0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (4)
  • R2,500 - R5,000 (6)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 11 of 11 matches in All Departments

Blockchains - A Handbook on Fundamentals, Platforms and Applications (1st ed. 2023): Sushmita Ruj, Salil Kanhere, Mauro Conti Blockchains - A Handbook on Fundamentals, Platforms and Applications (1st ed. 2023)
Sushmita Ruj, Salil Kanhere, Mauro Conti
R7,357 Discovery Miles 73 570 Ships in 10 - 15 working days

This handbook is a selection of foundational aspects, security analysis, platforms, and applications of blockchains that consists of four parts. The first part introduces the basic building blocks such as distributed computing and cryptography. Consensus algorithms that form the basic backbone of blockchain protocols are presented. Various cryptographic tools like hash functions, digital signatures and commitment schemes are also introduced. Advanced cryptographic techniques such as zero knowledge protocols, secret sharing, verifiable random functions that are used for privacy-preserving and secure design are discussed.  The second part of this handbook consists of popular blockchain designs and platforms. Architecture of Bitcoin, Ethereum, Monero, Tendermint and Algorand have been presented. Various important issues like scalability and security are discussed in the third part. Security design challenges, security vulnerabilities and their analysis are discussed. The final part of this handbook discusses various applications of blockchains. These include supply-chain, identity and credential management, Internet of Things (IoT), data-sharing, e-voting, e-governance, e-health, smart cities, and Industry 4.0. Research challenges and directions of future work are included in this handbook. This comprehensive reference targets students and researchers, who are starting to explore blockchain. Professionals working in blockchain security and applications will find this handbook to be a valuable reference.

Cyber Threat Intelligence (Hardcover, 1st ed. 2018): Ali Dehghantanha, Mauro Conti, Tooska Dargahi Cyber Threat Intelligence (Hardcover, 1st ed. 2018)
Ali Dehghantanha, Mauro Conti, Tooska Dargahi
R4,384 Discovery Miles 43 840 Ships in 12 - 17 working days

This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes. The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions - this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgrounds in artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.

Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020,... Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi
R2,609 Discovery Miles 26 090 Ships in 10 - 15 working days

This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020.The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography.

Cyber Threat Intelligence (Paperback, Softcover reprint of the original 1st ed. 2018): Ali Dehghantanha, Mauro Conti, Tooska... Cyber Threat Intelligence (Paperback, Softcover reprint of the original 1st ed. 2018)
Ali Dehghantanha, Mauro Conti, Tooska Dargahi
R4,241 Discovery Miles 42 410 Ships in 10 - 15 working days

This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes. The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions - this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgrounds in artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.

Cyberspace Safety and Security - 13th International Symposium, CSS 2021, Virtual Event, November 9-11, 2021, Proceedings... Cyberspace Safety and Security - 13th International Symposium, CSS 2021, Virtual Event, November 9-11, 2021, Proceedings (Paperback, 1st ed. 2022)
Weizhi Meng, Mauro Conti
R1,809 Discovery Miles 18 090 Ships in 10 - 15 working days

The LNCS 13172 constitute the proceedings of the 13th International Symposium on Cyberspace Safety and Security, CSS 2021, held online, in November 2021.The 9 full papers and 5 short papers presented in this book were carefully reviewed and selected from 35 submissions. The conference focuses on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.

Cryptology and Network Security - 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings... Cryptology and Network Security - 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings (Paperback, 1st ed. 2021)
Mauro Conti, Marc Stevens, Stephan Krenn
R2,628 Discovery Miles 26 280 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 20th International Conference on Cryptology and Network Security, CANS 2021, which was held during December 13-15, 2021. The conference was originally planned to take place in Vienna, Austria, and changed to an online event due to the COVID-19 pandemic.The 25 full and 3 short papers presented in these proceedings were carefully reviewed and selected from 85 submissions. They were organized in topical sections as follows: Encryption; signatures; cryptographic schemes and protocols; attacks and counter-measures; and attestation and verification.

Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI,... Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings (Paperback, 1st ed. 2020)
Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man-Ho Au, Lejla Batina, …
R3,119 Discovery Miles 31 190 Ships in 10 - 15 working days

This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, in Rome, Italy, in October 2020. The 31 papers presented in this volume were carefully reviewed and selected from 65 submissions. They stem from the following workshops: AIBlock 2020: Second International Workshop on Application Intelligence and Blockchain Security AIHWS 2020: First International Workshop on Artificial Intelligence in Hardware Security AIoTS 2020: Second International Workshop on Artificial Intelligence and Industrial Internet-of-Things Security Cloud S&P 2020: Second International Workshop on Cloud Security and Privacy SCI 2020: First International Workshop on Secure Cryptographic Implementation SecMT 2020: First International Workshop on Security in Mobile Technologies SiMLA 2020: Second International Workshop on Security in Machine Learning and its Applications

Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020,... Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Mauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi
R2,376 Discovery Miles 23 760 Ships in 10 - 15 working days

This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020. The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography.

Security and Trust Management - 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26-27, 2019,... Security and Trust Management - 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings (Paperback, 1st ed. 2019)
Sjouke Mauw, Mauro Conti
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes the proceedings of the 15th International Workshop on Security and Trust Management, STM 2019, held in Luxembourg City, Luxembourg, in September 2019, and co-located with the 24th European Symposium Research in Computer Security, ESORICS 2019. The 9 full papers and 1 short paper were carefully reviewed and selected from 23 submissions. The papers present novel research on all theoretical and practical aspects of security and trust in ICTs.

Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings... Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings (Paperback, 1st ed. 2015)
Mauro Conti, Matthias Schunter, Ioannis Askoxylakis
R2,393 Discovery Miles 23 930 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust and users; trusted systems and services; trust and privacy; and building blocks for trust. There are 7 two-page abstracts of poster papers included in the back matter of the volume.

Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings... Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings (Paperback, 1st ed. 2016)
Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti
R3,025 Discovery Miles 30 250 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Right Sign Rapid HIV Test Single Use…
R25 Discovery Miles 250
Fast X
Vin Diesel, Jason Momoa, … DVD R172 R132 Discovery Miles 1 320
The Girl On the Train
Emily Blunt, Rebecca Ferguson, … Blu-ray disc  (1)
R61 Discovery Miles 610
Huntlea Koletto - Matlow Pet Bed…
R969 R562 Discovery Miles 5 620
Aerolatte Cappuccino Art Stencils (Set…
R110 R95 Discovery Miles 950
Mission Impossible 6: Fallout
Tom Cruise, Henry Cavill, … Blu-ray disc  (1)
R131 R91 Discovery Miles 910
Golf Groove Sharpener (Black)
R249 Discovery Miles 2 490
CritiCare® Sterile Gauze Swabs (75 x 75…
R3 Discovery Miles 30
Peacemaker - Season 1
John Cena DVD R212 Discovery Miles 2 120
Vital Baby® HYDRATE™ Easy Sipper™ Cup…
R158 R149 Discovery Miles 1 490

 

Partners