|
Showing 1 - 7 of
7 matches in All Departments
This book contains a selection of the best papers of the 44th
Annual Conference, SAICSIT 2023, held in Pretoria, South Africa, in
July 2023. The 18 papers presented in this volume were carefully
reviewed and selected from 54 regular submissions. They adress
various aspects of the role of computer science in connectivity,
information systems for connectivity, connecting society and
emerging technologies for connectivity
|
Information Security - 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15-16, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff
|
R1,557
Discovery Miles 15 570
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 17th
International Conference on Information Security, ISSA 2018, held
in Pretoria, South Africa, in August 2018. The 13 revised full
papers presented were carefully reviewed and selected from 40
submissions. The papers are dealing with topics such as
authentication; access control; digital (cyber) forensics; cyber
security; mobile and wireless security; privacy-preserving
protocols; authorization; trust frameworks; security requirements;
formal security models; malware and its mitigation; intrusion
detection systems; social engineering; operating systems security;
browser security; denial-of-service attacks; vulnerability
management; file system security; firewalls; Web protocol security;
digital rights management; distributed systems security.
|
ICT Education - 50th Annual Conference of the Southern African Computer Lecturers' Association, SACLA 2021, Johannesburg, South Africa, July 16, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Wai Sze Leung, Marijke Coetzee, Duncan Coulter, Deon Cotterrell
|
R1,902
Discovery Miles 19 020
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 50th Annual
Conference of the Southern African Computer Lecturers' Association
on ICT Education, SACLA 2021, held in Johannesburg, South Africa in
July 2021. The 9 revised full papers presented were carefully
reviewed and selected fromthe 23 submissions. One invited paper was
also included in this volume. The papers are organized in following
topical sections: past, present and future; teaching innovation;
teaching methods and strategies.
|
Information and Cyber Security - 19th International Conference, ISSA 2020, Pretoria, South Africa, August 25-26, 2020, Revised Selected Papers (Paperback, 1st ed. 2020)
Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff, …
|
R1,557
Discovery Miles 15 570
|
Ships in 10 - 15 working days
|
This book constitutes the refereed post-conference proceedings of
the 19th International Conference on Information Security, ISSA
2020, which was supposed to be held in Pretoria, South Africa, in
August 2020, but it was held virtually due to the COVID-19
pandemic.The 10 revised full papers presented were carefully
reviewed and selected from 33 submissions. The papers deal with
topics such as authentication; access control; digital (cyber)
forensics; cyber security; mobile and wireless security;
privacy-preserving protocols; authorization; trust frameworks;
security requirements; formal security models; malware and its
mitigation; intrusion detection systems; social engineering;
operating systems security; browser security; denial-of-service
attacks; vulnerability management; file system security; firewalls;
Web protocol security; digital rights management; and distributed
systems security.
|
Information and Cyber Security - 18th International Conference, ISSA 2019, Johannesburg, South Africa, August 15, 2019, Proceedings (Paperback, 1st ed. 2020)
Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff
|
R1,557
Discovery Miles 15 570
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 18th
International Conference on Information Security, ISSA 2019, held
in Johannesburg, South Africa, in August 2019. The 12 revised full
papers presented were carefully reviewed and selected from 35
submissions. The papers are dealing with topics such as
authentication; access control; digital (cyber) forensics; cyber
security; mobile and wireless security; privacy-preserving
protocols; authorization; trust frameworks; security requirements;
formal security models; malware and its mitigation; intrusion
detection systems; social engineering; operating systems security;
browser security; denial-of-service attacks; vulnerability
management; file system security; firewalls; Web protocol security;
digital rights management; distributed systems security.
Mobile devices are considered to be the next logical step in social
networking as they become more pervasive and are able to establish
direct communication with each other. Mobile social networking is a
new movement in social networking as people have membership of both
a virtual community through an online social network environment,
and a physical community where they are located. A move in mobile
social networking is the decentralised exploration of friendships.
Short-range wireless protocols like Bluetooth enable collaborative
applications between mobile devices of users. Unlike conventional
centralised social networks that rely upon a central authority to
organise the opinions of each member of the social network and
protect their personal information, members of a decentralised
network are completely autonomous and responsible for their own
individual behaviour. When people meet for the first time, they
thus need help to determine if they can trust each other. This book
presents BlueTrust, a trust model for use in decentralised mobile
social networks. BlueTrust focuses on establishing trust between
users in close proximity by computing trust levels to support user
interaction.
Mobile handheld devices provide powerful capability and
functionality making it prominent within public and private
environments, allowing information to be processed inside and
outside of the organisation's network. Mobile Bluetooth
connectivity allows workers to access information in both personal
and corporate environments This book, presents an information
security evaluation of a Bluetooth-enabled handheld device. It
attempts to understand the implications of using a
Bluetooth-enabled handheld device in both public and private
environments and the risks presented by a mobile workforce using
Bluetooth connectivity. Information security risks are evaluated
based on research into vulnerabilities, attacks and tools that
exist to compromise a Bluetooth-enabled handheld device, while also
suggesting a possible Bluetooth penetration testing methodology. A
practical assessment is performed for a critical analysis of the
information security mechanisms implemented by the
Bluetooth-enabled handheld device (PDA) and determining possible
recommendations to mitigate identified risks.
|
|