0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (86)
  • R500+ (1,285)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Security Warrior (Paperback): Cyrus Peikari Security Warrior (Paperback)
Cyrus Peikari; Contributions by Anton Chuvakin
R1,048 R902 Discovery Miles 9 020 Save R146 (14%) Ships in 18 - 22 working days

When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.

What's the worst an attacker can do to you? You'd better find out, right? That's what "Security Warrior" teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, "Security Warrior" reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle.

"Security Warrior" places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability.

"Security Warrior" is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.

Practical UNIX and Internet Security (Paperback, 3rd Revised edition): Simson Garfinkel, Gene Spafford, Alan Schwartz Practical UNIX and Internet Security (Paperback, 3rd Revised edition)
Simson Garfinkel, Gene Spafford, Alan Schwartz
R1,363 R1,166 Discovery Miles 11 660 Save R197 (14%) Ships in 18 - 22 working days

This new edition of Practical Unix & Internet Security provides detailed coverage of today's increasingly important security and networking issues. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.

Hardening Cisco Routers (Paperback): Thomas Akin Hardening Cisco Routers (Paperback)
Thomas Akin
R559 R514 Discovery Miles 5 140 Save R45 (8%) Ships in 18 - 22 working days

This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. This is a reference for protecting the protectors, and author Thomas Akin supplies all the tools necessary to turn a potential vulnerability into a strength.

Global Electronic Commerce - A Policy Primer (Paperback, illustrated edition): Catherine Mann, Sue Eckert, Sarah Cleeland Knight Global Electronic Commerce - A Policy Primer (Paperback, illustrated edition)
Catherine Mann, Sue Eckert, Sarah Cleeland Knight
R643 Discovery Miles 6 430 Ships in 18 - 22 working days

Electronic commerce is changing the way that businesses and consumers interact with each other; the products they create, buy, and sell; and the way that they communicate, learn, and become informed. How can policymakers position their countries and themselves to take advantage of this new environment? How should policymaking adjust to a more global, more networked, and more information-rich marketplace where relationships and jurisdictions between the governments, businesses, and citizens of different countries increasingly overlap? How can governments effectively harness rapidly changing technologies and partner with both domestic and foreign private sectors to reap the greatest benefits for their constituents?

This primer answers these questions using both general analysis and specific examples. It addresses in particular the needs of policymakers in emerging markets who must formulate and refine policies that affect e-commerce in areas ranging from telecommunications and finance to international trade and domestic distribution as well as taxation and privacy. Companies considering doing business in these economies also will find that the examples offer insights into the issues that policymakers face, the different policy approaches that they choose, and the market opportunities that result as more and more economies embrace global electronic commerce.

Virtual Private Networks 2e (Paperback, 2nd Revised edition): Charlie Scott Virtual Private Networks 2e (Paperback, 2nd Revised edition)
Charlie Scott
R880 R759 Discovery Miles 7 590 Save R121 (14%) Ships in 18 - 22 working days

This book explains how to plan and build a Virtual Private Network (VPN), a collection of technologies that creates secure connections or "tunnels" over regular Internet lines. It discusses costs, configuration, and how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH). New features in the second edition include SSH and an expanded description of the IPSec standard.

Geometries, Codes and Cryptography (Paperback, 1990 ed.): G. Longo, M. Marchi, A. Sgarro Geometries, Codes and Cryptography (Paperback, 1990 ed.)
G. Longo, M. Marchi, A. Sgarro
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The general problem studied by information theory is the reliable transmission of information through unreliable channels. Channels can be unreliable either because they are disturbed by noise or because unauthorized receivers intercept the information transmitted. In the first case, the theory of error-control codes provides techniques for correcting at least part of the errors caused by noise. In the second case cryptography offers the most suitable methods for coping with the many problems linked with secrecy and authentication. Now, both error-control and cryptography schemes can be studied, to a large extent, by suitable geometric models, belonging to the important field of finite geometries. This book provides an update survey of the state of the art of finite geometries and their applications to channel coding against noise and deliberate tampering. The book is divided into two sections, "Geometries and Codes" and "Geometries and Cryptography." The first part covers such topics as Galois geometries, Steiner systems, Circle geometry and applications to algebraic coding theory. The second part deals with unconditional secrecy and authentication, geometric threshold schemes and applications of finite geometry to cryptography. This volume recommends itself to engineers dealing with communication problems, to mathematicians and to research workers in the fields of algebraic coding theory, cryptography and information theory.

Designing Bsd Rootkits (Paperback): Joseph Kong Designing Bsd Rootkits (Paperback)
Joseph Kong
R848 Discovery Miles 8 480 Ships in 18 - 22 working days

Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process. Organized as a tutorial, Designing BSD Rootkits will teach you the fundamentals of programming and developing rootkits under the FreeBSD operating system. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD. Kongs liberal use of examples assumes no prior kernel-hacking experience but doesn't water down the information. All code is thoroughly described and analyzed, and each chapter contains at least one real-world application.Included: The fundamentals of FreeBSD kernel module programming Using call hooking to subvert the FreeBSD kernel Directly manipulating the objects the kernel depends upon for its internal record-keeping Patching kernel code resident in main memory; in other words, altering the kernel's logic while it's still running How to defend against the attacks described Hack the FreeBSD kernel for yourself

Hardening Network Security (Paperback, Ed): John Mallery, Jason Zann, Patrick Kelly, Wesley Noonan, Eric Seagren, Paul Love,... Hardening Network Security (Paperback, Ed)
John Mallery, Jason Zann, Patrick Kelly, Wesley Noonan, Eric Seagren, …
R1,170 R1,003 Discovery Miles 10 030 Save R167 (14%) Ships in 18 - 22 working days

Take a proactive approach to enterprise network security by implementing preventive measures against attacks before they occur. Written by a team of IT security specialists, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Whether you're working on a Windows, UNIX, wireless, or mixed network, you'll get complete details on how to systematically harden your network from the ground up, as well as strategies for getting company-wide support for your security plan. With coverage of all major platforms and applications, this book is an essential security tool for on-the-job IT professionals. Features a four-part hardening methodology:

Do This Now!--Checklist of immediate steps to take to lockdown your system from further attack Take It From The Top--Systematic approach to hardening your enterprise from the top down, focusing on network, data, and software access, storage, and communications Once Is Never Enough!--Ongoing monitoring and assessment plan to keep your network secure, including patch management and auditing How to Succeed at Hardening Network Security--Strategies for getting budget approval, management buy-in, and employee cooperation for your security program

John Mallery is a Managing Consultant at BKD, LLP, and a veteran security specialist.

Jason Zann, CISSP, is an Information Security Consultant for DST Systems.

Patrick Kelly, CISSP, CCSE, MCSE, MCP+I, is an Information Assurance Engineer for ComGlobal Systems, Inc.

Paul Love, MS Network Security, CISSP, CISM, CISA, is a Security Manager with a large financial institution.

Wesley Noonan, MCSE, CCNA, CCDA, NNCSS, Security+, is aSenior Network Consultant for Collective Technologies, LLC.

Eric S. Seagren, CISSP, ISSAP, SCNP, CCNA, CNE, MCP+I, MCSE, is an IT architect, designing secure, scalable, and redundant networks.

Rob Kraft is the director of software development for KCX, Inc. Mark O'Neil is the CTO of Vordel and principal author of "Web Services Security."

Series Editor and author Roberta Bragg, CISSP, MCSE: Security, Security+, writes a column for Redmond Magazine and writes the weekly Security Watch newsletter. She is the author of "Hardening Windows Systems" and several other information security books.

Software Forensics (Paperback, Ed): Robert Slade Software Forensics (Paperback, Ed)
Robert Slade
R1,057 R915 Discovery Miles 9 150 Save R142 (13%) Ships in 18 - 22 working days

Software forensics -- analyzing program code to track, identify, and prosecute computer virus perpetrators -- has emerged as one of the most promising and technically challenging aspects of information management and security.


This is a technical tutorial that thoroughly examines the programming tools, investigative and analysis methods, and legal implications of the complex evidence chain. Also included are eye-opening case studies, including the famous Enron case, and sample code from real criminal investigations.


Written by a security consultant whose clients include the Canadian Government, Software Forensics covers:



* Basic concepts

* Hackers, crackers, and phreaks

* Objects of analysis: text strings, source code, machine code

* User interfaces and commands

* Program structures and versions

* Virus families

* Function indicators

* Stylistic analysis

* and much more


There is no better or faster way for programmers, security analysts and consultants, security officers in the enterprise, application developers, lawyers, judges, and anyone else interested in software forensics to get up to speed on forensic programming tools and methods and the nature of cyber evidence.
Security Assessment in Vehicular Networks (Paperback, 2013 ed.): Suguo Du, Haojin Zhu Security Assessment in Vehicular Networks (Paperback, 2013 ed.)
Suguo Du, Haojin Zhu
R1,529 Discovery Miles 15 290 Ships in 18 - 22 working days

This book presents several novel approaches to model the interaction between the attacker and the defender and assess the security of Vehicular Ad Hoc Networks (VANETs). The first security assessment approach is based on the attack tree security assessment model, which leverages tree based methods to analyze the risk of the system and identify the possible attacking strategies the adversaries may launch. To further capture the interaction between the attacker and the defender, the authors propose to utilize the attack-defense tree model to express the potential countermeasures which could mitigate the system. By considering rational participants that aim to maximize their payoff function, the brief describes a game-theoretic analysis approach to investigate the possible strategies that the security administrator and the attacker could adopt. A phased attack-defense game allows the reader to model the interactions between the attacker and defender for VANET security assessment. The brief offers a variety of methods for assessing the security of wireless networks. Professionals and researchers working on the defense of VANETs will find this material valuable.

PDA Security - Incorporating Handhelds into the Enterprise (Paperback, Ed): David Melnick, Asynchrony Solutions, Inc., Mark... PDA Security - Incorporating Handhelds into the Enterprise (Paperback, Ed)
David Melnick, Asynchrony Solutions, Inc., Mark Dinman, Alexander Muratov
R1,057 Discovery Miles 10 570 Ships in 18 - 22 working days

LOCK IN PDA SECURITY:

* Let an IT security expert help you assess the PDA threat to your business

* Learn what you must do to lock out dangers -- password theft, viruses, electronic eavesdropping, mobile code and wireless vulnerabilities, data corruption, device loss and theft, and other risks

* Maximize and protect the value of increasingly capable personal digital assistants to your organization


DOWNSIZE PDA RISKS. SUPERSIZE PDA REWARDS.


PDAs have moved into the workplace. More than 25 million of them will soon be accessing company networks. Are you prepared? If you’re an information technology or business executive, the time is right to size up the unique security risks these small, portable devices pose. This essential primer for those deploying, managing or using PDAs in the workplace will help you understand and address the challenges presented by this emerging set of technologies. Written by respected IT security experts, PDA Security, shows you how to:

* Assess the level of threat posed by PDAs in your organization

* Develop a measured and enforceable policy response to minimize the risk

* Understand the technical issues and defend against the threats PDAs pose to privacy, theft of sensitive information, system corruption, and other issues of network and data misuse

* Analyze secure solutions for all major handhelds -- Palm, PocketPC, and RIM

* Examine a case study on securing Palm for the work environment

* Learn why solutions almost always involve the operating system

* Discover what White-Hat Hacking reveals about vulnerabilities

* Find profitable ways to integrate PDAs into business plans and networks, while downsizing risks

* Get an insider’s preview of the future of handhelds -- the PCs of the early twenty-first century


With a Foreword by Rebecca Bace, internationally renowned intrusion-detection and network-security specialist and former member of the United States Department of Defense National Security Agency (NSA).


For ongoing news and original content on PDA security, related Web sites, and a calendar of related events, visit www.pdasecurity-book.com
Windows(R) XP Professional Security (Paperback): C. Weber, Gary Bahadur Windows(R) XP Professional Security (Paperback)
C. Weber, Gary Bahadur
R1,387 R1,160 Discovery Miles 11 600 Save R227 (16%) Ships in 18 - 22 working days

Get comprehensive coverage of XP Professional security with this definitive and focused resource. Work with firewalls and intrusion detection systems, fully utilize XP’s built-in support tools, manage security remotely, and much more.

IIS Security (Paperback): Marty Jost IIS Security (Paperback)
Marty Jost
R1,406 R1,179 Discovery Miles 11 790 Save R227 (16%) Ships in 18 - 22 working days

Protect your IIS server with help from this authoritative book. Covering all basic security tools that come with IIS -- and explaining their weaknesses -- this complete guide shows you how to utilize encryption, authorization, filtering, and other restrictive techniques to protect against attacks and other security violations.

VPNs: A Beginner's Guide (Paperback): John Mairs VPNs: A Beginner's Guide (Paperback)
John Mairs
R1,202 R1,036 Discovery Miles 10 360 Save R166 (14%) Ships in 18 - 22 working days

Ideal for connecting branch offices and remote workers, Virtual Private Networks (VPNs) provide a cost-effective, secure method for connecting to a network. This book is a step-by-step guide to deploying one of the fastest growing methods for remote access, global connections, and extranet connectivity. From understanding VPN technology to security features of VPN to actual implementations, this book covers it all.

mCommerce Security:  A Beginner's Guide (Paperback): Kapil Raina, Anurag Harsh mCommerce Security: A Beginner's Guide (Paperback)
Kapil Raina, Anurag Harsh
R1,169 R1,003 Discovery Miles 10 030 Save R166 (14%) Ships in 18 - 22 working days

Learn to implement a solid mCommerce security plan--from start to finish

Many businesses today recognize mobile commerce--mCommerce--as a way to increase revenue and offer customers a new level of convenience. Mobile phones and PDAs can now be used for online banking, purchasing tickets, messaging, and much more. For any transaction, security is a top priority--and this becomes increasingly complex when wireless and mobile applications are involved. This practical introductory guide clearly explains different mCommerce applications and their associated security risks. Through case studies, you'll learn best practices for implementing specific security methods in key industries--including banking, retail, entertainment, military, travel, and healthcare. The book also contains 8 pages of blueprints that depict secure end-to-end mCommerce architecture as well as identify key vulnerability points.Explore the latest security topics for both business and consumer mCommerce applications Improve services offered to customers through secure mCommerce applications Get details on various types of mobile applications and understand their security risks--including commerce, payments, information, communications, gaming, and military Discover the differences between mobile versus wired security Address mobile security issues in key industries such as banking and finance, travel, manufacturing, entertainment, public services, and defense Recognize the time- and cost-saving benefits of secured mCommerce applications through comprehensive case studies Preview the security of future mobile applications--such as 3G/4G networks and wearable computers

PKI: Implementing & Managing E-Security (Paperback): Andrew Nash, Derek Brink, William Duane, Celia Joseph PKI: Implementing & Managing E-Security (Paperback)
Andrew Nash, Derek Brink, William Duane, Celia Joseph
R1,391 R1,164 Discovery Miles 11 640 Save R227 (16%) Ships in 18 - 22 working days

Written by the experts at RSA Security, this book will show you how to secure transactions and develop customer trust in e-commerce through the use of PKI technology. Part of the RSA Press Series.

Rethinking Public Key Infrastructures and Digital Certificates - Building in Privacy (Paperback): Stefan Brands Rethinking Public Key Infrastructures and Digital Certificates - Building in Privacy (Paperback)
Stefan Brands
R1,177 Discovery Miles 11 770 Ships in 18 - 22 working days

Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are already widely used for authenticating and encrypting email and software, and eventually will be built into any device or piece of software that must be able to communicate securely. There is a serious problem, however, with this unavoidable trend: unless drastic measures are taken, everyone will be forced to communicate via what will be the most pervasive electronic surveillance tool ever built. There will also be abundant opportunity for misuse of digital certificates by hackers, unscrupulous employees, government agencies, financial institutions, insurance companies, and so on.In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that. Furthermore, different actions by the same person cannot be linked. Certificate holders have control over what information is disclosed, and to whom. Subsets of the proposed cryptographic building blocks can be used in combination, allowing a cookbook approach to the design of public key infrastructures. Potential applications include electronic cash, electronic postage, digital rights management, pseudonyms for online chat rooms, health care information storage, electronic voting, and even electronic gambling.

At Large - The Strange Case of the World's Biggest Internet Invasion (Paperback, New Ed): Charles C Mann, David H. Freedman At Large - The Strange Case of the World's Biggest Internet Invasion (Paperback, New Ed)
Charles C Mann, David H. Freedman
R494 Discovery Miles 4 940 Ships in 18 - 22 working days

Hailed as "a chilling portrait" by The Boston Globe and "a crafty thriller" by Newsweek, this astonishing story of an obsessive hacker promises to change the way you look at the Internet forever.

At Large chronicles the massive manhunt that united hard-nosed FBI agents, computer nerds, and uptight security bureaucrats against an elusive computer outlaw who broke into highly secured computer systems at banks, universities, federal agencies, and top-secret military weapons-research sites. Here is "a real-life tale of cops vs. hackers, by two technology writers with a flair for turning a complicated crime and investigation into a fast-moving edge-of-your-seat story" (Kirkus Reviews, starred). At Large blows the lid off the frightening vulnerability of the global online network, which leaves not only systems, but also individuals, exposed.

Digital Forensics (Paperback): A Arnes Digital Forensics (Paperback)
A Arnes
R1,842 Discovery Miles 18 420 Ships in 9 - 17 working days

The definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critical field Written by faculty members and associates of the world-renowned Norwegian Information Security Laboratory (NisLab) at the Norwegian University of Science and Technology (NTNU), this textbook takes a scientific approach to digital forensics ideally suited for university courses in digital forensics and information security. Each chapter was written by an accomplished expert in his or her field, many of them with extensive experience in law enforcement and industry. The author team comprises experts in digital forensics, cybercrime law, information security and related areas. Digital forensics is a key competency in meeting the growing risks of cybercrime, as well as for criminal investigation generally. Considering the astonishing pace at which new information technology and new ways of exploiting information technology is brought on line, researchers and practitioners regularly face new technical challenges, forcing them to continuously upgrade their investigatory skills. Designed to prepare the next generation to rise to those challenges, the material contained in Digital Forensics has been tested and refined by use in both graduate and undergraduate programs and subjected to formal evaluations for more than ten years. * Encompasses all aspects of the field, including methodological, scientific, technical and legal matters * Based on the latest research, it provides novel insights for students, including an informed look at the future of digital forensics * Includes test questions from actual exam sets, multiple choice questions suitable for online use and numerous visuals, illustrations and case example images * Features real-word examples and scenarios, including court cases and technical problems, as well as a rich library of academic references and references to online media Digital Forensics is an excellent introductory text for programs in computer science and computer engineering and for master degree programs in military and police education. It is also a valuable reference for legal practitioners, police officers, investigators, and forensic practitioners seeking to gain a deeper understanding of digital forensics and cybercrime.

RFID  Security and Privacy - 7th International Workshop, RFIDsec 2011, Amherst,  MA, USA, June 26-28, 2011, Revised Selected... RFID Security and Privacy - 7th International Workshop, RFIDsec 2011, Amherst, MA, USA, June 26-28, 2011, Revised Selected Papers (Paperback, 2012)
Ari Juels, Christof Paar
R1,386 Discovery Miles 13 860 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-worksop proceedings of the 7th International Workshop Radio Frequency Identification: Security and Privacy Issues. RFIDSec 2011, held in Amherst, Massachusetts, USA, in June 2011. The 12 revised full papers presented were carefully reviewed and selected from 21 initial submissions for inclusion in the book. The papers focus on minimalism in cryptography, on-tag cryptography, securing RFID with physics, and protocol-level security in RFID.

Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011, Toulouse, France, August 29 -... Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011, Proceedings (Paperback)
Steven Furnell, Costas Lambrinoudakis, Gunther Pernul
R1,731 Discovery Miles 17 310 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2011, held in Toulouse, France, in August/September 2011 in conjunction with DEXA 2011. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: identity and trust management; security and privacy models for pervasive information systems; reliability and security of content and data; authentication and authorization in digital business; intrusion detection and information filtering; management of privacy and confidentiality; and cryptographic protocols/usability of security.

Attacking Network Protocols (Paperback): James Forshaw Attacking Network Protocols (Paperback)
James Forshaw
R1,272 R977 Discovery Miles 9 770 Save R295 (23%) Ships in 10 - 15 working days

Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft's top bug hunter. This comprehensive guide looks at networking from an attacker's perspective to help you find, exploit, and ultimately protect vulnerabilities.Part I starts with a rundown of networking basics and traffic capture, as it builds a foundation for analyzing a network. Part II moves on to protocol analysis, both static and dynamic; you'll learn about common protocol structures, cryptography, and protocol security, and how to reverse engineer code with IDA Pro, ILSpy, and Javasnoop. Part III focuses on finding and exploiting vulnerabilities, including an overview of common bug classes, fuzzing, debugging, exhaustion attacks, and how to develop custom tools. Forshaw ends with an overview of the best tools for analyzing and exploiting networks. By the book's end, you'll have a deep understanding of how to analyze network communication and where to look for vulnerabilities.You'll learn how to--Capture, manipulate, and spoof packets both passively and on the wire-Reverse engineer code, brute force passwords, and decrypt traffic-Exploit vulnerabilities with denial-of-service attacks, authentication and authorization bypasses, and memory corruptions-Use capture and analysis tools like IDA Pro, Wireshark, and CANAPE-Strengthen your exploits by rerouting network traffic, exploiting compression, and controlling data flowAttacking Network Protocols is a must-have for any penetration tester, bug hunter, or developer looking to exploit and secure network vulnerabilities.

Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008, Proceedings (Paperback, 2008 ed.)
Nigel Smart
R1,485 Discovery Miles 14 850 Ships in 18 - 22 working days

These are the proceedings of Eurocrypt 2008, the 27th Annual IACR Eu- crypt Conference. The conference was sponsored by the International Asso- ation for Cryptologic Research (www.iacr.org), this year in cooperation with Tubitak (www.tubitak.gov.tr). The Eurocrypt 2008 Program Committee (PC) consisted of 28 members whose names are listed on the next page. There were 163 papers submitted to the conference and the PC chose 31 of them. Each paper was assigned to at least three PC members, who either handled it themselves or assigned it to an external referee. After the reviews were submitted, the committee deliberated both online for severalweeks and?nally ina face-to-facemeetingheldinBristol. Papers were refereed anonymously, with PC papers having a minimum of ?ve reviewers. All of our deliberations were aided by theWeb Submission and- viewSoftware written and maintainedby Shai Halevi. In addition to noti?cation of the decision of the committee, authors received reviews; the default for any report given to the committee was that it should be available to the authors as well.

Computers Under Attack - Intruders, Worms and Viruses (Paperback, New): Peter Denning Computers Under Attack - Intruders, Worms and Viruses (Paperback, New)
Peter Denning
R1,021 Discovery Miles 10 210 Ships in 18 - 22 working days

This book is broken down into 6 parts. The first describes the emergence of a worldwide network of computers, here called Worldnet, and the practices that people have engaged in as a result. The second part describes the problem of electronic breakins. The third part deals with the phenomenon of worms. The fourth part deals with viruses. The fifth part of the book gives a glimpse of the worlds in which hackers live. The final part deals with the social context in which people make ethical and moral interpretations and propose new laws.

Post-Quantum Cryptography (Hardcover, 2009 ed.): Daniel J. Bernstein, Johannes Buchmann, Erik Dahmen Post-Quantum Cryptography (Hardcover, 2009 ed.)
Daniel J. Bernstein, Johannes Buchmann, Erik Dahmen
R3,849 Discovery Miles 38 490 Ships in 10 - 15 working days

Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems.

Leading experts have joined forces for the first time to explain the state of the art in quantum computing, hash-based cryptography, code-based cryptography, lattice-based cryptography, and multivariate cryptography. Mathematical foundations and implementation issues are included.

This book is an essential resource for students and researchers who want to contribute to the field of post-quantum cryptography.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Brain Aromatase, Estrogens, and Behavior
Jacques Balthazart, Gregory Ball Hardcover R4,048 Discovery Miles 40 480
Regional Science in Business
Graham Clarke, Moss Madden Hardcover R4,210 Discovery Miles 42 100
2018 Meet-the-Professor Endocrine Case…
Ann Danoff Hardcover R2,261 Discovery Miles 22 610
Practical Authority - Agency and…
Rebecca Neaera Abers, Margaret E. Keck Hardcover R3,843 Discovery Miles 38 430
Introduction To Communication Studies
George Angelopulo, Elizabeth Lubinga Paperback R458 Discovery Miles 4 580
Mathematics For Engineering Students
Ramoshweu Solomon Lebelo, Radley Kebarapetse Mahlobo Paperback R397 Discovery Miles 3 970
Virtual Reality Technologies for Future…
A. Pakstas Hardcover R3,204 Discovery Miles 32 040
Persona 5: Tactica
R264 Discovery Miles 2 640
SQL Antipatterns, Volume 1 - Avoiding…
Bill Karwin Paperback R954 Discovery Miles 9 540
Time and Relational Theory - Temporal…
C.J. Date, Hugh Darwen, … Paperback R1,244 Discovery Miles 12 440

 

Partners