0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (4)
  • R2,500 - R5,000 (3)
  • R5,000 - R10,000 (2)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

Smart Cards, Tokens, Security and Applications (Paperback, Softcover reprint of the original 2nd ed. 2017): Keith Mayes,... Smart Cards, Tokens, Security and Applications (Paperback, Softcover reprint of the original 2nd ed. 2017)
Keith Mayes, Konstantinos Markantonakis
R2,534 Discovery Miles 25 340 Ships in 10 - 15 working days

This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverse industry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers.

Smart Cards, Tokens, Security and Applications (Hardcover, 2nd ed. 2017): Keith Mayes, Konstantinos Markantonakis Smart Cards, Tokens, Security and Applications (Hardcover, 2nd ed. 2017)
Keith Mayes, Konstantinos Markantonakis
R4,409 Discovery Miles 44 090 Ships in 10 - 15 working days

This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverse industry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers.

Secure Smart Embedded Devices, Platforms and Applications (Paperback, Softcover reprint of the original 1st ed. 2014):... Secure Smart Embedded Devices, Platforms and Applications (Paperback, Softcover reprint of the original 1st ed. 2014)
Konstantinos Markantonakis, Keith Mayes
R8,411 Discovery Miles 84 110 Ships in 10 - 15 working days

New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and considerations, while focusing strongly on technical and practical security issues. The benefits and pitfalls of developing and deploying applications that rely on embedded systems and their security functionality are presented. A sufficient level of technical detail to support embedded systems is provided throughout the text, although the book is quite readable for those seeking awareness through an initial overview of the topics. This edited volume benefits from the contributions of industry and academic experts and helps provide a cross-discipline overview of the security and practical issues for embedded systems, tokens, and platforms. It is an ideal complement to the earlier work, Smart Cards Tokens, Security and Applications from the same editors.

Secure Smart Embedded Devices, Platforms and Applications (Hardcover, 2014 ed.): Konstantinos Markantonakis, Keith Mayes Secure Smart Embedded Devices, Platforms and Applications (Hardcover, 2014 ed.)
Konstantinos Markantonakis, Keith Mayes
R6,643 Discovery Miles 66 430 Ships in 10 - 15 working days

New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and considerations, while focusing strongly on technical and practical security issues. The benefits and pitfalls of developing and deploying applications that rely on embedded systems and their security functionality are presented. A sufficient level of technical detail to support embedded systems is provided throughout the text, although the book is quite readable for those seeking awareness through an initial overview of the topics. This edited volume benefits from the contributions of industry and academic experts and helps provide a cross-discipline overview of the security and practical issues for embedded systems, tokens, and platforms. It is an ideal complement to the earlier work, Smart Cards Tokens, Security and Applications from the same editors.

Smart Cards, Tokens, Security and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008): Keith Mayes,... Smart Cards, Tokens, Security and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Keith Mayes, Konstantinos Markantonakis
R3,739 Discovery Miles 37 390 Ships in 10 - 15 working days

Providing a broad overview of the many card systems and solutions in practical use today, this state-of-the art work is written by contributing authors who are active researchers and acknowledged experts in their field. A single book cannot be found to match both the breadth and depth of content. The book combines a cross-discipline overview of smart cards, tokens and related security and applications plus a technical reference to support further research and study. A step-by-step approach educates the reader and by the end of the book the reader should be able to play an educated role in a smart card related project.

Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices - 4th IFIP WG 11.2... Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices - 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings (Paperback, Edition.)
Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron
R1,590 Discovery Miles 15 900 Ships in 10 - 15 working days

These proceedings contain the papers selected for presentation at the 4th Wo- shop on Information Security Theory and Practice (WISTP 2010), held during April 12-14, 2010 in Passau, Germany. In response to the call for papers, 69 papers were submitted to the wo- shop. These papers were evaluated on the basis of their signi?cance, novelty, and technicalquality. Eachpaper was reviewedby four members of the Program Committee. Reviewing was double-blind meaning that the Program Committee was not able to see the names and a?liations of the authors, and the authors were not told which committee members reviewed which papers. The Program Committee meeting was held electronically, holding intensive discussions over a periodoftwo weeks.Of the papers submitted, 20 full papersand 10shortpapers were selected for presentation at the workshop. This workshop was sponsored by Vodaphone, who also provided a best - per award. We would like to thank this organization for their support, which helped make this workshop possible. Their continued support helps to reduce registration fees and make WISTP a continuing success. WISTP 2010 was also organized in cooperation with the International - sociation for Cryptologic Research (IACR), the IFIP WG 11.2 Pervasive S- tems Security, and ACM SIGSAC. Their support has signi?cantly contributed to raising the pro?le of WISTP, which is re?ected in the number of high-quality submissions that we received.

Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks - Second IFIP WG 11.2... Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks - Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 (Paperback, 2008 ed.)
Jose A. Onieva, Damien Sauveron, Serge Chaumette, Dieter Gollmann, Konstantinos Markantonakis
R1,518 Discovery Miles 15 180 Ships in 10 - 15 working days

With the rapid development of information technologies and the transition to next-generation networks, computer systems and in particular embedded s- tems are becoming more and more mobile and ubiquitous. They also strongly interact with the physical world. Ensuring the security of these complex and resource-constrained systems is a really challenging research topic. Therefore this Workshop in Information Security Theory and Practices was organized to bring together researchers and practitioners in related areas, and to encourage cooperation between the research and the industrial communities. This was the second edition of WISTP, after the ?rst event in Heraklion, Greece, in 2007. This year again we had a signi?cant number of high-quality submissions coming from many di?erent countries. These submissions re?ected the major topics of the conference, i. e. , smart devices, convergence, and ne- generation networks. Submissions were reviewed by at least three reviewers, in most cases by four, and at least by ?ve for the papers involving Program C- mittee members. This long and rigorousprocess could be achievedthanks to the hard work of the Program Committee members and additional reviewers, listed in the following pages. This led to the selection of high-quality papers that made up the workshop program and are published in these proceedings. A number of posters and short papers were also selected for presentation at the conference. The process was very selective and we would like to thank all those authors who submitted contributions that could not be selected.

Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG... Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 (Paperback, 2007 ed.)
Damien Sauveron, Konstantinos Markantonakis, Angelos Bilas, Jean-Jacques Quisquater
R1,641 Discovery Miles 16 410 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems, WISTP 2007, held in Heraklion, Crete, Greece in May 2007.

The 20 revised full papers are organized in topical sections on mobility, hardware and cryptography, privacy, cryptography schemes, smart cards, and small devices.

Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 --... Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 -- December 2, 2016, Revised Selected Papers (Paperback, 1st ed. 2017)
Gerhard P Hancke, Konstantinos Markantonakis
R2,170 Discovery Miles 21 700 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Workshop on Radio Frequency Identification and IoT Security, RFIDSec 2016, held in Hong Kong, China, in November/December 2016. The 14 revised full papers were carefully reviewed and selected from 30 submissions and are organized in topical sections on protocols; side channel and hardware; cards and tokens; proximity; and communication.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Be Safe Paramedical Disposable Triangle…
R9 Discovery Miles 90
Samsung 27" LED IPS Monitor
R3,104 R2,738 Discovery Miles 27 380
Too Hard To Forget
Tessa Bailey Paperback R280 R224 Discovery Miles 2 240
Lucky Define - Plastic 3 Head…
R390 Discovery Miles 3 900
The Walking Dead: Season 1-5
Andrew Lincoln, David Morrissey, … DVD  (1)
R399 R149 Discovery Miles 1 490
DAS Smart Metal Clay Extruder
R638 R376 Discovery Miles 3 760
Chicco Natural Feeling Teat (Medium Flow…
R80 Discovery Miles 800
Tom Ford Tobacco Vanille Eau De Parfum…
R7,552 Discovery Miles 75 520
Estee Lauder Beautiful Belle Eau De…
R2,241 R1,652 Discovery Miles 16 520

 

Partners