0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (3)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Quantum Random Number Generation - Theory and Practice (Hardcover, 1st ed. 2020): Christian Kollmitzer, Stefan Schauer, Stefan... Quantum Random Number Generation - Theory and Practice (Hardcover, 1st ed. 2020)
Christian Kollmitzer, Stefan Schauer, Stefan Rass, Benjamin Rainer
R3,616 Discovery Miles 36 160 Ships in 12 - 17 working days

This book provides an overview of state-of-the-art implementations of quantum random number generators (QRNGs), and especially examines their relation to classical statistical randomness models and numerical techniques for computing random numbers. The reader - who ideally has a background in classical statistics, computer science, or cryptography - is introduced to the world of quantum bits step by step, and explicit relations between QRNGs and their classical counterparts are identified along the way. Random number generation is a major pillar of cryptography. Capitalizing on the randomness inherent in quantum phenomena is a rapidly evolving branch of quantum cryptography with countless applications for the future. The value of quantum randomness for cryptographic purposes is empirically demonstrated in statistical evaluations of QRNGs' performance compared to classical techniques for true and pseudorandom number generation. The book then provides an overview of technical implementations of QRNGs, before a concluding discussion of major achievements and remaining obstacles in the field rounds out the coverage, while also opening the door for future research directions.

Game Theory for Security and Risk Management - From Theory to Practice (Hardcover, 1st ed. 2018): Stefan Rass, Stefan Schauer Game Theory for Security and Risk Management - From Theory to Practice (Hardcover, 1st ed. 2018)
Stefan Rass, Stefan Schauer
R3,584 Discovery Miles 35 840 Ships in 10 - 15 working days

The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies. Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains. Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions. The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering. The second part then shows how these models are adopted, implemented, and analyzed. Surveillance systems, interconnected networks, and power grids are among the different application areas discussed. Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks.

Cyber-Security in Critical Infrastructures - A Game-Theoretic Approach (Paperback, 1st ed. 2020): Stefan Rass, Stefan Schauer,... Cyber-Security in Critical Infrastructures - A Game-Theoretic Approach (Paperback, 1st ed. 2020)
Stefan Rass, Stefan Schauer, Sandra Koenig, Quanyan Zhu
R4,953 Discovery Miles 49 530 Ships in 10 - 15 working days

This book presents a compendium of selected game- and decision-theoretic models to achieve and assess the security of critical infrastructures. Given contemporary reports on security incidents of various kinds, we can see a paradigm shift to attacks of an increasingly heterogeneous nature, combining different techniques into what we know as an advanced persistent threat. Security precautions must match these diverse threat patterns in an equally diverse manner; in response, this book provides a wealth of techniques for protection and mitigation. Much traditional security research has a narrow focus on specific attack scenarios or applications, and strives to make an attack "practically impossible." A more recent approach to security views it as a scenario in which the cost of an attack exceeds the potential reward. This does not rule out the possibility of an attack but minimizes its likelihood to the least possible risk. The book follows this economic definition of security, offering a management scientific view that seeks a balance between security investments and their resulting benefits. It focuses on optimization of resources in light of threats such as terrorism and advanced persistent threats. Drawing on the authors' experience and inspired by real case studies, the book provides a systematic approach to critical infrastructure security and resilience. Presenting a mixture of theoretical work and practical success stories, the book is chiefly intended for students and practitioners seeking an introduction to game- and decision-theoretic techniques for security. The required mathematical concepts are self-contained, rigorously introduced, and illustrated by case studies. The book also provides software tools that help guide readers in the practical use of the scientific models and computational frameworks.

Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017,... Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings (Paperback, 1st ed. 2017)
Stefan Rass, Boan, Christopher Kiekintveld, Fei Fang, Stefan Schauer
R1,543 Discovery Miles 15 430 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Decision and Game Theory for Security, GameSec 2017, held in Vienna, Austria, in October 2017. The 24 revised full papers presented together with 4 short papers were carefully reviewed and selected from 71 submissions.The papers address topics such as Game theory and mechanism design for security and privacy; Pricing and economic incentives for building dependable and secure systems; Dynamic control, learning, and optimization and approximation techniques; Decision making and decision theory for cybersecurity and security requirements engineering; Socio-technological and behavioral approaches to security; Risk assessment and risk management; Security investment and cyber insurance; Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems; New approaches for security and privacy in cloud computing and for critical infrastructure; Security and privacy of wireless and mobile communications, including user location privacy; Game theory for intrusion detection; and Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Mission Impossible 6: Fallout
Tom Cruise, Henry Cavill, … Blu-ray disc  (1)
R131 R91 Discovery Miles 910
Kendall Office Chair (Light Grey)
R1,699 R1,346 Discovery Miles 13 460
Midnights
Taylor Swift CD R394 Discovery Miles 3 940
By Way Of Deception
Amir Tsarfati, Steve Yohn Paperback  (1)
R250 R185 Discovery Miles 1 850
Teenage Mutant Ninja Turtles: Out of the…
Megan Fox, Stephen Amell, … Blu-ray disc R46 Discovery Miles 460
Sylvanian Families - Walnut Squirrel…
R749 R579 Discovery Miles 5 790
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Efekto 77300-G Nitrile Gloves (L)(Green)
R63 Discovery Miles 630
Playseat Evolution Racing Chair (Black)
 (3)
R8,999 R6,999 Discovery Miles 69 990
Bostik Double-Sided Tape (18mm x 10m…
 (1)
R31 Discovery Miles 310

 

Partners