![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
Equip your students with a management-focused overview of information security as well as the tools to effectively administer it with Whitman/Mattord's MANAGEMENT OF INFORMATION SECURITY, Sixth Edition. More than ever, we need to prepare information security management students to build and staff security programs capable of securing systems and networks to meet the challenges in a world where continuously emerging threats, ever-present attacks and the success of criminals illustrate weaknesses in current information technologies. This text offers an exceptional blend of skills and experiences to administer and manage the more secure computing environments that organizations need. Reflecting the latest developments from the field, it includes updated coverage of NIST, ISO and security governance along with emerging concerns like Ransomware, Cloud Computing and the Internet of Things.
This thought-provoking book challenges the way we think about the regulation of cryptoassets based on cryptographic consensus technology. Bringing a timely new perspective, Syren Johnstone critiques the application of a financial regulation narrative to cryptoassets, questions the assumptions on which it is based, and considers its impact on industry development. Providing new insights into the dynamics of oversight regulation, Johnstone argues that the financial narrative stifles the 'New Prospect' for the formation of novel commercial relationships and institutional arrangements. The book asks whether regulations developed in the 20th century remain appropriate to apply to a technology emerging in the 21st, suggesting it is time to think about how to regulate for ecosystem development. Johnstone concludes with proposals for reform, positing a new framework that facilitates industry aspirations while remaining sustainable and compatible with regulatory objectives. Rethinking the Regulation of Cryptoassets will be an invaluable read for policy makers, regulators and technologists looking for a deeper understanding of the issues surrounding cryptoasset regulation and possible alternative approaches. It will also be of interest to scholars and students researching the intersection of law, technology, regulation and finance.
Blockchain has potential to revolutionize how manufacturers design, engineer, make and scale their products. Blockchain is gradually proving to be an effective "middleware" solution for enabling seamless interoperability within complex supply chains. Due to its technological nature, blockchain enables secure, transparent and fast data exchanges as well as allowing for the creation of immutable records databases The main advantage of Blockchain in Manufacturing Industries is product traceability, supply chain transparency, compliance monitoring, and auditability. Moreover, leveraging blockchain technology into a manufacturing enterprise can enhance its security and reduce the rates of systematic failures. So, blockchain is now used in various sectors of the manufacturing industry, such as automotive, aerospace, defense, pharmaceutical, consumer electronics, textile, food and beverages, and more. Hence, Blockchain should be seen as an investment in future-readiness and customer-centricity, not as an experimental technology - because, the evidence is overwhelming. This book will explore the strengths of Blockchain adaptation in Manufacturing Industries and Logistics Management, cover different use cases of Blockchain Technology for Manufacturing Industries and Logistics Management, and will discuss the role, impact and challenges of adopting Blockchain in Manufacturing industries and Logistics Management. The chapters will also provide the current open issues and future research trends of Blockchain, especially for Manufacturing Industries and Logistics, and will encapsulate quantitative and qualitative research for a wide spectrum of readers of the book.
The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country's sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography. Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing.
Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student and industry professional. With individual chapters focusing on areas including web accessibility; the digital divide; youth protection and surveillance; Information security; education; ethics in the Information professions and Internet voting; this book provides an invaluable resource for students, scholars and professionals currently working in information Technology related areas.
Cryptography is concerned with the construction of schemes that withstand any abuse. A cryptographic scheme is constructed so as to maintain a desired functionality, even under malicious attempts aimed at making it deviate from its prescribed behavior. The design of cryptographic systems must be based on firm foundations, whereas ad hoc approaches and heuristics are a very dangerous way to go. These foundations were developed mostly in the 1980s, in works that are all co-authored by Shafi Goldwasser and/or Silvio Micali. These works have transformed cryptography from an engineering discipline, lacking sound theoretical foundations, into a scientific field possessing a well-founded theory, which influences practice as well as contributes to other areas of theoretical computer science. This book celebrates these works, which were the basis for bestowing the 2012 A.M. Turing Award upon Shafi Goldwasser and Silvio Micali. A significant portion of this book reproduces some of these works, and another portion consists of scientific perspectives by some of their former students. The highlight of the book is provided by a few chapters that allow the readers to meet Shafi and Silvio in person. These include interviews with them, their biographies and their Turing Award lectures.
This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on Homomorphic Encryption. In the past 3 years, a global community consisting of researchers in academia, industry, and government, has been working closely to standardize homomorphic encryption. This is the first publication of whitepapers created by these experts that comprehensively describes the scientific inventions, presents a concrete security analysis, and broadly discusses applicable use scenarios and markets. This book also features a collection of privacy-preserving machine learning applications powered by homomorphic encryption designed by groups of top graduate students worldwide at the Private AI Bootcamp hosted by Microsoft Research. The volume aims to connect non-expert readers with this important new cryptographic technology in an accessible and actionable way. Readers who have heard good things about homomorphic encryption but are not familiar with the details will find this book full of inspiration. Readers who have preconceived biases based on out-of-date knowledge will see the recent progress made by industrial and academic pioneers on optimizing and standardizing this technology. A clear picture of how homomorphic encryption works, how to use it to solve real-world problems, and how to efficiently strengthen privacy protection, will naturally become clear.
The blockchain revolution has drastically impacted global economics and the strategic practices within different industries. Cryptocurrency specifically has forever changed the face of business and the implementation of business online. While innovative, people are still in the early stages of building and developing blockchain technology and its applications, and it is critical that researchers and practitioners obtain a better understanding of this global phenomenon. Architectures and Frameworks for Developing and Applying Blockchain Technology is an essential reference source that presents the technological foundation, recent research findings, developments, and critical issues associated with blockchain technology from both computer science and social science perspectives. Featuring topics such as artificial intelligence, digital economy, and network technology, this book is ideally designed for academics, researchers, industry leaders, IT consultants, engineers, programmers, practitioners, government officials, policymakers, and students.
In The Political Economy and Feasibility of Bitcoin and Cryptocurrencies Spencer J. Pack brings his authority as a scholar and advisor to this study of bitcoin and cryptocurrencies from the perspective of the history of economic thought. Major theorists analyzed in depth include Aristotle, Smith, Law, Marx, Keynes, Rothbard and Hayek, and the book draws extensively upon the ideas of Schumpeter, Galbraith and Sraffa. The book argues for reconceptualization of the basic microeconomic categories into rental, sale and financial asset prices along with a reconsideration of Keynes' general theory to his special theory and Rothbard's relationship to Rousseau. The author posits that intense theoretical and practical struggles will continue over who should control the quantity of money, the cause of the capitalist economy's instability, and who or what is more dangerous: concentrated centers of private wealth and private enterprises or the contemporary state. He concludes that in terms of the quality of money, the cryptocurrency community is probably correct, with new forms of money potentially being better than sovereign fiat currency. The book's relevance will appeal to members of the history of economic thought community, economic theorists, and political science and political theory scholars as well as to policy makers and members of the cryptocurrency community.
Technological advancements have led to many beneficial developments in the electronic world, especially in relation to online commerce. Unfortunately, these advancements have also created a prime hunting ground for hackers to obtain financially sensitive information and deterring these breaches in security has been difficult. Cryptographic Solutions for Secure Online Banking and Commerce discusses the challenges of providing security for online applications and transactions. Highlighting research on digital signatures, public key infrastructure, encryption algorithms, and digital certificates, as well as other e-commerce protocols, this book is an essential reference source for financial planners, academicians, researchers, advanced-level students, government officials, managers, and technology developers.
This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the 'ransomware revolution' after a series of major attacks beginning in 2013, and how the advent of cryptocurrencies provided the catalyst for the development and increased profitability of ransomware, sparking a phenomenal rise in the number and complexity of ransomware attacks. This book analyzes why the speed of technology adoption has been a fundamental factor in the continued success of financially motivated cybercrime, and how the ease of public access to advanced encryption techniques has allowed malicious actors to continue to operate with increased anonymity across the internet. This anonymity has enabled increased collaboration between attackers, which has aided the development of new ransomware attacks, and led to an increasing level of technical complexity in ransomware attacks. This book highlights that the continuous expansion and early adoption of emerging technologies may be beyond the capacity of conventional risk managers and risk management frameworks. Researchers and advanced level students studying or working in computer science, business or criminology will find this book useful as a reference or secondary text. Professionals working in cybersecurity, cryptography, information technology, financial crime (and other related topics) will also welcome this book as a reference.
In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more. While other books have documented the development of public key cryptography, this is the first to provide a comprehensive insiders' perspective on the full impacts of public key cryptography, including six original chapters by nine distinguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman. The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy.
This book covers the discrete mathematics as it has been established after its emergence since the middle of the last century and its elementary applications to cryptography. It can be used by any individual studying discrete mathematics, finite mathematics, and similar subjects. Any necessary prerequisites are explained and illustrated in the book. As a background of cryptography, the textbook gives an introduction into number theory, coding theory, information theory, that obviously have discrete nature. Designed in a "self-teaching" format, the book includes about 600 problems (with and without solutions) and numerous, practical examples of cryptography. FEATURES Designed in a "self-teaching" format, the book includes about 600 problems (with and without solutions) and numerous examples of cryptography Provides an introduction into number theory, game theory, coding theory, and information theory as background for the coverage of cryptography Covers cryptography topics such as CRT, affine ciphers, hashing functions, substitution ciphers, unbreakable ciphers, Discrete Logarithm Problem (DLP), and more
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module. |
![]() ![]() You may like...
Primary Clinical Care Manual - A…
Soweto Trust for Nurse Clinical Training
Paperback
ADHD 2.0 - New Science And Essential…
Edward M. Hallowell, John J. Ratey
Paperback
Functional Heads, Volume 7 - The…
Laura Bruge, Anna Cardinaletti, …
Hardcover
R4,222
Discovery Miles 42 220
Leadership In Health Services Management
Karien Jooste, Siedine Coetzee
Paperback
|