home
sign in
my orders
my e-books
my trolley
my account
contact
keyword
isbn13
author
title
| can't find it |
Tell us the title, author
and / or ISBN number
*
Any other details such as author,
ISBN, title or genre. Please be specific
What is your email address?
*
Not a valid email address
| browse books |
Textbooks
books
antiques & collectibles
architecture
art
biography & autobiography
body, mind & spirit
business & economics
comics & graphic novels
computers
cooking
crafts & hobbies
drama
education
family & relationships
fiction
foreign language study
games
gardening
health & fitness
history
house & home
humor
juvenile fiction
juvenile nonfiction
language arts & disciplines
law
literary collections
literary criticism
mathematics
medical
music
nature
non-classifiable
performing arts
pets
philosophy
photography
poetry
political science
psychology
reference
religion
science
self-help
social science
sports & recreation
study aids
technology
transportation
travel
true crime
books
| book details |
Analysis Techniques for Information Security
By (author)
Anupam Datta
, By (author)
Somesh Jha
, By (author)
Ninghui Li
, By (author)
David Melski
, By (author)
Thomas Reps
| on special |
normal price: R 1,602.95
Price: R 1,522.95
| add to trolley |
processing...
| book description |
Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher likelihood of accidental failures and malicious attacks. Disruption of services caused by such undesired events can have catastrophic effects, such as disruption of essential services and huge financial losses. The increased reliance of critical services on our cyberinfrastructure and the dire consequences of security breaches have highlighted the importance of information security. Authorization, security protocols, and software security are three central areas in security in which there have been significant advances in developing systematic foundations and analysis methods that work for practical systems. This book provides an introduction to this work, covering representative approaches, illustrated by examples, and providing pointers to additional work in the area. Table of Contents: Introduction / Foundations / Detecting Buffer Overruns Using Static Analysis / Analyzing Security Policies / Analyzing Security Protocols
| product details |
Normally shipped |
Available from overseas. Usually dispatched in 14 days
Publisher |
Springer International Publishing AG
Published date |
28 Apr 2010
Language |
English
Format |
Paperback / softback
Pages |
152
Dimensions |
235 x 191 x 0mm (L x W x H)
Weight |
0g
ISBN |
978-3-0310-1206-8
Readership Age |
BISAC |
computers / security
| other options |
| back |
| your trolley |
To view the items in your trolley please sign in.
| sign in |
| specials |
Fifteen Dogs
André Alexis
Paperback / softback
176 pages
was: R 280.95
now: R 252.95
Available from overseas. Dispatched in aprox 4-8 weeks as local supplier is out of stock
A pack of dogs are granted the power of human thought - but what will it do to them? A surprising and insightful look at the beauty and perils of consciousness.
| more |
| add to trolley |
processing...
The Ballerina and the Bull: Anarchist Utopias in the Age of Finance
Johanna Isaacson
Paperback / softback
288 pages
was: R 306.95
now: R 275.95
This title will take longer to obtain, and should be delivered in 6-8 weeks
Our moment has seen the resurgence of an anarchist sensibility, from the uprisings in Seattle in 1999 to the Occupy movement of 2011.
| more |
| add to trolley |
processing...
Bonsai Success in Southern Africa
Carl Morrow
Paperback / softback
160 pages
Enquiries only
In this uniquely Southern African book, Carl Morrow and Keith Kirsten guide readers step by step into the magical realms of bonsai as a hobby, horticultural practice and art form.
| more |
| enquire |
processing...
Copyright 2024
|
terms and conditions