0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (2)
  • R5,000 - R10,000 (2)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

Smart Cards, Tokens, Security and Applications (Hardcover, 2nd ed. 2017): Keith Mayes, Konstantinos Markantonakis Smart Cards, Tokens, Security and Applications (Hardcover, 2nd ed. 2017)
Keith Mayes, Konstantinos Markantonakis
R2,899 Discovery Miles 28 990 Ships in 12 - 17 working days

This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverse industry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers.

Secure Smart Embedded Devices, Platforms and Applications (Hardcover, 2014 ed.): Konstantinos Markantonakis, Keith Mayes Secure Smart Embedded Devices, Platforms and Applications (Hardcover, 2014 ed.)
Konstantinos Markantonakis, Keith Mayes
R6,260 Discovery Miles 62 600 Ships in 10 - 15 working days

New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and considerations, while focusing strongly on technical and practical security issues. The benefits and pitfalls of developing and deploying applications that rely on embedded systems and their security functionality are presented. A sufficient level of technical detail to support embedded systems is provided throughout the text, although the book is quite readable for those seeking awareness through an initial overview of the topics. This edited volume benefits from the contributions of industry and academic experts and helps provide a cross-discipline overview of the security and practical issues for embedded systems, tokens, and platforms. It is an ideal complement to the earlier work, Smart Cards Tokens, Security and Applications from the same editors.

Smart Cards, Tokens, Security and Applications (Paperback, Softcover reprint of the original 2nd ed. 2017): Keith Mayes,... Smart Cards, Tokens, Security and Applications (Paperback, Softcover reprint of the original 2nd ed. 2017)
Keith Mayes, Konstantinos Markantonakis
R2,389 Discovery Miles 23 890 Ships in 10 - 15 working days

This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverse industry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers.

Secure Smart Embedded Devices, Platforms and Applications (Paperback, Softcover reprint of the original 1st ed. 2014):... Secure Smart Embedded Devices, Platforms and Applications (Paperback, Softcover reprint of the original 1st ed. 2014)
Konstantinos Markantonakis, Keith Mayes
R7,898 Discovery Miles 78 980 Ships in 10 - 15 working days

New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and considerations, while focusing strongly on technical and practical security issues. The benefits and pitfalls of developing and deploying applications that rely on embedded systems and their security functionality are presented. A sufficient level of technical detail to support embedded systems is provided throughout the text, although the book is quite readable for those seeking awareness through an initial overview of the topics. This edited volume benefits from the contributions of industry and academic experts and helps provide a cross-discipline overview of the security and practical issues for embedded systems, tokens, and platforms. It is an ideal complement to the earlier work, Smart Cards Tokens, Security and Applications from the same editors.

Smart Cards, Tokens, Security and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008): Keith Mayes,... Smart Cards, Tokens, Security and Applications (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Keith Mayes, Konstantinos Markantonakis
R3,525 Discovery Miles 35 250 Ships in 10 - 15 working days

Providing a broad overview of the many card systems and solutions in practical use today, this state-of-the art work is written by contributing authors who are active researchers and acknowledged experts in their field. A single book cannot be found to match both the breadth and depth of content. The book combines a cross-discipline overview of smart cards, tokens and related security and applications plus a technical reference to support further research and study. A step-by-step approach educates the reader and by the end of the book the reader should be able to play an educated role in a smart card related project.

Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices - 4th IFIP WG 11.2... Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices - 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings (Paperback, Edition.)
Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron
R1,500 Discovery Miles 15 000 Ships in 10 - 15 working days

These proceedings contain the papers selected for presentation at the 4th Wo- shop on Information Security Theory and Practice (WISTP 2010), held during April 12-14, 2010 in Passau, Germany. In response to the call for papers, 69 papers were submitted to the wo- shop. These papers were evaluated on the basis of their signi?cance, novelty, and technicalquality. Eachpaper was reviewedby four members of the Program Committee. Reviewing was double-blind meaning that the Program Committee was not able to see the names and a?liations of the authors, and the authors were not told which committee members reviewed which papers. The Program Committee meeting was held electronically, holding intensive discussions over a periodoftwo weeks.Of the papers submitted, 20 full papersand 10shortpapers were selected for presentation at the workshop. This workshop was sponsored by Vodaphone, who also provided a best - per award. We would like to thank this organization for their support, which helped make this workshop possible. Their continued support helps to reduce registration fees and make WISTP a continuing success. WISTP 2010 was also organized in cooperation with the International - sociation for Cryptologic Research (IACR), the IFIP WG 11.2 Pervasive S- tems Security, and ACM SIGSAC. Their support has signi?cantly contributed to raising the pro?le of WISTP, which is re?ected in the number of high-quality submissions that we received.

Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks - Second IFIP WG 11.2... Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks - Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008 (Paperback, 2008 ed.)
Jose A. Onieva, Damien Sauveron, Serge Chaumette, Dieter Gollmann, Konstantinos Markantonakis
R1,433 Discovery Miles 14 330 Ships in 10 - 15 working days

With the rapid development of information technologies and the transition to next-generation networks, computer systems and in particular embedded s- tems are becoming more and more mobile and ubiquitous. They also strongly interact with the physical world. Ensuring the security of these complex and resource-constrained systems is a really challenging research topic. Therefore this Workshop in Information Security Theory and Practices was organized to bring together researchers and practitioners in related areas, and to encourage cooperation between the research and the industrial communities. This was the second edition of WISTP, after the ?rst event in Heraklion, Greece, in 2007. This year again we had a signi?cant number of high-quality submissions coming from many di?erent countries. These submissions re?ected the major topics of the conference, i. e. , smart devices, convergence, and ne- generation networks. Submissions were reviewed by at least three reviewers, in most cases by four, and at least by ?ve for the papers involving Program C- mittee members. This long and rigorousprocess could be achievedthanks to the hard work of the Program Committee members and additional reviewers, listed in the following pages. This led to the selection of high-quality papers that made up the workshop program and are published in these proceedings. A number of posters and short papers were also selected for presentation at the conference. The process was very selective and we would like to thank all those authors who submitted contributions that could not be selected.

Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG... Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems - First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 (Paperback, 2007 ed.)
Damien Sauveron, Konstantinos Markantonakis, Angelos Bilas, Jean-Jacques Quisquater
R1,547 Discovery Miles 15 470 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems, WISTP 2007, held in Heraklion, Crete, Greece in May 2007.

The 20 revised full papers are organized in topical sections on mobility, hardware and cryptography, privacy, cryptography schemes, smart cards, and small devices.

Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 --... Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 -- December 2, 2016, Revised Selected Papers (Paperback, 1st ed. 2017)
Gerhard P Hancke, Konstantinos Markantonakis
R2,037 Discovery Miles 20 370 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Workshop on Radio Frequency Identification and IoT Security, RFIDSec 2016, held in Hong Kong, China, in November/December 2016. The 14 revised full papers were carefully reviewed and selected from 30 submissions and are organized in topical sections on protocols; side channel and hardware; cards and tokens; proximity; and communication.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Phoebe's Tale - From His Shadow…
Garon Whited Hardcover R539 Discovery Miles 5 390
Empire of the Vampire
Jay Kristoff Paperback R300 R240 Discovery Miles 2 400
Frans Hals - The Male Portrait
Lelia Packer, Ashok Roy Paperback R632 Discovery Miles 6 320
Mothtown
Caroline Hardaker Paperback R308 R254 Discovery Miles 2 540
Zodiac Academy - The Awakening
Caroline Peckham, Susanne Valenti Paperback R710 Discovery Miles 7 100
The Art of Tapestry
Helen Wyld Hardcover R1,126 Discovery Miles 11 260
Faith, Gender and the Senses in Italian…
Erin E. Benay Hardcover R4,009 Discovery Miles 40 090
Artemisia Gentileschi - The Image of the…
Mary D. Garrard Paperback R1,619 R1,410 Discovery Miles 14 100
The Return of the Baroque in Modern…
Gregg Lambert Hardcover R6,334 Discovery Miles 63 340
The Rule Of Three
Sam Ripley Paperback R390 R312 Discovery Miles 3 120

 

Partners