|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
Equip your students with a management-focused overview of information security as well as the tools to effectively administer it with Whitman/Mattord's MANAGEMENT OF INFORMATION SECURITY, Sixth Edition.
More than ever, we need to prepare information security management students to build and staff security programs capable of securing systems and networks to meet the challenges in a world where continuously emerging threats, ever-present attacks and the success of criminals illustrate weaknesses in current information technologies. This text offers an exceptional blend of skills and experiences to administer and manage the more secure computing environments that organizations need.
Reflecting the latest developments from the field, it includes updated coverage of NIST, ISO and security governance along with emerging concerns like Ransomware, Cloud Computing and the Internet of Things.
This thought-provoking book challenges the way we think about the
regulation of cryptoassets based on cryptographic consensus
technology. Bringing a timely new perspective, Syren Johnstone
critiques the application of a financial regulation narrative to
cryptoassets, questions the assumptions on which it is based, and
considers its impact on industry development. Providing new
insights into the dynamics of oversight regulation, Johnstone
argues that the financial narrative stifles the 'New Prospect' for
the formation of novel commercial relationships and institutional
arrangements. The book asks whether regulations developed in the
20th century remain appropriate to apply to a technology emerging
in the 21st, suggesting it is time to think about how to regulate
for ecosystem development. Johnstone concludes with proposals for
reform, positing a new framework that facilitates industry
aspirations while remaining sustainable and compatible with
regulatory objectives. Rethinking the Regulation of Cryptoassets
will be an invaluable read for policy makers, regulators and
technologists looking for a deeper understanding of the issues
surrounding cryptoasset regulation and possible alternative
approaches. It will also be of interest to scholars and students
researching the intersection of law, technology, regulation and
finance.
Blockchain has potential to revolutionize how manufacturers design,
engineer, make and scale their products. Blockchain is gradually
proving to be an effective "middleware" solution for enabling
seamless interoperability within complex supply chains. Due to its
technological nature, blockchain enables secure, transparent and
fast data exchanges as well as allowing for the creation of
immutable records databases The main advantage of Blockchain in
Manufacturing Industries is product traceability, supply chain
transparency, compliance monitoring, and auditability. Moreover,
leveraging blockchain technology into a manufacturing enterprise
can enhance its security and reduce the rates of systematic
failures. So, blockchain is now used in various sectors of the
manufacturing industry, such as automotive, aerospace, defense,
pharmaceutical, consumer electronics, textile, food and beverages,
and more. Hence, Blockchain should be seen as an investment in
future-readiness and customer-centricity, not as an experimental
technology - because, the evidence is overwhelming. This book will
explore the strengths of Blockchain adaptation in Manufacturing
Industries and Logistics Management, cover different use cases of
Blockchain Technology for Manufacturing Industries and Logistics
Management, and will discuss the role, impact and challenges of
adopting Blockchain in Manufacturing industries and Logistics
Management. The chapters will also provide the current open issues
and future research trends of Blockchain, especially for
Manufacturing Industries and Logistics, and will encapsulate
quantitative and qualitative research for a wide spectrum of
readers of the book.
The concept of quantum computing is based on two fundamental
principles of quantum mechanics: superposition and entanglement.
Instead of using bits, qubits are used in quantum computing, which
is a key indicator in the high level of safety and security this
type of cryptography ensures. If interfered with or eavesdropped
in, qubits will delete or refuse to send, which keeps the
information safe. This is vital in the current era where sensitive
and important personal information can be digitally shared online.
In computer networks, a large amount of data is transferred
worldwide daily, including anything from military plans to a
country's sensitive information, and data breaches can be
disastrous. This is where quantum cryptography comes into play. By
not being dependent on computational power, it can easily replace
classical cryptography. Limitations and Future Applications of
Quantum Cryptography is a critical reference that provides
knowledge on the basics of IoT infrastructure using quantum
cryptography, the differences between classical and quantum
cryptography, and the future aspects and developments in this
field. The chapters cover themes that span from the usage of
quantum cryptography in healthcare, to forensics, and more. While
highlighting topics such as 5G networks, image processing,
algorithms, and quantum machine learning, this book is ideally
intended for security professionals, IoT developers, computer
scientists, practitioners, researchers, academicians, and students
interested in the most recent research on quantum computing.
Information Security and Ethics: Social and Organizational Issues
brings together examples of the latest research from a number of
international scholars addressing a wide range of issues
significant to this important and growing field of study. These
issues are relevant to the wider society, as well as to the
individual, citizen, educator, student and industry professional.
With individual chapters focusing on areas including web
accessibility; the digital divide; youth protection and
surveillance; Information security; education; ethics in the
Information professions and Internet voting; this book provides an
invaluable resource for students, scholars and professionals
currently working in information Technology related areas.
Cryptography is concerned with the construction of schemes that
withstand any abuse. A cryptographic scheme is constructed so as to
maintain a desired functionality, even under malicious attempts
aimed at making it deviate from its prescribed behavior. The design
of cryptographic systems must be based on firm foundations, whereas
ad hoc approaches and heuristics are a very dangerous way to go.
These foundations were developed mostly in the 1980s, in works that
are all co-authored by Shafi Goldwasser and/or Silvio Micali. These
works have transformed cryptography from an engineering discipline,
lacking sound theoretical foundations, into a scientific field
possessing a well-founded theory, which influences practice as well
as contributes to other areas of theoretical computer science. This
book celebrates these works, which were the basis for bestowing the
2012 A.M. Turing Award upon Shafi Goldwasser and Silvio Micali. A
significant portion of this book reproduces some of these works,
and another portion consists of scientific perspectives by some of
their former students. The highlight of the book is provided by a
few chapters that allow the readers to meet Shafi and Silvio in
person. These include interviews with them, their biographies and
their Turing Award lectures.
 |
TLS Mastery
(Hardcover)
Michael W Lucas
|
R970
R875
Discovery Miles 8 750
Save R95 (10%)
|
Ships in 10 - 15 working days
|
|
This book summarizes recent inventions, provides guidelines and
recommendations, and demonstrates many practical applications of
homomorphic encryption. This collection of papers represents the
combined wisdom of the community of leading experts on Homomorphic
Encryption. In the past 3 years, a global community consisting of
researchers in academia, industry, and government, has been working
closely to standardize homomorphic encryption. This is the first
publication of whitepapers created by these experts that
comprehensively describes the scientific inventions, presents a
concrete security analysis, and broadly discusses applicable use
scenarios and markets. This book also features a collection of
privacy-preserving machine learning applications powered by
homomorphic encryption designed by groups of top graduate students
worldwide at the Private AI Bootcamp hosted by Microsoft Research.
The volume aims to connect non-expert readers with this important
new cryptographic technology in an accessible and actionable way.
Readers who have heard good things about homomorphic encryption but
are not familiar with the details will find this book full of
inspiration. Readers who have preconceived biases based on
out-of-date knowledge will see the recent progress made by
industrial and academic pioneers on optimizing and standardizing
this technology. A clear picture of how homomorphic encryption
works, how to use it to solve real-world problems, and how to
efficiently strengthen privacy protection, will naturally become
clear.
The blockchain revolution has drastically impacted global economics
and the strategic practices within different industries.
Cryptocurrency specifically has forever changed the face of
business and the implementation of business online. While
innovative, people are still in the early stages of building and
developing blockchain technology and its applications, and it is
critical that researchers and practitioners obtain a better
understanding of this global phenomenon. Architectures and
Frameworks for Developing and Applying Blockchain Technology is an
essential reference source that presents the technological
foundation, recent research findings, developments, and critical
issues associated with blockchain technology from both computer
science and social science perspectives. Featuring topics such as
artificial intelligence, digital economy, and network technology,
this book is ideally designed for academics, researchers, industry
leaders, IT consultants, engineers, programmers, practitioners,
government officials, policymakers, and students.
In The Political Economy and Feasibility of Bitcoin and
Cryptocurrencies Spencer J. Pack brings his authority as a scholar
and advisor to this study of bitcoin and cryptocurrencies from the
perspective of the history of economic thought. Major theorists
analyzed in depth include Aristotle, Smith, Law, Marx, Keynes,
Rothbard and Hayek, and the book draws extensively upon the ideas
of Schumpeter, Galbraith and Sraffa. The book argues for
reconceptualization of the basic microeconomic categories into
rental, sale and financial asset prices along with a
reconsideration of Keynes' general theory to his special theory and
Rothbard's relationship to Rousseau. The author posits that intense
theoretical and practical struggles will continue over who should
control the quantity of money, the cause of the capitalist
economy's instability, and who or what is more dangerous:
concentrated centers of private wealth and private enterprises or
the contemporary state. He concludes that in terms of the quality
of money, the cryptocurrency community is probably correct, with
new forms of money potentially being better than sovereign fiat
currency. The book's relevance will appeal to members of the
history of economic thought community, economic theorists, and
political science and political theory scholars as well as to
policy makers and members of the cryptocurrency community.
Technological advancements have led to many beneficial developments
in the electronic world, especially in relation to online commerce.
Unfortunately, these advancements have also created a prime hunting
ground for hackers to obtain financially sensitive information and
deterring these breaches in security has been difficult.
Cryptographic Solutions for Secure Online Banking and Commerce
discusses the challenges of providing security for online
applications and transactions. Highlighting research on digital
signatures, public key infrastructure, encryption algorithms, and
digital certificates, as well as other e-commerce protocols, this
book is an essential reference source for financial planners,
academicians, researchers, advanced-level students, government
officials, managers, and technology developers.
This book explores the genesis of ransomware and how the parallel
emergence of encryption technologies has elevated ransomware to
become the most prodigious cyber threat that enterprises are
confronting. It also investigates the driving forces behind what
has been dubbed the 'ransomware revolution' after a series of major
attacks beginning in 2013, and how the advent of cryptocurrencies
provided the catalyst for the development and increased
profitability of ransomware, sparking a phenomenal rise in the
number and complexity of ransomware attacks. This book analyzes why
the speed of technology adoption has been a fundamental factor in
the continued success of financially motivated cybercrime, and how
the ease of public access to advanced encryption techniques has
allowed malicious actors to continue to operate with increased
anonymity across the internet. This anonymity has enabled increased
collaboration between attackers, which has aided the development of
new ransomware attacks, and led to an increasing level of technical
complexity in ransomware attacks. This book highlights that the
continuous expansion and early adoption of emerging technologies
may be beyond the capacity of conventional risk managers and risk
management frameworks. Researchers and advanced level students
studying or working in computer science, business or criminology
will find this book useful as a reference or secondary text.
Professionals working in cybersecurity, cryptography, information
technology, financial crime (and other related topics) will also
welcome this book as a reference.
In the mid-1970s, Whitfield Diffie and Martin Hellman invented
public key cryptography, an innovation that ultimately changed the
world. Today public key cryptography provides the primary basis for
secure communication over the internet, enabling online work,
socializing, shopping, government services, and much more. While
other books have documented the development of public key
cryptography, this is the first to provide a comprehensive
insiders' perspective on the full impacts of public key
cryptography, including six original chapters by nine distinguished
scholars. The book begins with an original joint biography of the
lives and careers of Diffie and Hellman, highlighting parallels and
intersections, and contextualizing their work. Subsequent chapters
show how public key cryptography helped establish an open
cryptography community and made lasting impacts on computer and
network security, theoretical computer science, mathematics, public
policy, and society. The volume includes particularly influential
articles by Diffie and Hellman, as well as newly transcribed
interviews and Turing Award Lectures by both Diffie and Hellman.
The contributed chapters provide new insights that are accessible
to a wide range of readers, from computer science students and
computer security professionals, to historians of technology and
members of the general public. The chapters can be readily
integrated into undergraduate and graduate courses on a range of
topics, including computer security, theoretical computer science
and mathematics, the history of computing, and science and
technology policy.
This book covers the discrete mathematics as it has been
established after its emergence since the middle of the last
century and its elementary applications to cryptography. It can be
used by any individual studying discrete mathematics, finite
mathematics, and similar subjects. Any necessary prerequisites are
explained and illustrated in the book. As a background of
cryptography, the textbook gives an introduction into number
theory, coding theory, information theory, that obviously have
discrete nature. Designed in a "self-teaching" format, the book
includes about 600 problems (with and without solutions) and
numerous, practical examples of cryptography. FEATURES Designed in
a "self-teaching" format, the book includes about 600 problems
(with and without solutions) and numerous examples of cryptography
Provides an introduction into number theory, game theory, coding
theory, and information theory as background for the coverage of
cryptography Covers cryptography topics such as CRT, affine
ciphers, hashing functions, substitution ciphers, unbreakable
ciphers, Discrete Logarithm Problem (DLP), and more
This book describes the efficient implementation of public-key
cryptography (PKC) to address the security challenges of massive
amounts of information generated by the vast network of connected
devices, ranging from tiny Radio Frequency Identification (RFID)
tags to powerful desktop computers. It investigates implementation
aspects of post quantum PKC and homomorphic encryption schemes
whose security is based on the hardness of the ring-learning with
error (LWE) problem. The work includes designing an FPGA-based
accelerator to speed up computation on encrypted data in the cloud
computer. It also proposes a more practical scheme that uses a
special module called recryption box to assist homomorphic function
evaluation, roughly 20 times faster than the implementation without
this module.
|
You may like...
Esque
Rob Bravery
CD
R41
R30
Discovery Miles 300
Final Betrayal
Patricia Gibney
Paperback
R424
R389
Discovery Miles 3 890
Mimic
Daniel Cole
Paperback
R355
R280
Discovery Miles 2 800
|