0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (12)
  • R250 - R500 (86)
  • R500+ (1,344)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Data Security in Cloud Computing, Volume II (Paperback): Giulio D'Agostino Data Security in Cloud Computing, Volume II (Paperback)
Giulio D'Agostino
R1,129 R936 Discovery Miles 9 360 Save R193 (17%) Ships in 10 - 15 working days
Quantum Cryptography and Secret-Key Distillation (Paperback): Gilles van Assche Quantum Cryptography and Secret-Key Distillation (Paperback)
Gilles van Assche
R1,923 Discovery Miles 19 230 Ships in 12 - 19 working days

Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This 2006 text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secret-key distillation. The book starts with an overview chapter, progressing to classical cryptography, information theory (classical and quantum), and applications of quantum cryptography. The discussion moves to secret-key distillation, privacy amplification and reconciliation techniques, concluding with the security principles of quantum cryptography. The author explains the physical implementation and security of these systems, enabling engineers to gauge the suitability of quantum cryptography for securing transmission in their particular application. With its blend of fundamental theory, implementation techniques, and details of recent protocols, this book will be of interest to graduate students, researchers, and practitioners in electrical engineering, physics, and computer science.

Blockchain across Oracle - Understand the details and implications of the Blockchain for Oracle developers and customers... Blockchain across Oracle - Understand the details and implications of the Blockchain for Oracle developers and customers (Paperback)
Robert van Moelken
R1,245 Discovery Miles 12 450 Ships in 10 - 15 working days

Learn what the Blockchain is, what the differences between available blockchain platforms are, how to work with Oracle's Blockchain Cloud Service, and how Blockchain can change the direction of your Oracle work and the focus of your customers. Key Features A professional orientation of the Blockchain for Oracle developers and customers Learn what the Blockchain is and how it will affect for you and your customers Learn how blockchain will disrupt traditional cross-organizational applications Implement your own Blockchain on Oracle and develop your first smart contract Industry directions of the Blockchain to help you decide where to develop your skills Book DescriptionBlockchain across Oracle gives you the professional orientation to Blockchain that you need as an Oracle developer in today's changing world. Written and prepared for you by Oracle Developer Champion Robert van Moelken, this book gets you up to speed with the details of the Blockchain - core concepts, how to implement Oracle's Blockchain Cloud Service, industry implications for the Blockchain, and how the Blockchain will affect your Oracle customers. Robert van Moelken introduces you to the history and concepts of the Blockchain. You'll really get to understand the Blockchain inside and out, as an Oracle developer or solution architect. You'll understand the Blockchain flow, and how the hashes and chains create a new decentralised paradigm for you as an Oracle developer. You'll gain insights into how the Blockchain affects Oracle developers and customers in this modern and disruptive era. You'll see how the Blockchain concepts work in this new world where Assets, Transactions, Security, and Privacy, can all be sustained across a decentralized system for your customers. Then you'll find a detailed look at the cutting-edge Oracle middleware solutions. You'll learn about Hyperledger Fabric, the opensource Blockchain framework used by Oracle as its core, and how to set up your own Oracle Blockchain Network. You'll design and develop a smart contract, and learn how to run it on the Oracle Blockchain Cloud Service. The final part of the book looks at how the Blockchain will affect your customers across various industry sectors. By studying industry trends in the financial services sector, healthcare industry, and the transport industry, you'll discover how the options and possibilities for you and your clients are being transformed by the Blockchain across Oracle. You'll complete this professional orientation by looking at Blockchain trends and future directions. What you will learn A full introduction to the Blockchain How the Blockchain affects Oracle developers and customers Core concepts including blocks, hashes, and chains, assets, transactions, and consensus How to work with Oracle Cloud to implement a Blockchain Network Design, develop, and run smart contracts on the Oracle Blockchain Cloud Service Blockchain security and privacy for Oracle developers and clients Public and private Blockchain decisions for Oracle architects and developers Industry analysis across finance, governance, and healthcare sectors Industry trends and the future of the Blockchain technology Who this book is forThis book is a professional orientation for all Oracle developers, solution architects, and decisions makers involved in Oracle system and future development.

Tokenomics - The Crypto Shift of Blockchains, ICOs, and Tokens (Paperback): Sean Au, Thomas Power Tokenomics - The Crypto Shift of Blockchains, ICOs, and Tokens (Paperback)
Sean Au, Thomas Power
R1,178 Discovery Miles 11 780 Ships in 10 - 15 working days

Explore the differences between ICOs, cryptocurrencies, and tokens (offerings), enabling the reader to understand the ICO landscape, how millions were raised in minutes, and where the future of the tokenized economy is heading. Take a real-time journey, cutting through the myths, understanding token choices available to everyone. Key Features Interviews with key figures in Tokenomics Unbiased evaluation and comparison of the different offerings Conceptual analysis of the market's reaction League table showing current exposure An account of the theoretical and current legal foundations of alt coins and tokens A complete introduction to the phases of an initial coin offering Book DescriptionTokenomics is the economy of this new world. This is a no-holds-barred, in-depth exploration of the way in which we can participate in the blockchain economy. The reader will learn the basics of bitcoin, blockchains, and tokenomics; what the very first ICO was; and how over a period of 5 years, various projects managed to raise the enormous sums of money they did. The book then provides insights from ICO experts and looks at what the future holds. By comparing the past, current, and future of this technology, the book will inform anyone, whatever motivates their interest. The crypto shift of blockchains, ICOs, and tokens is much more than just buying bitcoins, creating tokens, or raising millions in a minute in an ICO. It is a new paradigm shift from centralized to decentralized, from closed to open, and from opaqueness to transparency. ICOs and the creation of tokens during the craze of 2017 needed a lot of preparation, an understanding of cryptocurrencies and of emerging legal frameworks, but this has spurred a new movement to tokenize the world. The author gives an unbiased, authoritative picture of the current playing field, exploring the token opportunities and provides a unique insight into the developing world of this tokenized economy. This book will nourish hungry minds wanting to grow their knowledge in this fascinating area. What you will learn The background of ICOs and how they came to be The difference between a coin and a token, a utility and a security, and all the other acronyms you're likely to ever encounter How these ICOs raised enormous sums of money Tokenomics: structuring the token with creativity Why it's important to play nicely with the regulators A sneak peak into the future of ICOs from leaders in the industry Who this book is forWith the media hype about bitcoin, this book appeals to anyone, from those with a general interest in anything crypto, or those with some knowledge of the nuances between cryptocurrency, ICOs, IPOs and the Token economy.

Quantum Computing for High School Students (Paperback): Yuly Billig Quantum Computing for High School Students (Paperback)
Yuly Billig
R820 R703 Discovery Miles 7 030 Save R117 (14%) Ships in 10 - 15 working days
Blockchain Basics - A Non-Technical Introduction in 25 Steps (Paperback, 1st ed.): Daniel Drescher Blockchain Basics - A Non-Technical Introduction in 25 Steps (Paperback, 1st ed.)
Daniel Drescher
R809 R709 Discovery Miles 7 090 Save R100 (12%) Ships in 10 - 15 working days

In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors. This book bridges the gap that exists between purely technical books about the blockchain and purely business-focused books. It does so by explaining both the technical concepts that make up the blockchain and their role in business-relevant applications. What You'll Learn What the blockchain is Why it is needed and what problem it solves Why there is so much excitement about the blockchain and its potential Major components and their purpose How various components of the blockchain work and interact Limitations, why they exist, and what has been done to overcome them Major application scenarios Who This Book Is For Everyone who wants to get a general idea of what blockchain technology is, how it works, and how it will potentially change the financial system as we know it

Digital Identity (Paperback): Phil Windley Digital Identity (Paperback)
Phil Windley
R838 R654 Discovery Miles 6 540 Save R184 (22%) Ships in 12 - 19 working days

The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce.

Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. "Digital Identity" explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers.

Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for [email protected] and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view ofthe concepts, issues, and technologies behind identity management architecture.

How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.

Hacking - 3 Books in 1: The Beginner's Complete Guide to Computer Hacking and Penetration Testing & The Complete... Hacking - 3 Books in 1: The Beginner's Complete Guide to Computer Hacking and Penetration Testing & The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples & The Comprehensive Beginner's Guide to Take Control of (Paperback)
Miles Price
R711 Discovery Miles 7 110 Ships in 10 - 15 working days
Prime Numbers and Computer Methods for Factorization (Paperback, 2nd ed. 2012): Hans Riesel Prime Numbers and Computer Methods for Factorization (Paperback, 2nd ed. 2012)
Hans Riesel
R2,437 Discovery Miles 24 370 Ships in 10 - 15 working days

From the original hard cover edition:

In the modern age of almost universal computer usage, practically every individual in a technologically developed society has routine access to the most up-to-date cryptographic technology that exists, the so-called RSA public-key cryptosystem. A major component of this system is the factorization of large numbers into their primes. Thus an ancient number-theory concept now plays a crucial role in communication among millions of people who may have little or no knowledge of even elementary mathematics.

Hans Riesel's highly successful first edition of this book has now been enlarged and updated with the goal of satisfying the needs of researchers, students, practitioners of cryptography, and non-scientific readers with a mathematical inclination. It includes important advances in computational prime number theory and in factorization as well as re-computed and enlarged tables, accompanied by new tables reflecting current research by both the author and his coworkers and by independent researchers.

The book treats four fundamental problems: the number of primes below a given limit, the approximate number of primes, the recognition of primes and the factorization of large numbers. The author provides explicit algorithms and computer programs, and has attempted to discuss as many of the classically important results as possible, as well as the most recent discoveries. The programs include are written in PASCAL to allow readers to translate the programs into the language of their own computers.

The independent structure of each chapter of the book makes it highly readable for a wide variety of mathematicians, students of applied number theory, and others interested in both study and research in number theory and cryptography. "

Linux Server Security (Paperback, 2nd Revised edition): Michael Bauer Linux Server Security (Paperback, 2nd Revised edition)
Michael Bauer
R1,095 R835 Discovery Miles 8 350 Save R260 (24%) Ships in 12 - 19 working days

Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well.

This highly regarded book, originally titled "Building Secure Servers with Linux," combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--as a hub offering services to an organization or the Internet--and shows readers how to harden their hosts against attacks. An all-inclusive resource for Linux users who wish to harden their systems, "Linux Server Security" covers general security such as intrusion detection and firewalling a hub, as well as key services such as DNS, the Apache Web server, mail, and secure shell.

Author Michael D. Bauer, a security consultant, network architect, and lead author of the popular Paranoid Penguin column in the "Linux Journal," carefully outlines the security risks, defines precautions that can minimize those risks, and offers recipes for robust security. He is joined on several chapters by administrator and developer Bill Lubanovic.

A number of new security topics have been added for this edition, including:

Database security, with a focus on MySQL

Using OpenLDAP for authentication

An introduction to email encryption

The Cyrus IMAP service, a popular mail delivery agent

The vsftpd FTP server

Geared toward Linux users with little security expertise, the author explainssecurity concepts and techniques in clear language, beginning with the fundamentals. "Linux Server Security" with Linux provides a unique balance of "big picture" principles that transcend specific software packages and version numbers, and very clear procedures on securing some of those software packages on several popular distributions. With this book in hand, you'll have both the expertise and the tools to comprehensively secure your Linux system.

The GnuTLS 3.6.1 Manual (Paperback): Nikos Mavrogiannopoulos, Simon Josefsson The GnuTLS 3.6.1 Manual (Paperback)
Nikos Mavrogiannopoulos, Simon Josefsson
R669 Discovery Miles 6 690 Ships in 10 - 15 working days
The Cryptocurrency Bible - Ultimate Guide to Understanding Cryptocurrency, Blockc (Paperback): Ryam Blum The Cryptocurrency Bible - Ultimate Guide to Understanding Cryptocurrency, Blockc (Paperback)
Ryam Blum
R261 Discovery Miles 2 610 Ships in 10 - 15 working days
Journal of Cyber Security and Mobility (6-3) (Paperback): Ashutosh Dutta, Wojciech Mazurczyk Journal of Cyber Security and Mobility (6-3) (Paperback)
Ashutosh Dutta, Wojciech Mazurczyk; Neeli R. Prasad
R1,081 Discovery Miles 10 810 Ships in 10 - 15 working days
Advances in Cryptology - EUROCRYPT 2009 - 28th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2009 - 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009, Proceedings (Paperback, 2009 ed.)
Antoine Joux
R1,619 Discovery Miles 16 190 Ships in 10 - 15 working days

You are holding the proceedings of Eurocrypt 2009, the 28th Annual Inter- tional Conferenceon the Theoryand Applications of CryptographicTechniques. This conference was organized by the International Association for Cryptologic Research in cooperation with the Horst Gort ] z Institute for IT-Security at the Ruhr-Universit] at Bochum. The local organization received additional support from several sponsors: Horst G] ortz Stiftung, Deutsche Forschungsgemeinschaft, Bochum 2015, Secunet, NXP, IET, Taylor & Francis, AuthentiDate. The c- ference was held in Cologne, Germany. The Eurocrypt 2009 Program Committee (PC) consisted of 29 members, listed on the next page. There were 148 submissions and 33 were selected to - pear in this volume.Eachsubmissionwasassignedto at leastthreePCmembers and reviewed anonymously. During the review process, the PC members were assisted by 131 external reviewers.Once the reviews were available, the comm- tee discussed the papers in depth using the EasyChair conference management system. The authors of accepted papers were given ?ve weeks to prepare the- nalversionsincluded in theseproceedings.Therevisedpaperswerenot reviewed again and their authors bear the responsibility for their content. Inadditiontothepapersincludedinthisvolume, theconferencealsofeatured aPosterandaRumpsession.Thelistofpresentedpostersappearsinthisvolume before the table of contents. Dan Bernstein served as the Chair of the Rump session. The conference also had the pleasure of hearing invited talks by Sha? Goldwasser and Phillip Rogaway."

Design and Cryptanalysis of ZUC - A Stream Cipher in Mobile Telephony (Paperback, 1st ed. 2021): Chandra Sekhar Mukherjee,... Design and Cryptanalysis of ZUC - A Stream Cipher in Mobile Telephony (Paperback, 1st ed. 2021)
Chandra Sekhar Mukherjee, Dibyendu Roy, Subhamoy Maitra
R1,370 Discovery Miles 13 700 Ships in 12 - 19 working days

This book is a timely document of state-of-the art analytical techniques in the domain of stream cipher design and analysis with a specific cipher, named ZUC. It links new research to brief contextual literature review in the domain of complex LFSR-based stream ciphers. A snapshot of how stream ciphers are deployed in the mobile telephony architecture, one of the most well-known topics for more than five decades in the domain of computer and communication sciences, is presented in this book. The book provides an in-depth study on design and cryptanalysis of ZUC as well as relevant research results in this field with directions towards future analysis of this cipher.

Everyday Cryptography - Fundamental Principles and Applications (Paperback, 2nd Revised edition): Keith Martin Everyday Cryptography - Fundamental Principles and Applications (Paperback, 2nd Revised edition)
Keith Martin
R1,796 Discovery Miles 17 960 Ships in 9 - 17 working days

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the Internet, mobile phones, Wi-Fi networks, payment cards, Tor, and Bitcoin. This book is intended to be introductory, self-contained, and widely accessible. It is suitable as a first read on cryptography. Almost no prior knowledge of mathematics is required since the book deliberately avoids the details of the mathematics techniques underpinning cryptographic mechanisms. Instead our focus will be on what a normal user or practitioner of information security needs to know about cryptography in order to understand the design and use of everyday cryptographic applications. By focusing on the fundamental principles of modern cryptography rather than the technical details of current cryptographic technology, the main part this book is relatively timeless, and illustrates the application of these principles by considering a number of contemporary applications of cryptography. Following the revelations of former NSA contractor Edward Snowden, the book considers the wider societal impact of use of cryptography and strategies for addressing this. A reader of this book will not only be able to understand the everyday use of cryptography, but also be able to interpret future developments in this fascinating and crucially important area of technology.

Convergence Security - Journal Volume 1 - 2016 (Paperback): Kuinam K Kim Convergence Security - Journal Volume 1 - 2016 (Paperback)
Kuinam K Kim
R837 Discovery Miles 8 370 Ships in 10 - 15 working days
Tor - Tor and the Deep Web: A Guide to Become Anonymous Online, Conceal Your IP Address, Block Nsa Spying and Hack!... Tor - Tor and the Deep Web: A Guide to Become Anonymous Online, Conceal Your IP Address, Block Nsa Spying and Hack! (Paperback)
Joshua Welsh
R449 Discovery Miles 4 490 Ships in 10 - 15 working days
Journal of Cyber Security and Mobility (6-1) (Paperback): Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad Journal of Cyber Security and Mobility (6-1) (Paperback)
Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad
R1,068 Discovery Miles 10 680 Ships in 10 - 15 working days
Cyber Crimes - History of World's Worst Cyber Attacks (Paperback): Vannesa Pitts Cyber Crimes - History of World's Worst Cyber Attacks (Paperback)
Vannesa Pitts
R462 Discovery Miles 4 620 Ships in 10 - 15 working days
Hacking University - Computer Hacking and Mobile Hacking 2 Manuscript Bundle: Essential Beginners Guide on How to Become an... Hacking University - Computer Hacking and Mobile Hacking 2 Manuscript Bundle: Essential Beginners Guide on How to Become an Amateur Hacker and Hacking Mobile Devices, Tablets, Game Consoles, and Apps. (Hacking, How to Hack, Hacking for Beginners, Computer, (Paperback)
Isaac D Cody
R537 Discovery Miles 5 370 Ships in 10 - 15 working days
Virtual Private Networks 2e (Paperback, 2nd Revised edition): Charlie Scott Virtual Private Networks 2e (Paperback, 2nd Revised edition)
Charlie Scott
R952 R730 Discovery Miles 7 300 Save R222 (23%) Ships in 12 - 19 working days

This book explains how to plan and build a Virtual Private Network (VPN), a collection of technologies that creates secure connections or "tunnels" over regular Internet lines. It discusses costs, configuration, and how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH). New features in the second edition include SSH and an expanded description of the IPSec standard.

The Encrypted Pocketbook of Passwords (Paperback): Raef Meeuwisse The Encrypted Pocketbook of Passwords (Paperback)
Raef Meeuwisse
R178 Discovery Miles 1 780 Ships in 10 - 15 working days
Multi-application Smart Cards - Technology and Applications (Hardcover): Mike Hendry Multi-application Smart Cards - Technology and Applications (Hardcover)
Mike Hendry
R3,295 Discovery Miles 32 950 Ships in 12 - 19 working days

Multi-application smart cards have yet to realise their enormous potential, partly because few people understand the technology, market, and behavioural issues involved. Here, Mike Hendry sets out to fill this knowledge gap with a comprehensive and accessible guide. Following a review of the state-of-the-art in smart card technology, the book describes the business requirements of each smart-card-using sector, and the systems required to support multiple applications. Implementation aspects, including security, are treated in detail and numerous international case studies cover identity, telecoms, banking and transportation applications. Lessons are drawn from these studies to help deliver more successful projects in the future. Invaluable for users and integrators specifying, evaluating and integrating multi-application systems, the book will also be useful to terminal, card and system designers; network, IT and security managers; and software specialists.

A Decade of Lattice Cryptography (Paperback): Chris Peikert A Decade of Lattice Cryptography (Paperback)
Chris Peikert
R2,289 Discovery Miles 22 890 Ships in 10 - 15 working days

Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn as the foundation for secure cryptographic systems. Attractive features of lattice cryptography include apparent resistance to quantum attacks (in contrast with most number-theoretic cryptography), high asymptotic efficiency and parallelism, security under worst-case intractability assumptions, and solutions to long-standing open problems in cryptography. This monograph surveys most of the major developments in lattice cryptography over the past ten years. The main focus is on the foundational short integer solution (SIS) and learning with errors (LWE) problems (and their more efficient ring-based variants), their provable hardness assuming the worst-case intractability of standard lattice problems, and their many cryptographic applications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R539 Discovery Miles 5 390
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R844 R733 Discovery Miles 7 330
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R819 Discovery Miles 8 190
New Research on the Voynich Manuscript…
National Security Agency Hardcover R568 Discovery Miles 5 680
TLS Mastery
Michael W Lucas Hardcover R970 R875 Discovery Miles 8 750
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,406 R1,302 Discovery Miles 13 020
Simple Steps to Data Encryption - A…
Pete Loshin Paperback R720 Discovery Miles 7 200
Protecting Privacy through Homomorphic…
Kristin Lauter, Wei Dai, … Hardcover R3,121 Discovery Miles 31 210
Technical Articles about the Voynich…
National Security Agency Hardcover R630 Discovery Miles 6 300
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,692 Discovery Miles 66 920

 

Partners