0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (8)
  • -
Status
Brand

Showing 1 - 10 of 10 matches in All Departments

Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud... Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19–22, 2023, Proceedings (1st ed. 2023)
Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, …
R2,713 Discovery Miles 27 130 Ships in 10 - 15 working days

This book constitutes the proceedings of the satellite workshops held around the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Kyoto, Japan, in June 2023.The 34 full papers and 13 poster papers presented in this volume were carefully reviewed and selected from 76 submissions. They stem from the following workshops: ·  1st ACNS Workshop on Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis (ADSC 2023) ·        5th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2023) ·        4th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2023) ·        5th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2023) ·        3rd ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2023) ·        5th ACNS Workshop on Cloud Security and Privacy (Cloud S&P 2023) ·        4th ACNS Workshop on Secure Cryptographic Implementation (SCI 2023) ·        4th ACNS Workshop on Security in Mobile Technologies (SecMT 2023) ·        5th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2023)

Network and System Security - 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings... Network and System Security - 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings (Paperback, 1st ed. 2022)
Xingliang Yuan, Guangdong Bai, Cristina Alcaraz, Suryadipta Majumdar
R3,360 Discovery Miles 33 600 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 16th International Conference on Network and System Security, NSS 2022, held in Denarau Island, Fiji, on December 9-12, 2022. The 23 full and 18 short papers presented in this book were carefully reviewed and selected from 83 submissions. They focus on theoretical and practical aspects of network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.

Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P,... Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings (Paperback, 1st ed. 2022)
Jianying Zhou, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, …
R1,667 Discovery Miles 16 670 Ships in 10 - 15 working days

This book constitutes the proceedings of the satellite workshops held around the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, held in Rome, Italy, in June 2022. Due to the Corona pandemic the workshop was held as a virtual event. The 31 papers presented in this volume were carefully reviewed and selected from 52 submissions. They stem from the following workshops: - AIBlock: 4th ACNS Workshop on Application Intelligence and Blockchain Security - AIHWS: 3rd ACNS Workshop on Artificial Intelligence in Hardware Security - AIoTS: 4th ACNS Workshop on Artificial Intelligence and Industrial IoT Security - CIMSS: 2nd ACNS Workshop on Critical Infrastructure and Manufacturing System Security - Cloud S&P: 4th ACNS Workshop on Cloud Security and Privacy - SCI: 3rd ACNS Workshop on Secure Cryptographic Implementation - SecMT: 3rd ACNS Workshop on Security in Mobile Technologies - SiMLA: 4th ACNS Workshop on Security in Machine Learning and its Applications

Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P,... Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings (Paperback, 1st ed. 2021)
Jianying Zhou, Chuadhry Mujeeb Ahmed, Lejla Batina, Sudipta Chattopadhyay, Olga Gadyatskaya, …
R2,779 Discovery Miles 27 790 Ships in 10 - 15 working days

This book constitutes the proceedings of the satellite workshops held around the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, held in Kamakura, Japan, in June 2021.The 26 papers presented in this volume were carefully reviewed and selected from 49 submissions. They stem from the following workshops: AIBlock 2021: Third International Workshop on Application Intelligence and Blockchain Security AIHWS 2021: Second International Workshop on Artificial Intelligence in Hardware Security AIoTS 2021: Third International Workshop on Artificial Intelligence and Industrial IoT Security CIMSS 2021: First International Workshop on Critical Infrastructure and Manufacturing System Security Cloud S&P 2021: Third International Workshop on Cloud Security and Privacy SCI 2021: Second International Workshop on Secure Cryptographic Implementation SecMT 2021: Second International Workshop on Security in Mobile Technologies SiMLA 2021; Third International Workshop on Security in Machine Learning and its Applications Due to the Corona pandemic the workshop was held as a virtual event.

Digital Forensics and Cyber Crime - 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020,... Digital Forensics and Cyber Crime - 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, Proceedings (Paperback, 1st ed. 2021)
Sanjay Goel, Pavel Gladyshev, Daryl Johnson, Makan Pourzandi, Suryadipta Majumdar
R2,703 Discovery Miles 27 030 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2020, held in Boston, MA, in October 2020. Due to COVID-19 pandemic the conference was held virtually. The 11 reviewed full papers and 4 short papers were selected from 35 submissions and are grouped in topical sections on digital forensics; cyber-physical system Forensics; event reconstruction in digital forensics; emerging topics in forensics; cybersecurity and digital forensics.

Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI,... Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings (Paperback, 1st ed. 2020)
Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man-Ho Au, Lejla Batina, …
R3,309 Discovery Miles 33 090 Ships in 10 - 15 working days

This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, in Rome, Italy, in October 2020. The 31 papers presented in this volume were carefully reviewed and selected from 65 submissions. They stem from the following workshops: AIBlock 2020: Second International Workshop on Application Intelligence and Blockchain Security AIHWS 2020: First International Workshop on Artificial Intelligence in Hardware Security AIoTS 2020: Second International Workshop on Artificial Intelligence and Industrial Internet-of-Things Security Cloud S&P 2020: Second International Workshop on Cloud Security and Privacy SCI 2020: First International Workshop on Secure Cryptographic Implementation SecMT 2020: First International Workshop on Security in Mobile Technologies SiMLA 2020: Second International Workshop on Security in Machine Learning and its Applications

Cloud Security Auditing (Paperback, 1st ed. 2019): Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily,... Cloud Security Auditing (Paperback, 1st ed. 2019)
Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, …
R2,703 Discovery Miles 27 030 Ships in 10 - 15 working days

This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastructure from the structural point of view, while focusing on virtualization-related security properties and consistency between multiple control layers. It presents an off-line automated framework for auditing consistent isolation between virtual networks in OpenStack-managed cloud spanning over overlay and layer 2 by considering both cloud layers' views. A runtime security auditing framework for the cloud with special focus on the user-level including common access control and authentication mechanisms e.g., RBAC, ABAC and SSO is covered as well. This book also discusses a learning-based proactive security auditing system, which extracts probabilistic dependencies between runtime events and applies such dependencies to proactively audit and prevent security violations resulting from critical events. Finally, this book elaborates the design and implementation of a middleware as a pluggable interface to OpenStack for intercepting and verifying the legitimacy of user requests at runtime. Many companies nowadays leverage cloud services for conducting major business operations (e.g., Web service, inventory management, customer service, etc.). However, the fear of losing control and governance still persists due to the inherent lack of transparency and trust in clouds. The complex design and implementation of cloud infrastructures may cause numerous vulnerabilities and misconfigurations, while the unique properties of clouds (elastic, self-service, multi-tenancy) can bring novel security challenges. In this book, the authors discuss how state-of-the-art security auditing solutions may help increase cloud tenants' trust in the service providers by providing assurance on the compliance with the applicable laws, regulations, policies, and standards. This book introduces the latest research results on both traditional retroactive auditing and novel (runtime and proactive) auditing techniques to serve different stakeholders in the cloud. This book covers security threats from different cloud abstraction levels and discusses a wide-range of security properties related to cloud-specific standards (e.g., Cloud Control Matrix (CCM) and ISO 27017). It also elaborates on the integration of security auditing solutions into real world cloud management platforms (e.g., OpenStack, Amazon AWS and Google GCP). This book targets industrial scientists, who are working on cloud or security-related topics, as well as security practitioners, administrators, cloud providers and operators.Researchers and advanced-level students studying and working in computer science, practically in cloud security will also be interested in this book.

Cloud Security Auditing (Hardcover, 1st ed. 2019): Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily,... Cloud Security Auditing (Hardcover, 1st ed. 2019)
Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, …
R3,466 Discovery Miles 34 660 Ships in 10 - 15 working days

This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastructure from the structural point of view, while focusing on virtualization-related security properties and consistency between multiple control layers. It presents an off-line automated framework for auditing consistent isolation between virtual networks in OpenStack-managed cloud spanning over overlay and layer 2 by considering both cloud layers' views. A runtime security auditing framework for the cloud with special focus on the user-level including common access control and authentication mechanisms e.g., RBAC, ABAC and SSO is covered as well. This book also discusses a learning-based proactive security auditing system, which extracts probabilistic dependencies between runtime events and applies such dependencies to proactively audit and prevent security violations resulting from critical events. Finally, this book elaborates the design and implementation of a middleware as a pluggable interface to OpenStack for intercepting and verifying the legitimacy of user requests at runtime. Many companies nowadays leverage cloud services for conducting major business operations (e.g., Web service, inventory management, customer service, etc.). However, the fear of losing control and governance still persists due to the inherent lack of transparency and trust in clouds. The complex design and implementation of cloud infrastructures may cause numerous vulnerabilities and misconfigurations, while the unique properties of clouds (elastic, self-service, multi-tenancy) can bring novel security challenges. In this book, the authors discuss how state-of-the-art security auditing solutions may help increase cloud tenants' trust in the service providers by providing assurance on the compliance with the applicable laws, regulations, policies, and standards. This book introduces the latest research results on both traditional retroactive auditing and novel (runtime and proactive) auditing techniques to serve different stakeholders in the cloud. This book covers security threats from different cloud abstraction levels and discusses a wide-range of security properties related to cloud-specific standards (e.g., Cloud Control Matrix (CCM) and ISO 27017). It also elaborates on the integration of security auditing solutions into real world cloud management platforms (e.g., OpenStack, Amazon AWS and Google GCP). This book targets industrial scientists, who are working on cloud or security-related topics, as well as security practitioners, administrators, cloud providers and operators.Researchers and advanced-level students studying and working in computer science, practically in cloud security will also be interested in this book.

Applied Cryptography and Network Security Workshops - ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS,... Applied Cryptography and Network Security Workshops - ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5-7, 2019, Proceedings (Paperback, 1st ed. 2019)
Jianying Zhou, Robert Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, …
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book constitutes the proceedings of the satellite workshops held around the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, in Bogota, Colombia, in June 2019. The 10 papers presented in this volume were carefully reviewed and selected from 30 submissions. They stem from the following workshops: AIBlock 2019: First International Workshop on Application Intelligence and Blockchain SecurityAIoTS 2019:First International Workshop on Articial Intelligence and Industrial Internet-of-Things SecurityCloud S&P 2019:First International Workshop on Cloud Security and PrivacyPriDA 2019:First InternationalWorkshop on Privacy-preserving Distributed Data AnalysisSiMLA 2019: First International Workshop on Security in Machine Learning and its Applications

Innovations In Digital Forensics: Suryadipta Majumdar, Paria Shirani, Lingyu Wang Innovations In Digital Forensics
Suryadipta Majumdar, Paria Shirani, Lingyu Wang
R3,733 Discovery Miles 37 330 Ships in 10 - 15 working days

Digital forensics deals with the investigation of cybercrimes. With the growing deployment of cloud computing, mobile computing, and digital banking on the internet, the nature of digital forensics has evolved in recent years, and will continue to do so in the near future.This book presents state-of-the-art techniques to address imminent challenges in digital forensics. In particular, it focuses on cloud forensics, Internet-of-Things (IoT) forensics, and network forensics, elaborating on innovative techniques, including algorithms, implementation details and performance analysis, to demonstrate their practicality and efficacy. The innovations presented in this volume are designed to help various stakeholders with the state-of-the-art digital forensics techniques to understand the real world problems. Lastly, the book will answer the following questions: How do the innovations in digital forensics evolve with the emerging technologies? What are the newest challenges in the field of digital forensics?

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Sudocrem Skin & Baby Care Barrier Cream…
R128 Discovery Miles 1 280
Slazenger Wimbledon Tennis Balls SL (3…
R140 R130 Discovery Miles 1 300
Butterfly A4 70 Micron Pre-cut…
R35 Discovery Miles 350
Harry Potter Wizard Wand - In…
 (3)
R830 Discovery Miles 8 300
How To Fix (Unf*ck) A Country - 6 Things…
Roy Havemann Paperback R310 R210 Discovery Miles 2 100
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Microwave Egg Poacher (Yellow)
 (1)
R81 Discovery Miles 810
JCB Chelsea Steel Toe Safety Boot (Tan…
R1,509 Discovery Miles 15 090
Kendall Office Chair (Light Grey)
R1,699 R1,346 Discovery Miles 13 460
Britney Spears Fantasy Eau De Parfum…
R517 Discovery Miles 5 170

 

Partners