0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (3)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Security for Mobility (Hardcover, New): Chris J. Mitchell Security for Mobility (Hardcover, New)
Chris J. Mitchell
R3,871 R3,486 Discovery Miles 34 860 Save R385 (10%) Ships in 18 - 22 working days

Over the last two decades, mobile telecommunications has grown dramatically, from a small niche technology to a massive industry. Mobile telephones are now ubiquitous, and the divisions between PCs, PDAs, mobile telephones and other mobile devices are becoming increasingly blurred. Against this background, the security of information of both the devices themselves, and the information handled by these devices, is becoming ever more important. Security for Mobility pulls together up to the minute research from an international group of academics and professionals working in industry. The main text of the book is divided into five parts - underlying technologies; network security; mobile code issues; application security; and the future. Each chapter of the book is the collaboration of different authors, including many of the leading European experts currently working within the field. Thus each chapter is self-contained and can be read independently, although there are many relationships between the various chapters. The book will be of interest to engineers and computer scientists working in security-related aspects of the communications, computing and telecommunications industries, as well as postgraduate students and academics working within these fields.

Trusted Systems - 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012, Proceedings (Paperback, 2012):... Trusted Systems - 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012, Proceedings (Paperback, 2012)
Chris J. Mitchell, Allan Tomlinson
R1,793 Discovery Miles 17 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Conference on Trusted Systems, INTRUST 2012, held in London, UK, in December 2012. The 6 revised full papers presented together with 3 short invited papers and a short paper which formed the basis for a panel session were carefully reviewed and selected from 19 submissions. The papers are organized in topical section on automated analysis, security and trust, mobile trust, security of distributed systems, evaluation and analysis, and embedded security.

Information and Communications Security - 11th International Conference, ICICS 2009 (Paperback, 2009 ed.): Sihan Qing, Chris J.... Information and Communications Security - 11th International Conference, ICICS 2009 (Paperback, 2009 ed.)
Sihan Qing, Chris J. Mitchell, Guilin Wang
R2,712 Discovery Miles 27 120 Ships in 18 - 22 working days

The11thInternationalConferenceonInformationandCommunicationsSecurity (ICICS 2009) was held in Beijing, China during December 14-17, 2009. The ICICS conferenceseriesis anestablished forum that bringstogether people from universities,researchinstitutes, industry and governmentinstitutions, who work in a range of ?elds within information and communications security. The ICICS conferencesgiveattendeestheopportunitytoexchangenewideasandinvestigate developments in the state of the art. In previous years, ICICS has taken place in the UK (2008), China (2007, 2005, 2003, 2001 and 1997), USA (2006), Spain (2004), Singapore (2002), and Australia (1999). On each occasion, as on this one, the proceedings have been published in the Springer LNCS series. In total, 162 manuscripts from 20 countries and districts were submitted to ICICS 2009, and a total of 37 (31 regular papers plus 6 short papers) from 13 countries and districts were accepted (an acceptance rate of 23%). The accepted papers cover a wide range of disciplines within information security and applied cryptography. Each submission to ICICS 2009 was anonymously reviewed by three or four reviewers. We are very grateful to members of the Program C- mittee, which was composed of 44 members from 14 countries; we would like to thank them, as well as all the external referees, for their time and their valuable contributions to the tough and time-consuming reviewing process.

Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks - Third IFIP WG 11.2... Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks - Third IFIP WG 11.2 International Workshop, WISTP 2009 Brussels, Belgium, September 1-4, 2009 Proceedings Proceedings (Paperback, 2009 ed.)
Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris J. Mitchell, Jean-Jacques Quisquater
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This volume contains the 12 papers presented at the WISTP 2009 conference, held in Brussels, Belgium in September 2009. WISTP 2009 was the third int- national workshop devoted to information security theory and practice. WISTP 2009 built on the successful WISTP 2007 and 2008 conferences, held in Heraklion, Crete, Greece and Seville, Spain in May 2007 and May 2008, - spectively. The proceedings of WISTP 2007 and WISTP 2008 were published as volumes 4462 and 5019 of the Lecture Notes in Computer Science series. This workshop received the following support: - Co-sponsored by IFIP WG 11. 2 Small System Security - Co-sponsored by VDE ITG - Technical sponsorship of the IEEE Systems, Man & Cybernetics Society - Supported by the Technical Committee on Systems Safety and Security - Organized in cooperation with the ACM SIGSAC - Supported by ENISA - Supported by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC) These proceedings contain 12 original papers covering a range of theoretical and practical topics in information security. For the purposes of the organi- tion of the WISTP program, the papers were divided into four main categories, namely: - Mobility - Attacks and Secure Implementations - Performance and Security - Cryptography The12papersincludedherewereselectedfromatotalof27submissions. The refereeing process was rigorous,involving at least three (and mostly four or ?ve) independent reports being prepared for each submission.

Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings... Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings (Paperback, 1st ed. 2015)
Javier Lopez, Chris J. Mitchell
R2,904 Discovery Miles 29 040 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: signatures; system and software security; block ciphers; protocols; network and cloud security; encryption and fundamentals; PUFs and implementation security; and key generation, biometrics and image security.

Trusted Computing - Second International Conference, Trust 2009 Oxford, UK, April 6-8, 2009,  Proceedings (Paperback, 2009... Trusted Computing - Second International Conference, Trust 2009 Oxford, UK, April 6-8, 2009, Proceedings (Paperback, 2009 ed.)
Liqun Chen, Chris J. Mitchell, Andrew Martin
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Thisvolumecontainsthe15paperspresentedinthetechnicalstrandoftheTrust 2009 conference, held in Oxford, UK in April 2009. Trust 2009 was the second international conference devoted to the technical and socio-economic aspects of trusted computing. The conference had two main strands, one devoted to technical aspects of trusted computing (addressed by these proceedings), and the other devoted to socio-economic aspects. Trust 2009 built on the successful Trust 2008 conference, held in Villach, Austria in March 2008. The proceedings of Trust 2008, containing 14 papers, were published in volume 4968 of the Lecture Notes in Computer Science series. ThetechnicalstrandofTrust2009contained15originalpapersonthedesign and application of trusted computing. For these proceedings the papers have been divided into four main categories, namely: - Implementation of trusted computing - Attestation - PKI for trusted computing - Applications of trusted computing The 15 papers included here were selected from a total of 33 submissions. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion. We believe that the result is a high-quality set of papers, some of which have been signi?cantly improved as a result of the refereeing process. We would also like to thank all the authors who submitted their papers to the technical strand of the Trust 2009 conference, all external referees, and all the attendees of the conference.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Gans
Laura Wall Paperback R100 R93 Discovery Miles 930
Mathematical Analysis - Approximation…
Mariano Giaquinta, Giuseppe Modica Hardcover R2,964 Discovery Miles 29 640
Clothes Have Feelings Too! Charlie…
Ari Mazor Hardcover R622 Discovery Miles 6 220
L(2) Approaches in Several Complex…
Takeo Ohsawa Hardcover R3,128 Discovery Miles 31 280
Building Information Modelling (BIM) in…
W. P. de Wilde, L. Mahdjoubi, … Hardcover R4,604 Discovery Miles 46 040
Little Pixie's Christmas - Book One in…
Shelley Cass Hardcover R469 Discovery Miles 4 690
When Dinosaurs Walked the Earth
Sean Taylor Paperback R193 Discovery Miles 1 930
Harmonic and Complex Analysis and its…
Alexander Vasil'ev Hardcover R3,475 Discovery Miles 34 750
4D CAD and Visualization in Construction…
Raymond Issa, I. Flood, … Hardcover R8,317 Discovery Miles 83 170
The Alphabet Crew
Brittany Earls Hardcover R472 Discovery Miles 4 720

 

Partners