0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Attribute-Based Encryption and Access Control (Paperback): Dijiang Huang, Qiuxiang Dong, Yan Zhu Attribute-Based Encryption and Access Control (Paperback)
Dijiang Huang, Qiuxiang Dong, Yan Zhu
R1,486 Discovery Miles 14 860 Ships in 12 - 17 working days

This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications. The goal is to provide in-depth knowledge usable for college students and researchers who want to have a comprehensive understanding of ABE schemes and novel ABE-enabled research and applications. The specific focus is to present the development of using new ABE features such as group-based access, ID-based revocation, and attributes management functions such as delegation, federation, and interoperability. These new capabilities can build a new ABE-based Attribute-Based Access Control (ABAC) solution that can incorporate data access policies and control into ciphertext. This book is also ideal for IT companies to provide them with the most recent technologies and research on how to implement data access control models for mobile and data-centric applications, where data access control does not need to rely on a fixed access control infrastructure. It's also of interested to those working in security, to enable them to have the most recent developments in data access control such as ICN and Blockchain technologies. Features Covers cryptographic background knowledge for ABE and ABAC Features various ABE constructions to achieve integrated access control capabilities Offers a comprehensive coverage of ABE-based ABAC Provides ABE applications with real-world examples Advances the ABE research to support new mobile and data-centric applications

Software-Defined Networking and Security - From Theory to Practice (Paperback): Dijiang Huang, Ankur Chowdhary, Sandeep... Software-Defined Networking and Security - From Theory to Practice (Paperback)
Dijiang Huang, Ankur Chowdhary, Sandeep Pisharody
R1,488 Discovery Miles 14 880 Ships in 12 - 17 working days

This book provides readers insights into cyber maneuvering or adaptive and intelligent cyber defense. It describes the required models and security supporting functions that enable the analysis of potential threats, detection of attacks, and implementation of countermeasures while expending attacker resources and preserving user experience. This book not only presents significant education-oriented content, but uses advanced content to reveal a blueprint for helping network security professionals design and implement a secure Software-Defined Infrastructure (SDI) for cloud networking environments. These solutions are a less intrusive alternative to security countermeasures taken at the host level and offer centralized control of the distributed network. The concepts, techniques, and strategies discussed in this book are ideal for students, educators, and security practitioners looking for a clear and concise text to avant-garde cyber security installations or simply to use as a reference. Hand-on labs and lecture slides are located at http://virtualnetworksecurity.thothlab.com/. Features Discusses virtual network security concepts Considers proactive security using moving target defense Reviews attack representation models based on attack graphs and attack trees Examines service function chaining in virtual networks with security considerations Recognizes machine learning and AI in network security

Attribute-Based Encryption and Access Control (Hardcover): Dijiang Huang, Qiuxiang Dong, Yan Zhu Attribute-Based Encryption and Access Control (Hardcover)
Dijiang Huang, Qiuxiang Dong, Yan Zhu
R4,732 Discovery Miles 47 320 Ships in 12 - 17 working days

This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications. The goal is to provide in-depth knowledge usable for college students and researchers who want to have a comprehensive understanding of ABE schemes and novel ABE-enabled research and applications. The specific focus is to present the development of using new ABE features such as group-based access, ID-based revocation, and attributes management functions such as delegation, federation, and interoperability. These new capabilities can build a new ABE-based Attribute-Based Access Control (ABAC) solution that can incorporate data access policies and control into ciphertext. This book is also ideal for IT companies to provide them with the most recent technologies and research on how to implement data access control models for mobile and data-centric applications, where data access control does not need to rely on a fixed access control infrastructure. It's also of interested to those working in security, to enable them to have the most recent developments in data access control such as ICN and Blockchain technologies. Features Covers cryptographic background knowledge for ABE and ABAC Features various ABE constructions to achieve integrated access control capabilities Offers a comprehensive coverage of ABE-based ABAC Provides ABE applications with real-world examples Advances the ABE research to support new mobile and data-centric applications

Mobile Cloud Computing - Foundations and Service Models (Paperback): Huijun Wu, Dijiang Huang Mobile Cloud Computing - Foundations and Service Models (Paperback)
Huijun Wu, Dijiang Huang
R1,900 R1,755 Discovery Miles 17 550 Save R145 (8%) Ships in 12 - 17 working days

Mobile Cloud Computing: Foundations and Service Models combines cloud computing, mobile computing and wireless networking to bring new computational resources for mobile users, network operators and cloud computing providers. The book provides the latest research and development insights on mobile cloud computing, beginning with an exploration of the foundations of cloud computing, existing cloud infrastructures classifications, virtualization techniques and service models. It then examines the approaches to building cloud services using a bottom-up approach, describing data center design, cloud networking and software orchestration solutions, showing how these solutions support mobile devices and services. The book describes mobile cloud clouding concepts with a particular focus on a user-centric approach, presenting a distributed mobile cloud service model called POEM to manage mobile cloud resource and compose mobile cloud applications. It concludes with a close examination of the security and privacy issues of mobile clouds.

Software-Defined Networking and Security - From Theory to Practice (Hardcover): Dijiang Huang, Ankur Chowdhary, Sandeep... Software-Defined Networking and Security - From Theory to Practice (Hardcover)
Dijiang Huang, Ankur Chowdhary, Sandeep Pisharody
R3,551 Discovery Miles 35 510 Ships in 12 - 17 working days

This book provides readers insights into cyber maneuvering or adaptive and intelligent cyber defense. It describes the required models and security supporting functions that enable the analysis of potential threats, detection of attacks, and implementation of countermeasures while expending attacker resources and preserving user experience. This book not only presents significant education-oriented content, but uses advanced content to reveal a blueprint for helping network security professionals design and implement a secure Software-Defined Infrastructure (SDI) for cloud networking environments. These solutions are a less intrusive alternative to security countermeasures taken at the host level and offer centralized control of the distributed network. The concepts, techniques, and strategies discussed in this book are ideal for students, educators, and security practitioners looking for a clear and concise text to avant-garde cyber security installations or simply to use as a reference. Hand-on labs and lecture slides are located at http://virtualnetworksecurity.thothlab.com/. Features Discusses virtual network security concepts Considers proactive security using moving target defense Reviews attack representation models based on attack graphs and attack trees Examines service function chaining in virtual networks with security considerations Recognizes machine learning and AI in network security

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Introducing Hibirism ... In The Meantime…
Donald Mokgale, Ernest Nkomotje Paperback R290 R195 Discovery Miles 1 950
Safari Nation - A Social History Of The…
Jacob Dlamini Paperback R320 R250 Discovery Miles 2 500
Sala Kahle, District Six
Nomvuyo Ngcelwane Paperback R376 Discovery Miles 3 760
Epic Land - Namibia Exposed
Amy Schoeman Hardcover R919 Discovery Miles 9 190
Tipping Point: Turmoil Or Reform…
Raymond Parsons Paperback R300 R215 Discovery Miles 2 150
Guide To Sieges Of South Africa…
Nicki Von Der Heyde Paperback  (4)
R220 R190 Discovery Miles 1 900
They Called Me Queer
Kim Windvogel, Kelly-Eve Koopman Paperback R320 R275 Discovery Miles 2 750
Killing Karoline - A Memoir
Sara-Jayne King Paperback  (1)
R325 R279 Discovery Miles 2 790
Mandela - His Essential Life
Peter Hain Paperback  (1)
R305 R244 Discovery Miles 2 440
The Lie Of 1652 - A Decolonised History…
Patric Mellet Paperback  (7)
R365 R314 Discovery Miles 3 140

 

Partners