0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (86)
  • R500+ (1,897)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Cryptography - Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29 - April 2, 1982 (Paperback, 1983... Cryptography - Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29 - April 2, 1982 (Paperback, 1983 ed.)
T. Beth
R1,557 Discovery Miles 15 570 Ships in 18 - 22 working days

T. Beth (Ed.): Cryptography - EUROCRYPT '82, LNCS 149, pp. 1-28, 1983. 0 Springer-Verlag Berlin Heidelberg 1983 3 Having all of a sudden left the shady corner of semi-military art, modern cryptography has become a central topic of research in all areas of communication science. Definitions (cf. Bauer pp. 31 - 48) Cryptographic measures are applied to p- tect valuable data during transmission against unwanted interception INTERCEPTOR Fig. A: passive violation and (possibly undectable) forgery . Fig. 2: acti-se violation In accordance with the subsequent paper of Bauer (pp. 31 - 481, the technique applied to meet these requirements is called en- tion. In this process the transmitter enciphers (or encrypts) a plaintext message into a ciphertext. 4 ciphertexc ciphering Fig. 3: The Wire-tap-channel This transformation is called a cipher(function) which the au- rized receiver deciphers (decrypts). An enemy is a person or institution who wants illegal access to the messages. Assuming that the enemy can only get hold of the ciph- texts, he has to perform a cryptanalysis in order to reconstitute the plaintexts. To add to the difficulties for a cryptanalyst, the cipher functions are chosen to a varying parameter, called the key. A generator cryptosystem consists of a class of injective cipher functions ES: M-C, mapping plaintext messages(EM) into ciphertexts(EC) . The parameter s runs through the set K of keys. These formulations are best demonstrated by the basic, classical examples.

Modern Cryptography Volume 2 - A Classical Introduction to Informational and Mathematical Principle (Hardcover, 1st ed. 2023):... Modern Cryptography Volume 2 - A Classical Introduction to Informational and Mathematical Principle (Hardcover, 1st ed. 2023)
Zhiyong Zheng, Kun Tian, Fengxia Liu
R1,205 Discovery Miles 12 050 Ships in 9 - 17 working days

This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.

Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Jaipur, India, December... Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022, Proceedings (Paperback, 1st ed. 2022)
Lejla Batina, Stjepan Picek, Mainack Mondal
R1,797 R1,694 Discovery Miles 16 940 Save R103 (6%) Ships in 9 - 17 working days

This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9-12, 2022. The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy.

Algebraic Coding Theory and Applications (Paperback, 1979 ed.): Carlos R. P. Hartmann, Giuseppe Longo Algebraic Coding Theory and Applications (Paperback, 1979 ed.)
Carlos R. P. Hartmann, Giuseppe Longo
R1,494 Discovery Miles 14 940 Ships in 18 - 22 working days
An Introduction to Number Theory with Cryptography (Hardcover, 2nd edition): James Kraft, Lawrence Washington An Introduction to Number Theory with Cryptography (Hardcover, 2nd edition)
James Kraft, Lawrence Washington
R3,678 Discovery Miles 36 780 Ships in 10 - 15 working days

Building on the success of the first edition, An Introduction to Number Theory with Cryptography, Second Edition, increases coverage of the popular and important topic of cryptography, integrating it with traditional topics in number theory. The authors have written the text in an engaging style to reflect number theory's increasing popularity. The book is designed to be used by sophomore, junior, and senior undergraduates, but it is also accessible to advanced high school students and is appropriate for independent study. It includes a few more advanced topics for students who wish to explore beyond the traditional curriculum. Features of the second edition include Over 800 exercises, projects, and computer explorations Increased coverage of cryptography, including Vigenere, Stream, Transposition,and Block ciphers, along with RSA and discrete log-based systems "Check Your Understanding" questions for instant feedback to students New Appendices on "What is a proof?" and on Matrices Select basic (pre-RSA) cryptography now placed in an earlier chapter so that the topic can be covered right after the basic material on congruences Answers and hints for odd-numbered problems About the Authors: Jim Kraft received his Ph.D. from the University of Maryland in 1987 and has published several research papers in algebraic number theory. His previous teaching positions include the University of Rochester, St. Mary's College of California, and Ithaca College, and he has also worked in communications security. Dr. Kraft currently teaches mathematics at the Gilman School. Larry Washington received his Ph.D. from Princeton University in 1974 and has published extensively in number theory, including books on cryptography (with Wade Trappe), cyclotomic fields, and elliptic curves. Dr. Washington is currently Professor of Mathematics and Distinguished Scholar-Teacher at the University of Maryland.

Channel Coding Theory - Course Held at the Department for Automation and Information, July 1970 (Paperback, 1970 ed.): I.... Channel Coding Theory - Course Held at the Department for Automation and Information, July 1970 (Paperback, 1970 ed.)
I. Csiszar
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days
Blockchain, Artificial Intelligence, and the Internet of Things - Possibilities and Opportunities (Hardcover, 1st ed. 2022):... Blockchain, Artificial Intelligence, and the Internet of Things - Possibilities and Opportunities (Hardcover, 1st ed. 2022)
Pethuru Raj, Ashutosh Kumar Dubey, Abhishek Kumar, Pramod Singh Rathore
R1,388 R895 Discovery Miles 8 950 Save R493 (36%) Ships in 9 - 17 working days

This book provides basic concepts and deep knowledge about various security mechanisms that can be implemented in IoT through Blockchain technology. This book aids readers in gaining insight and knowledge about providing security and solutions to different challenges in IoT using Blockchain technology. This book primarily focuses on challenges to addressing the integration of the IoT with Blockchain with respect to potential benefits for IoT. This book gives descriptive analysis of Blockchain integrated with IoT applications and platforms for the development of IoT solutions along with possible topologies to that integration. Several application examples are included in a variety of industries.

New Directions of Modern Cryptography (Hardcover): Zhenfu Cao New Directions of Modern Cryptography (Hardcover)
Zhenfu Cao
R3,534 Discovery Miles 35 340 Ships in 10 - 15 working days

Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern Cryptography presents general principles and application paradigms critical to the future of this field. The study of cryptography is motivated by and driven forward by security requirements. All the new directions of modern cryptography, including proxy re-cryptography, attribute-based cryptography, batch cryptography, and noncommutative cryptography have arisen from these requirements. Focusing on these four kinds of cryptography, this volume presents the fundamental definitions, precise assumptions, and rigorous security proofs of cryptographic primitives and related protocols. It also describes how they originated from security requirements and how they are applied. The book provides vivid demonstrations of how modern cryptographic techniques can be used to solve security problems. The applications cover wired and wireless communication networks, satellite communication networks, multicast/broadcast and TV networks, and newly emerging networks. It also describes some open problems that challenge the new directions of modern cryptography. This volume is an essential resource for cryptographers and practitioners of network security, security researchers and engineers, and those responsible for designing and developing secure network systems.

Kanalcodierung - Grundlagen und Anwendungen in modernen Kommunikationssystemen (German, Hardcover, 1996 ed.): P. Herbig Kanalcodierung - Grundlagen und Anwendungen in modernen Kommunikationssystemen (German, Hardcover, 1996 ed.)
P. Herbig; Bernd Friedrichs
R2,947 Discovery Miles 29 470 Ships in 18 - 22 working days

Seit der Begriindung der Informations- und Codierungstheorie durch die Ar beiten von Claude E. Shannon sind fast fiinf Jahrzehnte vergangen. In diesem Zeitraum hat sich die Kanalcodierung von einer rein theoretischen Disziplin zu einer ausgedehnten anwendungsorientierten Wissenschaft entwickelt. In fast allen modernen und leistungsfahigen Systemen zur Nachrichteniibertragung oder Nachrichtenspeicherung stellt die Kanalcodierung heute einen zentralen und pragenden Baustein dar. Mit der Compact Disc und mit Modems zur Dateniibertragung dringen Codierungsverfahren inzwischen auch in die privat genutzte Elektronik vor. Durch Kanalcodierung kann die Ubertragungsqualitat enorm gesteigert werden und gleichzeitig kommen die Ubertragungsverfahren mit weniger Sen deleistung und teilweise auch mit weniger Bandbreite aus. Diese Vorteile miissen nicht mit einer Reduktion der Datenrate bezahlt werden, sondern nur mit einem erh6hten Aufwand an digitaler Signalverarbeitung in Sender und Empfanger. Die Codierungstheorie liefert Resultate zur Struktur und zu den Eigenschaften von Codes sowie effiziente und aufwandsgiinstige Verfahren zur Decodierung. Zusammen mit der hochintegrierten Schaltungstechnik, die im mer leistungsfahiger und kostengiinstiger wird, fiihren die Fortschritte in der Kanalcodierung zu einer standigen Weiterentwicklung der Ubertragungsver fahren sowie zu einer effizienteren Nutzung der UbertragungskanaIe."

RC4 Stream Cipher and Its Variants (Paperback): Goutam Paul, Subhamoy Maitra RC4 Stream Cipher and Its Variants (Paperback)
Goutam Paul, Subhamoy Maitra
R2,042 Discovery Miles 20 420 Ships in 10 - 15 working days

RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. They also explore variants of RC4 and the eSTREAM finalist HC-128. After an introduction to the vast field of cryptology, the book reviews hardware and software stream ciphers and describes RC4. It presents a theoretical analysis of RC4 KSA, discussing biases of the permutation bytes toward secret key bytes and absolute values. The text explains how to reconstruct the secret key from known state information and analyzes the RC4 PRGA in detail, including a sketch of state recovery attacks. The book then describes three popular attacks on RC4: distinguishing attacks, Wired Equivalent Privacy (WEP) protocol attacks, and fault attacks. The authors also compare the advantages and disadvantages of several variants of RC4 and examine stream cipher HC-128, which is the next level of evolution after RC4 in the software stream cipher paradigm. The final chapter emphasizes the safe use of RC4. With open research problems in each chapter, this book offers a complete account of the most current research on RC4.

Everyday Cryptography - Fundamental Principles and Applications (Paperback, 2nd Revised edition): Keith Martin Everyday Cryptography - Fundamental Principles and Applications (Paperback, 2nd Revised edition)
Keith Martin
R1,776 Discovery Miles 17 760 Ships in 9 - 17 working days

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the Internet, mobile phones, Wi-Fi networks, payment cards, Tor, and Bitcoin. This book is intended to be introductory, self-contained, and widely accessible. It is suitable as a first read on cryptography. Almost no prior knowledge of mathematics is required since the book deliberately avoids the details of the mathematics techniques underpinning cryptographic mechanisms. Instead our focus will be on what a normal user or practitioner of information security needs to know about cryptography in order to understand the design and use of everyday cryptographic applications. By focusing on the fundamental principles of modern cryptography rather than the technical details of current cryptographic technology, the main part this book is relatively timeless, and illustrates the application of these principles by considering a number of contemporary applications of cryptography. Following the revelations of former NSA contractor Edward Snowden, the book considers the wider societal impact of use of cryptography and strategies for addressing this. A reader of this book will not only be able to understand the everyday use of cryptography, but also be able to interpret future developments in this fascinating and crucially important area of technology.

Modern Cryptography Volume 2 - A Classical Introduction to Informational and Mathematical Principle (Paperback, 1st ed. 2023):... Modern Cryptography Volume 2 - A Classical Introduction to Informational and Mathematical Principle (Paperback, 1st ed. 2023)
Zhiyong Zheng, Kun Tian, Fengxia Liu
R1,021 Discovery Miles 10 210 Ships in 10 - 15 working days

This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.

Blockchain, Big Data and Machine Learning - Trends and Applications (Hardcover): Neeraj Kumar, N. Gayathri, B. Balamurugan, Md... Blockchain, Big Data and Machine Learning - Trends and Applications (Hardcover)
Neeraj Kumar, N. Gayathri, B. Balamurugan, Md Arafatur Rahman
R4,501 Discovery Miles 45 010 Ships in 10 - 15 working days

Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and experimental case studies related to real-time environment are covered as well. Aimed at Senior undergraduate students, researchers and professionals in computer science and engineering and electrical engineering, this book: Converges Blockchain, Big Data and Machine learning in one volume. Connects Blockchain technologies with the data centric applications such Big data and E-Health. Easy to understand examples on how to create your own blockchain supported by case studies of blockchain in different industries. Covers big data analytics examples using R. Includes lllustrative examples in python for blockchain creation.

Systemtheorie - Methoden und Anwendungen fur ein- und mehrdimensionale Systeme (German, Hardcover, 3., neubearb. u. erw. Aufl.... Systemtheorie - Methoden und Anwendungen fur ein- und mehrdimensionale Systeme (German, Hardcover, 3., neubearb. u. erw. Aufl. 1995)
Hans Marko
R3,502 Discovery Miles 35 020 Ships in 18 - 22 working days

Dieser Klassiker der Systemtheorie wurde auf den neuesten Stand gebracht und um ein Kapitel uber mehrdimensionale Systeme erweitert. Zentrales Thema ist die grundlegende und umfassende Darstellung der Behandlung linearer Systeme mittels Spektraltransformationen. Diese mussen nicht nachrichten-, informations-, oder regelungstechnischer, sondern konnen z.B. auch biologischer Natur sein.
Auf eine kompakte Darstellung wurde besonderer Wert gelegt, die Anspruche an die Mathematikkenntnisse des Lesers sind gering. Das Buch ist somit sowohl als Nachschlagewerk als auch zum Lernen geeignet."

Socio-Technical Aspects in Security - 11th International Workshop, STAST 2021, Virtual Event, October 8, 2021, Revised Selected... Socio-Technical Aspects in Security - 11th International Workshop, STAST 2021, Virtual Event, October 8, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Simon Parkin, Luca Vigano
R1,678 Discovery Miles 16 780 Ships in 10 - 15 working days

This book constitutes revised selected papers from the refereed conference proceedings of the 11th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2021, held in conjunction with ESORICS, the European Symposium on Research in Computer Security, as a virtual event, in October 2021. The 10 full papers included in this book were carefully reviewed and selected from 25 submissions. They were organized in topical sections as follows: web and apps; context and modelling; and from the present to the future.

Proceedings of International Conference on Network Security and Blockchain Technology - ICNSBT 2021 (Paperback, 1st ed. 2022):... Proceedings of International Conference on Network Security and Blockchain Technology - ICNSBT 2021 (Paperback, 1st ed. 2022)
Debasis Giri, Jyotsna Kumar Mandal, Kouichi Sakurai, Debashis De
R5,368 Discovery Miles 53 680 Ships in 10 - 15 working days

The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2021), organized by Computer Society of India-Kolkata Chapter, India, during December 2-4, 2021. The book discusses recent developments and contemporary research in cryptography, network security, cyber security, and blockchain technology. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world.

Practical Cryptography - Algorithms and Implementations Using C++ (Paperback): Saiful Azad, Al-Sakib Khan Pathan Practical Cryptography - Algorithms and Implementations Using C++ (Paperback)
Saiful Azad, Al-Sakib Khan Pathan
R1,880 Discovery Miles 18 800 Ships in 10 - 15 working days

Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an increased reliance on cryptography. This book discusses the theories and concepts behind modern cryptography and demonstrates how to develop and implement cryptographic algorithms using C++ programming language. Written for programmers and engineers, Practical Cryptography explains how you can use cryptography to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this book shows you how to build security into your computer applications, networks, and storage. Suitable for undergraduate and postgraduate students in cryptography, network security, and other security-related courses, this book will also help anyone involved in computer and network security who wants to learn the nuts and bolts of practical cryptography.

The Mathematics of Secrets - Cryptography from Caesar Ciphers to Digital Encryption (Paperback): Joshua Holden The Mathematics of Secrets - Cryptography from Caesar Ciphers to Digital Encryption (Paperback)
Joshua Holden
R462 Discovery Miles 4 620 Ships in 18 - 22 working days

Explaining the mathematics of cryptography The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography-the science of sending secret messages. Using a wide range of historical anecdotes and real-world examples, Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers work. He focuses on both code making and code breaking and discusses most of the ancient and modern ciphers that are currently known. He begins by looking at substitution ciphers, and then discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, connections between ciphers and computer encryption, stream ciphers, public-key ciphers, and ciphers involving exponentiation. He concludes by looking at the future of ciphers and where cryptography might be headed. The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages. A blog describing new developments and historical discoveries in cryptography related to the material in this book is accessible at http://press.princeton.edu/titles/10826.html.

Network Coding and Subspace Designs (Hardcover, 1st ed. 2018): Marcus Greferath, Mario Osvin Pavcevic, Natalia Silberstein,... Network Coding and Subspace Designs (Hardcover, 1st ed. 2018)
Marcus Greferath, Mario Osvin Pavcevic, Natalia Silberstein, Maria Angeles Vazquez-Castro
R3,631 R2,515 Discovery Miles 25 150 Save R1,116 (31%) Ships in 10 - 15 working days

This book, written by experts from universities and major research laboratories, addresses the hot topic of network coding, a powerful scheme for information transmission in networks that yields near-optimal throughput. It introduces readers to this striking new approach to network coding, in which the network is not simply viewed as a mechanism for delivering packets, but rather an algebraic structure named the subspace, which these packets span. This leads to a new kind of coding theory, employing what are called subspace codes. The book presents selected, highly relevant advanced research output on: Subspace Codes and Rank Metric Codes; Finite Geometries and Subspace Designs; Application of Network Coding; Codes for Distributed Storage Systems. The outcomes reflect research conducted within the framework of the European COST Action IC1104: Random Network Coding and Designs over GF(q). Taken together, they offer communications engineers, R&D engineers, researchers and graduate students in Mathematics, Computer Science, and Electrical Engineering a comprehensive reference guide to the construction of optimal network codes, as well as efficient encoding and decoding schemes for a given network code.

Quantum Algorithms for Cryptographically Significant Boolean Functions - An IBMQ Experience (Paperback, 1st ed. 2021):... Quantum Algorithms for Cryptographically Significant Boolean Functions - An IBMQ Experience (Paperback, 1st ed. 2021)
Tharrmashastha SAPV, Debajyoti Bera, Arpita Maitra, Subhamoy Maitra
R1,668 Discovery Miles 16 680 Ships in 10 - 15 working days

This book is a timely report of the state-of-the-art analytical techniques in the domain of quantum algorithms related to Boolean functions. It bridges the gap between recent developments in the area and the hands-on analysis of the spectral properties of Boolean functions from a cryptologic viewpoint. Topics covered in the book include Qubit, Deutsch-Jozsa and Walsh spectrum, Grover's algorithm, Simon's algorithm and autocorrelation spectrum. The book aims at encouraging readers to design and implement practical algorithms related to Boolean functions. Apart from combinatorial techniques, this book considers implementing related programs in a quantum computer. Researchers, practitioners and educators will find this book valuable.

Boolean Functions for Cryptography and Coding Theory (Hardcover): Claude Carlet Boolean Functions for Cryptography and Coding Theory (Hardcover)
Claude Carlet
R2,194 Discovery Miles 21 940 Ships in 10 - 15 working days

Boolean functions are essential to systems for secure and reliable communication. This comprehensive survey of Boolean functions for cryptography and coding covers the whole domain and all important results, building on the author's influential articles with additional topics and recent results. A useful resource for researchers and graduate students, the book balances detailed discussions of properties and parameters with examples of various types of cryptographic attacks that motivate the consideration of these parameters. It provides all the necessary background on mathematics, cryptography, and coding, and an overview on recent applications, such as side channel attacks on smart cards, cloud computing through fully homomorphic encryption, and local pseudo-random generators. The result is a complete and accessible text on the state of the art in single and multiple output Boolean functions that illustrates the interaction between mathematics, computer science, and telecommunications.

Tribe of Hackers Red Team - Tribal Knowledge from The best in Offensive Cybersecurity (Paperback): M. J. Carey Tribe of Hackers Red Team - Tribal Knowledge from The best in Offensive Cybersecurity (Paperback)
M. J. Carey
R542 R489 Discovery Miles 4 890 Save R53 (10%) Ships in 9 - 17 working days

Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe. The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world's leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more Learn what it takes to secure a Red Team job and to stand out from other candidates Discover how to hone your hacking skills while staying on the right side of the law Get tips for collaborating on documentation and reporting Explore ways to garner support from leadership on your security proposals Identify the most important control to prevent compromising your network Uncover the latest tools for Red Team offensive security Whether you're new to Red Team security, an experienced practitioner, or ready to lead your own team, Tribe of Hackers Red Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the Red Team offensive.

Cryptography Apocalypse - Preparing for the Day When Quantum Computing Breaks Today's Crypto Edition 1 (Paperback): RA... Cryptography Apocalypse - Preparing for the Day When Quantum Computing Breaks Today's Crypto Edition 1 (Paperback)
RA Grimes
R764 R656 Discovery Miles 6 560 Save R108 (14%) Ships in 9 - 17 working days

Will your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized 'crackers' to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today's computer cryptography is a rock-solid way to safeguard everything from online passwords to the backbone of the entire internet. Unfortunately, many current cryptographic methods will soon be obsolete. In 2016, the National Institute of Standards and Technology (NIST) predicted that quantum computers will soon be able to break the most popular forms of public key cryptography. The encryption technologies we rely on every day--HTTPS, TLS, WiFi protection, VPNs, cryptocurrencies, PKI, digital certificates, smartcards, and most two-factor authentication--will be virtually useless. . . unless you prepare. Cryptography Apocalypse is a crucial resource for every IT and InfoSec professional for preparing for the coming quantum-computing revolution. Post-quantum crypto algorithms are already a reality, but implementation will take significant time and computing power. This practical guide helps IT leaders and implementers make the appropriate decisions today to meet the challenges of tomorrow. This important book: Gives a simple quantum mechanics primer Explains how quantum computing will break current cryptography Offers practical advice for preparing for a post-quantum world Presents the latest information on new cryptographic methods Describes the appropriate steps leaders must take to implement existing solutions to guard against quantum-computer security threats Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto is a must-have guide for anyone in the InfoSec world who needs to know if their security is ready for the day crypto break and how to fix it.

Security in Computing and Communications - 8th International Symposium, SSCC 2020, Chennai, India, October 14-17, 2020, Revised... Security in Computing and Communications - 8th International Symposium, SSCC 2020, Chennai, India, October 14-17, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Sabu M. Thampi, Guojun Wang, Danda B. Rawat, Ryan Ko, Chun I. Fan
R1,295 Discovery Miles 12 950 Ships in 10 - 15 working days

This book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 13 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.

Multidisciplinary Perspectives in Cryptology and Information Security (Hardcover): Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas Multidisciplinary Perspectives in Cryptology and Information Security (Hardcover)
Sattar B. Sadkhan Al Maliky, Nidaa A. Abbas
R6,180 Discovery Miles 61 800 Ships in 18 - 22 working days

With the prevalence of digital information, IT professionals have encountered new challenges regarding data security. In an effort to address these challenges and offer solutions for securing digital information, new research on cryptology methods is essential. Multidisciplinary Perspectives in Cryptology and Information Security considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security. This publication offers a comprehensive, in-depth analysis of encryption solutions and will be of particular interest to IT professionals, cryptologists, and researchers in the field.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Identity-Based Encryption
Sanjit Chatterjee, Palash Sarkar Hardcover R2,652 Discovery Miles 26 520
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Computer & Internet Security - A…
Wenliang Du Hardcover R1,874 Discovery Miles 18 740
Technical Articles about the Voynich…
National Security Agency Hardcover R597 Discovery Miles 5 970
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R778 R682 Discovery Miles 6 820
Radical transparency and digital…
Luke Heemsbergen Hardcover R2,676 Discovery Miles 26 760
Providing Sound Foundations for…
Oded Goldreich Hardcover R3,016 Discovery Miles 30 160
Blockchain Applications
Arshdeep Bagha Hardcover R1,870 R1,522 Discovery Miles 15 220
Performances of Peace: Utrecht 1713
Renger Bruin, Cornelis Haven, … Hardcover R4,536 Discovery Miles 45 360

 

Partners