0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Analysis Techniques for Information Security (Paperback): Anupam Datta, Somesh Jha, Ninghui Li, David Melski, Thomas Reps Analysis Techniques for Information Security (Paperback)
Anupam Datta, Somesh Jha, Ninghui Li, David Melski, Thomas Reps
R1,097 Discovery Miles 10 970 Ships in 10 - 15 working days

Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher likelihood of accidental failures and malicious attacks. Disruption of services caused by such undesired events can have catastrophic effects, such as disruption of essential services and huge financial losses. The increased reliance of critical services on our cyberinfrastructure and the dire consequences of security breaches have highlighted the importance of information security. Authorization, security protocols, and software security are three central areas in security in which there have been significant advances in developing systematic foundations and analysis methods that work for practical systems. This book provides an introduction to this work, covering representative approaches, illustrated by examples, and providing pointers to additional work in the area. Table of Contents: Introduction / Foundations / Detecting Buffer Overruns Using Static Analysis / Analyzing Security Policies / Analyzing Security Protocols

Advances in Computer Science, Information Security and Privacy - 13th Asian Computing Science Conference, Seoul, Korea,... Advances in Computer Science, Information Security and Privacy - 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedings (Paperback, 2009 ed.)
Anupam Datta
R1,518 Discovery Miles 15 180 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009.

The 7 revised full papers and 3 revised short papers presented together with 2 invited talks were carefully reviewed and selected from 45 submissions. Focusing on the theory and practice of information security and privacy, the papers include topics of deducibility constraints, symmetric encryption modes, dynamic security domains and policies, cryptography, formal verification of quantum programs, decision of static equivalence, authenticated message and proxy signature scheme.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Multi Colour Animal Print Neckerchief
R119 Discovery Miles 1 190
Call The Midwife - Season 10
Jenny Agutter, Linda Bassett, … DVD R209 Discovery Miles 2 090
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Designer French Collection Billion Eau…
R328 R215 Discovery Miles 2 150
Knot-a-Bag Dispenser Refills
R111 R96 Discovery Miles 960
Soccer Waterbottle [Black]
R70 Discovery Miles 700
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
The Creator
John David Washington, Gemma Chan, … DVD R325 Discovery Miles 3 250
Too Beautiful To Break
Tessa Bailey Paperback R280 R224 Discovery Miles 2 240

 

Partners