0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (85)
  • R500+ (1,287)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Advances in Cryptology - EUROCRYPT 2009 - 28th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2009 - 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009, Proceedings (Paperback, 2009 ed.)
Antoine Joux
R1,497 Discovery Miles 14 970 Ships in 18 - 22 working days

You are holding the proceedings of Eurocrypt 2009, the 28th Annual Inter- tional Conferenceon the Theoryand Applications of CryptographicTechniques. This conference was organized by the International Association for Cryptologic Research in cooperation with the Horst Gort ] z Institute for IT-Security at the Ruhr-Universit] at Bochum. The local organization received additional support from several sponsors: Horst G] ortz Stiftung, Deutsche Forschungsgemeinschaft, Bochum 2015, Secunet, NXP, IET, Taylor & Francis, AuthentiDate. The c- ference was held in Cologne, Germany. The Eurocrypt 2009 Program Committee (PC) consisted of 29 members, listed on the next page. There were 148 submissions and 33 were selected to - pear in this volume.Eachsubmissionwasassignedto at leastthreePCmembers and reviewed anonymously. During the review process, the PC members were assisted by 131 external reviewers.Once the reviews were available, the comm- tee discussed the papers in depth using the EasyChair conference management system. The authors of accepted papers were given ?ve weeks to prepare the- nalversionsincluded in theseproceedings.Therevisedpaperswerenot reviewed again and their authors bear the responsibility for their content. Inadditiontothepapersincludedinthisvolume, theconferencealsofeatured aPosterandaRumpsession.Thelistofpresentedpostersappearsinthisvolume before the table of contents. Dan Bernstein served as the Chair of the Rump session. The conference also had the pleasure of hearing invited talks by Sha? Goldwasser and Phillip Rogaway."

Cryptanalysis (Paperback): Helen Fouche Gaines Cryptanalysis (Paperback)
Helen Fouche Gaines
R385 R349 Discovery Miles 3 490 Save R36 (9%) Ships in 9 - 17 working days

Thorough, systematic introduction to serious cryptography, especially strong in modern forms of cipher solution used by experts. Nihilist, grille, U. S. Army, key-phrase, multiple-alphabet, Gronsfeld, Porta, Beaufort, periodic ciphers and more. Simple and advanced methods. 166 specimens to solve-with solutions.

Design and Cryptanalysis of ZUC - A Stream Cipher in Mobile Telephony (Paperback, 1st ed. 2021): Chandra Sekhar Mukherjee,... Design and Cryptanalysis of ZUC - A Stream Cipher in Mobile Telephony (Paperback, 1st ed. 2021)
Chandra Sekhar Mukherjee, Dibyendu Roy, Subhamoy Maitra
R1,292 Discovery Miles 12 920 Ships in 10 - 15 working days

This book is a timely document of state-of-the art analytical techniques in the domain of stream cipher design and analysis with a specific cipher, named ZUC. It links new research to brief contextual literature review in the domain of complex LFSR-based stream ciphers. A snapshot of how stream ciphers are deployed in the mobile telephony architecture, one of the most well-known topics for more than five decades in the domain of computer and communication sciences, is presented in this book. The book provides an in-depth study on design and cryptanalysis of ZUC as well as relevant research results in this field with directions towards future analysis of this cipher.

Beginning Information Cards and CardSpace - From Novice to Professional (Paperback, 1st ed.): Marc Mercuri Beginning Information Cards and CardSpace - From Novice to Professional (Paperback, 1st ed.)
Marc Mercuri
R960 R839 Discovery Miles 8 390 Save R121 (13%) Ships in 18 - 22 working days

If you work at all with Internet-facing solutions, you know that the lack of an identity metasystem is a critical vulnerability in the design. Various consortiums have worked to define a system of identitya platform-agnostic way of communicating and validating claims of identity. If you work with identity solutions or structures, you will find "Beginning Information Cards and CardSpace: From Novice to Professional" essential to understanding and successfully implementing CardSpace solutions.

Topics range from fundamental discussion of identityincluding identity concepts, laws of identity, and the identity metasystemto comprehensive coverage of Windows CardSpace. You'll learn what CardSpace is all about, where you can and should use it, and how you would implement it. Additionally, multiple case studies showcase different scenarios where the technology is employed.Youll learn the technology from someone who's done real implementations with major customersAuthor Marc Mercurri works directly with the Windows CardSpace product groupHigh-quality demos with universal themes are applicable to your own work

Foundations of Security - What Every Programmer Needs to Know (Paperback, 1st ed.): Christoph Kern, Anita Kesavan, Neil Daswani Foundations of Security - What Every Programmer Needs to Know (Paperback, 1st ed.)
Christoph Kern, Anita Kesavan, Neil Daswani
R1,724 R1,402 Discovery Miles 14 020 Save R322 (19%) Ships in 18 - 22 working days

Software developers need to worry about security as never before. They need clear guidance on safe coding practices, and that's exactly what this book delivers. The book does not delve deep into theory, or rant about the politics of security. Instead, it clearly and simply lays out the most common threats that programmers need to defend against. It then shows programmers how to make their defense. The book takes a broad focus, ranging over SQL injection, worms and buffer overflows, password security, and more. It sets programmers on the path towards successfully defending against the entire gamut of security threats that they might face.

Cyber Forensics - A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition... Cyber Forensics - A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition (Hardcover, 2nd edition)
Doug Menendez, Albert Marcella, Jr.
R3,974 Discovery Miles 39 740 Ships in 10 - 15 working days

Designed as an introduction and overview to the field, Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition integrates theory and practice to present the policies, procedures, methodologies, and legal ramifications and implications of a cyber forensic investigation. The authors guide you step-by-step through the basics of investigation and introduce the tools and procedures required to legally seize and forensically evaluate a suspect machine. Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition delineates the scope and goals of cyber forensics to reveal and track legal and illegal activity. Beginning with an introduction and definition of cyber forensics, chapters explain the rules of evidence and chain of custody in maintaining legally valid electronic evidence. They describe how to begin an investigation and employ investigative methodology, as well as establish standard operating procedures for the field and cyber forensic laboratory. The authors provide an in depth examination of the manipulation of technology to conceal illegal activities and the use of cyber forensics to uncover them. They discuss topics and issues such as conducting a cyber forensic investigation within both the local and federal legal framework, and evaluating the current data security and integrity exposure of multifunctional devices. Cyber Forensics includes details and tips on taking control of a suspect computer or PDA and its "operating" environment, mitigating potential exposures and risks to chain of custody, and establishing and following a flowchart for the seizure of electronic evidence. An extensive list of appendices include websites, organizations, pertinent legislation, further readings, best practice recommendations, more information on hardware and software, and a recap of the federal rules of civil procedure.

Information Assurance - Security in the Information Environment (Paperback, 2nd ed. 2006): Andrew Blyth, Gerald L. Kovacich Information Assurance - Security in the Information Environment (Paperback, 2nd ed. 2006)
Andrew Blyth, Gerald L. Kovacich
R4,519 Discovery Miles 45 190 Ships in 18 - 22 working days

This updated edition will help IT managers and assets protection professionals to assure the protection and availability of vital digital information and related information systems assets. It contains major updates and three new chapters. The book uniquely bridges the gap between information security, information systems security and information warfare. It re-examines why organizations need to take information assurance seriously.

Cybersecurity in Humanities and Social Sciences - A Research Methods Approach (Hardcover): H Loiseau Cybersecurity in Humanities and Social Sciences - A Research Methods Approach (Hardcover)
H Loiseau
R3,754 Discovery Miles 37 540 Ships in 9 - 17 working days

The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology, law, information science, security studies, surveillance studies, strategic studies, polemology. There is, however, no actual cybersecurity studies. After two decades of scientific production on this subject, we thought it essential to take stock of the research methods that could be mobilized, imagined and invented by the researchers. The research methodology on the subject "cybersecurity" has, paradoxically, been the subject of relatively few publications to date. This dimension is essential. It is the initial phase by which any researcher, seasoned or young doctoral student, must pass, to define his subject of study, delimit the contours, ask the research questions, and choose the methods of treatment. It is this methodological dimension that our book proposes to treat. The questions the authors were asked to answer were: how can cybersecurity be defined? What disciplines in the humanities and social sciences are studying, and how, cybersecurity? What is the place of pluralism or interdisciplinarity? How are the research topics chosen, the questions defined? How, concretely, to study cybersecurity: tools, methods, theories, organization of research, research fields, data ...? How are discipline-specific theories useful for understanding and studying cybersecurity? Has cybersecurity had an impact on scientific theories?

Entzifferte Geheimnisse - Methoden Und Maximen Der Kryptologie (German, Hardcover, 3rd 3., Uberarb. U. Erw. Aufl. 2000 ed.):... Entzifferte Geheimnisse - Methoden Und Maximen Der Kryptologie (German, Hardcover, 3rd 3., Uberarb. U. Erw. Aufl. 2000 ed.)
Friedrich L. Bauer
R1,599 Discovery Miles 15 990 Ships in 10 - 15 working days

Die Kryptologie, eine jahrtausendealte "Geheimwissenschaft," gewinnt zusehends praktische Bedeutung fur den Schutz von Kommunikationswegen, Datenbanken und Software. Neben ihre Nutzung in rechnergestutzten offentlichen Nachrichtensystemen ("public keys") treten mehr und mehr rechnerinterne Anwendungen, wie Zugriffsberechtigungen und der Quellenschutz von Software. - Der erste Teil des Buches behandelt die Geheimschriften und ihren Gebrauch - die Kryptographie. Dabei wird auch auf das aktuelle Thema "Kryptographie und Grundrechte des Burgers" eingegangen. Im zweiten Teil wird das Vorgehen zum unbefugten Entziffern einer Geheimschrift - die Kryptanalyse - besprochen, wobei insbesondere Hinweise zur Beurteilung der Verfahrenssicherheit gegeben werden. Mit der vorliegenden dritten Auflage wurde das Werk auf den neuesten Stand gebracht. - Das Buch setzt nur mathematische Grundkenntnisse voraus. Mit einer Fulle spannender, lustiger und bisweilen anzuglicher Geschichten aus der historischen Kryptologie gewurzt, ist es auch fur Laien reizvoll zu lesen."

Improving your C# Skills - Solve modern challenges with functional programming and test-driven techniques of C# (Paperback):... Improving your C# Skills - Solve modern challenges with functional programming and test-driven techniques of C# (Paperback)
Ovais Mehboob Ahmed Khan, John Callaway, Clayton Hunt, Rod Stephens
R1,201 Discovery Miles 12 010 Ships in 9 - 17 working days

Conquer complex and interesting programming challenges by building robust and concurrent applications with caches, cryptography, and parallel programming. Key Features Understand how to use .NET frameworks like the Task Parallel Library (TPL)and CryptoAPI Develop a containerized application based on microservices architecture Gain insights into memory management techniques in .NET Core Book DescriptionThis Learning Path shows you how to create high performing applications and solve programming challenges using a wide range of C# features. You'll begin by learning how to identify the bottlenecks in writing programs, highlight common performance pitfalls, and apply strategies to detect and resolve these issues early. You'll also study the importance of micro-services architecture for building fast applications and implementing resiliency and security in .NET Core. Then, you'll study the importance of defining and testing boundaries, abstracting away third-party code, and working with different types of test double, such as spies, mocks, and fakes. In addition to describing programming trade-offs, this Learning Path will also help you build a useful toolkit of techniques, including value caching, statistical analysis, and geometric algorithms. This Learning Path includes content from the following Packt products: C# 7 and .NET Core 2.0 High Performance by Ovais Mehboob Ahmed Khan Practical Test-Driven Development using C# 7 by John Callaway, Clayton Hunt The Modern C# Challenge by Rod Stephens What you will learn Measure application performance using BenchmarkDotNet Leverage the Task Parallel Library (TPL) and Parallel Language Integrated Query (PLINQ)library to perform asynchronous operations Modify a legacy application to make it testable Use LINQ and PLINQ to search directories for files matching patterns Find areas of polygons using geometric operations Randomize arrays and lists with extension methods Use cryptographic techniques to encrypt and decrypt strings and files Who this book is forIf you want to improve the speed of your code and optimize the performance of your applications, or are simply looking for a practical resource on test driven development, this is the ideal Learning Path for you. Some familiarity with C# and .NET will be beneficial.

Advances in Cryptology - EUROCRYPT 2004 - International Conference on the Theory and Applications of Cryptographic Techniques,... Advances in Cryptology - EUROCRYPT 2004 - International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings (Paperback, 2004 ed.)
Christian Cachin, Jan Camenisch
R2,926 Discovery Miles 29 260 Ships in 18 - 22 working days

These are the proceedings of Eurocrypt 2004, the 23rd Annual Eurocrypt C- ference. The conference was organized by members of the IBM Zurich Research Laboratory in cooperation with IACR, the International Association for Cr- tologic Research. Theconferencereceivedarecordnumberof206submissions,outofwhichthe program committee selected 36 for presentation at the conference (three papers were withdrawn by the authors shortly after submission). These proceedings contain revised versions of the accepted papers. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers. The conference program also featured two invited talks. The ?rst one was the 2004 IACR Distinguished Lecture given by Whit?eld Di?e. The second invited talk was by Ivan Damg? ard who presented "Paradigms for Multiparty Computation. " The traditional rump session with short informal talks on recent results was chaired by Arjen Lenstra. The reviewing process was a challenging task, and many good submissions had to be rejected. Each paper was reviewed independently by at least three members of the program committee, and papers co-authored by a member of the program committee were reviewed by at least six (other) members. The individual reviewing phase was followed by profound and sometimes lively d- cussions about the papers, which contributed a lot to the quality of the ?nal selection. Extensive comments were sent to the authors in most cases.

Internet-Security Aus Software-Sicht - Ein Leitfaden Zur Software-Erstellung Fur Sicherheitskritische Bereiche (German,... Internet-Security Aus Software-Sicht - Ein Leitfaden Zur Software-Erstellung Fur Sicherheitskritische Bereiche (German, Hardcover, 2008 ed.)
Walter Kriha, Roland Schmitz
R842 Discovery Miles 8 420 Ships in 18 - 22 working days

Die Praxis zeigt, dass bei der Entwicklung groAer, komplexer Softwaresysteme Sicherheitsaspekte oft gar nicht oder erst sehr spAt berA1/4cksichtigt werden. IT-Security-Spezialisten werden in die Entwicklung neuer Systeme oft nicht eingebunden, und Softwareentwicklern fehlt hAufig das Bewusstsein fA1/4r Sicherheitsprobleme und die nAtigen Detailkenntnisse, vorhandene LAsungen richtig einzusetzen. Hier setzt das Buch an und schlAgt eine BrA1/4cke von der Softwaresicht zu mehr netzwerkorientierten Aspekten der Internet-Security. Ziel der Autoren ist es, bei Entwicklern und Projektleitern ein grundlegendes Sicherheitsbewusstsein zu schaffen und ihnen einen Leitfaden fA1/4r den Bau sicherer verteilter Systeme an die Hand zu geben. Sicherheitsprobleme werden anhand konkreter Beispiele diskutiert und passende LAsungen aufgezeigt.

Digital Identity (Paperback): Phil Windley Digital Identity (Paperback)
Phil Windley
R780 R684 Discovery Miles 6 840 Save R96 (12%) Ships in 18 - 22 working days

The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce.

Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. "Digital Identity" explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers.

Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for [email protected] and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view ofthe concepts, issues, and technologies behind identity management architecture.

How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.

Mapping Hacks (Paperback): Schuyler Erle Mapping Hacks (Paperback)
Schuyler Erle; Contributions by Rich Gibson, Jo Walsh
R746 R675 Discovery Miles 6 750 Save R71 (10%) Ships in 18 - 22 working days

Since the dawn of creation, man has designed maps to help identify the space that we occupy. From Lewis and Clark's pencil-sketched maps of mountain trails to Jacques Cousteau's sophisticated charts of the ocean floor, creating maps of the utmost precision has been a constant pursuit. So why should things change now?

Well, they shouldn't. The reality is that map creation, or "cartography," has only improved in its ease-of-use over time. In fact, with the recent explosion of inexpensive computing and the growing availability of public mapping data, mapmaking today extends all the way to the ordinary PC user.

"Mapping Hacks," the latest page-turner from O'Reilly Press, tackles this notion head on. It's a collection of one hundred simple--and mostly free--techniques available to developers and power users who want draw digital maps or otherwise visualize geographic data. Authors Schuyler Erle, Rich Gibson, and Jo Walsh do more than just illuminate the basic concepts of location and cartography, they walk you through the process one step at a time.

"Mapping Hacks" shows you where to find the best sources of geographic data, and then how to integrate that data into your own map. But that's just an appetizer. This comprehensive resource also shows you how to interpret and manipulate unwieldy cartography data, as well as how to incorporate personal photo galleries into your maps. It even provides practical uses for GPS (Global Positioning System) devices--those touch-of-a-button street maps integrated into cars and mobile phones. Just imagine: If Captain Kidd had this technology, we'd all know where to find his buried treasure!

With all of these industrial-strength tips andtools, "Mapping Hacks" effectively takes the sting out of the digital mapmaking and navigational process. Now you can create your own maps for business, pleasure, or entertainment--without ever having to sharpen a single pencil.

Linux Server Security (Paperback, 2nd Revised edition): Michael Bauer Linux Server Security (Paperback, 2nd Revised edition)
Michael Bauer
R1,044 R898 Discovery Miles 8 980 Save R146 (14%) Ships in 18 - 22 working days

Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well.

This highly regarded book, originally titled "Building Secure Servers with Linux," combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--as a hub offering services to an organization or the Internet--and shows readers how to harden their hosts against attacks. An all-inclusive resource for Linux users who wish to harden their systems, "Linux Server Security" covers general security such as intrusion detection and firewalling a hub, as well as key services such as DNS, the Apache Web server, mail, and secure shell.

Author Michael D. Bauer, a security consultant, network architect, and lead author of the popular Paranoid Penguin column in the "Linux Journal," carefully outlines the security risks, defines precautions that can minimize those risks, and offers recipes for robust security. He is joined on several chapters by administrator and developer Bill Lubanovic.

A number of new security topics have been added for this edition, including:

Database security, with a focus on MySQL

Using OpenLDAP for authentication

An introduction to email encryption

The Cyrus IMAP service, a popular mail delivery agent

The vsftpd FTP server

Geared toward Linux users with little security expertise, the author explainssecurity concepts and techniques in clear language, beginning with the fundamentals. "Linux Server Security" with Linux provides a unique balance of "big picture" principles that transcend specific software packages and version numbers, and very clear procedures on securing some of those software packages on several popular distributions. With this book in hand, you'll have both the expertise and the tools to comprehensively secure your Linux system.

Smart Home Hacks (Paperback): Gordon Meyer Smart Home Hacks (Paperback)
Gordon Meyer
R703 R632 Discovery Miles 6 320 Save R71 (10%) Ships in 18 - 22 working days

So much of what is commonplace today was once considered impossible, or at least wishful thinking. Laser beams in the operating room, cars with built-in guidance systems, cell phones with email access. There's just no getting around the fact that technology always has, and always will be, very cool.

But technology isn't only cool; it's also very smart. That's why one of the hottest technological trends nowadays is the creation of smart homes.

At an increasing rate, people are turning their homes into state-of-the-art machines, complete with more switches, sensors, and actuators than you can shake a stick at. Whether you want to equip your home with motion detectors for added security, install computer-controlled lights for optimum convenience, or even mount an in-home web cam or two purely for entertainment, the world is now your oyster. Ah, but like anything highly technical, creating a smart home is typically easier said than done.

Thankfully, "Smart Home Hacks" takes the guesswork out of the process. Through a seemingly unending array of valuable tips, tools, and techniques, "Smart Home Hacks" explains in clear detail how to use Mac, Windows, or Linux to achieve the automated home of your dreams. In no time, you'll learn how to turn a loose collection of sensors and switches into a well-automated and well-functioning home no matter what your technical level may be.

"Smart Home Hacks" covers a litany of stand-alone and integrated smart home solutions designed to enhance safety, comfort, and convenience in new and existing homes. Kitchens, bedrooms, home offices, living rooms, and even bathrooms are all candidates for smart automation and therefore are all addressed in"Smart Home Hacks,"

Intelligently written by engineering guru and George Jetson wannabe, Gordon Meyer, "Smart Home Hacks" leaves no stone unturned. From what to purchase to how to use your remote control, it's the ultimate guide to understanding and implementing complete or partial home automation.

Security Warrior (Paperback): Cyrus Peikari Security Warrior (Paperback)
Cyrus Peikari; Contributions by Anton Chuvakin
R1,048 R902 Discovery Miles 9 020 Save R146 (14%) Ships in 18 - 22 working days

When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.

What's the worst an attacker can do to you? You'd better find out, right? That's what "Security Warrior" teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, "Security Warrior" reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle.

"Security Warrior" places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability.

"Security Warrior" is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.

Practical UNIX and Internet Security (Paperback, 3rd Revised edition): Simson Garfinkel, Gene Spafford, Alan Schwartz Practical UNIX and Internet Security (Paperback, 3rd Revised edition)
Simson Garfinkel, Gene Spafford, Alan Schwartz
R1,363 R1,166 Discovery Miles 11 660 Save R197 (14%) Ships in 18 - 22 working days

This new edition of Practical Unix & Internet Security provides detailed coverage of today's increasingly important security and networking issues. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.

Python Tools For Scientists - An Introduction to Using Anaconda, JupyterLab, and Python's Scientific Libraries... Python Tools For Scientists - An Introduction to Using Anaconda, JupyterLab, and Python's Scientific Libraries (Paperback)
Lee Vaughan
R1,149 R902 Discovery Miles 9 020 Save R247 (21%) Ships in 10 - 15 working days

Doing Science With Python introduces readers to the most popular coding tools for scientific research, such as Anaconda, Spyder, Jupyter Notebooks, and JupyterLab, as well as dozens of important Python libraries for working with data, including NumPy, matplotlib, and pandas. No prior programming experience is required! You'll be guided through setting up a professional coding environment, then get a crash course on programming with Python, and explore the many tools and libraries ideal for working with data, designing visualisations, simulating natural events, and more.

Hardening Cisco Routers (Paperback): Thomas Akin Hardening Cisco Routers (Paperback)
Thomas Akin
R559 R514 Discovery Miles 5 140 Save R45 (8%) Ships in 18 - 22 working days

This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. This is a reference for protecting the protectors, and author Thomas Akin supplies all the tools necessary to turn a potential vulnerability into a strength.

Global Electronic Commerce - A Policy Primer (Paperback, illustrated edition): Catherine Mann, Sue Eckert, Sarah Cleeland Knight Global Electronic Commerce - A Policy Primer (Paperback, illustrated edition)
Catherine Mann, Sue Eckert, Sarah Cleeland Knight
R643 Discovery Miles 6 430 Ships in 18 - 22 working days

Electronic commerce is changing the way that businesses and consumers interact with each other; the products they create, buy, and sell; and the way that they communicate, learn, and become informed. How can policymakers position their countries and themselves to take advantage of this new environment? How should policymaking adjust to a more global, more networked, and more information-rich marketplace where relationships and jurisdictions between the governments, businesses, and citizens of different countries increasingly overlap? How can governments effectively harness rapidly changing technologies and partner with both domestic and foreign private sectors to reap the greatest benefits for their constituents?

This primer answers these questions using both general analysis and specific examples. It addresses in particular the needs of policymakers in emerging markets who must formulate and refine policies that affect e-commerce in areas ranging from telecommunications and finance to international trade and domestic distribution as well as taxation and privacy. Companies considering doing business in these economies also will find that the examples offer insights into the issues that policymakers face, the different policy approaches that they choose, and the market opportunities that result as more and more economies embrace global electronic commerce.

Cyber Security - The complete guide to cyber threats and protection (Paperback, 2nd ed.): David Sutton Cyber Security - The complete guide to cyber threats and protection (Paperback, 2nd ed.)
David Sutton
R887 Discovery Miles 8 870 Ships in 9 - 17 working days
Virtual Private Networks 2e (Paperback, 2nd Revised edition): Charlie Scott Virtual Private Networks 2e (Paperback, 2nd Revised edition)
Charlie Scott
R880 R759 Discovery Miles 7 590 Save R121 (14%) Ships in 18 - 22 working days

This book explains how to plan and build a Virtual Private Network (VPN), a collection of technologies that creates secure connections or "tunnels" over regular Internet lines. It discusses costs, configuration, and how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH). New features in the second edition include SSH and an expanded description of the IPSec standard.

Geometries, Codes and Cryptography (Paperback, 1990 ed.): G. Longo, M. Marchi, A. Sgarro Geometries, Codes and Cryptography (Paperback, 1990 ed.)
G. Longo, M. Marchi, A. Sgarro
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The general problem studied by information theory is the reliable transmission of information through unreliable channels. Channels can be unreliable either because they are disturbed by noise or because unauthorized receivers intercept the information transmitted. In the first case, the theory of error-control codes provides techniques for correcting at least part of the errors caused by noise. In the second case cryptography offers the most suitable methods for coping with the many problems linked with secrecy and authentication. Now, both error-control and cryptography schemes can be studied, to a large extent, by suitable geometric models, belonging to the important field of finite geometries. This book provides an update survey of the state of the art of finite geometries and their applications to channel coding against noise and deliberate tampering. The book is divided into two sections, "Geometries and Codes" and "Geometries and Cryptography." The first part covers such topics as Galois geometries, Steiner systems, Circle geometry and applications to algebraic coding theory. The second part deals with unconditional secrecy and authentication, geometric threshold schemes and applications of finite geometry to cryptography. This volume recommends itself to engineers dealing with communication problems, to mathematicians and to research workers in the fields of algebraic coding theory, cryptography and information theory.

Security Assessment in Vehicular Networks (Paperback, 2013 ed.): Suguo Du, Haojin Zhu Security Assessment in Vehicular Networks (Paperback, 2013 ed.)
Suguo Du, Haojin Zhu
R1,529 Discovery Miles 15 290 Ships in 18 - 22 working days

This book presents several novel approaches to model the interaction between the attacker and the defender and assess the security of Vehicular Ad Hoc Networks (VANETs). The first security assessment approach is based on the attack tree security assessment model, which leverages tree based methods to analyze the risk of the system and identify the possible attacking strategies the adversaries may launch. To further capture the interaction between the attacker and the defender, the authors propose to utilize the attack-defense tree model to express the potential countermeasures which could mitigate the system. By considering rational participants that aim to maximize their payoff function, the brief describes a game-theoretic analysis approach to investigate the possible strategies that the security administrator and the attacker could adopt. A phased attack-defense game allows the reader to model the interactions between the attacker and defender for VANET security assessment. The brief offers a variety of methods for assessing the security of wireless networks. Professionals and researchers working on the defense of VANETs will find this material valuable.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Intelligent Security Systems - How…
L. Reznik Hardcover R2,554 Discovery Miles 25 540
Architectures and Frameworks for…
Nansi Shi Hardcover R6,093 Discovery Miles 60 930
Corporate Cybersecurity - Identifying…
J. Jackson Hardcover R2,573 Discovery Miles 25 730
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R549 R503 Discovery Miles 5 030
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,321 R1,228 Discovery Miles 12 280
Cybersecurity in Smart Homes…
Khatoun Hardcover R3,483 Discovery Miles 34 830
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,170 Discovery Miles 61 700
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Conflicts, Crimes and Regulations in…
SY Laurent Hardcover R3,743 Discovery Miles 37 430
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,170 Discovery Miles 61 700

 

Partners