0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Analysis Techniques for Information Security (Paperback): Anupam Datta, Somesh Jha, Ninghui Li, David Melski, Thomas Reps Analysis Techniques for Information Security (Paperback)
Anupam Datta, Somesh Jha, Ninghui Li, David Melski, Thomas Reps
R1,000 Discovery Miles 10 000 Ships in 18 - 22 working days

Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher likelihood of accidental failures and malicious attacks. Disruption of services caused by such undesired events can have catastrophic effects, such as disruption of essential services and huge financial losses. The increased reliance of critical services on our cyberinfrastructure and the dire consequences of security breaches have highlighted the importance of information security. Authorization, security protocols, and software security are three central areas in security in which there have been significant advances in developing systematic foundations and analysis methods that work for practical systems. This book provides an introduction to this work, covering representative approaches, illustrated by examples, and providing pointers to additional work in the area. Table of Contents: Introduction / Foundations / Detecting Buffer Overruns Using Static Analysis / Analyzing Security Policies / Analyzing Security Protocols

Advances in Computer Science, Information Security and Privacy - 13th Asian Computing Science Conference, Seoul, Korea,... Advances in Computer Science, Information Security and Privacy - 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedings (Paperback, 2009 ed.)
Anupam Datta
R1,375 Discovery Miles 13 750 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009.

The 7 revised full papers and 3 revised short papers presented together with 2 invited talks were carefully reviewed and selected from 45 submissions. Focusing on the theory and practice of information security and privacy, the papers include topics of deducibility constraints, symmetric encryption modes, dynamic security domains and policies, cryptography, formal verification of quantum programs, decision of static equivalence, authenticated message and proxy signature scheme.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Mich Turner's Cake Masterclass - The…
Mich Turner Hardcover  (1)
R766 R282 Discovery Miles 2 820
Boardroom Dancing - Transformation…
Nolitha Fakude Paperback R320 R290 Discovery Miles 2 900
Cupcakes - Book + 3 Silicone Cupcake…
Hardcover  (3)
R149 R136 Discovery Miles 1 360
The Law Of Business Structures
Paperback R1,218 R1,055 Discovery Miles 10 550
Campaign Finance Law - A Comparative…
Orestis Omran Hardcover R1,544 Discovery Miles 15 440
The Role of Law and Ethics in the…
Joseph Straus Hardcover R2,654 Discovery Miles 26 540
Expansive - A Guide To Thinking Bigger…
John Sanei, Erik Kruger Paperback R290 R259 Discovery Miles 2 590
Business By Grace - How I Built A…
Zibusiso Mkhwanazi, Steven Zwane Paperback R340 R304 Discovery Miles 3 040
Comparative Constitutional Justice
Matteo Nicolini, Silvia Bagni Hardcover R2,822 Discovery Miles 28 220
Cuisinart Chef's Convection Toaster Oven…
Dopa Rabins Hardcover R664 Discovery Miles 6 640

 

Partners