0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (1)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Emerging Security Algorithms and Techniques (Hardcover): Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh Emerging Security Algorithms and Techniques (Hardcover)
Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh
R4,091 Discovery Miles 40 910 Ships in 12 - 17 working days

Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission. Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich-Goldwasser-Halevi, Identity Based Encryption, and Attribute Based Encryption. There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc. The book offers comprehensive coverage of the most essential topics, including: Modular Arithmetic, Finite Fields Prime Number, DLP, Integer Factorization Problem Symmetric Cryptography Asymmetric Cryptography Post-Quantum Cryptography Identity Based Encryption Attribute Based Encryption Key Management Entity Authentication, Message Authentication Digital Signatures Hands-On "SageMath" This book serves as a textbook/reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, and Electronics and Communication Engineering.

Opportunistic Networks - Mobility Models, Protocols, Security, and Privacy (Hardcover): Khaleel Ahmad, Nur Izura Udzir, Ganesh... Opportunistic Networks - Mobility Models, Protocols, Security, and Privacy (Hardcover)
Khaleel Ahmad, Nur Izura Udzir, Ganesh Chandra Deka
R5,268 Discovery Miles 52 680 Ships in 12 - 17 working days

Opportunistic networks allow mobile users to share information without any network infrastructure.This book is suitable for both undergraduates and postgraduates as it discusses various aspects of opportunistic networking including, foundations of ad hoc network; taxonomy of mobility models, etc.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bestway H2O GO! Sugarcoated Noodles…
R190 Discovery Miles 1 900
Bad Boy Men's Smoke Watch & Sunglass Set…
 (3)
R489 Discovery Miles 4 890
Ryobi Belt Sander (76x533)(810W)
R1,491 Discovery Miles 14 910
Colleen Pencil Crayons - Assorted…
R144 R131 Discovery Miles 1 310
Huntlea Original Two Tone Pillow Bed…
R650 R565 Discovery Miles 5 650
Xbox One Replacement Case
 (8)
R53 Discovery Miles 530
Brother LC472XLY Ink Cartridge (Yellow…
R449 R419 Discovery Miles 4 190
GBC 230 MultiBind Manual Binding Machine…
R29,149 R16,999 Discovery Miles 169 990
Baby Dove Body Wash 200ml
R50 Discovery Miles 500
Loot
Nadine Gordimer Paperback  (2)
R205 R168 Discovery Miles 1 680

 

Partners