0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (7)
  • R5,000 - R10,000 (2)
  • -
Status
Brand

Showing 1 - 11 of 11 matches in All Departments

Blockchains - A Handbook on Fundamentals, Platforms and Applications (1st ed. 2023): Sushmita Ruj, Salil Kanhere, Mauro Conti Blockchains - A Handbook on Fundamentals, Platforms and Applications (1st ed. 2023)
Sushmita Ruj, Salil Kanhere, Mauro Conti
R7,806 Discovery Miles 78 060 Ships in 10 - 15 working days

This handbook is a selection of foundational aspects, security analysis, platforms, and applications of blockchains that consists of four parts. The first part introduces the basic building blocks such as distributed computing and cryptography. Consensus algorithms that form the basic backbone of blockchain protocols are presented. Various cryptographic tools like hash functions, digital signatures and commitment schemes are also introduced. Advanced cryptographic techniques such as zero knowledge protocols, secret sharing, verifiable random functions that are used for privacy-preserving and secure design are discussed.  The second part of this handbook consists of popular blockchain designs and platforms. Architecture of Bitcoin, Ethereum, Monero, Tendermint and Algorand have been presented. Various important issues like scalability and security are discussed in the third part. Security design challenges, security vulnerabilities and their analysis are discussed. The final part of this handbook discusses various applications of blockchains. These include supply-chain, identity and credential management, Internet of Things (IoT), data-sharing, e-voting, e-governance, e-health, smart cities, and Industry 4.0. Research challenges and directions of future work are included in this handbook. This comprehensive reference targets students and researchers, who are starting to explore blockchain. Professionals working in blockchain security and applications will find this handbook to be a valuable reference.

Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020,... Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi
R2,767 Discovery Miles 27 670 Ships in 10 - 15 working days

This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020.The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography.

Cyber Threat Intelligence (Paperback, Softcover reprint of the original 1st ed. 2018): Ali Dehghantanha, Mauro Conti, Tooska... Cyber Threat Intelligence (Paperback, Softcover reprint of the original 1st ed. 2018)
Ali Dehghantanha, Mauro Conti, Tooska Dargahi
R4,499 Discovery Miles 44 990 Ships in 10 - 15 working days

This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes. The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions - this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgrounds in artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.

Cyber Threat Intelligence (Hardcover, 1st ed. 2018): Ali Dehghantanha, Mauro Conti, Tooska Dargahi Cyber Threat Intelligence (Hardcover, 1st ed. 2018)
Ali Dehghantanha, Mauro Conti, Tooska Dargahi
R5,731 Discovery Miles 57 310 Ships in 10 - 15 working days

This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes. The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions - this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgrounds in artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.

Cyberspace Safety and Security - 13th International Symposium, CSS 2021, Virtual Event, November 9-11, 2021, Proceedings... Cyberspace Safety and Security - 13th International Symposium, CSS 2021, Virtual Event, November 9-11, 2021, Proceedings (Paperback, 1st ed. 2022)
Weizhi Meng, Mauro Conti
R1,918 Discovery Miles 19 180 Ships in 10 - 15 working days

The LNCS 13172 constitute the proceedings of the 13th International Symposium on Cyberspace Safety and Security, CSS 2021, held online, in November 2021.The 9 full papers and 5 short papers presented in this book were carefully reviewed and selected from 35 submissions. The conference focuses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.

Cryptology and Network Security - 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings... Cryptology and Network Security - 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings (Paperback, 1st ed. 2021)
Mauro Conti, Marc Stevens, Stephan Krenn
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 20th International Conference on Cryptology and Network Security, CANS 2021, which was held during December 13-15, 2021. The conference was originally planned to take place in Vienna, Austria, and changed to an online event due to the COVID-19 pandemic.The 25 full and 3 short papers presented in these proceedings were carefully reviewed and selected from 85 submissions. They were organized in topical sections as follows: Encryption; signatures; cryptographic schemes and protocols; attacks and counter-measures; and attestation and verification.

Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI,... Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings (Paperback, 1st ed. 2020)
Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man-Ho Au, Lejla Batina, …
R3,309 Discovery Miles 33 090 Ships in 10 - 15 working days

This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, in Rome, Italy, in October 2020. The 31 papers presented in this volume were carefully reviewed and selected from 65 submissions. They stem from the following workshops: AIBlock 2020: Second International Workshop on Application Intelligence and Blockchain Security AIHWS 2020: First International Workshop on Artificial Intelligence in Hardware Security AIoTS 2020: Second International Workshop on Artificial Intelligence and Industrial Internet-of-Things Security Cloud S&P 2020: Second International Workshop on Cloud Security and Privacy SCI 2020: First International Workshop on Secure Cryptographic Implementation SecMT 2020: First International Workshop on Security in Mobile Technologies SiMLA 2020: Second International Workshop on Security in Machine Learning and its Applications

Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020,... Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi
R2,520 Discovery Miles 25 200 Ships in 10 - 15 working days

This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020. The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography.

Security and Trust Management - 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26-27, 2019,... Security and Trust Management - 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings (Paperback, 1st ed. 2019)
Sjouke Mauw, Mauro Conti
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book constitutes the proceedings of the 15th International Workshop on Security and Trust Management, STM 2019, held in Luxembourg City, Luxembourg, in September 2019, and co-located with the 24th European Symposium Research in Computer Security, ESORICS 2019. The 9 full papers and 1 short paper were carefully reviewed and selected from 23 submissions. The papers present novel research on all theoretical and practical aspects of security and trust in ICTs.

Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings... Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings (Paperback, 1st ed. 2015)
Mauro Conti, Matthias Schunter, Ioannis Askoxylakis
R2,554 Discovery Miles 25 540 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust and users; trusted systems and services; trust and privacy; and building blocks for trust. There are 7 two-page abstracts of poster papers included in the back matter of the volume.

Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings... Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings (Paperback, 1st ed. 2016)
Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti
R3,235 Discovery Miles 32 350 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Personal History Of David…
Dev Patel, Peter Capaldi, … DVD  (1)
R66 Discovery Miles 660
Positively Me - Daring To Live And Love…
Nozibele Mayaba, Sue Nyathi Paperback  (2)
R310 R210 Discovery Miles 2 100
Boucheron Quatre Eau De Parfum Spray…
R1,825 Discovery Miles 18 250
Tommy Hilfiger - Tommy Cologne Spray…
R1,218 R694 Discovery Miles 6 940
Strontium Technology AMMO USB 3.1 flash…
R70 Discovery Miles 700
Peptine Pro Equine Hydrolysed Collagen…
 (2)
R359 R279 Discovery Miles 2 790
Lucky Lubricating Clipper Oil (100ml)
R49 R29 Discovery Miles 290
Pure Pleasure Sherpa Electric Blanket…
R999 R853 Discovery Miles 8 530
Chicco First Dreams Rainbow Sky 2 in 1…
R700 R559 Discovery Miles 5 590
Faber-Castell Minibox 1 Hole Sharpener…
R10 Discovery Miles 100

 

Partners