0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (85)
  • R500+ (1,287)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and... Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Tsuyoshi Takagi, Thomas Peyrin
R1,523 Discovery Miles 15 230 Ships in 18 - 22 working days

The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.

Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings... Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings (Paperback, 1st ed. 2017)
Tanja Lange, Tsuyoshi Takagi
R2,523 Discovery Miles 25 230 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017, held in Utrecht, The Netherlands, in June 2017. The 23 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on code-based cryptography, isogeny-based cryptography, lattice-based cryptography, multivariate cryptography, quantum algorithms, and security models.

Attacking Network Protocols (Paperback): James Forshaw Attacking Network Protocols (Paperback)
James Forshaw
R1,272 R959 Discovery Miles 9 590 Save R313 (25%) Ships in 10 - 15 working days

Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft's top bug hunter. This comprehensive guide looks at networking from an attacker's perspective to help you find, exploit, and ultimately protect vulnerabilities.Part I starts with a rundown of networking basics and traffic capture, as it builds a foundation for analyzing a network. Part II moves on to protocol analysis, both static and dynamic; you'll learn about common protocol structures, cryptography, and protocol security, and how to reverse engineer code with IDA Pro, ILSpy, and Javasnoop. Part III focuses on finding and exploiting vulnerabilities, including an overview of common bug classes, fuzzing, debugging, exhaustion attacks, and how to develop custom tools. Forshaw ends with an overview of the best tools for analyzing and exploiting networks. By the book's end, you'll have a deep understanding of how to analyze network communication and where to look for vulnerabilities.You'll learn how to--Capture, manipulate, and spoof packets both passively and on the wire-Reverse engineer code, brute force passwords, and decrypt traffic-Exploit vulnerabilities with denial-of-service attacks, authentication and authorization bypasses, and memory corruptions-Use capture and analysis tools like IDA Pro, Wireshark, and CANAPE-Strengthen your exploits by rerouting network traffic, exploiting compression, and controlling data flowAttacking Network Protocols is a must-have for any penetration tester, bug hunter, or developer looking to exploit and secure network vulnerabilities.

Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency... Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency + 10 Best Defi Projects and Strategies to Maximize Your Profits (Paperback)
Harper Fraley
R613 R548 Discovery Miles 5 480 Save R65 (11%) Ships in 18 - 22 working days
Topics in Cryptology - CT-RSA 2017 - The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA,... Topics in Cryptology - CT-RSA 2017 - The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings (Paperback, 1st ed. 2017)
Helena Handschuh
R2,597 Discovery Miles 25 970 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2017, CT-RSA 2017, held in San Francisco, CA, USA, in February 2017. The 25 papers presented in this volume were carefully reviewed and selected from 77 submissions. CT-RSA has become a major publication venue in cryptography. It covers a wide variety of topics from public-key to symmetric key cryptography and from cryptographic protocols to primitives and their implementation security. This year selected topics such as cryptocurrencies and white-box cryptography were added to the call for papers.

Il Futuro Dell'information & Communication Technology - Tecnologie, Timori E Scenari Futuri Della Global Network... Il Futuro Dell'information & Communication Technology - Tecnologie, Timori E Scenari Futuri Della Global Network Revolution (Italian, Paperback, 2009 ed.)
Antonio Teti
R578 Discovery Miles 5 780 Ships in 18 - 22 working days

Negli ultimi decenni il rapido sviluppo delle tecnologie IT ha influito in maniera determinante nella vita dell uomo, trasformando, spesso inconsapevolmente il suo lavoro, le sue abitudini, il suo modo di interagire con il mondo che lo circonda. Il fenomeno della "globalizzazione" dei mercati e solo una delle trasformazioni che l intero pianeta sta attraversando. Anche se i vantaggi derivanti dall utilizzo delle moderne tecnologie di comunicazione ci facilitano nel lavoro e nella attivita ludiche e personali, molte sono le perplessita e i dubbi che attanagliano tutti coloro che le utilizzano. Se l Information Technology rappresenta il "combustibile" indispensabile per la sopravvivenza delle aziende e delle attivita dell uomo, nel contempo puo generare problematicita di grande rilievo. Il testo tratta alcune delle problematiche che destano preoccupazioni rilevanti nel mondo intero come il consumo energetico dei sistemi informatici (incontrollabili e inquinanti), il problema della garanzia della privacy e dell integrita dei dati su Internet, l utilizzo della rete Internet come strumento di controllo delle masse, la possibile sparizione degli attuali sistemi operativi che potranno essere sostituiti dal sistema operativo Web Operating System.

Blockchain and the Law - The Rule of Code (Paperback): Primavera de Filippi, Aaron Wright Blockchain and the Law - The Rule of Code (Paperback)
Primavera de Filippi, Aaron Wright
R648 Discovery Miles 6 480 Ships in 10 - 15 working days

"Blockchains will matter crucially; this book, beautifully and clearly written for a wide audience, powerfully demonstrates how." -Lawrence Lessig "Attempts to do for blockchain what the likes of Lawrence Lessig and Tim Wu did for the Internet and cyberspace-explain how a new technology will upend the current legal and social order... Blockchain and the Law is not just a theoretical guide. It's also a moral one." -Fortune Bitcoin has been hailed as an Internet marvel and decried as the preferred transaction vehicle for criminals. It has left nearly everyone without a computer science degree confused: how do you "mine" money from ones and zeros? The answer lies in a technology called blockchain. A general-purpose tool for creating secure, decentralized, peer-to-peer applications, blockchain technology has been compared to the Internet in both form and impact. Blockchains are being used to create "smart contracts," to expedite payments, to make financial instruments, to organize the exchange of data and information, and to facilitate interactions between humans and machines. But by cutting out the middlemen, they run the risk of undermining governmental authorities' ability to supervise activities in banking, commerce, and the law. As this essential book makes clear, the technology cannot be harnessed productively without new rules and new approaches to legal thinking. "If you...don't 'get' crypto, this is the book-length treatment for you." -Tyler Cowen, Marginal Revolution "De Filippi and Wright stress that because blockchain is essentially autonomous, it is inflexible, which leaves it vulnerable, once it has been set in motion, to the sort of unforeseen consequences that laws and regulations are best able to address." -James Ryerson, New York Times Book Review

Managing Security with Snort and IDS Tools (Paperback): Kerry J. Cox Managing Security with Snort and IDS Tools (Paperback)
Kerry J. Cox; Contributions by Christopher Gerg
R892 R771 Discovery Miles 7 710 Save R121 (14%) Ships in 18 - 22 working days

Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.

Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you?

Many intrusion detection books are long on theory but short on specifics and practical examples. Not "Managing Security with Snort and IDS Tools." This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs.

"Managing Security with Snort and IDS Tools" covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices.

Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts.

"Managing Security with Snort and IDS Tools" maps out a proactive--and effective--approach to keeping your systems safe from attack.

Progress in Cryptology - LATINCRYPT 2014 - Third International Conference on Cryptology and Information Security in Latin... Progress in Cryptology - LATINCRYPT 2014 - Third International Conference on Cryptology and Information Security in Latin America Florianopolis, Brazil, September 17-19, 2014 Revised Selected Papers (Paperback, 2015 ed.)
Diego F. Aranha, Alfred Menezes
R2,417 Discovery Miles 24 170 Ships in 18 - 22 working days

This book constitutes the proceedings of the 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, held in Florianopolis, Brazil, in September 2014. The 19 papers presented together with four invited talks were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on cryptographic engineering, side-channel attacks and countermeasures, privacy, crypto analysis and cryptographic protocols.

Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014,... Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers (Paperback, 2015 ed.)
Dongdai Lin, Moti Yung, Jianying Zhou
R2,851 Discovery Miles 28 510 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on privacy and anonymity, multiparty and outsource computation, signature and security protocols, lattice and public key cryptography, block cipher and hash function, authentication and encryption, elliptic curve, and cryptographic primitive and application.

Information Security and Cryptology - ICISC 2014 - 17th International Conference, Seoul, South Korea, December 3-5, 2014,... Information Security and Cryptology - ICISC 2014 - 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers (Paperback, 2015 ed.)
Joo Young Lee, Jongsung Kim
R2,587 Discovery Miles 25 870 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Korea in December 2014. The 27 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on RSA security, digital signature, public key cryptography, block ciphers, network security, mobile security, hash functions, information hiding and efficiency, cryptographic protocol, and side-channel attacks.

Advances in Audio Watermarking Based on Singular Value Decomposition (Paperback, 2015 ed.): Pranab Kumar Dhar, Tetsuya Shimamura Advances in Audio Watermarking Based on Singular Value Decomposition (Paperback, 2015 ed.)
Pranab Kumar Dhar, Tetsuya Shimamura
R1,586 Discovery Miles 15 860 Ships in 18 - 22 working days

This book introduces audio watermarking methods for copyright protection, which has drawn extensive attention for securing digital data from unauthorized copying. The book is divided into two parts. First, an audio watermarking method in discrete wavelet transform (DWT) and discrete cosine transform (DCT) domains using singular value decomposition (SVD) and quantization is introduced. This method is robust against various attacks and provides good imperceptible watermarked sounds. Then, an audio watermarking method in fast Fourier transform (FFT) domain using SVD and Cartesian-polar transformation (CPT) is presented. This method has high imperceptibility and high data payload and it provides good robustness against various attacks. These techniques allow media owners to protect copyright and to show authenticity and ownership of their material in a variety of applications. * Features new methods of audio watermarking for copyright protection and ownership protection * Outlines techniques that provide superior performance in terms of imperceptibility, robustness, and data payload * Includes applications such as data authentication, data indexing, broadcast monitoring, fingerprinting, etc.

Hacker Contest - Sicherheitsprobleme, Loesungen, Beispiele (German, Paperback, Softcover Reprint of the Original 1st 2003 ed.):... Hacker Contest - Sicherheitsprobleme, Loesungen, Beispiele (German, Paperback, Softcover Reprint of the Original 1st 2003 ed.)
Markus Schumacher, Utz Roedig, Marie-Luise Moschgath
R1,066 Discovery Miles 10 660 Ships in 18 - 22 working days

Know-how zur Abwehr von Hacker-Angriffen
Mehr Sicherheit fur Netze, Systeme und Anwendungen
Praxis-Leitfaden mit konzeptionellem Ansatz
Anschaulich durch zeitlose Beispiele

Ein Wettbewerb der Hacker? Wer knackt am schnellsten das Sicherheitssystem?
Die andere Seite - die Sicherheitsexperten - mussen in der Lage sein, Rechnernetze, Systeme und Anwendungen aus der Sicht eines Angreifers zu verstehen, um Sicherheitslucken erkennen und effizient schliessen zu konnen. Dabei unterstutzt sie das Buch.
Das Thema Sicherheit wird hier pragmatisch betrachtet. Die Sicherheit einer Komponente hangt meist direkt von einer oder mehreren anderen Komponenten ab, wobei diese Abhangigkeiten komplex und schwer erfassbar sind.
Auf Basis der Erfahrungen, die im Rahmen des "Hacker Contest" gesammelt wurden, vermittelt das Buch praxisnah die Grundsatze des Hackens bzw. Crackens und prinzipieller Angriffskonzepte.
Die Autoren sind kontiunierlich an der Konzeption und Durchfuhrung des Hacker Contest beteiligt. Sie haben bereits im Informatik-Spektrum einen Artikel zum Thema veroffentlich, der auf grosse Resonanz stiess."

Professional Pen Testing for Web Applications (Paperback): A. Andreu Professional Pen Testing for Web Applications (Paperback)
A. Andreu
R1,291 R1,094 Discovery Miles 10 940 Save R197 (15%) Ships in 18 - 22 working days

There is no such thing as "perfect security" when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing creates a balance that allows a system to be secure while simultaneously being fully functional. With this book, you'll learn how to become an effective penetrator (i.e., a white hat or ethical hacker) in order to circumvent the security features of a Web application so that those features can be accurately evaluated and adequate security precautions can be put in place.
After a review of the basics of web applications, you'll be introduced to web application hacking concepts and techniques such as vulnerability analysis, attack simulation, results analysis, manuals, source code, and circuit diagrams. These web application hacking concepts and techniques will prove useful information for ultimately securing the resources that need your protection.
What you will learn from this book
* Surveillance techniques that an attacker uses when targeting a system for a strike
* Various types of issues that exist within the modern day web application space
* How to audit web services in order to assess areas of risk and exposure
* How to analyze your results and translate them into documentation that is useful for remediation
* Techniques for pen-testing trials to practice before a live project
Who this book is for
This book is for programmers, developers, and information security professionals who want to become familiar with web application security and how to audit it.
Wrox Professional guides are planned and written by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job.

Entzifferte Geheimnisse (German, Paperback, Softcover reprint of the original 1st ed. 1995): Friedrich L. Bauer Entzifferte Geheimnisse (German, Paperback, Softcover reprint of the original 1st ed. 1995)
Friedrich L. Bauer
R1,013 R866 Discovery Miles 8 660 Save R147 (15%) Ships in 18 - 22 working days

Die Kryptologie, eine jahrtausendealte "Geheimwissenschaft," gewinnt zusehends praktische Bedeutung in Verbindung mit dem Schutz von Kommunikationswegen, Datenbanken und Software. Neben ihrer Nutzung in rechnergestutzten offentlichen Nachrichtensystemen ("offentliche Schlussel") treten zusehends rechnerinterne Anwendungen, die sich auch auf Zugriffsberechtigungen und den Quellenschutz von Software erstrecken.
Der erste Teil des Buches handelt in elf Kapiteln von den Geheimschriften und ihrem Gebrauch - von der Kryptographie. Im zweiten Teil wird in elf weiteren Kapiteln das Vorgehen zum unbefugten Entziffern einer Geheimschrift - die Kryptanalyse - besprochen, wobei sich insbesondere Hinweise fur die Verfahrensbeurteilung ergeben.
Das Buch setzt nur elementare mathematische Kenntnisse voraus. Mit einer Fulle spannender, lustiger und bisweilen anzuglicher Geschichten aus der historischen Kryptologie gewurzt, ist es auch fur den Laien reizvoll zu lesen."

Cryptographic Security Architecture - Design and Verification (Paperback, Softcover reprint of the original 1st ed. 2004):... Cryptographic Security Architecture - Design and Verification (Paperback, Softcover reprint of the original 1st ed. 2004)
Peter Gutmann
R2,689 Discovery Miles 26 890 Ships in 18 - 22 working days

A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar cryptovariables. It is the foundation for enforcing computer security policies and controls and preempting system misuse.

This book provides a comprehensive design for a portable, flexible high-security cryptographic architecture, with particular emphasis on incorporating rigorous security models and practices. "Cryptographic Security Architecture" unveils an alternative means of building a trustworthy system based on concepts from established software engineering principles and cognitive psychology. Its novel security-kernel design implements a reference monitor that controls access to security-relevant objects and attributes based on a configurable security policy.

Topics and features:

* Builds a concise architectural design that can be easily extended in the future

* Develops an application-specific security kernel that enforces a fully customizable, rule-based security policy

* Presents a new verification technique that allows verification from the high-level specification down to the running code

* Describes effective security assurance in random number generation, and the pitfalls associated therewith

* Examines the generation and protection of cryptovariables, as well as application of the architectural design to cryptographic hardware

The work provides an in-depth presentation of a flexible, platform-independent cryptographic security architecture suited to software, hardware, and hybrid implementations. Security design practitioners, professionals, researchers, and advanced students will find the work an essential resource.

Data Warehouse Management - Das St. Galler Konzept Zur Ganzheitlichen Gestaltung Der Informationslogistik (German, Paperback,... Data Warehouse Management - Das St. Galler Konzept Zur Ganzheitlichen Gestaltung Der Informationslogistik (German, Paperback, Softcover Reprint of the Original 1st 2003 ed.)
Eitel Maur, Robert Winter
R1,533 Discovery Miles 15 330 Ships in 18 - 22 working days

Die Herausforderungen des Data Warehousing liegen langst jenseits von Grundkonzeption und Architektur, die weitestgehend gefestigt sind. Ein ganzheitliches proaktives Datenqualitatsmanagement und integriertes Metadatenmanagement sind fur ein effektives Data-Warehouse-System heute ebenso elementare Voraussetzung wie Datenschutz und Datensicherheit, die im Data-Warehouse-Umfeld neue Bedeutung erlangt haben. Zahlreiche Uberschneidungen und daher Synergiepotenziale bestehen mit Customer Relationship Management, Enterprise Application Integration und Knowledge Management.

Die Autoren zeigen zu diesem Zweck fundierte Konzepte und praktikable Losungen auf, die speziell im zweiten Teil anhand realer Umsetzungen mit bedeutenden europaischen Unternehmen (UBS, Credit Suisse, Swiss Re u. a.) verdeutlicht werden. "

Prime Numbers and Computer Methods for Factorization (Paperback, 2nd ed. 2012): Hans Riesel Prime Numbers and Computer Methods for Factorization (Paperback, 2nd ed. 2012)
Hans Riesel
R2,251 Discovery Miles 22 510 Ships in 18 - 22 working days

From the original hard cover edition:

In the modern age of almost universal computer usage, practically every individual in a technologically developed society has routine access to the most up-to-date cryptographic technology that exists, the so-called RSA public-key cryptosystem. A major component of this system is the factorization of large numbers into their primes. Thus an ancient number-theory concept now plays a crucial role in communication among millions of people who may have little or no knowledge of even elementary mathematics.

Hans Riesel's highly successful first edition of this book has now been enlarged and updated with the goal of satisfying the needs of researchers, students, practitioners of cryptography, and non-scientific readers with a mathematical inclination. It includes important advances in computational prime number theory and in factorization as well as re-computed and enlarged tables, accompanied by new tables reflecting current research by both the author and his coworkers and by independent researchers.

The book treats four fundamental problems: the number of primes below a given limit, the approximate number of primes, the recognition of primes and the factorization of large numbers. The author provides explicit algorithms and computer programs, and has attempted to discuss as many of the classically important results as possible, as well as the most recent discoveries. The programs include are written in PASCAL to allow readers to translate the programs into the language of their own computers.

The independent structure of each chapter of the book makes it highly readable for a wide variety of mathematicians, students of applied number theory, and others interested in both study and research in number theory and cryptography. "

Expdt - Vergleichbarkeit Von Richtlinien Fur Selbstregulierung Und Selbstdatenschutz (German, Paperback, 2010 ed.): Martin... Expdt - Vergleichbarkeit Von Richtlinien Fur Selbstregulierung Und Selbstdatenschutz (German, Paperback, 2010 ed.)
Martin Kahmer
R1,818 Discovery Miles 18 180 Ships in 18 - 22 working days
Kryptografie in Theorie und Praxis - Mathematische Grundlagen fur Internetsicherheit, Mobilfunk und elektronisches Geld... Kryptografie in Theorie und Praxis - Mathematische Grundlagen fur Internetsicherheit, Mobilfunk und elektronisches Geld (German, Paperback, 2. Aufl. 2010)
Albrecht Beutelspacher, Heike B Neumann, Thomas Schwarzpaul
R1,544 Discovery Miles 15 440 Ships in 18 - 22 working days

Kryptografie hat sich in jungster Zeit als eine Wissenschaft gezeigt, bei der mathematische Methoden mit besonderem Erfolg eingesetzt werden konnen. Das Buch stellt die gesamte Kryptografie unter diesem Aspekt vor: Grundlagen und Anwendungen, Verschlusselung und Authentifikation, symmetrische Algorithmen und Public-Key-Verfahren werden entsprechend ihrer Wichtigkeit prasentiert. Das Buch hat den Umfang einer 2-semestrigen Vorlesung, aufgrund seiner klaren Darstellung eignet es sich aber auch hervorragend zum Selbststudium. Zahlreiche Ubungsaufgaben von unterschiedlichem Schwierigkeitsgrad dienen zur Kontrolle des Verstandnisses."

Kali Linux - Advanced Methods and Strategies to Learn Kali Linux (Paperback): Ethan Thorpe Kali Linux - Advanced Methods and Strategies to Learn Kali Linux (Paperback)
Ethan Thorpe
R496 Discovery Miles 4 960 Ships in 18 - 22 working days
Codici Cifrati - Arne Beurling E LA Crittografia Nella II Guerra Mondiale (Italian, Paperback, 2005 ed.): Bengt Beckman Codici Cifrati - Arne Beurling E LA Crittografia Nella II Guerra Mondiale (Italian, Paperback, 2005 ed.)
Bengt Beckman
R610 Discovery Miles 6 100 Ships in 18 - 22 working days

Durante la II guerra mondiale hanno avuto luogo numerosi risultati di rilievo nel campo della crittografia militare. Uno dei meno conosciuti e quello usato dal servizio di intelligence svedese, nei confronti del codice tedesco per le comunicazioni strategiche con i comandi dei paesi occupati nel nord Europa, le cui linee passavano per la Svezia. In tal modo, durante la fase piu critica della guerra la direzione politica e militare svedese era in grado di seguire i piani e le disposizioni dei Tedeschi, venendo a conoscenza dei piu arditi progetti per modificare la propria politica, tenendo la Svezia fuori dalla guerra.

La violazione del codice tedesco e narrata in dettaglio, per la prima volta, con elementi che gli permettono di essere un ottima introduzione al campo della crittografia, oltre che un ritratto vitale e umano della societa del tempo: una disperata condizione bellica, l'intrigo politico e spionistico, il genio del matematico Arne Beurling, le difficolta e i trucchi del mestiere, e il lavoro sistematico e oscuro di una folla di decrittatori.

Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August... Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings (Paperback, 2006 ed.)
Cynthia Dwork
R1,519 Discovery Miles 15 190 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 26th Annual International Cryptology Conference, CRYPTO 2006, held in Santa Barbara, California, USA in August 2006. The 34 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 250 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications.

CASP+ Certification Kit Exam CAS-004 (Paperback): NH Tanner CASP+ Certification Kit Exam CAS-004 (Paperback)
NH Tanner
R1,867 R1,495 Discovery Miles 14 950 Save R372 (20%) Ships in 9 - 17 working days

Prepare for test success with this all-in-one CASP+ Certification Kit! The kit includes: CASP+ Study Guide: Exam CAS-004, Fourth Edition, builds on the popular Sybex Study Guide approach, providing 100% coverage of the CASP+ Exam CAS-004 objectives. The book contains clear and concise information on crucial security topics. It includes practical examples and insights drawn from real-world experience, as well as exam highlights and end-of-chapter review questions. The comprehensive study resource provides authoritative coverage of key exam topics, including: Security Architecture Security Operations Security Engineering and Cryptography Governance, Risk, and Compliance Because the exam focuses on practical applications of key security concepts, the book includes an appendix of additional hands-on labs. CASP+ Practice Tests: Exam CAS-004, Second Edition, provides hundreds of domain-by domain questions, covering the CASP+ objectives, PLUS two additional practice exams, for a total of 1,000 practice test questions. You'll also get one year of FREE access after activation to the Sybex interactive learning environment and online test bank. Let this book help you gain the confidence you need for taking the CASP+ Exam CAS-004 and prepare you for test success.

Digitale Signatur (German, Paperback): Frank Bitzer, Klaus M Brisch Digitale Signatur (German, Paperback)
Frank Bitzer, Klaus M Brisch
R1,500 Discovery Miles 15 000 Ships in 18 - 22 working days

Digitale Kommunikation dringt in immer mehr Bereiche privater und unternehmerischer Anwendungsfelder ein. Seit 1997 sind die gesetzlichen Rahmenbedingungen in Deutschland fur rechtlich gesicherte Vorgange im Internet geschaffen. Zentraler Bestandteil ist die digitale Signatur. Die Autoren erklaren anschaulich und detailliert deren Konzept und Einsatzmoglichkeiten. Die Funktionen von Signatur, Trustcenter, Chipkarte und asymmetrischem Schlusselverfahren werden dargestellt und durch zahlreiche Diagramme verdeutlicht. Die Informationen dienen als Entscheidungsgrundlage fur den Einsatz der digitalen Signatur in Firmen, Institutionen und Behorden. Die Anwendungsbeispiele beziehen sich auf Business-to-Business- und Business-to-Customer-Beziehungen in Intranet und Internet. Das Werk wendet sich vor allem an Produzenten digitaler Medien sowie Entscheider in Wirtschaft und Verwaltung.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Natural Hazards and Human-Exacerbated…
Edgardo Latrubesse Hardcover R2,881 Discovery Miles 28 810
Imaging, Vision and Learning Based on…
Xue-Cheng Tai, Egil Bae, … Hardcover R1,428 Discovery Miles 14 280
Spatial Analysis in Karst Geomorphology…
Ela Segina Hardcover R3,789 Discovery Miles 37 890
Nonlinear Dynamics and Statistics
Alistair I. Mees Hardcover R2,734 Discovery Miles 27 340
Routledge Library Editions: Geology
Various Hardcover R115,540 Discovery Miles 1 155 400
Late Cenozoic Climate Change in Asia…
Zhisheng An Hardcover R2,746 Discovery Miles 27 460
Examples In Markov Decision Processes
Alexey B Piunovskiy Hardcover R2,698 Discovery Miles 26 980
Maxima and Minima with Applications…
W. Kaplan Hardcover R4,513 Discovery Miles 45 130
Multilevel Optimization: Algorithms and…
Athanasios Migdalas, Panos M. Pardalos, … Hardcover R5,198 Discovery Miles 51 980
Soil Degradation in the United States…
Rattan Lal, Thomas Iivari, … Hardcover R7,319 Discovery Miles 73 190

 

Partners