0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (1)
  • R1,000 - R2,500 (4)
  • R2,500 - R5,000 (3)
  • -
Status
Brand

Showing 1 - 8 of 8 matches in All Departments

Computer Security in the 21st Century (Hardcover, 2005): D. T. Lee, S. P Shieh, J. Doug Tygar Computer Security in the 21st Century (Hardcover, 2005)
D. T. Lee, S. P Shieh, J. Doug Tygar
R2,816 Discovery Miles 28 160 Ships in 10 - 15 working days

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include presentations of:

- Fundamental new security

- Cryptographic protocols and design,

- A new way of measuring network vulnerability: attack surfaces,

- Network vulnerability and building impenetrable systems,

- Multimedia content protection including a new standard for photographic images, JPEG2000.

Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.

Computer Security in the 21st Century (Paperback, Softcover reprint of hardcover 1st ed. 2005): D. T. Lee, S. P Shieh, J. Doug... Computer Security in the 21st Century (Paperback, Softcover reprint of hardcover 1st ed. 2005)
D. T. Lee, S. P Shieh, J. Doug Tygar
R2,784 Discovery Miles 27 840 Ships in 10 - 15 working days

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include presentations of:

- Fundamental new security

- Cryptographic protocols and design,

- A new way of measuring network vulnerability: attack surfaces,

- Network vulnerability and building impenetrable systems,

- Multimedia content protection including a new standard for photographic images, JPEG2000.

Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.

Computing and Combinatorics - 12th Annual International Conference, COCOON 2006, Taipei, Taiwan, August 15-18, 2006,... Computing and Combinatorics - 12th Annual International Conference, COCOON 2006, Taipei, Taiwan, August 15-18, 2006, Proceedings (Paperback, 2006 ed.)
Danny Z. Chen, D. T. Lee
R1,712 Discovery Miles 17 120 Ships in 10 - 15 working days

This book presents the refereed proceedings of the 12th Annual International Computing and Combinatorics Conference, COCOON 2006, held in Taipei, Taiwan, August 2006. The book offers 52 revised full papers presented together with abstracts of 2 invited talks. The papers are organized in topical sections on computational economics, finance, and management, graph algorithms, computational complexity and computability, quantum computing, computational biology and medicine, computational geometry, graph theory, and more.

Algorithms and Computation - 11th International Conference, ISAAC 2000, Taipei, Taiwan, December 18-20, 2000. Proceedings... Algorithms and Computation - 11th International Conference, ISAAC 2000, Taipei, Taiwan, December 18-20, 2000. Proceedings (Paperback, 2000 ed.)
D. T. Lee, Shang-Hua Teng
R3,057 Discovery Miles 30 570 Ships in 10 - 15 working days

The papers in this volume were selected for presentation at the Eleventh Annual International Symposium on Algorithms and Computation (ISAAC 2000), held on 18{20 December, 2000 at the Institute of Information Science, Academia Sinica, Taipei, Taiwan. Previous meetings were held in Tokyo (1990), Taipei (1991), Nagoya (1992), Hong Kong (1993), Beijing (1994), Cairns (1995), Osaka (1996), Singapore (1997), Taejon (1998), and Chennai (1999). Submissions to the conference this year were conducted entirely electro- cally. Thanks to the excellent software developed by the Institute of Information Science, Academia Sinica, we were able to carry out virtually all communication via the World Wide Web. In response to the call for papers, a total of 87 extended abstracts were submitted from 25 countries. Each submitted paper was handled by at least three program committee members, with the assistance of a number of external reviewers, as indicated by the referee list found in the proceedings. There were many more acceptable papers than there was space available in the symposium program, which made the program committee's task extremely di cult. Finally 46 papers were selected for presentation at the Symposium. In addition to these contributed papers, the conference also included two invited presentations by Dr. Jean-Daniel Boissonnat, INRIA Sophia-Antipolis, France and Professor Jin-Yi Cai, University of Wisconsin at Madison, Wisconsin, USA. It is expected that most of the accepted papers will appear in a more complete form in scienti c journals.

Computing and Combinatorics - 5th Annual International Conference, COCOON'99, Tokyo, Japan, July 26-28, 1999, Proceedings... Computing and Combinatorics - 5th Annual International Conference, COCOON'99, Tokyo, Japan, July 26-28, 1999, Proceedings (Paperback, 1999 ed.)
Takao Asano, Hiroshi Imai, D. T. Lee, Shin-Ichi Nakano, Takeshi Tokuyama
R1,690 Discovery Miles 16 900 Ships in 10 - 15 working days

The abstracts and papers in this volume were presented at the Fifth Annual International Computing and Combinatorics Conference (COCOON '99), which was held in Tokyo, Japan from July 26 to 28, 1999. The topics cover most aspects of theoretical computer science and combinatorics pertaining to computing. In response to the call for papers, 88 high-quality extended abstracts were submitted internationally, of which 46 were selected for presentation by the p- gram committee. Every submitted paper was reviewed by at least three program committee members. Many of these papers represent reports on continuing - search, and it is expected that most of them will appear in a more polished and complete form in scienti c journals. In addition to the regular papers, this v- ume contains abstracts of two invited plenary talks by Prabhakar Raghavan and Seinosuke Toda. The conference also included a special talk by Kurt Mehlhorn on LEDA (Library of E cient Data types and Algorithms). The Hao Wang Award (inaugurated at COCOON '97) is given to honor the paper judged by the program committee to have the greatest scienti c merit. The recipients of the Hao Wang Award 1999 were Hiroshi Nagamochi and Tos- hide Ibaraki for their paper \An Approximation for Finding a Smallest 2-Edge- Connected Subgraph Containing a Speci ed Spanning Tree".

Computing and Combinatorics - Third Annual International Conference, COCOON '97, Shanghai, China, August 20-22, 1997.... Computing and Combinatorics - Third Annual International Conference, COCOON '97, Shanghai, China, August 20-22, 1997. Proceedings. (Paperback, 1997 ed.)
Tao Jiang, D. T. Lee
R1,704 Discovery Miles 17 040 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third Annual International Computing and Combinatorics Conference, COCOON'97, held in Shanghai, China, in August 1997.
The volume presents 53 revised full papers selected from a total of 106 submissions. The papers are organized in sections on parallel and distributed computing, computational geometry, complexity, computational biology, computability, cryptography and computational finance, graph algorithms, algorithms, rewriting and logic, algorithms and applications, automata languages and complexity, and mathematical programming and genetic algorithms.

Word Search Puzzles for Stroke Patients - Rebuild Memory and Logic - Extra Large Print - Improve Cognitive Funtion - High... Word Search Puzzles for Stroke Patients - Rebuild Memory and Logic - Extra Large Print - Improve Cognitive Funtion - High Frequency Common Words - Great Gift for Those Recovering from Stroke and Brain Related Trauma (Large print, Paperback, Large type / large print edition)
Dt Lee Press
R252 Discovery Miles 2 520 Ships in 10 - 15 working days
Computer Security on the Edge (Hardcover): D. Tygar, A. Perrig, D. T. Lee, S. P Shieh Computer Security on the Edge (Hardcover)
D. Tygar, A. Perrig, D. T. Lee, S. P Shieh
R2,225 Discovery Miles 22 250 Out of stock

This book is a series of related chapters on advanced topics in computer security for researchers in computer and electrical engineering.  Original contributions are edited and invited from members of the TRUST project, a major NSF-funded research  grant focusing on the themes of identity theft, privacy and medical records, malware, computer network defense, secure sensor webs, secure embedded systems, and large scale systems.  The editors are among the authors represented in the contributions.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Homequip USB Rehargeable Table Top…
R445 Discovery Miles 4 450
Samsung EO-IA500BBEGWW Wired In-ear…
R299 R249 Discovery Miles 2 490
Elvis
Baz Luhrmann Blu-ray disc R191 R171 Discovery Miles 1 710
Dig & Discover: Dinosaurs - Excavate 2…
Hinkler Pty Ltd Kit R256 R222 Discovery Miles 2 220
Home Classix Placemats - Blooming…
R59 R51 Discovery Miles 510
Emoji Earphones - Various Designs (Pack…
R560 Discovery Miles 5 600
Angelcare Nappy Bin Refills
R165 R145 Discovery Miles 1 450
Bantex @School White Glue with…
 (1)
R12 Discovery Miles 120
Bantex B9875 A5 Record Card File Box…
R125 R112 Discovery Miles 1 120
Lucky Lubricating Clipper Oil (100ml)
R79 Discovery Miles 790

 

Partners