0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Analysis Techniques for Information Security (Paperback): Anupam Datta, Somesh Jha, Ninghui Li, David Melski, Thomas Reps Analysis Techniques for Information Security (Paperback)
Anupam Datta, Somesh Jha, Ninghui Li, David Melski, Thomas Reps
R1,000 Discovery Miles 10 000 Ships in 18 - 22 working days

Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher likelihood of accidental failures and malicious attacks. Disruption of services caused by such undesired events can have catastrophic effects, such as disruption of essential services and huge financial losses. The increased reliance of critical services on our cyberinfrastructure and the dire consequences of security breaches have highlighted the importance of information security. Authorization, security protocols, and software security are three central areas in security in which there have been significant advances in developing systematic foundations and analysis methods that work for practical systems. This book provides an introduction to this work, covering representative approaches, illustrated by examples, and providing pointers to additional work in the area. Table of Contents: Introduction / Foundations / Detecting Buffer Overruns Using Static Analysis / Analyzing Security Policies / Analyzing Security Protocols

Advances in Computer Science, Information Security and Privacy - 13th Asian Computing Science Conference, Seoul, Korea,... Advances in Computer Science, Information Security and Privacy - 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedings (Paperback, 2009 ed.)
Anupam Datta
R1,375 Discovery Miles 13 750 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009.

The 7 revised full papers and 3 revised short papers presented together with 2 invited talks were carefully reviewed and selected from 45 submissions. Focusing on the theory and practice of information security and privacy, the papers include topics of deducibility constraints, symmetric encryption modes, dynamic security domains and policies, cryptography, formal verification of quantum programs, decision of static equivalence, authenticated message and proxy signature scheme.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Katvis
Annelie Botes Paperback  (1)
R360 R332 Discovery Miles 3 320
The Watchmaker's Hand
Jeffery Deaver Paperback R475 Discovery Miles 4 750
Sleeper
Mike Nicol Paperback R300 R277 Discovery Miles 2 770
Return To The Wild
James Hendry Paperback  (3)
R340 R308 Discovery Miles 3 080
Crossfire
Wilbur Smith, David Churchill Hardcover R399 R362 Discovery Miles 3 620
Oath Of Loyalty
Kyle Mills Paperback R414 R388 Discovery Miles 3 880
Die Wet Van Gauteng
Hannes Barnard Paperback R370 R330 Discovery Miles 3 300
The Family Lawyer - 3-in-One Collection
James Patterson Paperback  (1)
R295 R271 Discovery Miles 2 710
The Match
Harlan Coben Paperback R379 Discovery Miles 3 790
Monster
Rudie van Rensburg Paperback R365 R326 Discovery Miles 3 260

 

Partners