0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (13)
  • R250 - R500 (88)
  • R500+ (1,342)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Authentication in Insecure Environments - Using Visual Cryptography and Non-Transferable Credentials in Practise (Paperback,... Authentication in Insecure Environments - Using Visual Cryptography and Non-Transferable Credentials in Practise (Paperback, 2014 ed.)
Sebastian Pape
R2,395 Discovery Miles 23 950 Ships in 10 - 15 working days

Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. Many users may not be able to determine whether their device is trustworthy, i.e. it might contain malware. One solution is to use visual cryptography for authentication. The author generalizes this concept to human decipherable encryption schemes and establishes a relationship to CAPTCHAS. He proposes a new security model and presents the first visual encryption scheme which makes use of noise to complicate the adversary's task. To prevent service providers from keeping their users under surveillance, anonymous credentials may be used. However, sometimes it is desirable to prevent the users from sharing their credentials. The author compares existing approaches based on non-transferable anonymous credentials and proposes an approach which combines biometrics and smartcards.

Implementing Computational Intelligence Techniques for Security Systems Design (Paperback): Yousif Abdullatif Albastaki, Wasan... Implementing Computational Intelligence Techniques for Security Systems Design (Paperback)
Yousif Abdullatif Albastaki, Wasan Awad
R4,498 Discovery Miles 44 980 Ships in 10 - 15 working days

Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms that take advantage of approaches based on computational intelligence techniques, such as genetic algorithms, genetic programming, and so on, have been proposed to solve these issues. Implementing Computational Intelligence Techniques for Security Systems Design is an essential research book that explores the application of computational intelligence and other advanced techniques in information security, which will contribute to a better understanding of the factors that influence successful security systems design. Featuring a range of topics such as encryption, self-healing systems, and cyber fraud, this book is ideal for security analysts, IT specialists, computer engineers, software developers, technologists, academicians, researchers, practitioners, and students.

Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July... Radio Frequency Identification: Security and Privacy Issues - 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Nitesh Saxena, Ahmad-Reza Sadeghi
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

This book constitutes the refereed post-proceedings of the 10th Workshop on RFID Security and Privacy, RFIDSec 2014, held in Oxford, UK, in 2014. The 9 revised full papers and 4 short papers presented in this volume were carefully reviewed and selected from 27 submissions. The papers deal with topics such as RFID power-efficiency, privacy, authentication and side channels, and key exchange.

Random Curves - Journeys of a Mathematician (Paperback, 2008 ed.): Neal Koblitz Random Curves - Journeys of a Mathematician (Paperback, 2008 ed.)
Neal Koblitz
R2,291 Discovery Miles 22 910 Ships in 10 - 15 working days

Neal Koblitz is a co-inventor of one of the two most popular forms of encryption and digital signature, and his autobiographical memoirs are collected in this volume. Besides his own personal career in mathematics and cryptography, Koblitz details his travels to the Soviet Union, Latin America, Vietnam and elsewhere; political activism; and academic controversies relating to math education, the C. P. Snow "two-culture" problem, and mistreatment of women in academia. These engaging stories fully capture the experiences of a student and later a scientist caught up in the tumultuous events of his generation.

Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014,... Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers (Paperback, 2015 ed.)
Javier Lopez, Indrajit Ray, Bruno Crispo
R2,296 Discovery Miles 22 960 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post- conference proceedings of the Ninth International Conference on Risks and Security of Internet Systems, CRiSIS 2014, held in Trento, Italy, in August 2014. The 13 full papers and 6 short papers presented were selected from 48 submissions. They explore risks and security issues in Internet applications, networks and systems covering topics such as trust, security risks and threats, intrusion detection and prevention, access control and security modeling.

Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromso, Norway, October 15-17, 2014, Proceedings (Paperback, 2014... Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromso, Norway, October 15-17, 2014, Proceedings (Paperback, 2014 ed.)
Karin Bernsmed, Simone Fischer-Hubner
R2,354 Discovery Miles 23 540 Ships in 10 - 15 working days

This book constitutes the proceedings of the 19th Nordic Conference on Secure IT Systems, held in Tromso, Norway, in October 2014. The 15 full papers presented in this volume were carefully reviewed and selected from 42 submissions. They are organized in topical sections named: information management and data privacy; cloud, big data and virtualization security; network security and logging; attacks and defenses; and security in healthcare and biometrics. The volume also contains one full-paper invited talk.

Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage... Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage Control Mechanism (Paperback)
Yuri A Bogachev
R359 R339 Discovery Miles 3 390 Save R20 (6%) Ships in 10 - 15 working days
Accountability and Security in the Cloud - First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6,... Accountability and Security in the Cloud - First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lectures (Paperback, 2015 ed.)
Massimo Felici, Carmen Fernandez-Gago
R2,388 Discovery Miles 23 880 Ships in 10 - 15 working days

The First A4Cloud Summer School has been one of the first events in the area of accountability and security in the cloud. It was organized by the EU-funded A4Cloud project, in collaboration with the European projects CIRRUS, Coco Cloud, CUMULUS, and SPECS. Cloud computing is a key technology that is being adopted progressively by companies and users across different application domains and industries. Yet, there are emerging issues such as security, privacy, and data protection. The 13 contributions included in this volume cover the state of the art and provide research insights into the following topics: accountability in the cloud; privacy and transparency in the cloud; empirical approaches for the cloud; socio-legal aspects of the cloud; cloud standards; and the accountability glossary of terms and definitions.

Theory of Cryptography - 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II... Theory of Cryptography - 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II (Paperback, 2015 ed.)
Yevgeniy Dodis, Jesper Buus Nielsen
R1,646 Discovery Miles 16 460 Ships in 10 - 15 working days

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concurrent and resettable security, non-malleable codes and tampering, privacy amplification, encryption an key exchange, pseudorandom functions and applications, proofs and verifiable computation, differential privacy, functional encryption, obfuscation.

Theory of Cryptography - 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I... Theory of Cryptography - 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I (Paperback, 2015 ed.)
Yevgeniy Dodis, Jesper Buus Nielsen
R1,634 Discovery Miles 16 340 Ships in 10 - 15 working days

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concurrent and resettable security, non-malleable codes and tampering, privacy amplification, encryption an key exchange, pseudorandom functions and applications, proofs and verifiable computation, differential privacy, functional encryption, obfuscation.

Kali Linux - Simple and Effective Approach to Learn Kali Linux (Paperback): Ethan Thorpe Kali Linux - Simple and Effective Approach to Learn Kali Linux (Paperback)
Ethan Thorpe
R535 Discovery Miles 5 350 Ships in 10 - 15 working days
Computer Hacking - The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners (Paperback): Tim Warren Computer Hacking - The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners (Paperback)
Tim Warren
R343 R313 Discovery Miles 3 130 Save R30 (9%) Ships in 10 - 15 working days
QC-LDPC Code-Based Cryptography (Paperback, 2014 ed.): Marco Baldi QC-LDPC Code-Based Cryptography (Paperback, 2014 ed.)
Marco Baldi
R1,860 Discovery Miles 18 600 Ships in 10 - 15 working days

This book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check (QC-LDPC) codes, with a special focus on the use of these codes in public-key cryptosystems derived from the McEliece and Niederreiter schemes. In the first part of the book, the main characteristics of QC-LDPC codes are reviewed, and several techniques for their design are presented, while tools for assessing the error correction performance of these codes are also described. Some families of QC-LDPC codes that are best suited for use in cryptography are also presented. The second part of the book focuses on the McEliece and Niederreiter cryptosystems, both in their original forms and in some subsequent variants. The applicability of QC-LDPC codes in these frameworks is investigated by means of theoretical analyses and numerical tools, in order to assess their benefits and drawbacks in terms of system efficiency and security. Several examples of QC-LDPC code-based public key cryptosystems are presented, and their advantages over classical solutions are highlighted. The possibility of also using QC-LDPC codes in symmetric encryption schemes and digital signature algorithms is also briefly examined.

The Art of Intrusion - The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (Paperback, New ed): KD Mitnick The Art of Intrusion - The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (Paperback, New ed)
KD Mitnick
R372 Discovery Miles 3 720 Ships in 12 - 19 working days

Hacker extraordinaire, Kevin Mitnick delivers the explosive encore to his bestselling "The Art of Deception". Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling "The Art of Deception", Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair raising stories of real life computer break ins and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him and whose exploits Mitnick now reveals in detail for the first time, including: a group of friends who won nearly a million dollars in Las Vegas by reverse engineering slot machines; two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems; two convicts who joined forces to become hackers inside a Texas prison; and, a "Robin Hood" hacker who penetrated the computer systems of many prominent companies and then told them how he gained access. With riveting "you are there" descriptions of real computer break ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience and attract the attention of both law enforcement agencies and the media.

Kali linux - learn now how kali linux works, how hacking with kali linux with this step by step guide for beginners and which... Kali linux - learn now how kali linux works, how hacking with kali linux with this step by step guide for beginners and which tools you need to hack + practical exercises (Paperback)
Adam Harris
R481 Discovery Miles 4 810 Ships in 10 - 15 working days
Deaver on Cybersecurity - An irreverent and honest expose of the online security problem, complete with a candid and thorough... Deaver on Cybersecurity - An irreverent and honest expose of the online security problem, complete with a candid and thorough reveal of its solution (Paperback)
Frederic Scott Deaver
R2,520 R2,053 Discovery Miles 20 530 Save R467 (19%) Ships in 10 - 15 working days
The I-Coin Explained - The World's First Crypto Mined by Individuals Based on the Quality of Their Emotions (Paperback):... The I-Coin Explained - The World's First Crypto Mined by Individuals Based on the Quality of Their Emotions (Paperback)
Maxime Drouin
R787 Discovery Miles 7 870 Ships in 10 - 15 working days
Information Hiding in Communication Networks - Fundamentals, Mechanisms, Applications, and Countermeasures (Hardcover): W... Information Hiding in Communication Networks - Fundamentals, Mechanisms, Applications, and Countermeasures (Hardcover)
W Mazurczyk
R2,641 Discovery Miles 26 410 Ships in 10 - 15 working days

Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications. * Highlights development trends and potential future directions of Information Hiding * Introduces a new classification and taxonomy for modern data hiding techniques * Presents different types of network steganography mechanisms * Introduces several example applications of information hiding in communication networks including some recent covert communication techniques in popular Internet services

Cryptocurrencies and Blockchain Technology - Cryptocurrencies and Blockchain: 4 Books in 1 (Paperback): Keizer Soeze Cryptocurrencies and Blockchain Technology - Cryptocurrencies and Blockchain: 4 Books in 1 (Paperback)
Keizer Soeze
R1,218 R1,024 Discovery Miles 10 240 Save R194 (16%) Ships in 10 - 15 working days
Bitcoin - Invest In Digital Gold (Paperback): Szabolcs Juhasz Bitcoin - Invest In Digital Gold (Paperback)
Szabolcs Juhasz
R626 R564 Discovery Miles 5 640 Save R62 (10%) Ships in 10 - 15 working days
SIP Security (Hardcover): D Sisalem SIP Security (Hardcover)
D Sisalem
R2,645 Discovery Miles 26 450 Ships in 12 - 19 working days

This book gives a detailed overview of SIP specific security issues and how to solve them

While the standards and products for VoIP and SIP services have reached market maturity, security and regulatory aspects of such services are still being discussed. SIP itself specifies only a basic set of security mechanisms that cover a subset of possible security issues. In this book, the authors survey important aspects of securing SIP-based services. This encompasses a description of the problems themselves and the standards-based solutions for such problems. Where a standards-based solution has not been defined, the alternatives are discussed and the benefits and constraints of the different solutions are highlighted.

"Key Features" Will help the readers to understand the actual problems of using and developing VoIP services, and to distinguish between real problems and the general hype of VoIP securityDiscusses key aspects of SIP security including authentication, integrity, confidentiality, non-repudiation and signallingAssesses the real security issues facing users of SIP, and details the latest theoretical and practical solutions to SIP Security issuesCovers secure SIP access, inter-provider secure communication, media security, security of the IMS infrastructures as well as VoIP services vulnerabilities and countermeasures against Denial-of-Service attacks and VoIP spam

This book will be of interest to IT staff involved in deploying and developing VoIP, service users of SIP, network engineers, designers and managers. Advanced undergraduate and graduate students studying data/voice/multimedia communications as well as researchers in academia and industry will also find this book valuable.

Information Security: Theory and Practice (Hardcover): Conner Casini Information Security: Theory and Practice (Hardcover)
Conner Casini
R3,438 R3,109 Discovery Miles 31 090 Save R329 (10%) Ships in 10 - 15 working days
Data Security and Communication Networks (Hardcover): Malcolm Becker Data Security and Communication Networks (Hardcover)
Malcolm Becker
R3,344 R3,025 Discovery Miles 30 250 Save R319 (10%) Ships in 10 - 15 working days
Data Security and Cryptography (Hardcover): Gina Simpson Data Security and Cryptography (Hardcover)
Gina Simpson
R3,439 R3,110 Discovery Miles 31 100 Save R329 (10%) Ships in 10 - 15 working days
Secure Programming Cookbook for C & C++ (Paperback): John Viega Secure Programming Cookbook for C & C++ (Paperback)
John Viega; Contributions by Matt Messier
R1,827 R1,462 Discovery Miles 14 620 Save R365 (20%) Ships in 9 - 17 working days

Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix® (including Linux®) and Windows® environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Information Security and Ethics - Social…
Marian Quigley Hardcover R2,316 Discovery Miles 23 160
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,692 Discovery Miles 66 920
Alice and Bob Learn Application Security
T Janca Paperback R1,084 R924 Discovery Miles 9 240
TLS Mastery
Michael W Lucas Hardcover R970 R875 Discovery Miles 8 750
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,573 Discovery Miles 35 730
Implementing the ISO/IEC 27001…
Edward Humphreys Hardcover R2,400 Discovery Miles 24 000
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R539 Discovery Miles 5 390
Cryptographic Solutions for Secure…
Kannan Balasubramanian, K. Mala, … Hardcover R5,505 Discovery Miles 55 050
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R834 Discovery Miles 8 340
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,692 Discovery Miles 66 920

 

Partners