0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (1,649)
  • R250 - R500 (732)
  • R500+ (5,136)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Cybercrime - An Encyclopedia of Digital Crime (Hardcover): Nancy E. Marion, Jason Twede Cybercrime - An Encyclopedia of Digital Crime (Hardcover)
Nancy E. Marion, Jason Twede
R2,570 Discovery Miles 25 700 Ships in 7 - 11 working days

This important reference work is an extensive, up-to-date resource for students wanting to immerse themselves in the world of cybercrime, or for those seeking further knowledge of specific attacks both domestically and internationally. Cybercrime is characterized by criminal acts that take place in the borderless digital realm. It takes on many forms, and its perpetrators and victims are varied. From financial theft, destruction of systems, fraud, corporate espionage, and ransoming of information to the more personal, such as stalking and web-cam spying as well as cyberterrorism, this work covers the full spectrum of crimes committed via cyberspace. This comprehensive encyclopedia covers the most noteworthy attacks while also focusing on the myriad issues that surround cybercrime. It includes entries on such topics as the different types of cyberattacks, cybercrime techniques, specific cybercriminals and cybercrime groups, and cybercrime investigations. While objective in its approach, this book does not shy away from covering such relevant, controversial topics as Julian Assange and Russian interference in the 2016 U.S. presidential election. It also provides detailed information on all of the latest developments in this constantly involving field. Includes an introductory overview essay that discusses all aspects of cybercrime-how it's defined, how it developed, and its massive expansion in recent years Offers a wide array of entries regarding cybercrime and the many ways it can be committed Explores the largest, most costly cyber attacks on a variety of victims, including corporations, governments, consumers, and individuals Provides up-to-date information on the ever-evolving field of cybercrime

Crafting an Information Security Playbook (Paperback): Jeff Bollinger, Brandon Enright, Matthew Valites Crafting an Information Security Playbook (Paperback)
Jeff Bollinger, Brandon Enright, Matthew Valites
R1,164 R711 Discovery Miles 7 110 Save R453 (39%) Ships in 10 - 15 working days

Any good attacker will tell you that expensive security monitoring and prevention tools aren't enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You'll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone. Written by members of Cisco's Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture.Learn incident response fundamentals-and the importance of getting back to basics Understand threats you face and what you should be protecting Collect, mine, organize, and analyze as many relevant data sources as possible Build your own playbook of repeatable methods for security monitoring and response Learn how to put your plan into action and keep it running smoothly Select the right monitoring and detection tools for your environment Develop queries to help you sort through data and create valuable reports Know what actions to take during the incident response phase

Critical  Infrastructure Protection - Advances in Critical Infrastructure Protection: Information Infrastructure Models,... Critical Infrastructure Protection - Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense (Paperback, 2012 ed.)
Javier Lopez, Roberto Setola, Stephen Wolthusen
R1,643 R1,342 Discovery Miles 13 420 Save R301 (18%) Ships in 10 - 15 working days

The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critical Information Infrastructure (CII), which not only forms one of the constituent sectors of the overall CI, but also is unique in providing an element of interconnection between sectors as well as often also intra-sectoral control mechanisms. The 14 papers of this book present a collection of pieces of scientific work in the areas of critical infrastructure protection. In combining elementary concepts and models with policy-related issues on one hand and placing an emphasis on the timely area of control systems, the book aims to highlight some of the key issues facing the research community.

Karma-based API on Apple Platforms - Building Privacy Into iOS and macOS Apps (Paperback, 1st ed.): Manuel Carrasco Molina Karma-based API on Apple Platforms - Building Privacy Into iOS and macOS Apps (Paperback, 1st ed.)
Manuel Carrasco Molina
R657 R516 Discovery Miles 5 160 Save R141 (21%) Ships in 7 - 11 working days

Leverage the best techniques provided by Apple to build apps with maximum privacy for your users. This book explores not only the how-to steps for implementing privacy in your apps, but also answers workflow questions about what information you actually need.Do you need full access to a device's contacts? Do you need to have location services enabled in the background constantly? This book explains how to selectively enable services and how to make apps that can continue to function even when the user refuses to share data. Understanding the needs of your users and the expectations of Apple in reviewing your app will make better apps. You'll see how to ensure that you make it through the App Store review quickly and without the need to go back and develop privacy protocols that should have been in place to begin with. Not only is developing with privacy in mind good from a moral standpoint, but it also helps you create leaner apps that set themselves up for less potential data breaches and issues later on in distribution. While a basic understanding of app creation is expected, no deep understanding of Cocoa(Touch) or Swift will be required as code will point to the Apple Documentation. What You'll Learn Important APIs and how they affect privacy Work with the camera, Siri, maps, and other common iOS services and hardware Effectively allow notifications and advertising without affecting privacy Who This Book Is For App builders interested in creating apps that respects their user's privacy. Users willing to learn about the technicalities behind apps that respect or not their privacy

A Fierce Domain - Conflict in Cyberspace, 1986 to 2012 (Paperback): Jason Healey, Karl Grindal A Fierce Domain - Conflict in Cyberspace, 1986 to 2012 (Paperback)
Jason Healey, Karl Grindal
R513 Discovery Miles 5 130 Ships in 7 - 11 working days

A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Domain reaches back to look at the major "wake-up calls," the major conflicts that have forced the realization that cyberspace is a harsh place where nations and others contest for superiority. The book identifies the key lessons for policymakers, and, most importantly, where these lessons greatly differ from popular myths common in military and political circles.

Information Security Management Principles (Paperback, 3rd edition): Andy Taylor Information Security Management Principles (Paperback, 3rd edition)
Andy Taylor; David Alexander, Amanda Finch, David Sutton, Andy Taylor
R1,020 R952 Discovery Miles 9 520 Save R68 (7%) Ships in 10 - 15 working days

In today's technology-driven environment there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. The third edition has been updated to reflect changes in the IT security landscape and updates to the BCS Certification in Information Security Management Principles, which the book supports.

Unmasking the Social Engineer - The Human Element of Security (Paperback): Christopher Hadnagy Unmasking the Social Engineer - The Human Element of Security (Paperback)
Christopher Hadnagy; Edited by Paul F. Kelly; Foreword by Paul Ekman
R691 R497 Discovery Miles 4 970 Save R194 (28%) Ships in 10 - 15 working days

Learn to identify the social engineer by non-verbal behavior

"Unmasking the Social Engineer: The Human Element of Security" focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. "Unmasking the Social Engineer" shows how attacks work, explains nonverbal communications, and demonstrates with visuals the connection of non-verbal behavior to social engineering and scamming.Clearly combines both the practical and technical aspects of social engineering securityReveals the various dirty tricks that scammers usePinpoints what to look for on the nonverbal side to detect the social engineer

Sharing proven scientific methodology for reading, understanding, and deciphering non-verbal communications, "Unmasking the Social Engineer" arms readers with the knowledge needed to help protect their organizations.

Security in Computing and Communications - 6th International Symposium, SSCC 2018, Bangalore, India, September 19-22, 2018,... Security in Computing and Communications - 6th International Symposium, SSCC 2018, Bangalore, India, September 19-22, 2018, Revised Selected Papers (Paperback, 1st ed. 2019)
Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat, Jose M. Alcaraz Calero
R2,745 R2,347 Discovery Miles 23 470 Save R398 (14%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Symposium on Security in Computing and Communications, SSCC 2018, held in Bangalore, India, in September 2018. The 34 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 94 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.

Operational Assessment of IT (Hardcover): Steve Katzman Operational Assessment of IT (Hardcover)
Steve Katzman
R3,059 Discovery Miles 30 590 Ships in 10 - 15 working days

Operational Assessment of IT presents ideas and concepts of optimization designed to improve an organization's business processes and assist business units in meeting organizational goals more effectively. Rather than focus on specific technologies, computing environments, enterprise risks, resource programs, or infrastructure, the book focuses on organizational processes. Throughout the book, the author presents concerns and environments encountered throughout his career to demonstrate issues and explain how you, too, can successfully implement the tools presented in the book. The assessment process reviews the economics as well as the effectiveness and efficiency of the process. Whether your organization is profit-based, not-for-profit, or even governmental, you cannot provide services or products at a continuous loss. For an operational assessment to be of value, the ultimate goal must be to insure that the business unit process is effective and efficient and employs the financial assets and resources appropriately or helps the business unit make adjustments to improve the operation and use resources more efficiently and economically. After reading this book, you will be able to devise more efficient and economical ways to meet your customers' requirements, no matter who or where your customers are. You will learn that the goal of any process is to service or supply customers with what they want. The book provides tools and techniques that will assist you in gaining a 360-degree view of the process so that you can help the business unit improve the delivery of a quality product or a service to the customer.

Watermarking Security (Paperback, 1st ed. 2016): Patrick Bas, Teddy Furon, Francois Cayre, Gwenael Doerr, Benjamin Mathon Watermarking Security (Paperback, 1st ed. 2016)
Patrick Bas, Teddy Furon, Francois Cayre, Gwenael Doerr, Benjamin Mathon
R1,337 Discovery Miles 13 370 Ships in 10 - 15 working days

This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

Building Secure Firmware - Armoring the Foundation of the Platform (Paperback, 1st ed.): Jiewen Yao, Vincent Zimmer Building Secure Firmware - Armoring the Foundation of the Platform (Paperback, 1st ed.)
Jiewen Yao, Vincent Zimmer
R862 R684 Discovery Miles 6 840 Save R178 (21%) Ships in 7 - 11 working days

Use this book to build secure firmware. As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence, mutability, and opaqueness to today's antivirus scanning technology, it represents an interesting target for attackers.As platforms are universally network-connected and can contain multiple devices with firmware, and a global supply chain feeds into platform firmware, assurance is critical for consumers, IT enterprises, and governments. This importance is highlighted by emergent requirements such as NIST SP800-193 for firmware resilience and NIST SP800-155 for firmware measurement. This book covers the secure implementation of various aspects of firmware, including standards-based firmware-such as support of the Trusted Computing Group (TCG), Desktop Management Task Force (DMTF), and Unified Extensible Firmware Interface (UEFI) specifications-and also provides code samples and use cases. Beyond the standards, alternate firmware implementations such as ARM Trusted Firmware and other device firmware implementations (such as platform roots of trust), are covered. What You Will Learn Get an overview of proactive security development for firmware, including firmware threat modeling Understand the details of architecture, including protection, detection, recovery, integrity measurement, and access control Be familiar with best practices for secure firmware development, including trusted execution environments, cryptography, and language-based defenses Know the techniques used for security validation and maintenance Who This Book Is For Given the complexity of modern platform boot requirements and the threat landscape, this book is relevant for readers spanning from IT decision makers to developers building firmware

Resilient Space Systems Design - An Introduction (Hardcover): Ron Burch Resilient Space Systems Design - An Introduction (Hardcover)
Ron Burch
R2,549 Discovery Miles 25 490 Ships in 10 - 15 working days

Presenting a fundamental definition of resilience, the book examines the concept of resilience as it relates to space system design. The book establishes the required definitions, relates its place to existing state-of-the-art systems engineering practices, and explains the process and mathematical tools used to achieve a resilient design. It discusses a variety of potential threats and their impact upon a space system. By providing multiple, real-world examples to illustrate the application of the design methodology, the book covers the necessary techniques and tools, while guiding the reader through the entirety of the process. The book begins with space systems basics to ensure the reader is versed in the functions and components of the system prior to diving into the details of resilience. However, the text does not assume that the reader has an extensive background in the subject matter of resilience. This book is aimed at engineers and architects in the areas of aerospace, space systems, and space communications.

Threat Modeling - Risk Identification and Avoidance in Secure Design (Paperback): Izar Tarandach, Matthew J. Coles Threat Modeling - Risk Identification and Avoidance in Secure Design (Paperback)
Izar Tarandach, Matthew J. Coles
R1,170 R886 Discovery Miles 8 860 Save R284 (24%) Ships in 7 - 11 working days

Discover different techniques available today to perform threat modeling in your development process. Threat modeling helps software architects and developers determine what could possibly go wrong with a system under development before code is ever written. With this practical guide, you'll learn the most effective ways to integrate threat modeling into the development lifecycle, with actionable information whether you're following a waterfall or agile methodology. Learn the current state of the threat modeling practice Explore the security development lifecycle used in several organizations Get help for threat modeling issues you discover in the field Integrate threat modeling with your current development technologies Learn practical ways to ensure that threat modeling doesn't affect the velocity of agile teams

Cryptography and Secure Communication (Hardcover, New): Richard E Blahut Cryptography and Secure Communication (Hardcover, New)
Richard E Blahut
R1,982 Discovery Miles 19 820 Ships in 10 - 15 working days

Today's pervasive computing and communications networks have created an intense need for secure and reliable cryptographic systems. Bringing together a fascinating mixture of topics in engineering, mathematics, computer science, and informatics, this book presents the timeless mathematical theory underpinning cryptosystems both old and new. Major branches of classical and modern cryptography are discussed in detail, from basic block and stream cyphers through to systems based on elliptic and hyperelliptic curves, accompanied by concise summaries of the necessary mathematical background. Practical aspects such as implementation, authentication and protocol-sharing are also covered, as are the possible pitfalls surrounding various cryptographic methods. Written specifically with engineers in mind, and providing a solid grounding in the relevant algorithms, protocols and techniques, this insightful introduction to the foundations of modern cryptography is ideal for graduate students and researchers in engineering and computer science, and practitioners involved in the design of security systems for communications networks.

Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers... Trusted Systems - 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers (Paperback, 1st ed. 2015)
Moti Yung, Liehuang Zhu, Yanjiang Yang
R1,764 Discovery Miles 17 640 Ships in 10 - 15 working days

Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The revised full papers focus on the theory, technologies and applications of trusted systems and cover all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;}

The Implant (Paperback): Robert L. Ivey The Implant (Paperback)
Robert L. Ivey
R144 R117 Discovery Miles 1 170 Save R27 (19%) Ships in 7 - 11 working days
Industrial Control Systems Security and Resiliency - Practice and Theory (Hardcover, 1st ed. 2019): Craig Rieger, Indrajit Ray,... Industrial Control Systems Security and Resiliency - Practice and Theory (Hardcover, 1st ed. 2019)
Craig Rieger, Indrajit Ray, Quanyan Zhu, Michael A. Haney
R2,952 Discovery Miles 29 520 Ships in 7 - 11 working days

This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios. Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Such resilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission's survivability goals, and identify ways to design secure resilient ICS systems. This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.

Advanced Concepts for Intelligent Vision Systems - 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29,... Advanced Concepts for Intelligent Vision Systems - 16th International Conference, ACIVS 2015, Catania, Italy, October 26-29, 2015. Proceedings (Paperback, 1st ed. 2015)
Sebastiano Battiato, Jacques Blanc-Talon, Giovanni Gallo, Wilfried Philips, Dan Popescu, …
R2,634 R2,088 Discovery Miles 20 880 Save R546 (21%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 16th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2015, held Catania, Italy, in October 2015. The 76 revised full papers were carefully selected from 129 submissions. Acivs 2015 is a conference focusing on techniques for building adaptive, intelligent, safe and secure imaging systems. The focus of the conference is on following topic: low-level Image processing, video processing and camera networks, motion and tracking, security, forensics and biometrics, depth and 3D, image quality improvement and assessment, classification and recognition, multidimensional signal processing, multimedia compression, retrieval, and navigation.

Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings... Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings (Paperback, 1st ed. 2015)
Sushil Jajoda, Chandan Mazumdar
R2,677 R2,134 Discovery Miles 21 340 Save R543 (20%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Conference on Information Systems Security, ICISS 2015, held in Kolkata, India, in December 2015. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 133 submissions. The papers address the following topics: access control; attacks and mitigation; cloud security; crypto systems and protocols; information flow control; sensor networks and cognitive radio; and watermarking and steganography.

On the Move to Meaningful Internet Systems: OTM 2015 Conferences - Confederated International Conferences: CoopIS, ODBASE, and... On the Move to Meaningful Internet Systems: OTM 2015 Conferences - Confederated International Conferences: CoopIS, ODBASE, and C&TC 2015, Rhodes, Greece, October 26-30, 2015. Proceedings (Paperback, 1st ed. 2015)
Christophe Debruyne, Herve Panetto, Robert Meersman, Tharam Dillon, Georg Weichhart, …
R2,151 R1,722 Discovery Miles 17 220 Save R429 (20%) Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2015, Ontologies, Databases, and Applications of Semantics, ODBASE 2015, and Cloud and Trusted Computing, C&TC, held as part of OTM 2015 in October 2015 in Rhodes, Greece. The 30 full papers presented together with 15 short papers were carefully reviewed and selected from 144 initial submissions. The OTM program every year covers data and Web semantics, distributed objects, Web services, databases, information systems, enterprise workflow and collaboration, ubiquity, interoperability, mobility, grid and high-performance computing.

Federal Cybersecurity Planning - Human Capital & Research & Development (Paperback, New): Kurk C. Moore, Marion D. Taylor Federal Cybersecurity Planning - Human Capital & Research & Development (Paperback, New)
Kurk C. Moore, Marion D. Taylor
R1,320 Discovery Miles 13 200 Ships in 10 - 15 working days

Threats to federal information technology (IT) infrastructure and systems continue to grow in number and sophistication. The ability to make federal IT infrastructure and systems secure depends on the knowledge, skills, and abilities of the federal and contractor workforce that implements and maintains these systems. In light of the importance of recruiting and retaining cybersecurity personnel, this book examines the extent to which federal agencies have implemented and established workforce planning practices for cybersecurity personnel and explores the status of and plans for government-wide cybersecurity workforce initiatives.

Internet and Distributed Computing Systems - 8th International Conference, IDCS 2015, Windsor, UK, September 2-4, 2015.... Internet and Distributed Computing Systems - 8th International Conference, IDCS 2015, Windsor, UK, September 2-4, 2015. Proceedings (Paperback, 1st ed. 2015)
Giuseppe Di Fatta, Giancarlo Fortino, Wenfeng Li, Mukaddim Pathan, Frederic Stahl, …
R2,058 R1,517 Discovery Miles 15 170 Save R541 (26%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Internet and Distributed Computing Systems, IDCS 2015, held in Windsor, UK, in September 2015. The 19 revised full and 6 revised short papers presented were carefully reviewed and selected from 42 submissions. The selected contributions covered cutting-edge aspects of Cloud Computing and Internet of Things, sensor networks, parallel and distributed computing, advanced networking, smart cities and smart buildings, Big Data and social networks.

Computer Safety, Reliability, and Security - SAFECOMP 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The... Computer Safety, Reliability, and Security - SAFECOMP 2015 Workshops, ASSURE, DECSoS. ISSE, ReSA4CI, and SASSUR, Delft, The Netherlands, September 22, 2015, Proceedings (Paperback, 1st ed. 2015)
Floor Koornneef, Coen van Gulijk
R2,194 R1,768 Discovery Miles 17 680 Save R426 (19%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of 5 workshops co-located with SAFECOMP 2015, the 34th International Conference on Computer Safety, Reliability, and Security, held in Delft, The Netherlands, in September 2015. The 36 revised full papers presented were carefully reviewed and selected from numerous submissions. This year's workshop are: ASSURE 2015 - Assurance Cases for Software-intensive Systems; DECSoS'15 - EWICS/ERCIM/ARTEMIS Dependable Cyber-physical Systems and Systems-of-Systems Workshop; ISSE'15 - International workshop on the Integration of Safety and Security Engineering; ReSA4CI 2015 - International Workshop on Reliability and Security Aspects for Critical Infrastructure Protection; SASSUR 2015 - International Workshop on Next Generation of System Assurance Approaches for Safety-Critical Systems.

Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings... Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings (Paperback, 1st ed. 2015)
Javier Lopez, Chris J. Mitchell
R2,662 R2,118 Discovery Miles 21 180 Save R544 (20%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISC 2015, held in Trondheim, Norway, in September 2015. The 30 revised full papers presented were carefully reviewed and selected from 103 submissions. The papers cover a wide range of topics in the area of cryptography and cryptanalysis and are organized in the following topical sections: signatures; system and software security; block ciphers; protocols; network and cloud security; encryption and fundamentals; PUFs and implementation security; and key generation, biometrics and image security.

Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings... Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings (Paperback, 1st ed. 2015)
Mauro Conti, Matthias Schunter, Ioannis Askoxylakis
R2,077 R1,536 Discovery Miles 15 360 Save R541 (26%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Trust and Trustworthy Computing, TRUST 2015, held in Heraklion, Crete, Greece, in August 2015. The 15 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: hardware-enhanced trusted execution; trust and users; trusted systems and services; trust and privacy; and building blocks for trust. There are 7 two-page abstracts of poster papers included in the back matter of the volume.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Wtf Is My Password - Password Book…
Booki Nova Paperback R115 Discovery Miles 1 150
Corporate Computer Security, Global…
Randall Boyle, Raymond Panko Paperback R1,650 Discovery Miles 16 500
Guide to Network Defense and…
Randy Weaver, Dean Farwood, … Paperback R1,157 R979 Discovery Miles 9 790
Intelligence-Driven Incident Response
Scott Roberts, Rebekah Brown Paperback R1,386 R841 Discovery Miles 8 410
IBM i Security Administration and…
Carol Woodbury Paperback R1,725 Discovery Miles 17 250
Tools And Weapons - The Promise And The…
Brad Smith, Carol Ann Browne Paperback  (1)
R355 R280 Discovery Miles 2 800
CompTIA Security+ Get Certified Get…
Darril Gibson Paperback R803 Discovery Miles 8 030
CISA Certified Information Systems…
David L Cannon, Brian T. O'Hara, … Paperback R1,421 R1,116 Discovery Miles 11 160
Social Engineering - The Science of…
Christopher Hadnagy Paperback R789 R499 Discovery Miles 4 990
BTEC Level 3 National IT Student Book 1
Karen Anderson, Alan Jarvis, … Paperback  (1)
R902 Discovery Miles 9 020

 

Partners