0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Attribute-Based Encryption and Access Control (Paperback): Dijiang Huang, Qiuxiang Dong, Yan Zhu Attribute-Based Encryption and Access Control (Paperback)
Dijiang Huang, Qiuxiang Dong, Yan Zhu
R1,486 Discovery Miles 14 860 Ships in 12 - 17 working days

This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications. The goal is to provide in-depth knowledge usable for college students and researchers who want to have a comprehensive understanding of ABE schemes and novel ABE-enabled research and applications. The specific focus is to present the development of using new ABE features such as group-based access, ID-based revocation, and attributes management functions such as delegation, federation, and interoperability. These new capabilities can build a new ABE-based Attribute-Based Access Control (ABAC) solution that can incorporate data access policies and control into ciphertext. This book is also ideal for IT companies to provide them with the most recent technologies and research on how to implement data access control models for mobile and data-centric applications, where data access control does not need to rely on a fixed access control infrastructure. It's also of interested to those working in security, to enable them to have the most recent developments in data access control such as ICN and Blockchain technologies. Features Covers cryptographic background knowledge for ABE and ABAC Features various ABE constructions to achieve integrated access control capabilities Offers a comprehensive coverage of ABE-based ABAC Provides ABE applications with real-world examples Advances the ABE research to support new mobile and data-centric applications

Software-Defined Networking and Security - From Theory to Practice (Paperback): Dijiang Huang, Ankur Chowdhary, Sandeep... Software-Defined Networking and Security - From Theory to Practice (Paperback)
Dijiang Huang, Ankur Chowdhary, Sandeep Pisharody
R1,488 Discovery Miles 14 880 Ships in 12 - 17 working days

This book provides readers insights into cyber maneuvering or adaptive and intelligent cyber defense. It describes the required models and security supporting functions that enable the analysis of potential threats, detection of attacks, and implementation of countermeasures while expending attacker resources and preserving user experience. This book not only presents significant education-oriented content, but uses advanced content to reveal a blueprint for helping network security professionals design and implement a secure Software-Defined Infrastructure (SDI) for cloud networking environments. These solutions are a less intrusive alternative to security countermeasures taken at the host level and offer centralized control of the distributed network. The concepts, techniques, and strategies discussed in this book are ideal for students, educators, and security practitioners looking for a clear and concise text to avant-garde cyber security installations or simply to use as a reference. Hand-on labs and lecture slides are located at http://virtualnetworksecurity.thothlab.com/. Features Discusses virtual network security concepts Considers proactive security using moving target defense Reviews attack representation models based on attack graphs and attack trees Examines service function chaining in virtual networks with security considerations Recognizes machine learning and AI in network security

Attribute-Based Encryption and Access Control (Hardcover): Dijiang Huang, Qiuxiang Dong, Yan Zhu Attribute-Based Encryption and Access Control (Hardcover)
Dijiang Huang, Qiuxiang Dong, Yan Zhu
R4,732 Discovery Miles 47 320 Ships in 12 - 17 working days

This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications. The goal is to provide in-depth knowledge usable for college students and researchers who want to have a comprehensive understanding of ABE schemes and novel ABE-enabled research and applications. The specific focus is to present the development of using new ABE features such as group-based access, ID-based revocation, and attributes management functions such as delegation, federation, and interoperability. These new capabilities can build a new ABE-based Attribute-Based Access Control (ABAC) solution that can incorporate data access policies and control into ciphertext. This book is also ideal for IT companies to provide them with the most recent technologies and research on how to implement data access control models for mobile and data-centric applications, where data access control does not need to rely on a fixed access control infrastructure. It's also of interested to those working in security, to enable them to have the most recent developments in data access control such as ICN and Blockchain technologies. Features Covers cryptographic background knowledge for ABE and ABAC Features various ABE constructions to achieve integrated access control capabilities Offers a comprehensive coverage of ABE-based ABAC Provides ABE applications with real-world examples Advances the ABE research to support new mobile and data-centric applications

Mobile Cloud Computing - Foundations and Service Models (Paperback): Huijun Wu, Dijiang Huang Mobile Cloud Computing - Foundations and Service Models (Paperback)
Huijun Wu, Dijiang Huang
R1,900 R1,755 Discovery Miles 17 550 Save R145 (8%) Ships in 12 - 17 working days

Mobile Cloud Computing: Foundations and Service Models combines cloud computing, mobile computing and wireless networking to bring new computational resources for mobile users, network operators and cloud computing providers. The book provides the latest research and development insights on mobile cloud computing, beginning with an exploration of the foundations of cloud computing, existing cloud infrastructures classifications, virtualization techniques and service models. It then examines the approaches to building cloud services using a bottom-up approach, describing data center design, cloud networking and software orchestration solutions, showing how these solutions support mobile devices and services. The book describes mobile cloud clouding concepts with a particular focus on a user-centric approach, presenting a distributed mobile cloud service model called POEM to manage mobile cloud resource and compose mobile cloud applications. It concludes with a close examination of the security and privacy issues of mobile clouds.

Software-Defined Networking and Security - From Theory to Practice (Hardcover): Dijiang Huang, Ankur Chowdhary, Sandeep... Software-Defined Networking and Security - From Theory to Practice (Hardcover)
Dijiang Huang, Ankur Chowdhary, Sandeep Pisharody
R3,551 Discovery Miles 35 510 Ships in 12 - 17 working days

This book provides readers insights into cyber maneuvering or adaptive and intelligent cyber defense. It describes the required models and security supporting functions that enable the analysis of potential threats, detection of attacks, and implementation of countermeasures while expending attacker resources and preserving user experience. This book not only presents significant education-oriented content, but uses advanced content to reveal a blueprint for helping network security professionals design and implement a secure Software-Defined Infrastructure (SDI) for cloud networking environments. These solutions are a less intrusive alternative to security countermeasures taken at the host level and offer centralized control of the distributed network. The concepts, techniques, and strategies discussed in this book are ideal for students, educators, and security practitioners looking for a clear and concise text to avant-garde cyber security installations or simply to use as a reference. Hand-on labs and lecture slides are located at http://virtualnetworksecurity.thothlab.com/. Features Discusses virtual network security concepts Considers proactive security using moving target defense Reviews attack representation models based on attack graphs and attack trees Examines service function chaining in virtual networks with security considerations Recognizes machine learning and AI in network security

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Moving On Skiffle
Van Morrison CD R536 Discovery Miles 5 360
Gloria
Sam Smith CD R407 Discovery Miles 4 070
Sony PlayStation 5 DualSense Wireless…
R1,599 R1,479 Discovery Miles 14 790
Blinde Mol Of Wyse Uil? - Hoe Om Met…
Susan Coetzer Paperback R313 R49 Discovery Miles 490
Complete Clumping Cat Litter (5kg)
R77 Discovery Miles 770
Sony PlayStation Portal Remote Player…
R5,299 Discovery Miles 52 990
Shield Fresh 24 Gel Air Freshener…
R31 Discovery Miles 310
Peptine Pro Canine/Feline Hydrolysed…
R369 R299 Discovery Miles 2 990
Lucky Metal Cut Throat Razer Carrier
R30 Discovery Miles 300
Docking Edition Multi-Functional…
R899 R500 Discovery Miles 5 000

 

Partners