0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Secure Broadcast Communication - In Wired and Wireless Networks (Hardcover, 2003 ed.): Adrian Perrig, J. D. Tygar Secure Broadcast Communication - In Wired and Wireless Networks (Hardcover, 2003 ed.)
Adrian Perrig, J. D. Tygar
R3,010 Discovery Miles 30 100 Ships in 10 - 15 working days

Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including:
*key distribution for access control,
*source authentication of transmissions, and
*non-repudiation of streams.

This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network.

This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.

Secure Broadcast Communication - In Wired and Wireless Networks (Paperback, Softcover reprint of the original 1st ed. 2003):... Secure Broadcast Communication - In Wired and Wireless Networks (Paperback, Softcover reprint of the original 1st ed. 2003)
Adrian Perrig, J. D. Tygar
R2,858 Discovery Miles 28 580 Ships in 10 - 15 working days

Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including:
*key distribution for access control,
*source authentication of transmissions, and
*non-repudiation of streams.

This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network.

This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.

Adversarial Machine Learning (Hardcover): Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, J. D. Tygar Adversarial Machine Learning (Hardcover)
Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, J. D. Tygar
R2,416 Discovery Miles 24 160 Ships in 12 - 19 working days

Written by leading researchers, this complete introduction brings together all the theory and tools needed for building robust machine learning in adversarial environments. Discover how machine learning systems can adapt when an adversary actively poisons data to manipulate statistical inference, learn the latest practical techniques for investigating system security and performing robust data analysis, and gain insight into new approaches for designing effective countermeasures against the latest wave of cyber-attacks. Privacy-preserving mechanisms and the near-optimal evasion of classifiers are discussed in detail, and in-depth case studies on email spam and network security highlight successful attacks on traditional machine learning algorithms. Providing a thorough overview of the current state of the art in the field, and possible future directions, this groundbreaking work is essential reading for researchers, practitioners and students in computer security and machine learning, and those wanting to learn about the next stage of the cybersecurity arms race.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Fasting Journal
Jentezen Franklin Hardcover R471 R440 Discovery Miles 4 400
Close Calls - Managing Risk and…
C. Macrae Hardcover R4,854 Discovery Miles 48 540
Growth Control in Woody Plants
Theodore T. Kozlowski, Stephen G. Pallardy Hardcover R2,911 Discovery Miles 29 110
Metals Trading Handbook - A Market…
Paddy Crabbe Hardcover R3,411 Discovery Miles 34 110
Economics of the U.S. Commercial Airline…
Ivan L. Pitt, John Randolph Norsworthy Hardcover R4,466 Discovery Miles 44 660
Optimizing Student Engagement in Online…
A.V. Senthil Kumar Hardcover R5,297 Discovery Miles 52 970
Wipe Clean Workbook: Uppercase Alphabet…
Roger Priddy Spiral bound  (1)
R286 R270 Discovery Miles 2 700
Pray First - The Transformative Power Of…
Chris Hodges Paperback R489 R456 Discovery Miles 4 560
Handwriting Activity Book for Ages 6-7…
CGP Books Paperback R134 Discovery Miles 1 340
Daughter, You are Treasured and Loved…
Rebekah Tague Hardcover R866 Discovery Miles 8 660

 

Partners