0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (1)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Mobile Cloud Computing - Foundations and Service Models (Paperback): Huijun Wu, Dijiang Huang Mobile Cloud Computing - Foundations and Service Models (Paperback)
Huijun Wu, Dijiang Huang
R1,678 Discovery Miles 16 780 Ships in 10 - 15 working days

Mobile Cloud Computing: Foundations and Service Models combines cloud computing, mobile computing and wireless networking to bring new computational resources for mobile users, network operators and cloud computing providers. The book provides the latest research and development insights on mobile cloud computing, beginning with an exploration of the foundations of cloud computing, existing cloud infrastructures classifications, virtualization techniques and service models. It then examines the approaches to building cloud services using a bottom-up approach, describing data center design, cloud networking and software orchestration solutions, showing how these solutions support mobile devices and services. The book describes mobile cloud clouding concepts with a particular focus on a user-centric approach, presenting a distributed mobile cloud service model called POEM to manage mobile cloud resource and compose mobile cloud applications. It concludes with a close examination of the security and privacy issues of mobile clouds.

Attribute-Based Encryption and Access Control (Paperback): Dijiang Huang, Qiuxiang Dong, Yan Zhu Attribute-Based Encryption and Access Control (Paperback)
Dijiang Huang, Qiuxiang Dong, Yan Zhu
R1,594 Discovery Miles 15 940 Ships in 10 - 15 working days

This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications. The goal is to provide in-depth knowledge usable for college students and researchers who want to have a comprehensive understanding of ABE schemes and novel ABE-enabled research and applications. The specific focus is to present the development of using new ABE features such as group-based access, ID-based revocation, and attributes management functions such as delegation, federation, and interoperability. These new capabilities can build a new ABE-based Attribute-Based Access Control (ABAC) solution that can incorporate data access policies and control into ciphertext. This book is also ideal for IT companies to provide them with the most recent technologies and research on how to implement data access control models for mobile and data-centric applications, where data access control does not need to rely on a fixed access control infrastructure. It's also of interested to those working in security, to enable them to have the most recent developments in data access control such as ICN and Blockchain technologies. Features Covers cryptographic background knowledge for ABE and ABAC Features various ABE constructions to achieve integrated access control capabilities Offers a comprehensive coverage of ABE-based ABAC Provides ABE applications with real-world examples Advances the ABE research to support new mobile and data-centric applications

Software-Defined Networking and Security - From Theory to Practice (Paperback): Dijiang Huang, Ankur Chowdhary, Sandeep... Software-Defined Networking and Security - From Theory to Practice (Paperback)
Dijiang Huang, Ankur Chowdhary, Sandeep Pisharody
R1,596 Discovery Miles 15 960 Ships in 10 - 15 working days

This book provides readers insights into cyber maneuvering or adaptive and intelligent cyber defense. It describes the required models and security supporting functions that enable the analysis of potential threats, detection of attacks, and implementation of countermeasures while expending attacker resources and preserving user experience. This book not only presents significant education-oriented content, but uses advanced content to reveal a blueprint for helping network security professionals design and implement a secure Software-Defined Infrastructure (SDI) for cloud networking environments. These solutions are a less intrusive alternative to security countermeasures taken at the host level and offer centralized control of the distributed network. The concepts, techniques, and strategies discussed in this book are ideal for students, educators, and security practitioners looking for a clear and concise text to avant-garde cyber security installations or simply to use as a reference. Hand-on labs and lecture slides are located at http://virtualnetworksecurity.thothlab.com/. Features Discusses virtual network security concepts Considers proactive security using moving target defense Reviews attack representation models based on attack graphs and attack trees Examines service function chaining in virtual networks with security considerations Recognizes machine learning and AI in network security

Attribute-Based Encryption and Access Control (Hardcover): Dijiang Huang, Qiuxiang Dong, Yan Zhu Attribute-Based Encryption and Access Control (Hardcover)
Dijiang Huang, Qiuxiang Dong, Yan Zhu
R5,052 Discovery Miles 50 520 Ships in 10 - 15 working days

This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications. The goal is to provide in-depth knowledge usable for college students and researchers who want to have a comprehensive understanding of ABE schemes and novel ABE-enabled research and applications. The specific focus is to present the development of using new ABE features such as group-based access, ID-based revocation, and attributes management functions such as delegation, federation, and interoperability. These new capabilities can build a new ABE-based Attribute-Based Access Control (ABAC) solution that can incorporate data access policies and control into ciphertext. This book is also ideal for IT companies to provide them with the most recent technologies and research on how to implement data access control models for mobile and data-centric applications, where data access control does not need to rely on a fixed access control infrastructure. It's also of interested to those working in security, to enable them to have the most recent developments in data access control such as ICN and Blockchain technologies. Features Covers cryptographic background knowledge for ABE and ABAC Features various ABE constructions to achieve integrated access control capabilities Offers a comprehensive coverage of ABE-based ABAC Provides ABE applications with real-world examples Advances the ABE research to support new mobile and data-centric applications

Software-Defined Networking and Security - From Theory to Practice (Hardcover): Dijiang Huang, Ankur Chowdhary, Sandeep... Software-Defined Networking and Security - From Theory to Practice (Hardcover)
Dijiang Huang, Ankur Chowdhary, Sandeep Pisharody
R3,797 Discovery Miles 37 970 Ships in 10 - 15 working days

This book provides readers insights into cyber maneuvering or adaptive and intelligent cyber defense. It describes the required models and security supporting functions that enable the analysis of potential threats, detection of attacks, and implementation of countermeasures while expending attacker resources and preserving user experience. This book not only presents significant education-oriented content, but uses advanced content to reveal a blueprint for helping network security professionals design and implement a secure Software-Defined Infrastructure (SDI) for cloud networking environments. These solutions are a less intrusive alternative to security countermeasures taken at the host level and offer centralized control of the distributed network. The concepts, techniques, and strategies discussed in this book are ideal for students, educators, and security practitioners looking for a clear and concise text to avant-garde cyber security installations or simply to use as a reference. Hand-on labs and lecture slides are located at http://virtualnetworksecurity.thothlab.com/. Features Discusses virtual network security concepts Considers proactive security using moving target defense Reviews attack representation models based on attack graphs and attack trees Examines service function chaining in virtual networks with security considerations Recognizes machine learning and AI in network security

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Dune: Part 1
Timothee Chalamet, Rebecca Ferguson, … Blu-ray disc  (4)
R298 Discovery Miles 2 980
Adidas Hybrid 50 Boxing Gloves (Black…
R532 R444 Discovery Miles 4 440
Value Dog Food (10kg) - JOCK
R350 R269 Discovery Miles 2 690
Loot
Nadine Gordimer Paperback  (2)
R367 R340 Discovery Miles 3 400
By Way Of Deception
Amir Tsarfati, Steve Yohn Paperback  (1)
R250 R230 Discovery Miles 2 300
West Side Story - (2022)
Steven Spielberg Blu-ray disc R309 Discovery Miles 3 090
Banana Republic W Eau De Parfum (125ml…
R1,429 R703 Discovery Miles 7 030
High Expectations
Mabel CD R371 Discovery Miles 3 710
Clementoni Baby Stacking Rings
R249 Discovery Miles 2 490
Rexel Secure X6 Cross - Cut P4 Shredder
R2,295 R1,899 Discovery Miles 18 990

 

Partners