0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (13)
  • R250 - R500 (88)
  • R500+ (1,342)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Management Of Information Security (Paperback, 6th Edition): Michael Whitman, Herbert Mattord Management Of Information Security (Paperback, 6th Edition)
Michael Whitman, Herbert Mattord
R1,406 R1,302 Discovery Miles 13 020 Save R104 (7%) Ships in 10 - 15 working days

Equip your students with a management-focused overview of information security as well as the tools to effectively administer it with Whitman/Mattord's MANAGEMENT OF INFORMATION SECURITY, Sixth Edition.

More than ever, we need to prepare information security management students to build and staff security programs capable of securing systems and networks to meet the challenges in a world where continuously emerging threats, ever-present attacks and the success of criminals illustrate weaknesses in current information technologies. This text offers an exceptional blend of skills and experiences to administer and manage the more secure computing environments that organizations need.

Reflecting the latest developments from the field, it includes updated coverage of NIST, ISO and security governance along with emerging concerns like Ransomware, Cloud Computing and the Internet of Things.

Rethinking the Regulation of Cryptoassets - Cryptographic Consensus Technology and the New Prospect (Hardcover): Syren Johnstone Rethinking the Regulation of Cryptoassets - Cryptographic Consensus Technology and the New Prospect (Hardcover)
Syren Johnstone
R3,573 Discovery Miles 35 730 Ships in 12 - 19 working days

This thought-provoking book challenges the way we think about the regulation of cryptoassets based on cryptographic consensus technology. Bringing a timely new perspective, Syren Johnstone critiques the application of a financial regulation narrative to cryptoassets, questions the assumptions on which it is based, and considers its impact on industry development. Providing new insights into the dynamics of oversight regulation, Johnstone argues that the financial narrative stifles the 'New Prospect' for the formation of novel commercial relationships and institutional arrangements. The book asks whether regulations developed in the 20th century remain appropriate to apply to a technology emerging in the 21st, suggesting it is time to think about how to regulate for ecosystem development. Johnstone concludes with proposals for reform, positing a new framework that facilitates industry aspirations while remaining sustainable and compatible with regulatory objectives. Rethinking the Regulation of Cryptoassets will be an invaluable read for policy makers, regulators and technologists looking for a deeper understanding of the issues surrounding cryptoasset regulation and possible alternative approaches. It will also be of interest to scholars and students researching the intersection of law, technology, regulation and finance.

Ethereum - Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency (Hardcover): Paul Paxton Ethereum - Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency (Hardcover)
Paul Paxton
R595 R539 Discovery Miles 5 390 Save R56 (9%) Ships in 10 - 15 working days
Utilizing Blockchain Technologies in Manufacturing and Logistics Management (Hardcover): S. B. Goyal, Nijalingappa Pradeep,... Utilizing Blockchain Technologies in Manufacturing and Logistics Management (Hardcover)
S. B. Goyal, Nijalingappa Pradeep, Piyush Kumar Shukla, Mangesh M. Ghonge, Renjith V. Ravi
R6,692 Discovery Miles 66 920 Ships in 10 - 15 working days

Blockchain has potential to revolutionize how manufacturers design, engineer, make and scale their products. Blockchain is gradually proving to be an effective "middleware" solution for enabling seamless interoperability within complex supply chains. Due to its technological nature, blockchain enables secure, transparent and fast data exchanges as well as allowing for the creation of immutable records databases The main advantage of Blockchain in Manufacturing Industries is product traceability, supply chain transparency, compliance monitoring, and auditability. Moreover, leveraging blockchain technology into a manufacturing enterprise can enhance its security and reduce the rates of systematic failures. So, blockchain is now used in various sectors of the manufacturing industry, such as automotive, aerospace, defense, pharmaceutical, consumer electronics, textile, food and beverages, and more. Hence, Blockchain should be seen as an investment in future-readiness and customer-centricity, not as an experimental technology - because, the evidence is overwhelming. This book will explore the strengths of Blockchain adaptation in Manufacturing Industries and Logistics Management, cover different use cases of Blockchain Technology for Manufacturing Industries and Logistics Management, and will discuss the role, impact and challenges of adopting Blockchain in Manufacturing industries and Logistics Management. The chapters will also provide the current open issues and future research trends of Blockchain, especially for Manufacturing Industries and Logistics, and will encapsulate quantitative and qualitative research for a wide spectrum of readers of the book.

Cryptocurrencies - An Essential Beginner's Guide to Blockchain Technology, Cryptocurrency Investing, Mastering Bitcoin... Cryptocurrencies - An Essential Beginner's Guide to Blockchain Technology, Cryptocurrency Investing, Mastering Bitcoin Basics Including Mining, Ethereum Smart Contracts, Trading and Some Info on Programming (Hardcover)
Herbert Jones
R757 R673 Discovery Miles 6 730 Save R84 (11%) Ships in 10 - 15 working days
Bitcoin - Invest In Digital Gold (Hardcover): Szabolcs Juhasz Bitcoin - Invest In Digital Gold (Hardcover)
Szabolcs Juhasz
R834 Discovery Miles 8 340 Ships in 10 - 15 working days
Cryptocurrencies and Blockchain Technology - Cryptocurrencies and Blockchain: 4 Books in 1 (Hardcover): Keizer Soeze Cryptocurrencies and Blockchain Technology - Cryptocurrencies and Blockchain: 4 Books in 1 (Hardcover)
Keizer Soeze
R1,469 R1,221 Discovery Miles 12 210 Save R248 (17%) Ships in 10 - 15 working days
Cryptocurrency for Beginners - How to Master Blockchain, Defi and start Investing in Bitcoin and Altcoins (Hardcover): Zeph... Cryptocurrency for Beginners - How to Master Blockchain, Defi and start Investing in Bitcoin and Altcoins (Hardcover)
Zeph Pascall
R819 Discovery Miles 8 190 Ships in 10 - 15 working days
TLS Mastery (Hardcover): Michael W Lucas TLS Mastery (Hardcover)
Michael W Lucas
R970 R875 Discovery Miles 8 750 Save R95 (10%) Ships in 10 - 15 working days
Limitations and Future Applications of Quantum Cryptography (Hardcover): Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia,... Limitations and Future Applications of Quantum Cryptography (Hardcover)
Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia, Raees Ahmad Khan
R6,692 Discovery Miles 66 920 Ships in 10 - 15 working days

The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country's sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography. Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing.

Technical Articles about the Voynich Manuscript (Hardcover): National Security Agency Technical Articles about the Voynich Manuscript (Hardcover)
National Security Agency
R630 Discovery Miles 6 300 Ships in 12 - 19 working days
New Research on the Voynich Manuscript - Proceedings of a Seminar (Hardcover): National Security Agency New Research on the Voynich Manuscript - Proceedings of a Seminar (Hardcover)
National Security Agency
R568 Discovery Miles 5 680 Ships in 12 - 19 working days
Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency... Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency + 10 Best Defi Projects and Strategies to Maximize Your Profits (Hardcover)
Harper Fraley
R844 R733 Discovery Miles 7 330 Save R111 (13%) Ships in 10 - 15 working days
Alice and Bob Learn Application Security (Paperback): T Janca Alice and Bob Learn Application Security (Paperback)
T Janca
R1,084 R924 Discovery Miles 9 240 Save R160 (15%) Ships in 12 - 19 working days

Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software development. This book covers all the basic subjects such as threat modeling and security testing, but also dives deep into more complex and advanced topics for securing modern software systems and architectures. Throughout, the book offers analogies, stories of the characters Alice and Bob, real-life examples, technical explanations and diagrams to ensure maximum clarity of the many abstract and complicated subjects. Topics include: Secure requirements, design, coding, and deployment Security Testing (all forms) Common Pitfalls Application Security Programs Securing Modern Applications Software Developer Security Hygiene Alice and Bob Learn Application Security is perfect for aspiring application security engineers and practicing software developers, as well as software project managers, penetration testers, and chief information security officers who seek to build or improve their application security programs. Alice and Bob Learn Application Security illustrates all the included concepts with easy-to-understand examples and concrete practical applications, furthering the reader's ability to grasp and retain the foundational and advanced topics contained within.

Information Security and Ethics - Social and Organizational Issues (Hardcover, illustrated Edition): Marian Quigley Information Security and Ethics - Social and Organizational Issues (Hardcover, illustrated Edition)
Marian Quigley
R2,316 Discovery Miles 23 160 Ships in 10 - 15 working days

Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student and industry professional. With individual chapters focusing on areas including web accessibility; the digital divide; youth protection and surveillance; Information security; education; ethics in the Information professions and Internet voting; this book provides an invaluable resource for students, scholars and professionals currently working in information Technology related areas.

Blockchain Applications (Hardcover): Arshdeep Bagha Blockchain Applications (Hardcover)
Arshdeep Bagha
R2,030 R1,645 Discovery Miles 16 450 Save R385 (19%) Ships in 10 - 15 working days
Information Security - Foundations, technologies and applications (Hardcover): Ali Ismail Awad, Michael Fairhurst Information Security - Foundations, technologies and applications (Hardcover)
Ali Ismail Awad, Michael Fairhurst
R3,728 R3,357 Discovery Miles 33 570 Save R371 (10%) Ships in 10 - 15 working days

The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our information systems and the information stored, processed and transmitted. This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security. Information Security: Foundations, technologies and applications is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security, and for professionals in sectors where information security is required.

Protecting Privacy through Homomorphic Encryption (Hardcover, 1st ed. 2021): Kristin Lauter, Wei Dai, Kim Laine Protecting Privacy through Homomorphic Encryption (Hardcover, 1st ed. 2021)
Kristin Lauter, Wei Dai, Kim Laine
R3,121 Discovery Miles 31 210 Ships in 10 - 15 working days

This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on Homomorphic Encryption. In the past 3 years, a global community consisting of researchers in academia, industry, and government, has been working closely to standardize homomorphic encryption. This is the first publication of whitepapers created by these experts that comprehensively describes the scientific inventions, presents a concrete security analysis, and broadly discusses applicable use scenarios and markets. This book also features a collection of privacy-preserving machine learning applications powered by homomorphic encryption designed by groups of top graduate students worldwide at the Private AI Bootcamp hosted by Microsoft Research. The volume aims to connect non-expert readers with this important new cryptographic technology in an accessible and actionable way. Readers who have heard good things about homomorphic encryption but are not familiar with the details will find this book full of inspiration. Readers who have preconceived biases based on out-of-date knowledge will see the recent progress made by industrial and academic pioneers on optimizing and standardizing this technology. A clear picture of how homomorphic encryption works, how to use it to solve real-world problems, and how to efficiently strengthen privacy protection, will naturally become clear.

Simple Steps to Data Encryption - A Practical Guide to Secure Computing (Paperback, New): Pete Loshin Simple Steps to Data Encryption - A Practical Guide to Secure Computing (Paperback, New)
Pete Loshin
R720 Discovery Miles 7 200 Ships in 12 - 19 working days

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography.

Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what looks like gibberish, but gibberish that only the end user can turn back into readable data again. The difficulty of encryption has much to do with deciding what kinds of threats one needs to protect against and then using the proper tool in the correct way. It's kind of like a manual transmission in a car: learning to drive with one is easy; learning to build one is hard.

The goal of this title is to present just enough for an average reader to begin protecting his or her data, immediately. Books and articles currently available about encryption start out with statistics and reports on the costs of data loss, and quickly get bogged down in cryptographic theory and jargon followed by attempts to comprehensively list all the latest and greatest tools and techniques. After step-by-step walkthroughs of the download and install process, there's precious little room left for what most readers really want: how to encrypt a thumb drive or email message, or digitally sign a data file.

There are terabytes of content that explain how cryptography works, why it's important, and all the different pieces of software that can be used to do it; there is precious little content available that couples concrete threats to data with explicit responses to those threats. This title fills that niche.

By reading this title readers will be provided with a step by step hands-on guide that includes:

Simple descriptions of actual threat scenarios

Simple, step-by-step instructions for securing data

How to use open source, time-proven and peer-reviewed cryptographic software

Easy to follow tips for safer computing

Unbiased and platform-independent coverage of encryption tools and techniques
Simple descriptions of actual threat scenarios Simple, step-by-step instructions for securing dataHow to use open source, time-proven and peer-reviewed cryptographic software Easy-to-follow tips for safer computing Unbiased and platform-independent coverage of encryption tools and techniques

Architectures and Frameworks for Developing and Applying Blockchain Technology (Hardcover): Nansi Shi Architectures and Frameworks for Developing and Applying Blockchain Technology (Hardcover)
Nansi Shi
R6,609 Discovery Miles 66 090 Ships in 10 - 15 working days

The blockchain revolution has drastically impacted global economics and the strategic practices within different industries. Cryptocurrency specifically has forever changed the face of business and the implementation of business online. While innovative, people are still in the early stages of building and developing blockchain technology and its applications, and it is critical that researchers and practitioners obtain a better understanding of this global phenomenon. Architectures and Frameworks for Developing and Applying Blockchain Technology is an essential reference source that presents the technological foundation, recent research findings, developments, and critical issues associated with blockchain technology from both computer science and social science perspectives. Featuring topics such as artificial intelligence, digital economy, and network technology, this book is ideally designed for academics, researchers, industry leaders, IT consultants, engineers, programmers, practitioners, government officials, policymakers, and students.

Quantum Computing for High School Students (Hardcover): Yuly Billig Quantum Computing for High School Students (Hardcover)
Yuly Billig
R848 R732 Discovery Miles 7 320 Save R116 (14%) Ships in 10 - 15 working days
Blockchain - An Essential Beginner's Guide to Understanding Blockchain Technology, Cryptocurrencies, Bitcoin and the... Blockchain - An Essential Beginner's Guide to Understanding Blockchain Technology, Cryptocurrencies, Bitcoin and the Future of Money (Hardcover)
Herbert Jones
R712 R628 Discovery Miles 6 280 Save R84 (12%) Ships in 10 - 15 working days
Cryptographic Solutions for Secure Online Banking and Commerce (Hardcover): Kannan Balasubramanian, K. Mala, M. Rajakan Cryptographic Solutions for Secure Online Banking and Commerce (Hardcover)
Kannan Balasubramanian, K. Mala, M. Rajakan
R5,505 Discovery Miles 55 050 Ships in 10 - 15 working days

Technological advancements have led to many beneficial developments in the electronic world, especially in relation to online commerce. Unfortunately, these advancements have also created a prime hunting ground for hackers to obtain financially sensitive information and deterring these breaches in security has been difficult. Cryptographic Solutions for Secure Online Banking and Commerce discusses the challenges of providing security for online applications and transactions. Highlighting research on digital signatures, public key infrastructure, encryption algorithms, and digital certificates, as well as other e-commerce protocols, this book is an essential reference source for financial planners, academicians, researchers, advanced-level students, government officials, managers, and technology developers.

Implementing the ISO/IEC 27001 Information Security Management System Standard (Hardcover): Edward Humphreys Implementing the ISO/IEC 27001 Information Security Management System Standard (Hardcover)
Edward Humphreys
R2,400 Discovery Miles 24 000 Ships in 10 - 15 working days

The ISO/IEC 27000 is a critical series of information security technology standards, and ISO/IEC 27001 is the newest release of this series. Authored by a recognized expert in the field, this authoritative and clear guide explores the ISO/IEC 27000 security standards and their implementation, focusing on the recent ISO/IEC 27001.

The Political Economy and Feasibility of Bitcoin and Cryptocurrencies - Insights from the History of Economic Thought... The Political Economy and Feasibility of Bitcoin and Cryptocurrencies - Insights from the History of Economic Thought (Hardcover)
Spencer J. Pack
R3,117 Discovery Miles 31 170 Ships in 12 - 19 working days

In The Political Economy and Feasibility of Bitcoin and Cryptocurrencies Spencer J. Pack brings his authority as a scholar and advisor to this study of bitcoin and cryptocurrencies from the perspective of the history of economic thought. Major theorists analyzed in depth include Aristotle, Smith, Law, Marx, Keynes, Rothbard and Hayek, and the book draws extensively upon the ideas of Schumpeter, Galbraith and Sraffa. The book argues for reconceptualization of the basic microeconomic categories into rental, sale and financial asset prices along with a reconsideration of Keynes' general theory to his special theory and Rothbard's relationship to Rousseau. The author posits that intense theoretical and practical struggles will continue over who should control the quantity of money, the cause of the capitalist economy's instability, and who or what is more dangerous: concentrated centers of private wealth and private enterprises or the contemporary state. He concludes that in terms of the quality of money, the cryptocurrency community is probably correct, with new forms of money potentially being better than sovereign fiat currency. The book's relevance will appeal to members of the history of economic thought community, economic theorists, and political science and political theory scholars as well as to policy makers and members of the cryptocurrency community.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
E-Government Website Development…
Ed Downey, Carl D. Ekstrom, … Hardcover R5,007 Discovery Miles 50 070
The JR Programming Language - Concurrent…
Ronald A Olsson, Aaron W. Keen Hardcover R1,749 Discovery Miles 17 490
Fundamentals of Spherical Array…
Boaz Rafaely Hardcover R4,235 Discovery Miles 42 350
Learn to Design a Website for Your…
Michael Nelson, David Ezeanaka Hardcover R502 Discovery Miles 5 020
Optically Amplified WDM Networks
John Zyskind, Atul Srivastava Paperback R2,816 R2,651 Discovery Miles 26 510
Semantics of the Probabilistic Typed…
Dirk Draheim Hardcover R4,195 Discovery Miles 41 950
Programming with TensorFlow - Solution…
Kolla Bhanu Prakash, G. R. Kanagachidambaresan Hardcover R2,862 Discovery Miles 28 620
Algebra and Geometry with Python
Sergei Kurgalin, Sergei Borzunov Hardcover R2,701 Discovery Miles 27 010
A Deep Dive into NoSQL Databases: The…
Pethuru Raj, Ganesh Chandra Deka Hardcover R4,483 Discovery Miles 44 830
Everyday Cryptography - Fundamental…
Keith Martin Hardcover R3,584 Discovery Miles 35 840

 

Partners