0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (2)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

History of the Islamic Centre of Southern California 1950-1977: Mostafa Hashem Sherif History of the Islamic Centre of Southern California 1950-1977
Mostafa Hashem Sherif
R2,486 R1,968 Discovery Miles 19 680 Save R518 (21%) Ships in 18 - 22 working days

This book documents the history of the Muslim community in the United States, and particularly in California, and the foundation and evolution of the Southern California Islamic Center. The associated digital archive was built in an ongoing project with the University of California, Los Angeles. This substantial work of social history analyses the Islamic Center’s work from 1953 to 1977 as it tries to establish itself within the mosaic of Southern Californian society. The work of the Islamic Centre has hardly been documented in the literature, and the social history of the wider Muslim Community in the USA is arguably under-researched. This is a unique and important contribution, of interest to historians, social scientists and students of race and religion in America.

Handbook of Enterprise Integration (Hardcover): Mostafa Hashem Sherif Handbook of Enterprise Integration (Hardcover)
Mostafa Hashem Sherif
R4,283 Discovery Miles 42 830 Ships in 10 - 15 working days

Maintaining compatibility among all affected network and application interfaces of modern enterprise systems can quickly become costly and overwhelming. This handbook presents the knowledge and practical experience of a global group of experts from varying disciplines to help you plan and implement enterprise integration projects that respond to business needs quickly and are seamless to business users. The Handbook of Enterprise Integration brings together the latest research and application results to provide infrastructure engineers, software engineers, software developers, system designers, and project managers with a clear and comprehensive understanding of systems integration technologies, architectures, applications, and project management techniques involved in enterprise system integration. The text includes coverage of mobile communications, standards for integrated manufacturing and e-commerce, RFID, Web-based systems, and complete service-oriented enterprise modeling and analysis. Practitioners will benefit from insights on managing virtual teams as well as techniques for introducing complex technology into businesses. Covering best practices in enterprise systems integration, the text highlights applications across various business enterprises to help you: Bring together existing systems for business processes improvement Design and implement systems that can be reconfigured quickly and easily in response to evolving operational needs Establish procedures for achieving smooth migrations from legacy systems-with minimal disruption to existing operations Complete with case studies, this book illustrates the current state of the art in the context of user requirements and integration and provides the up-to-date understanding required to manage today's complex and interconnected systems.

Management of Technology - New Directions in Technology Management - Selected Papers from the Thirteenth International... Management of Technology - New Directions in Technology Management - Selected Papers from the Thirteenth International Conference on Management of Technology (Hardcover, 2nd)
Mostafa Hashem Sherif, Tarek M. Khalil
R3,695 Discovery Miles 36 950 Ships in 10 - 15 working days

The 13th International Conference on Management of Technology (IAMOT) convened during the period of April 37, 2004 in Washington, D.C., U.S.A. The theme of the conference was: New Directions in Technology Management: Changing Collaboration between Government, Industry and University. The Conference chairs were Drs. Tarek Khalil from the University of Miami, John Aje and Frederick Betz from the University of Maryland and the Program chair was Dr. Yasser Hosni, from the University of Central Florida. This book is derived from the 13th Annual International Conference on Management of Technology (IAMOT) held in Washington DC, April 2004. It discusses collaboration between government, industry, and university. The contributions are international in scope.

Ad Hoc Networks - 5th International ICST Conference, ADHOCNETS 2013, Barcelona, Spain, October 2013, Revised Selected Papers... Ad Hoc Networks - 5th International ICST Conference, ADHOCNETS 2013, Barcelona, Spain, October 2013, Revised Selected Papers (Paperback, 2014)
Mostafa Hashem Sherif, Abdelhamid Mellouk, Jun Li, Paolo Bellavista
R1,881 Discovery Miles 18 810 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed proceedings of the 5th International Conference on Ad Hoc Networks, ADHOCNETS 2013, held in Barcelona, Spain, in October 2013. The 14 revised full papers presented were carefully selected and reviewed from numerous submissions and cover a wide range of applications, commercial and military such as mobile ad hoc networks, sensor networks, vehicular networks, underwater networks, underground networks, personal area networks, home networks and large-scale metropolitan networks for smart cities. They are organized in topical sections on wireless sensor networks, routing, applications and security.

Protocols for Secure Electronic Commerce (Paperback, 3rd Edition): Mostafa Hashem Sherif Protocols for Secure Electronic Commerce (Paperback, 3rd Edition)
Mostafa Hashem Sherif
R2,208 Discovery Miles 22 080 Ships in 10 - 15 working days

Protocols for Secure Electronic Commerce, Third Edition presents a compendium of protocols for securing electronic commerce, or e-commerce, in consumer- and business-to-business applications. Attending to a variety of electronic payment systems currently in use around the globe, this edition:

Updates all chapters to reflect the latest technical advances and developments in areas such as mobile commerce

Adds a new chapter on Bitcoin and other cryptocurrencies that did not exist at the time of the previous edition's publication

Increases the coverage of PayPal in accordance with PayPal’s amplified role for consumers and businesses

Expands the discussion of bank cards, dedicating a full chapter to magnetic stripe cards and a full chapter to chip-and-PIN technology

Protocols for Secure Electronic Commerce, Third Edition offers a state-of-the-art overview of best practices for the security of e-commerce, complete with end-of-chapter review questions and an extensive bibliography of specialized references. A Solutions Manual and PowerPoint slides are available with qualifying course adoption.

Table of Contents

Overview of Electronic Commerce

Electronic Commerce and Mobile Commerce

Effects of the Internet and Mobile Networks

Network Access

Barcodes

Smart Cards

Parties in Electronic Commerce

Security

Summary

Questions

Money and Payment Systems

Mechanisms of Classical Money

Payment Instruments

Types of Dematerialized Monies

Purses, Holders, and Wallets

Transactional Properties of Dematerialized Currencies

Overall Comparison of the Means of Payment

Practice of Dematerialized Money

Clearance and Settlement in Payment Systems

Drivers of Innovation in Banking and Payment Systems

Summary

Questions

Algorithms and Architectures for Security

Security of Open Financial Networks

OSI Model for Cryptographic Security

Security Services at the Link Layer

Security Services at the Network Layer

Security Services at the Application Layer

Message Confidentiality

Data Integrity

Identification of the Participants

Biometric Identification

Authentication of the Participants

Access Control

Denial of Service

Nonrepudiation

Secure Management of Cryptographic Keys

Exchange of Secret Keys: Kerberos

Public Key Kerberos

Exchange of Public Keys

Certificate Management

Authentication

Security Cracks

Summary

Appendix: Principles of Symmetric Encryption

Appendix: Principles of Public Key Encryption

Appendix: Principles of the Digital Signature Algorithm and the Elliptic Curve Digital Signature Algorithm

Questions

Business-to-Business Commerce

Drivers for Business-to-Business Electronic Commerce

Four Stages of Systems Integration

Overview of Business-to-Business Commerce

Short History of Business-to-Business Electronic Commerce

Examples of Business-to-Business Electronic Commerce

Evolution of Business-to-Business Electronic Commerce

Implementation of Business-to-Business Electronic Commerce

X12 and EDIFACT

EDI Messaging

Security of EDI

Integration of XML and Traditional EDI

New Architectures for Business-to-Business Electronic Commerce

Electronic Business (Using) Extensible Markup Language

Web Services

Relation of EDI with Electronic Funds Transfer

Summary

Questions

Transport Layer Security and Secure Sockets Layer

Architecture of SSL/TLS

SSL/TLS Security Services

SSL/TLS Subprotocols

Performance of SSL/TLS

Implementation Pitfalls

Summary

Questions

Wireless Transport Layer Security

Architecture

From TLS to WTLS

Operational Constraints

WAP and TLS Extensions

WAP Browsers

Summary

Questions

The SET Protocol

SET Architecture

Security Services of SET

Certification

Purchasing Transaction

Optional Procedures

Efforts to Promote SETs

SET versus TLS/SSL

Summary

Questions

Payments with Magnetic Stripe Cards

Point-of-Sale Transactions

Communication Standards for Card Transactions

Security of Point-of-Sale Transactions

Internet Transactions

3D Secure

Migration to EMV

Summary

Questions

Secure Payments with Integrated Circuit Cards

Description of Integrated Circuit Cards

Integration of Smart Cards with Computer Systems

Standards for Integrated Circuit Cards

Multiapplication Smart Cards

Security of Smart Cards

Payment Applications of Integrated Circuit Cards

EMV® Card

General Consideration on the Security of Smart Cards

Summary

Questions

Mobile Payments

Reference Model for Mobile Commerce

Secure Element in Mobile Phones

Barcodes

Bluetooth

Near-Field Communication

Text Messages

Bank-Centric Offers

Mobile Operator–Centric Offers

Third-Party Service Offers

Collaborative Offers

Payments from Mobile Terminals

Summary

Questions

Micropayments

Characteristics of Micropayment Systems

Standardization Efforts

Electronic Purses

Online Micropayments

Research Projects

Market Response to Micropayment Systems

Summary

Questions

PayPal

Evolution of PayPal

Personal Accounts

Business Accounts

Summary

Questions

Digital Money

Privacy with Cash and Digital Money

DigiCash (eCash)

Anonymity and Untraceability in DigiCash

Evaluation of DigiCash

Questions

Bitcoin and Cryptocurrencies

Background

Bitcoin Protocol

Operation

Risk Evaluation

Summary and Conclusions

Appendix: The Crypto Anarchist Manifesto

Appendix: Bitcoin as a Social Phenomenon

Appendix: Other Significant Cryptocurrencies

Appendix: Service Offers Based on Bitcoin

Questions

Dematerialized Checks

Processing of Paper Checks

Dematerialized Processing of Checks

Virtual Checks

Summary

Questions

Electronic Commerce in Society

Harmonization of Communication Interfaces

Governance of Electronic Money

Protection of Intellectual Property

Electronic Surveillance and Privacy

Content Filtering and Censorship

Taxation of Electronic Commerce

Trust Promotion

Archives Dematerialization

Summary

Questions

References

Websites/

Protocols for Secure Electronic Commerce (Hardcover, 3rd edition): Mostafa Hashem Sherif Protocols for Secure Electronic Commerce (Hardcover, 3rd edition)
Mostafa Hashem Sherif
R5,572 Discovery Miles 55 720 Ships in 10 - 15 working days

Protocols for Secure Electronic Commerce, Third Edition presents a compendium of protocols for securing electronic commerce, or e-commerce, in consumer- and business-to-business applications. Attending to a variety of electronic payment systems currently in use around the globe, this edition: Updates all chapters to reflect the latest technical advances and developments in areas such as mobile commerce Adds a new chapter on Bitcoin and other cryptocurrencies that did not exist at the time of the previous edition's publication Increases the coverage of PayPal in accordance with PayPal's amplified role for consumers and businesses Expands the discussion of bank cards, dedicating a full chapter to magnetic stripe cards and a full chapter to chip-and-PIN technology Protocols for Secure Electronic Commerce, Third Edition offers a state-of-the-art overview of best practices for the security of e-commerce, complete with end-of-chapter review questions and an extensive bibliography of specialized references. A Solutions Manual and PowerPoint slides are available with qualifying course adoption.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
DICTIONNAIRE D'ARABE DIALECTAL TUNISIEN
Louis Bardou Paperback R557 Discovery Miles 5 570
Sustainable Development of Denmark in…
Bo Fritzboger Hardcover R3,678 Discovery Miles 36 780
Americanisms:English New World
Maximilian Schele De Vere Hardcover R7,221 Discovery Miles 72 210
After Hitler - Recivilizing Germans…
Konrad H. Jarausch Hardcover R3,543 Discovery Miles 35 430
Agents of Moscow - The Hungarian…
Martin Mevius Hardcover R5,745 Discovery Miles 57 450
Becoming
Michelle Obama CD  (1)
R544 R462 Discovery Miles 4 620
Eastern Europe, Russia and Central Asia…
Imogen Bell Hardcover R10,068 Discovery Miles 100 680
Born For Greatness
Gerald J. Maarman Paperback R195 R180 Discovery Miles 1 800
Seeking God - Finding Another Kind Of…
Trevor Hudson Paperback R310 R291 Discovery Miles 2 910
NKJV Gift and Award Bible (Pink)
Thomas Nelson Paperback R269 R247 Discovery Miles 2 470

 

Partners