0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (2)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Cyber-Security in Critical Infrastructures - A Game-Theoretic Approach (Paperback, 1st ed. 2020): Stefan Rass, Stefan Schauer,... Cyber-Security in Critical Infrastructures - A Game-Theoretic Approach (Paperback, 1st ed. 2020)
Stefan Rass, Stefan Schauer, Sandra Koenig, Quanyan Zhu
R5,254 Discovery Miles 52 540 Ships in 10 - 15 working days

This book presents a compendium of selected game- and decision-theoretic models to achieve and assess the security of critical infrastructures. Given contemporary reports on security incidents of various kinds, we can see a paradigm shift to attacks of an increasingly heterogeneous nature, combining different techniques into what we know as an advanced persistent threat. Security precautions must match these diverse threat patterns in an equally diverse manner; in response, this book provides a wealth of techniques for protection and mitigation. Much traditional security research has a narrow focus on specific attack scenarios or applications, and strives to make an attack "practically impossible." A more recent approach to security views it as a scenario in which the cost of an attack exceeds the potential reward. This does not rule out the possibility of an attack but minimizes its likelihood to the least possible risk. The book follows this economic definition of security, offering a management scientific view that seeks a balance between security investments and their resulting benefits. It focuses on optimization of resources in light of threats such as terrorism and advanced persistent threats. Drawing on the authors' experience and inspired by real case studies, the book provides a systematic approach to critical infrastructure security and resilience. Presenting a mixture of theoretical work and practical success stories, the book is chiefly intended for students and practitioners seeking an introduction to game- and decision-theoretic techniques for security. The required mathematical concepts are self-contained, rigorously introduced, and illustrated by case studies. The book also provides software tools that help guide readers in the practical use of the scientific models and computational frameworks.

Quantum Random Number Generation - Theory and Practice (Hardcover, 1st ed. 2020): Christian Kollmitzer, Stefan Schauer, Stefan... Quantum Random Number Generation - Theory and Practice (Hardcover, 1st ed. 2020)
Christian Kollmitzer, Stefan Schauer, Stefan Rass, Benjamin Rainer
R4,230 Discovery Miles 42 300 Ships in 10 - 15 working days

This book provides an overview of state-of-the-art implementations of quantum random number generators (QRNGs), and especially examines their relation to classical statistical randomness models and numerical techniques for computing random numbers. The reader - who ideally has a background in classical statistics, computer science, or cryptography - is introduced to the world of quantum bits step by step, and explicit relations between QRNGs and their classical counterparts are identified along the way. Random number generation is a major pillar of cryptography. Capitalizing on the randomness inherent in quantum phenomena is a rapidly evolving branch of quantum cryptography with countless applications for the future. The value of quantum randomness for cryptographic purposes is empirically demonstrated in statistical evaluations of QRNGs' performance compared to classical techniques for true and pseudorandom number generation. The book then provides an overview of technical implementations of QRNGs, before a concluding discussion of major achievements and remaining obstacles in the field rounds out the coverage, while also opening the door for future research directions.

Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017,... Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings (Paperback, 1st ed. 2017)
Stefan Rass, Boan, Christopher Kiekintveld, Fei Fang, Stefan Schauer
R1,637 Discovery Miles 16 370 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Decision and Game Theory for Security, GameSec 2017, held in Vienna, Austria, in October 2017. The 24 revised full papers presented together with 4 short papers were carefully reviewed and selected from 71 submissions.The papers address topics such as Game theory and mechanism design for security and privacy; Pricing and economic incentives for building dependable and secure systems; Dynamic control, learning, and optimization and approximation techniques; Decision making and decision theory for cybersecurity and security requirements engineering; Socio-technological and behavioral approaches to security; Risk assessment and risk management; Security investment and cyber insurance; Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems; New approaches for security and privacy in cloud computing and for critical infrastructure; Security and privacy of wireless and mobile communications, including user location privacy; Game theory for intrusion detection; and Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy.

Game Theory for Security and Risk Management - From Theory to Practice (Hardcover, 1st ed. 2018): Stefan Rass, Stefan Schauer Game Theory for Security and Risk Management - From Theory to Practice (Hardcover, 1st ed. 2018)
Stefan Rass, Stefan Schauer
R3,803 Discovery Miles 38 030 Ships in 10 - 15 working days

The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies. Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains. Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions. The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering. The second part then shows how these models are adopted, implemented, and analyzed. Surveillance systems, interconnected networks, and power grids are among the different application areas discussed. Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Space Blankets (Adult)
 (1)
R16 Discovery Miles 160
Microgarden Stainless Steel Wire Peg…
 (1)
R199 R140 Discovery Miles 1 400
Red Elephant Horizon Backpack…
R527 Discovery Miles 5 270
Boucheron Quatre Eau De Parfum Spray…
R1,825 Discovery Miles 18 250
Estee Lauder Beautiful Belle Eau De…
R2,241 R1,652 Discovery Miles 16 520
Luca Distressed Peak Cap (Khaki)
R249 Discovery Miles 2 490
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Moon Bag [Black]
R57 Discovery Miles 570
A Seed Of A Dream - Morris Isaacson High…
Clive Glaser Paperback R265 R195 Discovery Miles 1 950

 

Partners