0
Your cart

Your cart is empty

Browse All departments
  • All departments
Price
Status
Brand

Showing 1 - 18 of 18 matches in All departments

Jinx (Graphic Reluctant Reader) (Paperback): Chloe Lewis Jinx (Graphic Reluctant Reader) (Paperback)
Chloe Lewis; Illustrated by Sara Foresti 1
R174 R154 Discovery Miles 1 540 Save R20 (11%) Ships in 12 - 17 working days
Treasure of the Gold Dragon: A Branches Book (Dragon Masters #12), Volume 12 (Paperback): Tracey West Treasure of the Gold Dragon: A Branches Book (Dragon Masters #12), Volume 12 (Paperback)
Tracey West; Illustrated by Sara Foresti 1
R104 R89 Discovery Miles 890 Save R15 (14%) Ships in 7 - 11 working days

The race is on to find the Gold Key! Pick a book. Grow a Reader! This series is part of Scholastic's early chapter book line, Branches, aimed at newly independent readers. With easy-to-read text, high-interest content, fast-paced plots, and illustrations on every page, these books will boost reading confidence and stamina. Branches books help readers grow. In the 12th book of this fantasy series, Maldred is after the powerful Gold Key! Drake and Rori travel to the lair of the Gold Dragon to help protect the key. There, they meet a new Dragon Master named Darma. If dark wizard Maldred gets his hands on the Gold Key, he will be one step closer to controlling a powerful Earthquake Dragon. Can the Dragon Masters stop him before it's too late? The action is nonstop in this exciting, heavily illustrated early chapter book series!

Data and Applications Security and Privacy XXIV - 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010,... Data and Applications Security and Privacy XXIV - 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings (Paperback, 2010 ed.)
Sara Foresti, Sushil Jajodia
R2,087 Discovery Miles 20 870 Ships in 7 - 11 working days

This book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, held in Rome Italy in June 2010. The 18 full and 11 short papers presented in this volume were carefully reviewed and selected from 61 submissions. The topics covered are query and data privacy; data protection; access control; data confidentiality and query verification; policy definition and enforcement; and trust and identity management.

Suzanne (DVD): François Damiens, Fanie Zanini, Apollonia Luisetti, Sara Forestier, Adèle Haenel, Paul Hamy, Maxim Driesen,... Suzanne (DVD)
François Damiens, Fanie Zanini, Apollonia Luisetti, Sara Forestier, Adèle Haenel, … 1
R169 Discovery Miles 1 690 Ships in 7 - 13 working days

French drama directed and co-written by Katell Quillévéré. Widower Nicolas Merevsky (François Damiens) looks after his two young daughters Suzanne (Apollonia Luisetti) and Maria (Fanie Zanini). When she is a teenager Suzanne (Sara Forestier) falls pregnant and decides to keep the baby. Five years later she has a son, Charlie (Maxim Driesen), and is working in the office of her father's trucking firm. Her life begins to spiral out of control, however, when she gets involved with gangster Julien (Paul Hamy) and finds herself facing a prison sentence with Nicolas and Maria (Adèle Haenel) looking on.

Sally Snowboarder (Paperback): Amit Tayal Sally Snowboarder (Paperback)
Amit Tayal; Nancy Harris; Illustrated by Sara Foresti
R146 R129 Discovery Miles 1 290 Save R17 (12%) Ships in 12 - 17 working days

Everyone in her family loves to ski, except Sally. Will Sally ever fit in or will she find her own way to shine on the slopes?

Treasure of the Gold Dragon: A Branches Book (Dragon Masters #12), Volume 12 (Hardcover, Library ed.): Tracey West Treasure of the Gold Dragon: A Branches Book (Dragon Masters #12), Volume 12 (Hardcover, Library ed.)
Tracey West; Illustrated by Sara Foresti
R308 R292 Discovery Miles 2 920 Save R16 (5%) Ships in 7 - 11 working days
Maitres Des Dragons: N Degrees 12 - Le Tresor Du Dragon d'Or (French, Paperback): Tracey West Maitres Des Dragons: N Degrees 12 - Le Tresor Du Dragon d'Or (French, Paperback)
Tracey West; Illustrated by Sara Foresti
R184 R151 Discovery Miles 1 510 Save R33 (18%) Ships in 7 - 11 working days
Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA,... Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I (Paperback, 1st ed. 2020)
Noseong Park, Kun Sun, Sara Foresti, Kevin Butler, Nitesh Saxena
R2,141 Discovery Miles 21 410 Ships in 7 - 11 working days

This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020. The conference was held virtually due to COVID-19 pandemic. The 60 full papers were carefully reviewed and selected from 120 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.

Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA,... Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II (Paperback, 1st ed. 2020)
Noseong Park, Kun Sun, Sara Foresti, Kevin Butler, Nitesh Saxena
R2,132 Discovery Miles 21 320 Ships in 7 - 11 working days

This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020. The conference was held virtually due to COVID-19 pandemic. The 60 full papers were carefully reviewed and selected from 120 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.

The President Wears Pink (Hardcover): Mandana Vetto The President Wears Pink (Hardcover)
Mandana Vetto; Illustrated by Sara Foresti
R357 R295 Discovery Miles 2 950 Save R62 (17%) Ships in 7 - 11 working days
Gainsbourg (French, DVD): Eric Elmosnino, Lucy Gordon, Laetitia Casta, Doug Jones, Anna Mouglalis, Mylene Jampanoi, Sara... Gainsbourg (French, DVD)
Eric Elmosnino, Lucy Gordon, Laetitia Casta, Doug Jones, Anna Mouglalis, … 1
R192 Discovery Miles 1 920 Ships in 7 - 13 working days

Biopic of notorious French singer-songwriter and provocateur Serge Gainsbourg, adapted by Joann Sfar from his graphic novel. Starring Eric Elmosnino in the title role as the chain-smoking Jewish iconoclast who flouts authority at every turn, the film traces his life from his childhood in 1940s Nazi-occupied Paris to his rise to success in the 1960s and relationships with French icons Juliette Greco (Anna Mouglalis), Brigitte Bardot (Laetitia Casta), France Gall (Sara Forestier) and Jane Birkin (Lucy Gordon).

Preserving Privacy in Data Outsourcing (Paperback, 2011 ed.): Sara Foresti Preserving Privacy in Data Outsourcing (Paperback, 2011 ed.)
Sara Foresti
R2,585 Discovery Miles 25 850 Ships in 7 - 11 working days

Foreword by Pierangela Samarati

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release.

Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data; it allows the data owner to outsource not only the data but the security policy itself. The last section of this book investigates the problem of executing queries over possible data distributed at different servers. Case Studies will be provided.

About this book:

Exclusively focuses on addressing protection of confidential information in the emerging data outsourcing scenarios.

Presents relevant and critical novel problems and novel techniques, a precious reference point to students, researchers, and developers in this field.

Provides a comprehensive overview of the data protection problem in outsourcing scenarios, as well as a rigorous analysis and formalization of the problem and solutions to it.

Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.

Computer Security -- ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12,... Computer Security -- ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings (Paperback, 2012 ed.)
Sara Foresti, Moti Yung, Fabio Martinelli
R2,403 Discovery Miles 24 030 Ships in 7 - 11 working days

This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security.

Preserving Privacy in Data Outsourcing (Hardcover, 2011 Ed.): Sara Foresti Preserving Privacy in Data Outsourcing (Hardcover, 2011 Ed.)
Sara Foresti
R2,708 Discovery Miles 27 080 Ships in 7 - 11 working days

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release.

Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data, allowing the data owner to outsource not only the data but the security policy itself. To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to protect privacy of data associations and provide fragmentation as a complementary means for protecting privacy: associations broken by fragmentation will be visible only to users authorized (by knowing the proper key) to join fragments. The book finally investigates the problem of executing queries over possible data distributed at different servers and which must be controlled to ensure sensitive information and sensitive associations be visible only to parties authorized for that. Case Studies are provided throughout the book.

Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.

Wild Grass (French, DVD): Andre Dussollier, Sabine Azéma, Emmanuelle Devos, Mathieu Amalric, Anne Consigny, Michel Vuillermoz,... Wild Grass (French, DVD)
Andre Dussollier, Sabine Azéma, Emmanuelle Devos, Mathieu Amalric, Anne Consigny, … 2
R162 Discovery Miles 1 620 Ships in 7 - 13 working days

Alain Resnais directs this adaptation of a novel by Christian Gailly. After dentist Marguerite Muir (Sabine Azema) has her handbag stolen, her wallet is found by the troubled Georges (Andre Dussollier), whose mid-life crisis is causing him to behave erratically and rendering him unable to perform even the most straightforward tasks. As Georges deliberates at length over what to do with the wallet, and Marguerite becomes increasingly curious about the identity of its finder, the two become drawn into an elaborate series of encounters which may or may not blossom into a romance. Emmanuelle Devos, Anne Consigny and Mathieu Amalric co-star.

Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings... Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings (Paperback, 1st ed. 2016)
Sara Foresti, Giuseppe Persiano
R2,373 Discovery Miles 23 730 Ships in 7 - 11 working days

This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016. The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: cryptanalysis of symmetric key; side channel attacks and implementation; lattice-based cryptography, virtual private network; signatures and hash; multi party computation; symmetric cryptography and authentication; system security, functional and homomorphic encryption; information theoretic security; malware and attacks; multi party computation and functional encryption; and network security, privacy, and authentication.

Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece,... Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings (Paperback, 1st ed. 2016)
Sara Foresti, Javier Lopez
R1,477 Discovery Miles 14 770 Out of stock

This volume constitutes the refereed proceedings of the 10th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2016, held in Heraklion, Crete, Greece, in September 2016. The 13 revised full papers and 5 short papers presented together in this book were carefully reviewed and selected from 29 submissions. WISTP 2016 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. The papers are organized in topical sections on authentication and key management; secure hardware systems; attacks to software and network systems; and access control and data protection.

Security and Trust Management - 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings... Security and Trust Management - 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings (Paperback, 1st ed. 2015)
Sara Foresti
R1,264 Discovery Miles 12 640 Out of stock

This book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management, STM 2015, held in Vienna, Austria, in September 2015, in conjunction with the 20th European Symposium Research in Computer Security, ESORICS 2015. The 15 revised full papers were carefully reviewed and selected from 38 submissions. They are organized in topical sections as security metrics and classification; data protection; intrusion detection and software vulnerabilities; cryptographic protocols; controlling data release; and security analysis, risk management and usability.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Xbox One Mini 2.4G Wireless Keyboard…
R699 R399 Discovery Miles 3 990
IQHK LEGO Star Wars - Darth Vader Key…
 (6)
R170 R146 Discovery Miles 1 460
Origins
Imagine Dragons CD R224 Discovery Miles 2 240
Billy Lynn's Long Halftime Walk
Ang Lee Blu-ray disc  (1)
R103 Discovery Miles 1 030
JuniorFX Children's Carry Case Art Set…
R600 R449 Discovery Miles 4 490
Krusell Boden Cover for Sony Xperia E4…
 (1)
R48 Discovery Miles 480
Transcend 4GB DDR4 2666MHZ SO-DIMM
R576 R458 Discovery Miles 4 580
Lucky Supa - 3 Piece Plastic Comb Set…
R29 Discovery Miles 290
Sony PlayStation 5 DualSense Charging…
R699 Discovery Miles 6 990
Powerglide Screw Tip
R65 R54 Discovery Miles 540

 

Partners