0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (16)
  • R250 - R500 (91)
  • R500+ (1,358)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Data Security in Cloud Computing, Volume I (Paperback): Giulio D'Agostino Data Security in Cloud Computing, Volume I (Paperback)
Giulio D'Agostino
R1,164 R943 Discovery Miles 9 430 Save R221 (19%) Ships in 10 - 15 working days
Data Security in Cloud Computing, Volume II (Paperback): Giulio D'Agostino Data Security in Cloud Computing, Volume II (Paperback)
Giulio D'Agostino
R1,159 R939 Discovery Miles 9 390 Save R220 (19%) Ships in 10 - 15 working days
Computers Under Attack - Intruders, Worms and Viruses (Paperback, New): Peter Denning Computers Under Attack - Intruders, Worms and Viruses (Paperback, New)
Peter Denning
R1,108 Discovery Miles 11 080 Ships in 10 - 15 working days

This book is broken down into 6 parts. The first describes the emergence of a worldwide network of computers, here called Worldnet, and the practices that people have engaged in as a result. The second part describes the problem of electronic breakins. The third part deals with the phenomenon of worms. The fourth part deals with viruses. The fifth part of the book gives a glimpse of the worlds in which hackers live. The final part deals with the social context in which people make ethical and moral interpretations and propose new laws.

Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008, Proceedings (Paperback, 2008 ed.)
Nigel Smart
R1,625 Discovery Miles 16 250 Ships in 10 - 15 working days

These are the proceedings of Eurocrypt 2008, the 27th Annual IACR Eu- crypt Conference. The conference was sponsored by the International Asso- ation for Cryptologic Research (www.iacr.org), this year in cooperation with Tubitak (www.tubitak.gov.tr). The Eurocrypt 2008 Program Committee (PC) consisted of 28 members whose names are listed on the next page. There were 163 papers submitted to the conference and the PC chose 31 of them. Each paper was assigned to at least three PC members, who either handled it themselves or assigned it to an external referee. After the reviews were submitted, the committee deliberated both online for severalweeks and?nally ina face-to-facemeetingheldinBristol. Papers were refereed anonymously, with PC papers having a minimum of ?ve reviewers. All of our deliberations were aided by theWeb Submission and- viewSoftware written and maintainedby Shai Halevi. In addition to noti?cation of the decision of the committee, authors received reviews; the default for any report given to the committee was that it should be available to the authors as well.

Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings... Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings (Paperback, 2007 ed.)
Josef Pieprzyk, Hossein Ghodosi, Ed Dawson
R1,600 Discovery Miles 16 000 Ships in 10 - 15 working days

Here is a highly relevant book that covers a wide array of key aspects in information security. It constitutes the refereed proceedings of the 12th Australasian Conference on Information Security and Privacy held in Townsville, Australia in July 2007. The 33 revised full papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on stream ciphers, hashing, biometrics, secret sharing, cryptanalysis, public key cryptography, authentication, e-commerce, and security.

Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings... Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings (Paperback, 2007 ed.)
Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang, Qing Yang, …
R1,666 Discovery Miles 16 660 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2007, held in Chengdu, China in April 2007. Coverage includes crime analysis, emergency response and surveillance, intrusion detection, network security, data and text mining, cybercrime and information access and security, intrusion detection, network security, terrorism informatics and crime analysis.

Smart Home Hacks (Paperback): Gordon Meyer Smart Home Hacks (Paperback)
Gordon Meyer
R718 R545 Discovery Miles 5 450 Save R173 (24%) Ships in 12 - 17 working days

So much of what is commonplace today was once considered impossible, or at least wishful thinking. Laser beams in the operating room, cars with built-in guidance systems, cell phones with email access. There's just no getting around the fact that technology always has, and always will be, very cool.

But technology isn't only cool; it's also very smart. That's why one of the hottest technological trends nowadays is the creation of smart homes.

At an increasing rate, people are turning their homes into state-of-the-art machines, complete with more switches, sensors, and actuators than you can shake a stick at. Whether you want to equip your home with motion detectors for added security, install computer-controlled lights for optimum convenience, or even mount an in-home web cam or two purely for entertainment, the world is now your oyster. Ah, but like anything highly technical, creating a smart home is typically easier said than done.

Thankfully, "Smart Home Hacks" takes the guesswork out of the process. Through a seemingly unending array of valuable tips, tools, and techniques, "Smart Home Hacks" explains in clear detail how to use Mac, Windows, or Linux to achieve the automated home of your dreams. In no time, you'll learn how to turn a loose collection of sensors and switches into a well-automated and well-functioning home no matter what your technical level may be.

"Smart Home Hacks" covers a litany of stand-alone and integrated smart home solutions designed to enhance safety, comfort, and convenience in new and existing homes. Kitchens, bedrooms, home offices, living rooms, and even bathrooms are all candidates for smart automation and therefore are all addressed in"Smart Home Hacks,"

Intelligently written by engineering guru and George Jetson wannabe, Gordon Meyer, "Smart Home Hacks" leaves no stone unturned. From what to purchase to how to use your remote control, it's the ultimate guide to understanding and implementing complete or partial home automation.

Hacker's Challenge 3 (Paperback, 3rd edition): David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi Hacker's Challenge 3 (Paperback, 3rd edition)
David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi
R1,729 R1,391 Discovery Miles 13 910 Save R338 (20%) Ships in 10 - 15 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The stories about phishing attacks against banks are so true-to-life, it's chilling." --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker's Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you'll get a detailed analysis of how the experts solved each incident.

Practical Cryptography (Paperback): N. Ferguson Practical Cryptography (Paperback)
N. Ferguson
R1,065 R863 Discovery Miles 8 630 Save R202 (19%) Ships in 9 - 15 working days

Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies.
Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers.
Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).

Practical UNIX and Internet Security (Paperback, 3rd Revised edition): Simson Garfinkel, Gene Spafford, Alan Schwartz Practical UNIX and Internet Security (Paperback, 3rd Revised edition)
Simson Garfinkel, Gene Spafford, Alan Schwartz
R1,348 R1,000 Discovery Miles 10 000 Save R348 (26%) Ships in 12 - 17 working days

This new edition of Practical Unix & Internet Security provides detailed coverage of today's increasingly important security and networking issues. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.

Recommender System with Machine Learning and Artif icial Intelligence: Practical Tools and Applicatio ns in Medical,... Recommender System with Machine Learning and Artif icial Intelligence: Practical Tools and Applicatio ns in Medical, Agricultural and Other Industries (Hardcover)
SN Mohanty
R5,523 Discovery Miles 55 230 Ships in 10 - 15 working days

This book is a multi-disciplinary effort that involves world-wide experts from diverse fields, such as artificial intelligence, human computer interaction, information technology, data mining, statistics, adaptive user interfaces, decision support systems, marketing, and consumer behavior. It comprehensively covers the topic of recommender systems, which provide personalized recommendations of items or services to the new users based on their past behavior. Recommender system methods have been adapted to diverse applications including social networking, movie recommendation, query log mining, news recommendations, and computational advertising. This book synthesizes both fundamental and advanced topics of a research area that has now reached maturity. Recommendations in agricultural or healthcare domains and contexts, the context of a recommendation can be viewed as important side information that affects the recommendation goals. Different types of context such as temporal data, spatial data, social data, tagging data, and trustworthiness are explored. This book illustrates how this technology can support the user in decision-making, planning and purchasing processes in agricultural & healthcare sectors.

Secure Computer and Network Systems - Modeling, Analysis and Design (Hardcover): Nye Secure Computer and Network Systems - Modeling, Analysis and Design (Hardcover)
Nye
R3,666 Discovery Miles 36 660 Ships in 10 - 15 working days

Secure Computer and Network Systems

Modeling, Analysis and Design

Nong Ye, Arizona State University, USA

Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of computer and network applications. Yet, our dependence on computer and network systems has also exposed us to new risks, which threaten the security of, and present new challenges for protecting our assets and information on computer and network systems. The reliability of computer and network systems ultimately depends on security and quality of service (QoS) performance.

This book presents quantitative modeling and analysis techniques to address these numerous challenges in cyber attack prevention and detection for security and QoS, including:

the latest research on computer and network behavior under attack and normal use conditions;

new design principles and algorithms, which can be used by engineers and practitioners to build secure computer and network systems, enhance security practice and move to providing QoS assurance on the Internet;

mathematical and statistical methods for achieving the accuracy and timeliness of cyber attack detection with the lowest computational overhead;

guidance on managing admission control, scheduling, reservation and service of computer and network jobs to assure the service stability and end-to-end delay of those jobs even under Denial of Service attacks or abrupt demands.

"Secure Computer and Network Systems: Modeling, Analysis and Design" is an up-to-date resource for practising engineers and researchers involved in security, reliabilityand quality management of computer and network systems. It is also a must-read for postgraduate students developing advanced technologies for improving computer network dependability.

Hardening Cisco Routers (Paperback): Thomas Akin Hardening Cisco Routers (Paperback)
Thomas Akin
R588 R443 Discovery Miles 4 430 Save R145 (25%) Ships in 12 - 17 working days

This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. This is a reference for protecting the protectors, and author Thomas Akin supplies all the tools necessary to turn a potential vulnerability into a strength.

Theory of Cryptography - First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004,... Theory of Cryptography - First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings (Paperback, 2004 ed.)
Moni Naor
R3,170 Discovery Miles 31 700 Ships in 10 - 15 working days

I thank Sha? Goldwasser for chairing this conference and making all the necessaryarrangementsatMIT.Sha?inturnistremendouslygratefultoJoanne Talbot who coordinated the conference facilities, hotels, Web page, budgets, and the conference chair relentlessly and without a single complaint. Thank you Joanne. I thank Mihir Bellare for chairing the Steering Committee of TCC and the members of the committee (see the list in the pages that follow) for helping out with many issues concerning the conference, including the proceedings and the TCC Web-site. Finally a big thanks is due to Oded Goldreich who initiated this endeavor and pushed hard for it. Rehovot, Israel Moni Naor December 2003 Program Chair TCC 2004 VII External Referees Masayuki Abe Daniel Gottesman Jesper Buus Nielsen Luis van Ahn Jens Groth Adriana Palacio Michael Backes Shai Halevi Erez Petrank Boaz Barak Danny Harnik Benny Pinkas Amos Beimel Alejandro Hevia Tal Rabin Mihir Bellare Thomas Jakobsen Oded Regev Alexandra Boldyreva Markus Jakobsson Amit Sahai Harry Buhrman Ari Juels Jean-Pierre Seifert Christian Cachin Jonathan Katz Adam Smith Jan Camenisch Hugo Krawczyk Martijn Stam Claude Cr epeau Eyal Kushilevitz Yael Tauman Kalai Anand Desai Yehuda Lindell Michael Waidner Yan Zong Ding Anna Lysyanskaya John Watrous Yevgeniy Dodis Tal Malkin Douglas Wikstr] om Marc Fischlin David Meyer Bogdan Warinschi Juan Garay Ashwin Nayak Stephanie Wehner Rosario Gennaro Gregory Neven Ke Yang TCC Steering Committee Mihir Bellare (Chair) UCSD, USA ? Ivan Damg? ard Arhus University, Denmark Oded Goldreich Weizmann Institute, Israel and Radcli?e Institute, USA Sha? Goldwasser MIT, USA and Weizmann Institute, Israel"

Global Electronic Commerce - A Policy Primer (Paperback, illustrated edition): Catherine Mann, Sue Eckert, Sarah Cleeland Knight Global Electronic Commerce - A Policy Primer (Paperback, illustrated edition)
Catherine Mann, Sue Eckert, Sarah Cleeland Knight
R504 R444 Discovery Miles 4 440 Save R60 (12%) Ships in 12 - 17 working days

Electronic commerce is changing the way that businesses and consumers interact with each other; the products they create, buy, and sell; and the way that they communicate, learn, and become informed. How can policymakers position their countries and themselves to take advantage of this new environment? How should policymaking adjust to a more global, more networked, and more information-rich marketplace where relationships and jurisdictions between the governments, businesses, and citizens of different countries increasingly overlap? How can governments effectively harness rapidly changing technologies and partner with both domestic and foreign private sectors to reap the greatest benefits for their constituents?

This primer answers these questions using both general analysis and specific examples. It addresses in particular the needs of policymakers in emerging markets who must formulate and refine policies that affect e-commerce in areas ranging from telecommunications and finance to international trade and domestic distribution as well as taxation and privacy. Companies considering doing business in these economies also will find that the examples offer insights into the issues that policymakers face, the different policy approaches that they choose, and the market opportunities that result as more and more economies embrace global electronic commerce.

Attacking Network Protocols (Paperback): James Forshaw Attacking Network Protocols (Paperback)
James Forshaw
R1,326 R901 Discovery Miles 9 010 Save R425 (32%) Ships in 12 - 17 working days

Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft's top bug hunter. This comprehensive guide looks at networking from an attacker's perspective to help you find, exploit, and ultimately protect vulnerabilities.Part I starts with a rundown of networking basics and traffic capture, as it builds a foundation for analyzing a network. Part II moves on to protocol analysis, both static and dynamic; you'll learn about common protocol structures, cryptography, and protocol security, and how to reverse engineer code with IDA Pro, ILSpy, and Javasnoop. Part III focuses on finding and exploiting vulnerabilities, including an overview of common bug classes, fuzzing, debugging, exhaustion attacks, and how to develop custom tools. Forshaw ends with an overview of the best tools for analyzing and exploiting networks. By the book's end, you'll have a deep understanding of how to analyze network communication and where to look for vulnerabilities.You'll learn how to--Capture, manipulate, and spoof packets both passively and on the wire-Reverse engineer code, brute force passwords, and decrypt traffic-Exploit vulnerabilities with denial-of-service attacks, authentication and authorization bypasses, and memory corruptions-Use capture and analysis tools like IDA Pro, Wireshark, and CANAPE-Strengthen your exploits by rerouting network traffic, exploiting compression, and controlling data flowAttacking Network Protocols is a must-have for any penetration tester, bug hunter, or developer looking to exploit and secure network vulnerabilities.

Sicherheit und Kryptographie im Internet - Theorie und Praxis (German, Paperback, 5., erw. u. akt. Aufl. 2020): Joerg Schwenk Sicherheit und Kryptographie im Internet - Theorie und Praxis (German, Paperback, 5., erw. u. akt. Aufl. 2020)
Joerg Schwenk
R1,883 Discovery Miles 18 830 Ships in 10 - 15 working days

Das vorliegende Buch bietet eine strukturierte, gut lesbare Einfuhrung zu den wichtigsten Sicherheitsstandards im Internet. Hierzu zahlen bekannte Standards wie TLS, OpenPGP, S/MIME, SSH, IPsec und WPA, aber auch die versteckten Sicherheitsfeatures aus der Microsoft-Welt (PPTP, Kerberos), dem Mobilfunk, DNSSEC, Single-Sign-On-Protokollen und Datenformaten wie XML und JSON. Das Verstandnis fur diese Standards und deren Weiterentwicklung wird durch eine detaillierte Beschreibung der bekannten Angriffe vertieft, insbesondere fur TLS liegt hier umfangreiches Material vor. Die 5. Auflage wurde erheblich erweitert und aktualisiert. Neue Themen sind unter anderem die WLAN-Standards WPA2 und WPA3, die neue TLS-Version 1.3, Kerberos, Anti-SPAM-Techniken und moderne Single-Sign-On-Protokolle. Das Thema TLS wird voellig neu dargestellt, und die Kapitel zu E-Mail-Sicherheit und IPsec deutlich erweitert. Eine umfangreiche Einfuhrung in praktische Aspekte der Kryptographie macht dieses Buch ohne zusatzliche Literatur nutzbar.

Artificial Immune System - Applications in Computer Security (Hardcover): Y Tan Artificial Immune System - Applications in Computer Security (Hardcover)
Y Tan
R2,582 Discovery Miles 25 820 Ships in 12 - 17 working days

This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security * Covers all of the current achievements in computer security based on immune principles, which were obtained by the Computational Intelligence Laboratory of Peking University, China * Includes state-of-the-art information on designing and developing artificial immune systems (AIS) and AIS-based solutions to computer security issues * Presents new concepts such as immune danger theory, immune concentration, and class-wise information gain (CIG)

Web Security Testing Cookbook (Paperback): Brian Hope Web Security Testing Cookbook (Paperback)
Brian Hope
R935 R699 Discovery Miles 6 990 Save R236 (25%) Ships in 12 - 17 working days

Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc security assessments, these recipes are repeatable, concise, and systematic-perfect for integrating into your regular test suite. Recipes cover the basics from observing messages between clients and servers to multi-phase tests that script the login and execution of web application features. By the end of the book, you'll be able to build tests pinpointed at Ajax functions, as well as large multi-step tests for the usual suspects: cross-site scripting and injection attacks. This book helps you: Obtain, install, and configure useful-and free-security testing tools Understand how your application communicates with users, so you can better simulate attacks in your tests Choose from many different methods that simulate common attacks such as SQL injection, cross-site scripting, and manipulating hidden form fields Make your tests repeatable by using the scripts and examples in the recipes as starting points for automated tests

Don't live in dread of the midnight phone call telling you that your site has been hacked. With Web Security Testing Cookbook and the free tools used in the book's examples, you can incorporate security coverage into your test suite, and sleep in peace.

Snort Cookbook (Paperback): Angela Orebaugh Snort Cookbook (Paperback)
Angela Orebaugh; Contributions by Simon Biles, Jacob Babbin
R936 R700 Discovery Miles 7 000 Save R236 (25%) Ships in 12 - 17 working days

If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new "Snort Cookbook" will save countless hours of sifting through dubious online advice or wordy tutorials in order to leverage the full power of SNORT.

Each recipe in the popular and practical problem-solution-discussion O'Reilly cookbook format contains a clear and thorough description of the problem, a concise but complete discussion of a solution, and real-world examples that illustrate that solution. The "Snort Cookbook" covers important issues that sys admins and security pros will us everyday, such as:

installation

optimization

logging

alerting

rules and signatures

detecting viruses

countermeasures

detecting common attacks

administration

honeypots

log analysis

But the "Snort Cookbook" offers far more than quick cut-and-paste solutions to frustrating security issues. Those who learn best in the trenches--and don't have the hours to spare to pore over tutorials or troll online for best-practice snippets of advice--will find that the solutions offered in this ultimate Snort sourcebook not only solveimmediate problems quickly, but also showcase the best tips and tricks they need to master be security gurus--and still have a life.

Programming NET Security (Paperback): Adam Freeman Programming NET Security (Paperback)
Adam Freeman
R1,222 R912 Discovery Miles 9 120 Save R310 (25%) Ships in 12 - 17 working days

With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of experience can still allow a program to be used in an unintended way, Programming .NET Security shows you how the various tools will help you write secure applications.

Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I (Paperback, 1st ed. 2019)
Yuval Ishai, Vincent Rijmen
R3,578 Discovery Miles 35 780 Ships in 10 - 15 working days

The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019. The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers are organized into the following topical sections: ABE and CCA security; succinct arguments and secure messaging; obfuscation; block ciphers; differential privacy; bounds for symmetric cryptography; non-malleability; blockchain and consensus; homomorphic primitives; standards; searchable encryption and ORAM; proofs of work and space; secure computation; quantum, secure computation and NIZK, lattice-based cryptography; foundations; efficient secure computation; signatures; information-theoretic cryptography; and cryptanalysis.

Java Security 2e (Paperback, 2nd Revised edition): Scott Oaks Java Security 2e (Paperback, 2nd Revised edition)
Scott Oaks
R1,321 R974 Discovery Miles 9 740 Save R347 (26%) Ships in 12 - 17 working days

The second edition focuses on the platform features of Java that provide security--the class loader, bytecode verifier, and security manager--and recent additions to Java that enhance this security model: digital signatures, security providers, and the access controller. The book covers in depth the security model of Java 2, version 1.3, including the two new security APIs: JAAS and JSSE.

Digital Forensics and Watermarking - 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018,... Digital Forensics and Watermarking - 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings (Paperback, 1st ed. 2019)
Chang D. Yoo, Yun Qing Shi, Hyoung Joong Kim, Alessandro Piva, Gwangsu Kim
R1,572 Discovery Miles 15 720 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018, held on Jeju Island, Korea, in October 2018.The 25 papers presented in this volume were carefully reviewed and selected from 43 submissions. The contributions are covering the following topics: deep neural networks for digital forensics; steganalysis and identification; watermarking; reversible data hiding; steganographic algorithms; identification and security; deep generative models for forgery and its detection.

Java Crytography (Paperback): Jonathon Knudsen Java Crytography (Paperback)
Jonathon Knudsen
R1,059 R786 Discovery Miles 7 860 Save R273 (26%) Ships in 12 - 17 working days

Java Cryptography teaches you how to write secure programs using Java's cryptographic tools. It includes thorough discussions of the java.security package and the Java Cryptography Extensions (JCE), showing you how to use security providers and even implement your own provider. It discusses authentication, key management, public and private key encryption, and includes a secure talk application that encrypts all data sent over the network. If you work with sensitive data, you'll find this book indispensable.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cybersecurity in Smart Homes…
Khatoun Hardcover R3,773 Discovery Miles 37 730
New Research on the Voynich Manuscript…
National Security Agency Hardcover R526 Discovery Miles 5 260
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,834 Discovery Miles 68 340
Technical Articles about the Voynich…
National Security Agency Hardcover R593 Discovery Miles 5 930
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R777 R668 Discovery Miles 6 680
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,321 R1,209 Discovery Miles 12 090
Providing Sound Foundations for…
Oded Goldreich Hardcover R3,332 Discovery Miles 33 320
TLS Mastery
Michael W Lucas Hardcover R995 R876 Discovery Miles 8 760
Cryptocurrencies and Blockchain…
Keizer Soeze Hardcover R1,508 R1,231 Discovery Miles 12 310
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R611 R518 Discovery Miles 5 180

 

Partners