0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (7)
  • -
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

South African Institute of Computer Scientists and Information Technologists - 44th Annual Conference, SAICSIT 2023, Pretoria,... South African Institute of Computer Scientists and Information Technologists - 44th Annual Conference, SAICSIT 2023, Pretoria, South Africa, July 17–19, 2023, Revised Selected Papers (1st ed. 2023)
Aurona Gerber, Marijke Coetzee
R2,323 Discovery Miles 23 230 Ships in 10 - 15 working days

This book contains a selection of the best papers of the 44th Annual Conference, SAICSIT 2023, held in Pretoria, South Africa, in July 2023. The 18 papers presented in this volume were carefully reviewed and selected from 54 regular submissions. They adress various aspects of the role of computer science in connectivity, information systems for connectivity, connecting society and emerging technologies for connectivity

Information Security - 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected... Information Security - 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018. The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.

ICT Education - 50th Annual Conference of the Southern African Computer Lecturers' Association, SACLA 2021, Johannesburg,... ICT Education - 50th Annual Conference of the Southern African Computer Lecturers' Association, SACLA 2021, Johannesburg, South Africa, July 16, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Wai Sze Leung, Marijke Coetzee, Duncan Coulter, Deon Cotterrell
R1,902 Discovery Miles 19 020 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 50th Annual Conference of the Southern African Computer Lecturers' Association on ICT Education, SACLA 2021, held in Johannesburg, South Africa in July 2021. The 9 revised full papers presented were carefully reviewed and selected fromthe 23 submissions. One invited paper was also included in this volume. The papers are organized in following topical sections: past, present and future; teaching innovation; teaching methods and strategies.

Information and Cyber Security - 19th International Conference, ISSA 2020, Pretoria, South Africa, August 25-26, 2020, Revised... Information and Cyber Security - 19th International Conference, ISSA 2020, Pretoria, South Africa, August 25-26, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff, …
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 19th International Conference on Information Security, ISSA 2020, which was supposed to be held in Pretoria, South Africa, in August 2020, but it was held virtually due to the COVID-19 pandemic.The 10 revised full papers presented were carefully reviewed and selected from 33 submissions. The papers deal with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; and distributed systems security.

Information and Cyber Security - 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019,... Information and Cyber Security - 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings (Paperback, 1st ed. 2020)
Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISSA 2019, held in Johannesburg, South Africa, in August 2019. The 12 revised full papers presented were carefully reviewed and selected from 35 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.

Trust in a decentralised mobile social network (Paperback): Bradley Markides, Marijke Coetzee Trust in a decentralised mobile social network (Paperback)
Bradley Markides, Marijke Coetzee
R1,784 Discovery Miles 17 840 Ships in 10 - 15 working days

Mobile devices are considered to be the next logical step in social networking as they become more pervasive and are able to establish direct communication with each other. Mobile social networking is a new movement in social networking as people have membership of both a virtual community through an online social network environment, and a physical community where they are located. A move in mobile social networking is the decentralised exploration of friendships. Short-range wireless protocols like Bluetooth enable collaborative applications between mobile devices of users. Unlike conventional centralised social networks that rely upon a central authority to organise the opinions of each member of the social network and protect their personal information, members of a decentralised network are completely autonomous and responsible for their own individual behaviour. When people meet for the first time, they thus need help to determine if they can trust each other. This book presents BlueTrust, a trust model for use in decentralised mobile social networks. BlueTrust focuses on establishing trust between users in close proximity by computing trust levels to support user interaction.

Information Security of a Bluetooth-enabled handheld device (Paperback): Frankie Tvrz, Marijke Coetzee Information Security of a Bluetooth-enabled handheld device (Paperback)
Frankie Tvrz, Marijke Coetzee
R1,780 Discovery Miles 17 800 Ships in 10 - 15 working days

Mobile handheld devices provide powerful capability and functionality making it prominent within public and private environments, allowing information to be processed inside and outside of the organisation's network. Mobile Bluetooth connectivity allows workers to access information in both personal and corporate environments This book, presents an information security evaluation of a Bluetooth-enabled handheld device. It attempts to understand the implications of using a Bluetooth-enabled handheld device in both public and private environments and the risks presented by a mobile workforce using Bluetooth connectivity. Information security risks are evaluated based on research into vulnerabilities, attacks and tools that exist to compromise a Bluetooth-enabled handheld device, while also suggesting a possible Bluetooth penetration testing methodology. A practical assessment is performed for a critical analysis of the information security mechanisms implemented by the Bluetooth-enabled handheld device (PDA) and determining possible recommendations to mitigate identified risks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Sony PlayStation Portal Remote Player…
R5,299 Discovery Miles 52 990
HP 330 Wireless Keyboard and Mouse Combo
R800 R450 Discovery Miles 4 500
Croxley Desk Cube Holder (Black) - Paper…
 (1)
R37 Discovery Miles 370
Finally Enough Love - #1's Remixed
Madonna CD  (2)
R408 Discovery Miles 4 080
JBL T110 In-Ear Headphones (Black)
 (13)
R229 R201 Discovery Miles 2 010
Gym Towel & Bag
R78 Discovery Miles 780
Snappy Tritan Bottle (1.2L)(Coral)
R209 R169 Discovery Miles 1 690
Estee Lauder Beautiful Belle Eau De…
R2,241 R1,652 Discovery Miles 16 520
Rhodes And His Banker - Empire, Wealth…
Richard Steyn Paperback R330 R220 Discovery Miles 2 200
Mountain Backgammon - The Classic Game…
Lily Dyu R575 R460 Discovery Miles 4 600

 

Partners