0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (87)
  • R500+ (1,269)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Digital Forensics and Watermarking - 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018,... Digital Forensics and Watermarking - 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings (Paperback, 1st ed. 2019)
Chang D. Yoo, Yun Qing Shi, Hyoung Joong Kim, Alessandro Piva, Gwangsu Kim
R1,437 Discovery Miles 14 370 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018, held on Jeju Island, Korea, in October 2018.The 25 papers presented in this volume were carefully reviewed and selected from 43 submissions. The contributions are covering the following topics: deep neural networks for digital forensics; steganalysis and identification; watermarking; reversible data hiding; steganographic algorithms; identification and security; deep generative models for forgery and its detection.

Super Secreto - The Third Epoch of Cryptography - Multiple, exponential, quantum-secure and above all, simple and practical... Super Secreto - The Third Epoch of Cryptography - Multiple, exponential, quantum-secure and above all, simple and practical Encryption for Everyone (Paperback)
Theo Tenzer
R853 Discovery Miles 8 530 Ships in 18 - 22 working days
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and... Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I (Paperback, 1st ed. 2017)
Tsuyoshi Takagi, Thomas Peyrin
R3,252 Discovery Miles 32 520 Ships in 18 - 22 working days

The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.

Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and... Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Tsuyoshi Takagi, Thomas Peyrin
R1,523 Discovery Miles 15 230 Ships in 18 - 22 working days

The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.

Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings... Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings (Paperback, 1st ed. 2017)
Tanja Lange, Tsuyoshi Takagi
R2,523 Discovery Miles 25 230 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017, held in Utrecht, The Netherlands, in June 2017. The 23 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on code-based cryptography, isogeny-based cryptography, lattice-based cryptography, multivariate cryptography, quantum algorithms, and security models.

Obfuscation - A User's Guide for Privacy and Protest (Paperback): Finn Brunton, Helen Nissenbaum Obfuscation - A User's Guide for Privacy and Protest (Paperback)
Finn Brunton, Helen Nissenbaum
R351 R325 Discovery Miles 3 250 Save R26 (7%) Ships in 18 - 22 working days

How we can evade, protest, and sabotage today's pervasive digital surveillance by deploying more data, not less-and why we should. With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today's pervasive digital surveillance-the collection of our data by governments, corporations, advertisers, and hackers. To the toolkit of privacy protecting techniques and projects, they propose adding obfuscation: the deliberate use of ambiguous, confusing, or misleading information to interfere with surveillance and data collection projects. Brunton and Nissenbaum provide tools and a rationale for evasion, noncompliance, refusal, even sabotage-especially for average users, those of us not in a position to opt out or exert control over data about ourselves. Obfuscation will teach users to push back, software developers to keep their user data safe, and policy makers to gather data without misusing it. Brunton and Nissenbaum present a guide to the forms and formats that obfuscation has taken and explain how to craft its implementation to suit the goal and the adversary. They describe a series of historical and contemporary examples, including radar chaff deployed by World War II pilots, Twitter bots that hobbled the social media strategy of popular protest movements, and software that can camouflage users' search queries and stymie online advertising. They go on to consider obfuscation in more general terms, discussing why obfuscation is necessary, whether it is justified, how it works, and how it can be integrated with other privacy practices and technologies.

Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency... Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency + 10 Best Defi Projects and Strategies to Maximize Your Profits (Paperback)
Harper Fraley
R613 R548 Discovery Miles 5 480 Save R65 (11%) Ships in 18 - 22 working days
Topics in Cryptology - CT-RSA 2017 - The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA,... Topics in Cryptology - CT-RSA 2017 - The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings (Paperback, 1st ed. 2017)
Helena Handschuh
R2,597 Discovery Miles 25 970 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2017, CT-RSA 2017, held in San Francisco, CA, USA, in February 2017. The 25 papers presented in this volume were carefully reviewed and selected from 77 submissions. CT-RSA has become a major publication venue in cryptography. It covers a wide variety of topics from public-key to symmetric key cryptography and from cryptographic protocols to primitives and their implementation security. This year selected topics such as cryptocurrencies and white-box cryptography were added to the call for papers.

Il Futuro Dell'information & Communication Technology - Tecnologie, Timori E Scenari Futuri Della Global Network... Il Futuro Dell'information & Communication Technology - Tecnologie, Timori E Scenari Futuri Della Global Network Revolution (Italian, Paperback, 2009 ed.)
Antonio Teti
R578 Discovery Miles 5 780 Ships in 18 - 22 working days

Negli ultimi decenni il rapido sviluppo delle tecnologie IT ha influito in maniera determinante nella vita dell uomo, trasformando, spesso inconsapevolmente il suo lavoro, le sue abitudini, il suo modo di interagire con il mondo che lo circonda. Il fenomeno della "globalizzazione" dei mercati e solo una delle trasformazioni che l intero pianeta sta attraversando. Anche se i vantaggi derivanti dall utilizzo delle moderne tecnologie di comunicazione ci facilitano nel lavoro e nella attivita ludiche e personali, molte sono le perplessita e i dubbi che attanagliano tutti coloro che le utilizzano. Se l Information Technology rappresenta il "combustibile" indispensabile per la sopravvivenza delle aziende e delle attivita dell uomo, nel contempo puo generare problematicita di grande rilievo. Il testo tratta alcune delle problematiche che destano preoccupazioni rilevanti nel mondo intero come il consumo energetico dei sistemi informatici (incontrollabili e inquinanti), il problema della garanzia della privacy e dell integrita dei dati su Internet, l utilizzo della rete Internet come strumento di controllo delle masse, la possibile sparizione degli attuali sistemi operativi che potranno essere sostituiti dal sistema operativo Web Operating System.

Progress in Cryptology - LATINCRYPT 2014 - Third International Conference on Cryptology and Information Security in Latin... Progress in Cryptology - LATINCRYPT 2014 - Third International Conference on Cryptology and Information Security in Latin America Florianopolis, Brazil, September 17-19, 2014 Revised Selected Papers (Paperback, 2015 ed.)
Diego F. Aranha, Alfred Menezes
R2,417 Discovery Miles 24 170 Ships in 18 - 22 working days

This book constitutes the proceedings of the 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, held in Florianopolis, Brazil, in September 2014. The 19 papers presented together with four invited talks were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on cryptographic engineering, side-channel attacks and countermeasures, privacy, crypto analysis and cryptographic protocols.

Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014,... Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers (Paperback, 2015 ed.)
Dongdai Lin, Moti Yung, Jianying Zhou
R2,851 Discovery Miles 28 510 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on privacy and anonymity, multiparty and outsource computation, signature and security protocols, lattice and public key cryptography, block cipher and hash function, authentication and encryption, elliptic curve, and cryptographic primitive and application.

Information Security and Cryptology - ICISC 2014 - 17th International Conference, Seoul, South Korea, December 3-5, 2014,... Information Security and Cryptology - ICISC 2014 - 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers (Paperback, 2015 ed.)
Joo Young Lee, Jongsung Kim
R2,587 Discovery Miles 25 870 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Korea in December 2014. The 27 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on RSA security, digital signature, public key cryptography, block ciphers, network security, mobile security, hash functions, information hiding and efficiency, cryptographic protocol, and side-channel attacks.

Advances in Audio Watermarking Based on Singular Value Decomposition (Paperback, 2015 ed.): Pranab Kumar Dhar, Tetsuya Shimamura Advances in Audio Watermarking Based on Singular Value Decomposition (Paperback, 2015 ed.)
Pranab Kumar Dhar, Tetsuya Shimamura
R1,586 Discovery Miles 15 860 Ships in 18 - 22 working days

This book introduces audio watermarking methods for copyright protection, which has drawn extensive attention for securing digital data from unauthorized copying. The book is divided into two parts. First, an audio watermarking method in discrete wavelet transform (DWT) and discrete cosine transform (DCT) domains using singular value decomposition (SVD) and quantization is introduced. This method is robust against various attacks and provides good imperceptible watermarked sounds. Then, an audio watermarking method in fast Fourier transform (FFT) domain using SVD and Cartesian-polar transformation (CPT) is presented. This method has high imperceptibility and high data payload and it provides good robustness against various attacks. These techniques allow media owners to protect copyright and to show authenticity and ownership of their material in a variety of applications. * Features new methods of audio watermarking for copyright protection and ownership protection * Outlines techniques that provide superior performance in terms of imperceptibility, robustness, and data payload * Includes applications such as data authentication, data indexing, broadcast monitoring, fingerprinting, etc.

Hacker Contest - Sicherheitsprobleme, Loesungen, Beispiele (German, Paperback, Softcover Reprint of the Original 1st 2003 ed.):... Hacker Contest - Sicherheitsprobleme, Loesungen, Beispiele (German, Paperback, Softcover Reprint of the Original 1st 2003 ed.)
Markus Schumacher, Utz Roedig, Marie-Luise Moschgath
R1,066 Discovery Miles 10 660 Ships in 18 - 22 working days

Know-how zur Abwehr von Hacker-Angriffen
Mehr Sicherheit fur Netze, Systeme und Anwendungen
Praxis-Leitfaden mit konzeptionellem Ansatz
Anschaulich durch zeitlose Beispiele

Ein Wettbewerb der Hacker? Wer knackt am schnellsten das Sicherheitssystem?
Die andere Seite - die Sicherheitsexperten - mussen in der Lage sein, Rechnernetze, Systeme und Anwendungen aus der Sicht eines Angreifers zu verstehen, um Sicherheitslucken erkennen und effizient schliessen zu konnen. Dabei unterstutzt sie das Buch.
Das Thema Sicherheit wird hier pragmatisch betrachtet. Die Sicherheit einer Komponente hangt meist direkt von einer oder mehreren anderen Komponenten ab, wobei diese Abhangigkeiten komplex und schwer erfassbar sind.
Auf Basis der Erfahrungen, die im Rahmen des "Hacker Contest" gesammelt wurden, vermittelt das Buch praxisnah die Grundsatze des Hackens bzw. Crackens und prinzipieller Angriffskonzepte.
Die Autoren sind kontiunierlich an der Konzeption und Durchfuhrung des Hacker Contest beteiligt. Sie haben bereits im Informatik-Spektrum einen Artikel zum Thema veroffentlich, der auf grosse Resonanz stiess."

Professional Pen Testing for Web Applications (Paperback): A. Andreu Professional Pen Testing for Web Applications (Paperback)
A. Andreu
R1,291 R1,094 Discovery Miles 10 940 Save R197 (15%) Ships in 18 - 22 working days

There is no such thing as "perfect security" when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing creates a balance that allows a system to be secure while simultaneously being fully functional. With this book, you'll learn how to become an effective penetrator (i.e., a white hat or ethical hacker) in order to circumvent the security features of a Web application so that those features can be accurately evaluated and adequate security precautions can be put in place.
After a review of the basics of web applications, you'll be introduced to web application hacking concepts and techniques such as vulnerability analysis, attack simulation, results analysis, manuals, source code, and circuit diagrams. These web application hacking concepts and techniques will prove useful information for ultimately securing the resources that need your protection.
What you will learn from this book
* Surveillance techniques that an attacker uses when targeting a system for a strike
* Various types of issues that exist within the modern day web application space
* How to audit web services in order to assess areas of risk and exposure
* How to analyze your results and translate them into documentation that is useful for remediation
* Techniques for pen-testing trials to practice before a live project
Who this book is for
This book is for programmers, developers, and information security professionals who want to become familiar with web application security and how to audit it.
Wrox Professional guides are planned and written by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job.

Cryptographic Security Architecture - Design and Verification (Paperback, Softcover reprint of the original 1st ed. 2004):... Cryptographic Security Architecture - Design and Verification (Paperback, Softcover reprint of the original 1st ed. 2004)
Peter Gutmann
R2,689 Discovery Miles 26 890 Ships in 18 - 22 working days

A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar cryptovariables. It is the foundation for enforcing computer security policies and controls and preempting system misuse.

This book provides a comprehensive design for a portable, flexible high-security cryptographic architecture, with particular emphasis on incorporating rigorous security models and practices. "Cryptographic Security Architecture" unveils an alternative means of building a trustworthy system based on concepts from established software engineering principles and cognitive psychology. Its novel security-kernel design implements a reference monitor that controls access to security-relevant objects and attributes based on a configurable security policy.

Topics and features:

* Builds a concise architectural design that can be easily extended in the future

* Develops an application-specific security kernel that enforces a fully customizable, rule-based security policy

* Presents a new verification technique that allows verification from the high-level specification down to the running code

* Describes effective security assurance in random number generation, and the pitfalls associated therewith

* Examines the generation and protection of cryptovariables, as well as application of the architectural design to cryptographic hardware

The work provides an in-depth presentation of a flexible, platform-independent cryptographic security architecture suited to software, hardware, and hybrid implementations. Security design practitioners, professionals, researchers, and advanced students will find the work an essential resource.

Data Warehouse Management - Das St. Galler Konzept Zur Ganzheitlichen Gestaltung Der Informationslogistik (German, Paperback,... Data Warehouse Management - Das St. Galler Konzept Zur Ganzheitlichen Gestaltung Der Informationslogistik (German, Paperback, Softcover Reprint of the Original 1st 2003 ed.)
Eitel Maur, Robert Winter
R1,533 Discovery Miles 15 330 Ships in 18 - 22 working days

Die Herausforderungen des Data Warehousing liegen langst jenseits von Grundkonzeption und Architektur, die weitestgehend gefestigt sind. Ein ganzheitliches proaktives Datenqualitatsmanagement und integriertes Metadatenmanagement sind fur ein effektives Data-Warehouse-System heute ebenso elementare Voraussetzung wie Datenschutz und Datensicherheit, die im Data-Warehouse-Umfeld neue Bedeutung erlangt haben. Zahlreiche Uberschneidungen und daher Synergiepotenziale bestehen mit Customer Relationship Management, Enterprise Application Integration und Knowledge Management.

Die Autoren zeigen zu diesem Zweck fundierte Konzepte und praktikable Losungen auf, die speziell im zweiten Teil anhand realer Umsetzungen mit bedeutenden europaischen Unternehmen (UBS, Credit Suisse, Swiss Re u. a.) verdeutlicht werden. "

Prime Numbers and Computer Methods for Factorization (Paperback, 2nd ed. 2012): Hans Riesel Prime Numbers and Computer Methods for Factorization (Paperback, 2nd ed. 2012)
Hans Riesel
R2,251 Discovery Miles 22 510 Ships in 18 - 22 working days

From the original hard cover edition:

In the modern age of almost universal computer usage, practically every individual in a technologically developed society has routine access to the most up-to-date cryptographic technology that exists, the so-called RSA public-key cryptosystem. A major component of this system is the factorization of large numbers into their primes. Thus an ancient number-theory concept now plays a crucial role in communication among millions of people who may have little or no knowledge of even elementary mathematics.

Hans Riesel's highly successful first edition of this book has now been enlarged and updated with the goal of satisfying the needs of researchers, students, practitioners of cryptography, and non-scientific readers with a mathematical inclination. It includes important advances in computational prime number theory and in factorization as well as re-computed and enlarged tables, accompanied by new tables reflecting current research by both the author and his coworkers and by independent researchers.

The book treats four fundamental problems: the number of primes below a given limit, the approximate number of primes, the recognition of primes and the factorization of large numbers. The author provides explicit algorithms and computer programs, and has attempted to discuss as many of the classically important results as possible, as well as the most recent discoveries. The programs include are written in PASCAL to allow readers to translate the programs into the language of their own computers.

The independent structure of each chapter of the book makes it highly readable for a wide variety of mathematicians, students of applied number theory, and others interested in both study and research in number theory and cryptography. "

Expdt - Vergleichbarkeit Von Richtlinien Fur Selbstregulierung Und Selbstdatenschutz (German, Paperback, 2010 ed.): Martin... Expdt - Vergleichbarkeit Von Richtlinien Fur Selbstregulierung Und Selbstdatenschutz (German, Paperback, 2010 ed.)
Martin Kahmer
R1,818 Discovery Miles 18 180 Ships in 18 - 22 working days
Kryptografie in Theorie und Praxis - Mathematische Grundlagen fur Internetsicherheit, Mobilfunk und elektronisches Geld... Kryptografie in Theorie und Praxis - Mathematische Grundlagen fur Internetsicherheit, Mobilfunk und elektronisches Geld (German, Paperback, 2. Aufl. 2010)
Albrecht Beutelspacher, Heike B Neumann, Thomas Schwarzpaul
R1,544 Discovery Miles 15 440 Ships in 18 - 22 working days

Kryptografie hat sich in jungster Zeit als eine Wissenschaft gezeigt, bei der mathematische Methoden mit besonderem Erfolg eingesetzt werden konnen. Das Buch stellt die gesamte Kryptografie unter diesem Aspekt vor: Grundlagen und Anwendungen, Verschlusselung und Authentifikation, symmetrische Algorithmen und Public-Key-Verfahren werden entsprechend ihrer Wichtigkeit prasentiert. Das Buch hat den Umfang einer 2-semestrigen Vorlesung, aufgrund seiner klaren Darstellung eignet es sich aber auch hervorragend zum Selbststudium. Zahlreiche Ubungsaufgaben von unterschiedlichem Schwierigkeitsgrad dienen zur Kontrolle des Verstandnisses."

Security Awareness - Applying Practical Security in Your World (Paperback, 5th edition): Mark Ciampa Security Awareness - Applying Practical Security in Your World (Paperback, 5th edition)
Mark Ciampa
R968 Discovery Miles 9 680 Ships in 4 - 6 working days

Designed to provide you with the knowledge needed to protect computers and networks from increasingly sophisticated attacks, SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fifth Edition continues to present the same straightforward, practical information that has made previous editions so popular. For most computer users, practical computer security poses some daunting challenges: What type of attacks will antivirus software prevent? How do I set up a firewall? How can I test my computer to be sure that attackers cannot reach it through the Internet? When and how should I install Windows patches? This text is designed to help you understand the answers to these questions through a series of real-life user experiences. In addition, hands-on projects and case projects give you the opportunity to test your knowledge and apply what you have learned. SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fifth Edition contains up-to-date information on relevant topics such as protecting mobile devices and wireless local area networks.

Kali Linux - Advanced Methods and Strategies to Learn Kali Linux (Paperback): Ethan Thorpe Kali Linux - Advanced Methods and Strategies to Learn Kali Linux (Paperback)
Ethan Thorpe
R496 Discovery Miles 4 960 Ships in 18 - 22 working days
Codici Cifrati - Arne Beurling E LA Crittografia Nella II Guerra Mondiale (Italian, Paperback, 2005 ed.): Bengt Beckman Codici Cifrati - Arne Beurling E LA Crittografia Nella II Guerra Mondiale (Italian, Paperback, 2005 ed.)
Bengt Beckman
R610 Discovery Miles 6 100 Ships in 18 - 22 working days

Durante la II guerra mondiale hanno avuto luogo numerosi risultati di rilievo nel campo della crittografia militare. Uno dei meno conosciuti e quello usato dal servizio di intelligence svedese, nei confronti del codice tedesco per le comunicazioni strategiche con i comandi dei paesi occupati nel nord Europa, le cui linee passavano per la Svezia. In tal modo, durante la fase piu critica della guerra la direzione politica e militare svedese era in grado di seguire i piani e le disposizioni dei Tedeschi, venendo a conoscenza dei piu arditi progetti per modificare la propria politica, tenendo la Svezia fuori dalla guerra.

La violazione del codice tedesco e narrata in dettaglio, per la prima volta, con elementi che gli permettono di essere un ottima introduzione al campo della crittografia, oltre che un ritratto vitale e umano della societa del tempo: una disperata condizione bellica, l'intrigo politico e spionistico, il genio del matematico Arne Beurling, le difficolta e i trucchi del mestiere, e il lavoro sistematico e oscuro di una folla di decrittatori.

Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August... Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings (Paperback, 2006 ed.)
Cynthia Dwork
R1,519 Discovery Miles 15 190 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 26th Annual International Cryptology Conference, CRYPTO 2006, held in Santa Barbara, California, USA in August 2006. The 34 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 250 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications.

Symmetrische Verschlusselungsverfahren (German, Paperback, 2003 ed.): Michael Miller Symmetrische Verschlusselungsverfahren (German, Paperback, 2003 ed.)
Michael Miller
R1,202 Discovery Miles 12 020 Ships in 18 - 22 working days

Enigma und Lucifer-Chiffre: das spannende Lehrbuch zur Kryptographie mit Online-Service.
Es wird detailliert beschrieben, was bei der Entwicklung eines symmetrischen Kryptosystems - das den heutigen Anforderungen entspricht - zu berucksichtigen ist. Dazu wird insbesondere die differentielle und die lineare Kryptoanalyse ausfuhrlich erklart."

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Recent Developments in the Numerics of…
Rainer Ansorge, Hester Bijl, … Hardcover R5,185 Discovery Miles 51 850
Numerical Solution of Partial…
Oleg P. Iliev, Svetozar D. Margenov, … Hardcover R5,056 R4,735 Discovery Miles 47 350
Ordinary Differential Equations with…
Luis Manuel Braga da Costa Campos Hardcover R20,454 Discovery Miles 204 540
Hyperbolic Problems: Theory, Numerics…
Michael Fey, Rolf Jeltsch Hardcover R4,293 Discovery Miles 42 930
Differential Equations with…
Dennis Zill Paperback R1,345 R1,252 Discovery Miles 12 520
Integral Methods in Science and…
Christian Constanda, Matteo Dalla Riva, … Hardcover R3,471 Discovery Miles 34 710
Stability of Neutral Functional…
Michael I. Gil' Hardcover R3,279 Discovery Miles 32 790
Differential Equations with…
Warren Wright, Dennis Zill Paperback  (1)
R1,393 R1,292 Discovery Miles 12 920
Recent Advances in Differential…
Juan Luis Garcia Guirao, Jose Alberto Murillo Hernandez, … Hardcover R2,744 R1,540 Discovery Miles 15 400
Advances in Numerical Analysis: Volume…
Will Light Hardcover R4,117 Discovery Miles 41 170

 

Partners