 R169 Discovery Miles 1 690

 

Partners