0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (78)
  • R250 - R500 (115)
  • R500+ (1,462)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Guide to Network Defense and Countermeasures (Paperback, 3rd edition): Randy Weaver, Dean Farwood, Dawn Weaver Guide to Network Defense and Countermeasures (Paperback, 3rd edition)
Randy Weaver, Dean Farwood, Dawn Weaver
R1,206 R1,019 Discovery Miles 10 190 Save R187 (16%) Ships in 15 - 25 working days

GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES provides a thorough guide to perimeter defense fundamentals, including intrusion detection and firewalls. This trusted text also covers more advanced topics such as security policies, network address translation (NAT), packet filtering and analysis, proxy servers, virtual private networks (VPN), and network traffic signatures. Thoroughly updated, the new third edition reflects the latest technology, trends, and techniques including virtualization, VMware, IPv6, and ICMPv6 structure, making it easier for current and aspiring professionals to stay on the cutting edge and one step ahead of potential security threats. A clear writing style and numerous screenshots and illustrations make even complex technical material easier to understand, while tips, activities, and projects throughout the text allow you to hone your skills by applying what you learn. Perfect for students and professionals alike in this high-demand, fast-growing field, GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES, Third Edition, is a must-have resource for success as a network security professional.

Practical Cryptology and Web Security (Paperback): P.K. Yuen Practical Cryptology and Web Security (Paperback)
P.K. Yuen
R2,035 R1,422 Discovery Miles 14 220 Save R613 (30%) Ships in 10 - 15 working days

The transfer of information over the world wide web depends critically on secure communications. The need to protect the material we send and receive from cyberspace, from the largest of business transactions to the simplest of personal web-pages, is crucial in ensuring we can continue to use this incredible resource safely. Cryptology provides the most reliable tools for storing or transmitting digital information and is the gold standard for attaining the levels of security our online interactions demand. Taking a step-by-step approach, P. K. Yuen demonstrates how to master web-based security skills including: protecting websites from hackers and viruses; encrypting email; building a secure web-database; performing secure business transactions over the web. Working from a problem-solving perspective, he shows how to implement security solutions and looks from the attacker's point of view at possible challenges to that security. In short, Practical Cryptology and Web Security offers a practical and comprehensive guide to all aspects of web security. This book features over 120 worked examples, many from industry, demonstrate the key considerations in implementing web security. AES, this book examines the latest web technologies in terms of security, including XML Signatures and XML Digital Contracts. PK Yuen is a well known expert on Communications, Internet and the World Wide Web. He has over 13 years' experience working on web technologies including large scale application developments, engineer training and project leadership and working on the security system of the Shanghai Pu Dong airport, China. He also co-authored Practical Web Technologies, published by Addison-Wesley in 2003.

The Truth Machine - The Blockchain and the Future of Everything (Paperback, Epub Edition): Michael J. Casey, Paul Vigna The Truth Machine - The Blockchain and the Future of Everything (Paperback, Epub Edition)
Michael J. Casey, Paul Vigna 1
R399 R304 Discovery Miles 3 040 Save R95 (24%) Ships in 10 - 15 working days

From the authors of the fascinating The Age of Cryptocurrency, comes the definitive work on the Internet's next big thing: the blockchain. Many of the `legacy systems' once designed to make our lives easier and our economy more efficient are no longer up to the task; big banks have grown more entrenched, privacy exists only until the next hack, and credit card fraud has become a fact of life. However, there is a way past all this-a new kind of operating system with the potential to revolutionise our economy: the blockchain. In The Truth Machine, Michael J. Casey and Paul Vigna demystify the blockchain and explain why it can restore personal control over our data, assets, and identities; grant billions of excluded people access to the global economy; and shift the balance of power to revive society's faith in itself. They reveal the empowerment possible when self-interested middlemen give way to the transparency of the blockchain, while highlighting the job losses, assertion of special interests, and threat to social cohesion that will accompany this shift. With a balanced perspective, Casey and Vigna show why we all must care about the path that blockchain technology takes-moving humanity forward, not backward.

Management of Information Security (Paperback, 6th edition): Michael Whitman, Herbert Mattord Management of Information Security (Paperback, 6th edition)
Michael Whitman, Herbert Mattord
R937 R803 Discovery Miles 8 030 Save R134 (14%) In stock

MANAGEMENT OF INFORMATION SECURITY, Sixth Edition prepares you to become an information security management practitioner able to secure systems and networks in a world where continuously emerging threats, ever-present attacks and the success of criminals illustrate the weaknesses in current information technologies. You'll develop both the information security skills and practical experience that organizations are looking for as they strive to ensure more secure computing environments. The text focuses on key executive and managerial aspects of information security. It also integrates coverage of CISSP and CISM throughout to effectively prepare you for certification. Reflecting the most recent developments in the field, it includes the latest information on NIST, ISO and security governance as well as emerging concerns like Ransomware, Cloud Computing and the Internet of Things.

You CAN Stop Stupid - Stopping Losses from Accidental and Malicious Actions (Paperback): Ira Winkler, Dr. Tracy Celaya Brown You CAN Stop Stupid - Stopping Losses from Accidental and Malicious Actions (Paperback)
Ira Winkler, Dr. Tracy Celaya Brown
R778 R627 Discovery Miles 6 270 Save R151 (19%) Ships in 7 - 11 working days

Stopping Losses from Accidental and Malicious Actions Around the world, users cost organizations billions of dollars due to simple errors and malicious actions. They believe that there is some deficiency in the users. In response, organizations believe that they have to improve their awareness efforts and making more secure users. This is like saying that coalmines should get healthier canaries. The reality is that it takes a multilayered approach that acknowledges that users will inevitably make mistakes or have malicious intent, and the failure is in not planning for that. It takes a holistic approach to assessing risk combined with technical defenses and countermeasures layered with a security culture and continuous improvement. Only with this kind of defense in depth can organizations hope to prevent the worst of the cybersecurity breaches and other user-initiated losses. Using lessons from tested and proven disciplines like military kill-chain analysis, counterterrorism analysis, industrial safety programs, and more, Ira Winkler and Dr. Tracy Celaya's You CAN Stop Stupid provides a methodology to analyze potential losses and determine appropriate countermeasures to implement. Minimize business losses associated with user failings Proactively plan to prevent and mitigate data breaches Optimize your security spending Cost justify your security and loss reduction efforts Improve your organization's culture Business technology and security professionals will benefit from the information provided by these two well-known and influential cybersecurity speakers and experts.

2019 Standard Catalog of Cryptocurrencies (Hardcover): Mateo Marin 2019 Standard Catalog of Cryptocurrencies (Hardcover)
Mateo Marin
R903 R638 Discovery Miles 6 380 Save R265 (29%) Ships in 10 - 15 working days
Tribe of Hackers Blue Team - Tribal Knowledge from the Best in Defensive Cybersecurity (Paperback): Marcus J. Carey, Jennifer... Tribe of Hackers Blue Team - Tribal Knowledge from the Best in Defensive Cybersecurity (Paperback)
Marcus J. Carey, Jennifer Jin
R565 R467 Discovery Miles 4 670 Save R98 (17%) Ships in 7 - 11 working days

Blue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world's leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You'll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn't in the real world of cybersecurity. Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills Learn how you can defend against physical and technical penetration testing Understand the techniques that advanced red teamers use against high-value targets Identify the most important tools to master as a blue teamer Explore ways to harden systems against red team attacks Stand out from the competition as you work to advance your cybersecurity career Authored by leaders in cybersecurity attack and breach simulations, the Tribe of Hackers series is perfect for those new to blue team security, experienced practitioners, and cybersecurity team leaders. Tribe of Hackers Blue Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the blue team defense.

Mastering Blockchain - Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications (Paperback):... Mastering Blockchain - Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications (Paperback)
Lorne Lantz, Daniel Cawrey
R1,422 R1,085 Discovery Miles 10 850 Save R337 (24%) Ships in 7 - 11 working days

The future will become increasingly distributed. As the publicity surrounding Bitcoin and blockchain has shown, distributed technology and business models are gaining popularity. Yet the disruptive potential of this technology is often obscured by hype and misconception. In this detailed guide, Lorne Lantz and Daniel Cawrey distill the complex ideas behind blockchain into an easily digestible reference manual, showing what's really going on under the hood. Finance and technology professionals will learn how a blockchain works as they explore the evolution and current state of blockchain technology, including the function of cryptocurrencies and smart contracts. This book is for anyone evaluating whether or not to invest time in the cryptocurrency and blockchain industry. Go beyond buzzwords and discover what the technology really has to offer. Learn why Bitcoin was fundamentally important in blockchain's birth Explore altcoin and alternative blockchain projects to understand what's possible Understand the challenges of scaling a blockchain and forking a blockchain Learn what Ethereum and other blockchains offer beyond Bitcoin Examine how the money flows in crypto markets Discover where the future lies in this exciting new technology

The Mathematics of Secrets - Cryptography from Caesar Ciphers to Digital Encryption (Paperback): Joshua Holden The Mathematics of Secrets - Cryptography from Caesar Ciphers to Digital Encryption (Paperback)
Joshua Holden
R464 R379 Discovery Miles 3 790 Save R85 (18%) Ships in 10 - 15 working days

Explaining the mathematics of cryptography The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography-the science of sending secret messages. Using a wide range of historical anecdotes and real-world examples, Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers work. He focuses on both code making and code breaking and discusses most of the ancient and modern ciphers that are currently known. He begins by looking at substitution ciphers, and then discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, connections between ciphers and computer encryption, stream ciphers, public-key ciphers, and ciphers involving exponentiation. He concludes by looking at the future of ciphers and where cryptography might be headed. The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages. A blog describing new developments and historical discoveries in cryptography related to the material in this book is accessible at http://press.princeton.edu/titles/10826.html.

The Shellcoder's Handbook - Discovering and Exploiting Security Holes (Paperback, 2nd Edition): Chris Anley, John Heasman,... The Shellcoder's Handbook - Discovering and Exploiting Security Holes (Paperback, 2nd Edition)
Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte
R964 R627 Discovery Miles 6 270 Save R337 (35%) Ships in 10 - 15 working days

* This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application * New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista * Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored * The companion Web site features downloadable code files

Networks, Security and Complexity - The Role of Public Policy in Critical Infrastructure Protection (Hardcover): Sean P. Gorman Networks, Security and Complexity - The Role of Public Policy in Critical Infrastructure Protection (Hardcover)
Sean P. Gorman
R2,465 Discovery Miles 24 650 Ships in 10 - 15 working days

The end of the 20th century witnessed an information revolution that introduced a host of new economic efficiencies. This economic change was underpinned by rapidly growing networks of infrastructure that have become increasingly complex. In this new era of global security we are now forced to ask whether our private efficiencies have led to public vulnerabilities, and if so, how do we make ourselves secure without hampering the economy. In order to answer these questions, Sean Gorman provides a framework for how vulnerabilities are identified and cost-effectively mitigated, as well as how resiliency and continuity of infrastructures can be increased. Networks, Security and Complexity goes on to address specific concerns such as determining criticality and interdependency, the most effective means of allocating scarce resources for defense, and whether diversity is a viable strategy. The author provides the economic, policy, and physics background to the issues of infrastructure security, along with tools for taking first steps in tackling these security dilemmas. He includes case studies of infrastructure failures and vulnerabilities, an analysis of threats to US infrastructure, and a review of the economics and geography of agglomeration and efficiency. This critical and controversial book will garner much attention and spark an important dialogue. Policymakers, security professionals, infrastructure operators, academics, and readers following homeland security issues will find this volume of great interest.

Kryptowahrungen fur Dummies (German, Paperback): Krijn Soeteman Kryptowahrungen fur Dummies (German, Paperback)
Krijn Soeteman
R378 Discovery Miles 3 780 Ships in 10 - 15 working days
Security Awareness - Applying Practical Security in Your World (Paperback, 4th edition): Mark Ciampa Security Awareness - Applying Practical Security in Your World (Paperback, 4th edition)
Mark Ciampa
R746 R641 Discovery Miles 6 410 Save R105 (14%) Ships in 15 - 25 working days

Designed to provide you with the knowledge needed to protect computers and networks from increasingly sophisticated attacks, SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fourth Edition continues to present the same straightforward, practical information that has made previous editions so popular. For most computer users, practical computer security poses some daunting challenges: What type of attacks will antivirus software prevent? How do I set up a firewall? How can I test my computer to be sure that attackers cannot reach it through the Internet? When and how should I install Windows patches? This text is designed to help you understand the answers to these questions through a series of real-life user experiences. In addition, hands-on projects and case projects give you the opportunity to test your knowledge and apply what you have learned. SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fourth Edition contains up-to-date information on relevant topics such as protecting mobile devices and wireless local area networks.

Tribe of Hackers Red Team - Tribal Knowledge from the Best in Offensive Cybersecurity (Paperback): Marcus J. Carey, Jennifer Jin Tribe of Hackers Red Team - Tribal Knowledge from the Best in Offensive Cybersecurity (Paperback)
Marcus J. Carey, Jennifer Jin
R496 R371 Discovery Miles 3 710 Save R125 (25%) Ships in 10 - 15 working days

Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe. The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world's leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more Learn what it takes to secure a Red Team job and to stand out from other candidates Discover how to hone your hacking skills while staying on the right side of the law Get tips for collaborating on documentation and reporting Explore ways to garner support from leadership on your security proposals Identify the most important control to prevent compromising your network Uncover the latest tools for Red Team offensive security Whether you're new to Red Team security, an experienced practitioner, or ready to lead your own team, Tribe of Hackers Red Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the Red Team offensive.

IT Security Governance Guidebook with Security Program Metrics on CD-ROM (Hardcover): Fred Cohen IT Security Governance Guidebook with Security Program Metrics on CD-ROM (Hardcover)
Fred Cohen
R3,051 Discovery Miles 30 510 Ships in 10 - 15 working days

The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs. Including graphics to support the information in the text, this book includes both an overview of material as well as detailed explanations of specific issues. The accompanying CD-ROM offers a collection of metrics, formed from repeatable and comparable measurement, that are designed to correspond to the enterprise security governance model provided in the text, allowing an enterprise to measure its overall information protection program.

The Art of Deception - Controlling the Human Element of Security (Paperback, New ed): Kevin D. Mitnick, William L Simon The Art of Deception - Controlling the Human Element of Security (Paperback, New ed)
Kevin D. Mitnick, William L Simon; Foreword by Steve Wozniak
R319 R217 Discovery Miles 2 170 Save R102 (32%) Ships in 10 - 15 working days

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

The Design of Rijndael - The Advanced Encryption Standard (AES) (Hardcover, 2nd ed. 2020): Joan Daemen, Vincent Rijmen The Design of Rijndael - The Advanced Encryption Standard (AES) (Hardcover, 2nd ed. 2020)
Joan Daemen, Vincent Rijmen
R3,215 Discovery Miles 32 150 Ships in 7 - 11 working days

An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.

The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Paperback, annotated... The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Paperback, annotated edition)
Thomas R. Peltier, Patrick D. Howard, Bob Cartwright
R2,434 Discovery Miles 24 340 Ships in 10 - 15 working days

Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs) - all CISSPs - this test prep book allows CISSP candidates to test their current knowledge in each of the ten security domains that make up the Common Body of Knowledge (CBK) from which the CISSP examination is based on. The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques provides an outline of the subjects, topics, and sub-topics contained within each domain in the CBK, and with it you can readily identify terms and concepts that you will need to know for the exam.

The book starts with a review of each of the ten domains and provides 25 sample questions with answers and references for each. It discusses successful approaches for preparing for the exam based on experiences of those who have recently passed the exam. It then provides a complete 250-question practice exam with answers. Explanations are provided to clarify why the correct answers are correct, and why the incorrect answers are incorrect. With a total of 500 sample questions, The Total CISSP Exam Prep Book gives you a full flavor of what it will take to pass the exam.

Mastering Corda - Blockchain for Java Developers (Paperback): Jamiel Sheikh Mastering Corda - Blockchain for Java Developers (Paperback)
Jamiel Sheikh
R1,438 R1,116 Discovery Miles 11 160 Save R322 (22%) Ships in 10 - 15 working days

Get a consistent, linear pathway for learning Corda and building CorDapps. With

CompTIA CySA+ Practice Tests - Exam CS0-002 (Paperback, 2nd Edition): Mike Chapple, David Seidl CompTIA CySA+ Practice Tests - Exam CS0-002 (Paperback, 2nd Edition)
Mike Chapple, David Seidl
R910 R733 Discovery Miles 7 330 Save R177 (19%) Ships in 7 - 11 working days

Efficiently prepare yourself for the demanding CompTIA CySA+ exam CompTIA CySA+ Practice Tests: Exam CS0-002, 2nd Edition offers readers the fastest and best way to prepare for the CompTIA Cybersecurity Analyst exam. With five unique chapter tests and two additional practice exams for a total of 1000 practice questions, this book covers topics including: Threat and Vulnerability Management Software and Systems Security Security Operations and Monitoring Incident Response Compliance and Assessment The new edition of CompTIA CySA+ Practice Tests is designed to equip the reader to tackle the qualification test for one of the most sought-after and in-demand certifications in the information technology field today. The authors are seasoned cybersecurity professionals and leaders who guide readers through the broad spectrum of security concepts and technologies they will be required to master before they can achieve success on the CompTIA CySA exam. The book also tests and develops the critical thinking skills and judgment the reader will need to demonstrate on the exam.

Hacking the Hacker - Learn From the Experts Who Take Down Hackers (Paperback): Roger A. Grimes Hacking the Hacker - Learn From the Experts Who Take Down Hackers (Paperback)
Roger A. Grimes
R499 R375 Discovery Miles 3 750 Save R124 (25%) Ships in 10 - 15 working days

Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top. Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure. * Go deep into the world of white hat hacking to grasp just how critical cybersecurity is * Read the stories of some of the world's most renowned computer security experts * Learn how hackers do what they do no technical expertise necessary * Delve into social engineering, cryptography, penetration testing, network attacks, and more As a field, cybersecurity is large and multi-faceted yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.

Investigating Cryptocurrencies - Understanding, Extracting, and Analyzing Blockchain Evidence (Paperback): Nick Furneaux Investigating Cryptocurrencies - Understanding, Extracting, and Analyzing Blockchain Evidence (Paperback)
Nick Furneaux
R1,205 R829 Discovery Miles 8 290 Save R376 (31%) Ships in 10 - 15 working days

Investigate crimes involving cryptocurrencies and other blockchain technologies Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their money into the market. Worse still, the blockchain can even be used to hide information and covert messaging, unknown to most investigators. Investigating Cryptocurrencies is the first book to help corporate, law enforcement, and other investigators understand the technical concepts and the techniques for investigating crimes utilizing the blockchain and related digital currencies such as Bitcoin and Ethereum. Understand blockchain and transaction technologies Set up and run cryptocurrency accounts Build information about specific addresses Access raw data on blockchain ledgers Identify users of cryptocurrencies Extracting cryptocurrency data from live and imaged computers Following the money With nearly $150 billion in cryptocurrency circulating and $3 billion changing hands daily, crimes committed with or paid for with digital cash are a serious business. Luckily, Investigating Cryptocurrencies Forensics shows you how to detect it and, more importantly, stop it in its tracks.

Password Organizer and Hide This Book - 6 X 9 See It Bigger Alphabet Password Organizer Book, Large Print with Tabbed Pages,... Password Organizer and Hide This Book - 6 X 9 See It Bigger Alphabet Password Organizer Book, Large Print with Tabbed Pages, Over 200 Record User and Password. Keep Favorite Website, Username, Email Used, and Passwords in One Easy, Convenient Place (Paperback)
Ellie And Scott
R148 Discovery Miles 1 480 Ships in 7 - 11 working days
Studies in Complexity and Cryptography - Miscellanea on the Interplay between Randomness and Computation (Paperback): Oded... Studies in Complexity and Cryptography - Miscellanea on the Interplay between Randomness and Computation (Paperback)
Oded Goldreich
R2,232 Discovery Miles 22 320 Ships in 7 - 11 working days

This book presents a collection of 36 pieces of scientific work in the areas of complexity theory and foundations of cryptography: 20 research contributions, 13 survey articles, and 3 programmatic and reflective viewpoint statements. These so far formally unpublished pieces were written by Oded Goldreich, some in collaboration with other scientists.
The articles included in this book essentially reflect the topical scope of the scientific career of Oded Goldreich now spanning three decades. In particular the topics dealt with include average-case complexity, complexity of approximation, derandomization, expander graphs, hashing functions, locally testable codes, machines that take advice, NP-completeness, one-way functions, probabilistically checkable proofs, proofs of knowledge, property testing, pseudorandomness, randomness extractors, sampling, trapdoor permutations, zero-knowledge, and non-iterative zero-knowledge.
All in all, this potpourri of studies in complexity and cryptography constitutes a most valuable contribution to the field of theoretical computer science centered around the personal achievements and views of one of its outstanding representatives.

Everyday Cryptography - Fundamental Principles and Applications (Paperback, 2nd Revised edition): Keith Martin Everyday Cryptography - Fundamental Principles and Applications (Paperback, 2nd Revised edition)
Keith Martin
R1,106 Discovery Miles 11 060 Ships in 10 - 15 working days

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the Internet, mobile phones, Wi-Fi networks, payment cards, Tor, and Bitcoin. This book is intended to be introductory, self-contained, and widely accessible. It is suitable as a first read on cryptography. Almost no prior knowledge of mathematics is required since the book deliberately avoids the details of the mathematics techniques underpinning cryptographic mechanisms. Instead our focus will be on what a normal user or practitioner of information security needs to know about cryptography in order to understand the design and use of everyday cryptographic applications. By focusing on the fundamental principles of modern cryptography rather than the technical details of current cryptographic technology, the main part this book is relatively timeless, and illustrates the application of these principles by considering a number of contemporary applications of cryptography. Following the revelations of former NSA contractor Edward Snowden, the book considers the wider societal impact of use of cryptography and strategies for addressing this. A reader of this book will not only be able to understand the everyday use of cryptography, but also be able to interpret future developments in this fascinating and crucially important area of technology.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Animal Biometrics - Techniques and…
Santosh Kumar, Sanjay Kumar Singh, … Hardcover R2,385 Discovery Miles 23 850
Eleventh Hour CISSP (R) - Study Guide
Eric Conrad, Seth Misenar, … Paperback R591 Discovery Miles 5 910
The Art of Intrusion - The Real Stories…
Kevin D. Mitnick, William L Simon Paperback R321 R246 Discovery Miles 2 460
Cryptology Transmitted Message…
Igor Izmailov, Boris Poizner, … Hardcover R4,526 Discovery Miles 45 260
Solving Cyber Risk - Protecting Your…
Andrew Coburn, Eireann Leverett, … Hardcover R986 R721 Discovery Miles 7 210
The Official (ISC)2 Guide to the CCSP…
Adam Gordon Hardcover R1,608 Discovery Miles 16 080
Cryptography: A Very Short Introduction
Fred Piper, Sean Murphy Paperback R232 R192 Discovery Miles 1 920
The Art of Deception - Controlling the…
Kevin D. Mitnick, William L Simon Hardcover R917 R652 Discovery Miles 6 520
Cryptanalysis
Helen Fouche Gaines Paperback R216 R205 Discovery Miles 2 050
Mechanics of User Identification and…
Dobromir Todorov Hardcover R3,092 Discovery Miles 30 920

 

Partners