0
Your cart

Your cart is empty

Browse All Departments
Price
Status
Brand

Showing 1 - 19 of 19 matches in All Departments

Empty Earth - Graphic Reluctant Reader: Kris Knight Empty Earth - Graphic Reluctant Reader
Kris Knight; Illustrated by Sara Foresti
R204 R186 Discovery Miles 1 860 Save R18 (9%) Ships in 9 - 17 working days
Jinx (Graphic Reluctant Reader) (Paperback): Chloe Lewis Jinx (Graphic Reluctant Reader) (Paperback)
Chloe Lewis; Illustrated by Sara Foresti 1
R197 R177 Discovery Miles 1 770 Save R20 (10%) Ships in 9 - 17 working days
The President Wears Pink (Hardcover): Mandana Vetto The President Wears Pink (Hardcover)
Mandana Vetto; Illustrated by Sara Foresti
R437 Discovery Miles 4 370 Ships in 10 - 15 working days
Preserving Privacy in Data Outsourcing (Hardcover, 2011 Ed.): Sara Foresti Preserving Privacy in Data Outsourcing (Hardcover, 2011 Ed.)
Sara Foresti
R2,754 Discovery Miles 27 540 Ships in 10 - 15 working days

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release.

Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data, allowing the data owner to outsource not only the data but the security policy itself. To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to protect privacy of data associations and provide fragmentation as a complementary means for protecting privacy: associations broken by fragmentation will be visible only to users authorized (by knowing the proper key) to join fragments. The book finally investigates the problem of executing queries over possible data distributed at different servers and which must be controlled to ensure sensitive information and sensitive associations be visible only to parties authorized for that. Case Studies are provided throughout the book.

Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.

Treasure of the Gold Dragon: A Branches Book (Dragon Masters #12) - Volume 12 (Paperback): Tracey West Treasure of the Gold Dragon: A Branches Book (Dragon Masters #12) - Volume 12 (Paperback)
Tracey West; Illustrated by Sara Foresti 1
R166 R156 Discovery Miles 1 560 Save R10 (6%) Ships in 18 - 22 working days

The race is on to find the Gold Key! Pick a book. Grow a Reader! This series is part of Scholastic's early chapter book line, Branches, aimed at newly independent readers. With easy-to-read text, high-interest content, fast-paced plots, and illustrations on every page, these books will boost reading confidence and stamina. Branches books help readers grow. In the 12th book of this fantasy series, Maldred is after the powerful Gold Key! Drake and Rori travel to the lair of the Gold Dragon to help protect the key. There, they meet a new Dragon Master named Darma. If dark wizard Maldred gets his hands on the Gold Key, he will be one step closer to controlling a powerful Earthquake Dragon. Can the Dragon Masters stop him before it's too late? The action is nonstop in this exciting, heavily illustrated early chapter book series!

The Riddler and the Jinx: Michael Anthony Steele The Riddler and the Jinx
Michael Anthony Steele; Illustrated by Sara Foresti
R204 R186 Discovery Miles 1 860 Save R18 (9%) Ships in 9 - 17 working days

When Harley ruins the Riddler’s carefully constructed scheme to capture Batman, she’s determined to show the calculating crook that she’s no bad-luck jinx. She’ll use her brilliantly bonkers mind to write confounding rhymes of her own! In this battle of wits, can the jolly jester prove there’s a method to her madness? Find out in this action-packed chapter book for DC Super Hero and Super-Villain fans!

Preserving Privacy in Data Outsourcing (Paperback, 2011 ed.): Sara Foresti Preserving Privacy in Data Outsourcing (Paperback, 2011 ed.)
Sara Foresti
R2,653 Discovery Miles 26 530 Ships in 10 - 15 working days

Foreword by Pierangela Samarati

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release.

Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data; it allows the data owner to outsource not only the data but the security policy itself. The last section of this book investigates the problem of executing queries over possible data distributed at different servers. Case Studies will be provided.

About this book:

Exclusively focuses on addressing protection of confidential information in the emerging data outsourcing scenarios.

Presents relevant and critical novel problems and novel techniques, a precious reference point to students, researchers, and developers in this field.

Provides a comprehensive overview of the data protection problem in outsourcing scenarios, as well as a rigorous analysis and formalization of the problem and solutions to it.

Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.

Computer Security -- ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12,... Computer Security -- ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings (Paperback, 2012 ed.)
Sara Foresti, Moti Yung, Fabio Martinelli
R1,575 Discovery Miles 15 750 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security.

Batman's Most Wanted: Michael Anthony Steele Batman's Most Wanted
Michael Anthony Steele; Illustrated by Sara Foresti
R204 R186 Discovery Miles 1 860 Save R18 (9%) Ships in 9 - 17 working days

When Gotham City’s biggest baddies gather to plan a heist, they tell Harley to go wait with the goons! What?! But the joke is on them after Batman busts in and she sneaks out holding blueprints that show the way to the crooked payday. Can the jilted jester pull off a solo steal while dodging the criminal bosses on her tail? Find out in this action-packed chapter book for DC Super Hero and Super-Villain fans!

Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA,... Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Noseong Park, Kun Sun, Sara Foresti, Kevin Butler, Nitesh Saxena
R2,721 Discovery Miles 27 210 Ships in 10 - 15 working days

This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020. The conference was held virtually due to COVID-19 pandemic. The 60 full papers were carefully reviewed and selected from 120 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.

Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA,... Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Noseong Park, Kun Sun, Sara Foresti, Kevin Butler, Nitesh Saxena
R1,465 Discovery Miles 14 650 Ships in 10 - 15 working days

This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020. The conference was held virtually due to COVID-19 pandemic. The 60 full papers were carefully reviewed and selected from 120 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.

The Joker Hideout Heist (Paperback): Steve Brezenoff The Joker Hideout Heist (Paperback)
Steve Brezenoff; Illustrated by Sara Foresti
R199 R180 Discovery Miles 1 800 Save R19 (10%) Ships in 9 - 17 working days

When Harley's hyenas are taken hostage, it's no laughing matter! The culprit is the Clown Prince of Crime, and landing a punch line on her part-time partner won't be easy. Can Harley find a way to crash the Joker's hideout, free her beloved pets, and prove, once and for all, that the joke is really on him? Find out in this action-packed chapter book for DC Super Hero and Super-Villain fans!

Poison Ivy's Big Boss in Bloom (Paperback): Michael Anthony Steele Poison Ivy's Big Boss in Bloom (Paperback)
Michael Anthony Steele; Illustrated by Sara Foresti
R199 R180 Discovery Miles 1 800 Save R19 (10%) Ships in 9 - 17 working days

When Harley springs Poison Ivy from Arkham Asylum, the jaunty jester expects a little payback. After all, there's no limit to the criminal empire she could grow with the Queen of Green's help. But will Harley bloom into the big boss she's always wanted to become, or will her villainous dreams wilt on the vine? Find out in this action-packed chapter book for DC Super Hero and Super-Villain fans!

Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings... Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings (Paperback, 1st ed. 2016)
Sara Foresti, Giuseppe Persiano
R1,538 Discovery Miles 15 380 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016. The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: cryptanalysis of symmetric key; side channel attacks and implementation; lattice-based cryptography, virtual private network; signatures and hash; multi party computation; symmetric cryptography and authentication; system security, functional and homomorphic encryption; information theoretic security; malware and attacks; multi party computation and functional encryption; and network security, privacy, and authentication.

Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece,... Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings (Paperback, 1st ed. 2016)
Sara Foresti, Javier Lopez
R2,111 Discovery Miles 21 110 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the 10th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2016, held in Heraklion, Crete, Greece, in September 2016. The 13 revised full papers and 5 short papers presented together in this book were carefully reviewed and selected from 29 submissions. WISTP 2016 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. The papers are organized in topical sections on authentication and key management; secure hardware systems; attacks to software and network systems; and access control and data protection.

Security and Trust Management - 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings... Security and Trust Management - 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings (Paperback, 1st ed. 2015)
Sara Foresti
R2,164 Discovery Miles 21 640 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management, STM 2015, held in Vienna, Austria, in September 2015, in conjunction with the 20th European Symposium Research in Computer Security, ESORICS 2015. The 15 revised full papers were carefully reviewed and selected from 38 submissions. They are organized in topical sections as security metrics and classification; data protection; intrusion detection and software vulnerabilities; cryptographic protocols; controlling data release; and security analysis, risk management and usability.

Treasure of the Gold Dragon: A Branches Book (Dragon Masters #12) - Volume 12 (Hardcover, Library ed.): Tracey West Treasure of the Gold Dragon: A Branches Book (Dragon Masters #12) - Volume 12 (Hardcover, Library ed.)
Tracey West; Illustrated by Sara Foresti
R397 Discovery Miles 3 970 Ships in 10 - 15 working days
Sally Snowboarder (Paperback): Amit Tayal Sally Snowboarder (Paperback)
Amit Tayal; Nancy Harris; Illustrated by Sara Foresti
R267 Discovery Miles 2 670 Ships in 9 - 17 working days

Everyone in her family loves to ski, except Sally. Will Sally ever fit in or will she find her own way to shine on the slopes?

Gainsbourg (French, DVD): Eric Elmosnino, Lucy Gordon, Laetitia Casta, Doug Jones, Anna Mouglalis, Mylene Jampanoi, Sara... Gainsbourg (French, DVD)
Eric Elmosnino, Lucy Gordon, Laetitia Casta, Doug Jones, Anna Mouglalis, … 1
R957 R554 Discovery Miles 5 540 Save R403 (42%) Ships in 10 - 15 working days

Biopic of notorious French singer-songwriter and provocateur Serge Gainsbourg, adapted by Joann Sfar from his graphic novel. Starring Eric Elmosnino in the title role as the chain-smoking Jewish iconoclast who flouts authority at every turn, the film traces his life from his childhood in 1940s Nazi-occupied Paris to his rise to success in the 1960s and relationships with French icons Juliette Greco (Anna Mouglalis), Brigitte Bardot (Laetitia Casta), France Gall (Sara Forestier) and Jane Birkin (Lucy Gordon).

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Being There - Backstories From The…
Tony Leon Paperback R350 R312 Discovery Miles 3 120
1000 Ninja Foodi Air Fryer Cookbook with…
Julia Adamo, Helen Bently Hardcover R646 Discovery Miles 6 460
Baking Secrets - Recipes for Every…
Martjie Malan Hardcover R500 R461 Discovery Miles 4 610
Historic Chicago Bakeries
Jennifer Billock Paperback R505 R473 Discovery Miles 4 730
Baking with Cannabis - 79 Delectable…
Veronique Windsor Hardcover R788 Discovery Miles 7 880
Democracy Works - Re-Wiring Politics To…
Greg Mills, Olusegun Obasanjo, … Paperback R320 R290 Discovery Miles 2 900
Keto Lifestyle: Simple
Hendrik Marais Paperback R380 R339 Discovery Miles 3 390
Black+Decker Toaster Oven Cookbook 2021…
Rachael Gerbert Hardcover R660 Discovery Miles 6 600
The Easy Anova Sous Vide Cookbook - 500…
Alta Ayala Hardcover R920 Discovery Miles 9 200
Shine A Light - In Conversation With…
Corrine Wilson Paperback R369 Discovery Miles 3 690

 

Partners