|
|
Showing 1 - 5 of
5 matches in All Departments
This book contains a selection of the best papers of the 44th
Annual Conference, SAICSIT 2023, held in Pretoria, South Africa, in
July 2023. The 18 papers presented in this volume were carefully
reviewed and selected from 54 regular submissions. They adress
various aspects of the role of computer science in connectivity,
information systems for connectivity, connecting society and
emerging technologies for connectivity
|
Information Security - 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff
|
R1,408
Discovery Miles 14 080
|
Ships in 18 - 22 working days
|
This book constitutes the refereed proceedings of the 17th
International Conference on Information Security, ISSA 2018, held
in Pretoria, South Africa, in August 2018. The 13 revised full
papers presented were carefully reviewed and selected from 40
submissions. The papers are dealing with topics such as
authentication; access control; digital (cyber) forensics; cyber
security; mobile and wireless security; privacy-preserving
protocols; authorization; trust frameworks; security requirements;
formal security models; malware and its mitigation; intrusion
detection systems; social engineering; operating systems security;
browser security; denial-of-service attacks; vulnerability
management; file system security; firewalls; Web protocol security;
digital rights management; distributed systems security.
|
ICT Education - 50th Annual Conference of the Southern African Computer Lecturers' Association, SACLA 2021, Johannesburg, South Africa, July 16, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Wai Sze Leung, Marijke Coetzee, Duncan Coulter, Deon Cotterrell
|
R1,716
Discovery Miles 17 160
|
Ships in 18 - 22 working days
|
This book constitutes the refereed proceedings of the 50th Annual
Conference of the Southern African Computer Lecturers' Association
on ICT Education, SACLA 2021, held in Johannesburg, South Africa in
July 2021. The 9 revised full papers presented were carefully
reviewed and selected fromthe 23 submissions. One invited paper was
also included in this volume. The papers are organized in following
topical sections: past, present and future; teaching innovation;
teaching methods and strategies.
|
Information and Cyber Security - 19th International Conference, ISSA 2020, Pretoria, South Africa, August 25-26, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff, …
|
R1,408
Discovery Miles 14 080
|
Ships in 18 - 22 working days
|
This book constitutes the refereed post-conference proceedings of
the 19th International Conference on Information Security, ISSA
2020, which was supposed to be held in Pretoria, South Africa, in
August 2020, but it was held virtually due to the COVID-19
pandemic.The 10 revised full papers presented were carefully
reviewed and selected from 33 submissions. The papers deal with
topics such as authentication; access control; digital (cyber)
forensics; cyber security; mobile and wireless security;
privacy-preserving protocols; authorization; trust frameworks;
security requirements; formal security models; malware and its
mitigation; intrusion detection systems; social engineering;
operating systems security; browser security; denial-of-service
attacks; vulnerability management; file system security; firewalls;
Web protocol security; digital rights management; and distributed
systems security.
|
Information and Cyber Security - 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings (Paperback, 1st ed. 2020)
Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff
|
R1,408
Discovery Miles 14 080
|
Ships in 18 - 22 working days
|
This book constitutes the refereed proceedings of the 18th
International Conference on Information Security, ISSA 2019, held
in Johannesburg, South Africa, in August 2019. The 12 revised full
papers presented were carefully reviewed and selected from 35
submissions. The papers are dealing with topics such as
authentication; access control; digital (cyber) forensics; cyber
security; mobile and wireless security; privacy-preserving
protocols; authorization; trust frameworks; security requirements;
formal security models; malware and its mitigation; intrusion
detection systems; social engineering; operating systems security;
browser security; denial-of-service attacks; vulnerability
management; file system security; firewalls; Web protocol security;
digital rights management; distributed systems security.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
|