0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Smart Card Security - Applications, Attacks, and Countermeasures (Paperback): Brij B. Gupta, Megha Quamara Smart Card Security - Applications, Attacks, and Countermeasures (Paperback)
Brij B. Gupta, Megha Quamara
R629 Discovery Miles 6 290 Ships in 10 - 15 working days

Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks associated with hardware, software, data, and users that are a part of smart card-based systems. The book starts with an introduction to the concept of smart cards and continues with a discussion of the different types of smart cards in use today, including various aspects regarding their configuration, underlying operating system, and usage. It then discusses different hardware- and software-level security attacks in smart card-based systems and applications and the appropriate countermeasures for these security attacks. It then investigates the security attacks on confidentiality, integrity, and availability of data in smart card-based systems and applications, including unauthorized remote monitoring, communication protocol exploitation, denial of service (DoS) attacks, and so forth, and presents the possible countermeasures for these attacks. The book continues with a focus on the security attacks against remote user authentication mechanisms in smart card-based applications and proposes a possible countermeasure for these attacks. Then it covers different communication standards for smart card-based applications and discusses the role of smart cards in various application areas as well as various open-source tools for the development and maintenance of smart card-based systems and applications. The final chapter explains the role of blockchain technology for securing smart card-based transactions and quantum cryptography for designing secure smart card-based algorithms. Smart Card Security: Applications, Attacks, and Countermeasures provides you with a broad overview of smart card technology and its various applications.

Smart Card Security - Applications, Attacks, and Countermeasures (Hardcover): Brij B. Gupta, Megha Quamara Smart Card Security - Applications, Attacks, and Countermeasures (Hardcover)
Brij B. Gupta, Megha Quamara
R1,663 Discovery Miles 16 630 Ships in 10 - 15 working days

Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks associated with hardware, software, data, and users that are a part of smart card-based systems. The book starts with an introduction to the concept of smart cards and continues with a discussion of the different types of smart cards in use today, including various aspects regarding their configuration, underlying operating system, and usage. It then discusses different hardware- and software-level security attacks in smart card-based systems and applications and the appropriate countermeasures for these security attacks. It then investigates the security attacks on confidentiality, integrity, and availability of data in smart card-based systems and applications, including unauthorized remote monitoring, communication protocol exploitation, denial of service (DoS) attacks, and so forth, and presents the possible countermeasures for these attacks. The book continues with a focus on the security attacks against remote user authentication mechanisms in smart card-based applications and proposes a possible countermeasure for these attacks. Then it covers different communication standards for smart card-based applications and discusses the role of smart cards in various application areas as well as various open-source tools for the development and maintenance of smart card-based systems and applications. The final chapter explains the role of blockchain technology for securing smart card-based transactions and quantum cryptography for designing secure smart card-based algorithms. Smart Card Security: Applications, Attacks, and Countermeasures provides you with a broad overview of smart card technology and its various applications.

Internet of Things Security - Principles, Applications, Attacks, and Countermeasures (Hardcover): Megha Quamara, Brij B. Gupta Internet of Things Security - Principles, Applications, Attacks, and Countermeasures (Hardcover)
Megha Quamara, Brij B. Gupta
R1,773 Discovery Miles 17 730 Ships in 10 - 15 working days

The Internet of Things (IoT), with its technological advancements and massive innovations, is building the idea of inter-connectivity among everyday life objects. With an explosive growth in the number of Internet-connected devices, the implications of the idea of IoT on enterprises, individuals, and society are huge. IoT is getting attention from both academia and industry due to its powerful real-time applications that raise demands to understand the entire spectrum of the field. However, due to increasing security issues, safeguarding the IoT ecosystem has become an important concern. With devices and information becoming more exposed and leading to increased attack possibilities, adequate security measures are required to leverage the benefits of this emerging concept. Internet of Things Security: Principles, Applications, Attacks, and Countermeasures is an extensive source that aims at establishing an understanding of the core concepts of IoT among its readers and the challenges and corresponding countermeasures in the field. Key features: Containment of theoretical aspects, as well as recent empirical findings associated with the underlying technologies Exploration of various challenges and trade-offs associated with the field and approaches to ensure security, privacy, safety, and trust across its key elements Vision of exciting areas for future research in the field to enhance the overall productivity This book is suitable for industrial professionals and practitioners, researchers, faculty members, and students across universities who aim to carry out research and development in the field of IoT security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Celestron Prepared Microscope Slides (25…
R802 Discovery Miles 8 020
Reading Planet: Rocket Phonics â…
Abigail Steel Paperback R222 Discovery Miles 2 220
Law@Work
A. Van Niekerk, N. Smit Paperback R1,367 R1,229 Discovery Miles 12 290
Market Cities, People Cities - The Shape…
Michael Oluf Emerson, Kevin T. Smiley Hardcover R2,636 Discovery Miles 26 360
Jump - A Memoir
Lenerd Louw Paperback R316 Discovery Miles 3 160
Song For Sarah - Lessons From My Mother
Jonathan Jansen, Naomi Jansen Hardcover  (3)
R100 R93 Discovery Miles 930
Madam & Eve 2018 - The Guptas Ate My…
Stephen Francis, Rico Schacherl Paperback R220 R203 Discovery Miles 2 030
Kirstenbosch - A Visitor's Guide
Colin Paterson-Jones, John Winter Paperback R170 R152 Discovery Miles 1 520
Township Economy - People, Spaces And…
Andrew Charman, Leif Petersen, … Paperback  (1)
R420 R388 Discovery Miles 3 880
Information Geometry, Volume 45
Arni S.R. Srinivasa Rao, C.R. Rao, … Hardcover R6,201 Discovery Miles 62 010

 

Partners