0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (12)
  • R250 - R500 (86)
  • R500+ (1,344)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Computer Security and Cryptography (Hardcover): AG Konheim Computer Security and Cryptography (Hardcover)
AG Konheim
R3,928 Discovery Miles 39 280 Ships in 12 - 19 working days

Gain the skills and knowledge needed to create effective data security systems

This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems.

The author contributed to the design and analysis of the Data Encryption Standard (DES), a widely used symmetric-key encryption algorithm. His recommendations are based on firsthand experience of what does and does not work.

Thorough in its coverage, the book starts with a discussion of the history of cryptography, including a description of the basic encryption systems and many of the cipher systems used in the twentieth century. The author then discusses the theory of symmetric- and public-key cryptography. Readers not only discover what cryptography can do to protect sensitive data, but also learn the practical limitations of the technology. The book ends with two chapters that explore a wide range of cryptography applications.

Three basic types of chapters are featured to facilitate learning: Chapters that develop technical skills Chapters that describe a cryptosystem and present a method of analysis Chapters that describe a cryptosystem, present a method of analysis, and provide problems to test your grasp of the material and your ability to implement practical solutions

With consumers becoming increasingly wary of identity theft and companies struggling to develop safe, secure systems, this book is essential reading for professionals in e-commerce and information technology. Written by a professor who teaches cryptography, it is also ideal for students.

Quality Assurance + Cryptography + Raspberry Pi 2 (Paperback): Solis Tech Quality Assurance + Cryptography + Raspberry Pi 2 (Paperback)
Solis Tech
R253 Discovery Miles 2 530 Ships in 10 - 15 working days
Cryptography - Cryptography Theory & Practice Made Easy! (Paperback): Solis Tech Cryptography - Cryptography Theory & Practice Made Easy! (Paperback)
Solis Tech
R266 Discovery Miles 2 660 Ships in 10 - 15 working days
Improving your C# Skills - Solve modern challenges with functional programming and test-driven techniques of C# (Paperback):... Improving your C# Skills - Solve modern challenges with functional programming and test-driven techniques of C# (Paperback)
Ovais Mehboob Ahmed Khan, John Callaway, Clayton Hunt, Rod Stephens
R1,346 Discovery Miles 13 460 Ships in 9 - 17 working days

Conquer complex and interesting programming challenges by building robust and concurrent applications with caches, cryptography, and parallel programming. Key Features Understand how to use .NET frameworks like the Task Parallel Library (TPL)and CryptoAPI Develop a containerized application based on microservices architecture Gain insights into memory management techniques in .NET Core Book DescriptionThis Learning Path shows you how to create high performing applications and solve programming challenges using a wide range of C# features. You'll begin by learning how to identify the bottlenecks in writing programs, highlight common performance pitfalls, and apply strategies to detect and resolve these issues early. You'll also study the importance of micro-services architecture for building fast applications and implementing resiliency and security in .NET Core. Then, you'll study the importance of defining and testing boundaries, abstracting away third-party code, and working with different types of test double, such as spies, mocks, and fakes. In addition to describing programming trade-offs, this Learning Path will also help you build a useful toolkit of techniques, including value caching, statistical analysis, and geometric algorithms. This Learning Path includes content from the following Packt products: C# 7 and .NET Core 2.0 High Performance by Ovais Mehboob Ahmed Khan Practical Test-Driven Development using C# 7 by John Callaway, Clayton Hunt The Modern C# Challenge by Rod Stephens What you will learn Measure application performance using BenchmarkDotNet Leverage the Task Parallel Library (TPL) and Parallel Language Integrated Query (PLINQ)library to perform asynchronous operations Modify a legacy application to make it testable Use LINQ and PLINQ to search directories for files matching patterns Find areas of polygons using geometric operations Randomize arrays and lists with extension methods Use cryptographic techniques to encrypt and decrypt strings and files Who this book is forIf you want to improve the speed of your code and optimize the performance of your applications, or are simply looking for a practical resource on test driven development, this is the ideal Learning Path for you. Some familiarity with C# and .NET will be beneficial.

Leading Issues in Cyber Warfare and Security (Paperback): Julie Ryan Leading Issues in Cyber Warfare and Security (Paperback)
Julie Ryan
R829 Discovery Miles 8 290 Ships in 10 - 15 working days
Entzifferte Geheimnisse - Methoden Und Maximen Der Kryptologie (German, Hardcover, 3rd 3., Uberarb. U. Erw. Aufl. 2000 ed.):... Entzifferte Geheimnisse - Methoden Und Maximen Der Kryptologie (German, Hardcover, 3rd 3., Uberarb. U. Erw. Aufl. 2000 ed.)
Friedrich L. Bauer
R1,696 Discovery Miles 16 960 Ships in 12 - 19 working days

Die Kryptologie, eine jahrtausendealte "Geheimwissenschaft," gewinnt zusehends praktische Bedeutung fur den Schutz von Kommunikationswegen, Datenbanken und Software. Neben ihre Nutzung in rechnergestutzten offentlichen Nachrichtensystemen ("public keys") treten mehr und mehr rechnerinterne Anwendungen, wie Zugriffsberechtigungen und der Quellenschutz von Software. - Der erste Teil des Buches behandelt die Geheimschriften und ihren Gebrauch - die Kryptographie. Dabei wird auch auf das aktuelle Thema "Kryptographie und Grundrechte des Burgers" eingegangen. Im zweiten Teil wird das Vorgehen zum unbefugten Entziffern einer Geheimschrift - die Kryptanalyse - besprochen, wobei insbesondere Hinweise zur Beurteilung der Verfahrenssicherheit gegeben werden. Mit der vorliegenden dritten Auflage wurde das Werk auf den neuesten Stand gebracht. - Das Buch setzt nur mathematische Grundkenntnisse voraus. Mit einer Fulle spannender, lustiger und bisweilen anzuglicher Geschichten aus der historischen Kryptologie gewurzt, ist es auch fur Laien reizvoll zu lesen."

Essential PHP Security (Paperback): Chris Shiflett Essential PHP Security (Paperback)
Chris Shiflett
R698 R614 Discovery Miles 6 140 Save R84 (12%) Ships in 10 - 15 working days

Being highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web development tools in use today. It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks. Security is an issue that demands attention, given the growing frequency of attacks on web sites. Essential PHP Security explains the most common types of attacks and how to write code that isn't susceptible to them. By examining specific attacks and the techniques used to protect against them, you will have a deeper understanding and appreciation of the safeguards you are about to learn in this book. In the much-needed (and highly-requested) Essential PHP Security, each chapter covers an aspect of a web application (such as form processing, database programming, session management, and authentication). Chapters describe potential attacks with examples and then explain techniques to help you prevent those attacks. Topics covered include: * Preventing cross-site scripting (XSS) vulnerabilities * Protecting against SQL injection attacks * Complicating session hijacking attempts You are in good hands with author Chris Shiflett, an internationally-recognized expert in the field of PHP security. Shiflett is also the founder and President of Brain Bulb, a PHP consultancy that offers a variety of services to clients around the world.

Mapping Hacks (Paperback): Schuyler Erle Mapping Hacks (Paperback)
Schuyler Erle; Contributions by Rich Gibson, Jo Walsh
R751 R605 Discovery Miles 6 050 Save R146 (19%) Ships in 12 - 19 working days

Since the dawn of creation, man has designed maps to help identify the space that we occupy. From Lewis and Clark's pencil-sketched maps of mountain trails to Jacques Cousteau's sophisticated charts of the ocean floor, creating maps of the utmost precision has been a constant pursuit. So why should things change now?

Well, they shouldn't. The reality is that map creation, or "cartography," has only improved in its ease-of-use over time. In fact, with the recent explosion of inexpensive computing and the growing availability of public mapping data, mapmaking today extends all the way to the ordinary PC user.

"Mapping Hacks," the latest page-turner from O'Reilly Press, tackles this notion head on. It's a collection of one hundred simple--and mostly free--techniques available to developers and power users who want draw digital maps or otherwise visualize geographic data. Authors Schuyler Erle, Rich Gibson, and Jo Walsh do more than just illuminate the basic concepts of location and cartography, they walk you through the process one step at a time.

"Mapping Hacks" shows you where to find the best sources of geographic data, and then how to integrate that data into your own map. But that's just an appetizer. This comprehensive resource also shows you how to interpret and manipulate unwieldy cartography data, as well as how to incorporate personal photo galleries into your maps. It even provides practical uses for GPS (Global Positioning System) devices--those touch-of-a-button street maps integrated into cars and mobile phones. Just imagine: If Captain Kidd had this technology, we'd all know where to find his buried treasure!

With all of these industrial-strength tips andtools, "Mapping Hacks" effectively takes the sting out of the digital mapmaking and navigational process. Now you can create your own maps for business, pleasure, or entertainment--without ever having to sharpen a single pencil.

Practical UNIX and Internet Security (Paperback, 3rd Revised edition): Simson Garfinkel, Gene Spafford, Alan Schwartz Practical UNIX and Internet Security (Paperback, 3rd Revised edition)
Simson Garfinkel, Gene Spafford, Alan Schwartz
R1,479 R1,259 Discovery Miles 12 590 Save R220 (15%) Ships in 10 - 15 working days

This new edition of Practical Unix & Internet Security provides detailed coverage of today's increasingly important security and networking issues. Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.

Hardening Cisco Routers (Paperback): Thomas Akin Hardening Cisco Routers (Paperback)
Thomas Akin
R607 R551 Discovery Miles 5 510 Save R56 (9%) Ships in 10 - 15 working days

This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. This is a reference for protecting the protectors, and author Thomas Akin supplies all the tools necessary to turn a potential vulnerability into a strength.

Security Awareness - Applying Practical Security in Your World (Paperback, 5th edition): Mark Ciampa Security Awareness - Applying Practical Security in Your World (Paperback, 5th edition)
Mark Ciampa
R1,125 Discovery Miles 11 250 Ships in 2 - 4 working days

Designed to provide you with the knowledge needed to protect computers and networks from increasingly sophisticated attacks, SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fifth Edition continues to present the same straightforward, practical information that has made previous editions so popular. For most computer users, practical computer security poses some daunting challenges: What type of attacks will antivirus software prevent? How do I set up a firewall? How can I test my computer to be sure that attackers cannot reach it through the Internet? When and how should I install Windows patches? This text is designed to help you understand the answers to these questions through a series of real-life user experiences. In addition, hands-on projects and case projects give you the opportunity to test your knowledge and apply what you have learned. SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fifth Edition contains up-to-date information on relevant topics such as protecting mobile devices and wireless local area networks.

Security Warrior (Paperback): Cyrus Peikari Security Warrior (Paperback)
Cyrus Peikari; Contributions by Anton Chuvakin
R1,097 R837 Discovery Miles 8 370 Save R260 (24%) Ships in 12 - 19 working days

When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.

What's the worst an attacker can do to you? You'd better find out, right? That's what "Security Warrior" teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, "Security Warrior" reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle.

"Security Warrior" places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability.

"Security Warrior" is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.

Global Electronic Commerce - A Policy Primer (Paperback, illustrated edition): Catherine Mann, Sue Eckert, Sarah Cleeland Knight Global Electronic Commerce - A Policy Primer (Paperback, illustrated edition)
Catherine Mann, Sue Eckert, Sarah Cleeland Knight
R691 Discovery Miles 6 910 Ships in 10 - 15 working days

Electronic commerce is changing the way that businesses and consumers interact with each other; the products they create, buy, and sell; and the way that they communicate, learn, and become informed. How can policymakers position their countries and themselves to take advantage of this new environment? How should policymaking adjust to a more global, more networked, and more information-rich marketplace where relationships and jurisdictions between the governments, businesses, and citizens of different countries increasingly overlap? How can governments effectively harness rapidly changing technologies and partner with both domestic and foreign private sectors to reap the greatest benefits for their constituents?

This primer answers these questions using both general analysis and specific examples. It addresses in particular the needs of policymakers in emerging markets who must formulate and refine policies that affect e-commerce in areas ranging from telecommunications and finance to international trade and domestic distribution as well as taxation and privacy. Companies considering doing business in these economies also will find that the examples offer insights into the issues that policymakers face, the different policy approaches that they choose, and the market opportunities that result as more and more economies embrace global electronic commerce.

Oracle Forensics - Accessing Oracle Security Vulnerabilities (Paperback, New): Paul M. Wright Oracle Forensics - Accessing Oracle Security Vulnerabilities (Paperback, New)
Paul M. Wright
R1,622 Discovery Miles 16 220 Ships in 10 - 15 working days

Today's Oracle professionals are challenged to protect their mission-critical data from many types of threats. Electronic data is being stolen is record amounts, and criminals are constantly devising sophisticated tools to breech your Oracle firewall. With advanced Oracle Forensics we can now proactively ensure the safety and security of our Oracle data, and all Oracle Forensics techniques are part of the due diligence that is required for all production databases. A failure to apply Forensics techniques to identify unseen threats can lead to a disaster, and this book is required reading for every Oracle DBA. This indispensable book is authored by Paul Wright, the world's top Oracle forensics expert, and the father of the field of Oracle Forensics. Packed with insights and expert tips, this is the definitive reference for all Oracle professional who are charged with protecting their valuable corporate information.

Combinatorial Designs for Authentication and Secrecy Codes (Paperback, New): Michael Huber Combinatorial Designs for Authentication and Secrecy Codes (Paperback, New)
Michael Huber
R1,752 Discovery Miles 17 520 Ships in 10 - 15 working days

Combinatorial Designs for Authentication and Secrecy Codes is a succinct in-depth review and tutorial of a subject that promises to lead to major advances in computer and communication security. This monograph provides a tutorial on combinatorial designs, which gives an overview of the theory. Furthermore, the application of combinatorial designs to authentication and secrecy codes is described in depth. This close relationship of designs with cryptography and information security was first revealed in Shannon's seminal paper on secrecy systems. The authors bring together in one source foundational and current contributions concerning design-theoretic constructions and characterizations of authentication and secrecy codes.

Secure Programming Cookbook for C & C++ (Paperback): John Viega Secure Programming Cookbook for C & C++ (Paperback)
John Viega; Contributions by Matt Messier
R1,827 R1,462 Discovery Miles 14 620 Save R365 (20%) Ships in 9 - 17 working days

Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix® (including Linux®) and Windows® environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.

Security Assessment in Vehicular Networks (Paperback, 2013 ed.): Suguo Du, Haojin Zhu Security Assessment in Vehicular Networks (Paperback, 2013 ed.)
Suguo Du, Haojin Zhu
R1,653 Discovery Miles 16 530 Ships in 10 - 15 working days

This book presents several novel approaches to model the interaction between the attacker and the defender and assess the security of Vehicular Ad Hoc Networks (VANETs). The first security assessment approach is based on the attack tree security assessment model, which leverages tree based methods to analyze the risk of the system and identify the possible attacking strategies the adversaries may launch. To further capture the interaction between the attacker and the defender, the authors propose to utilize the attack-defense tree model to express the potential countermeasures which could mitigate the system. By considering rational participants that aim to maximize their payoff function, the brief describes a game-theoretic analysis approach to investigate the possible strategies that the security administrator and the attacker could adopt. A phased attack-defense game allows the reader to model the interactions between the attacker and defender for VANET security assessment. The brief offers a variety of methods for assessing the security of wireless networks. Professionals and researchers working on the defense of VANETs will find this material valuable.

VPNs: A Beginner's Guide (Paperback): John Mairs VPNs: A Beginner's Guide (Paperback)
John Mairs
R1,305 R1,118 Discovery Miles 11 180 Save R187 (14%) Ships in 10 - 15 working days

Ideal for connecting branch offices and remote workers, Virtual Private Networks (VPNs) provide a cost-effective, secure method for connecting to a network. This book is a step-by-step guide to deploying one of the fastest growing methods for remote access, global connections, and extranet connectivity. From understanding VPN technology to security features of VPN to actual implementations, this book covers it all.

RFID  Security and Privacy - 7th International Workshop, RFIDsec 2011, Amherst,  MA, USA, June 26-28, 2011, Revised Selected... RFID Security and Privacy - 7th International Workshop, RFIDsec 2011, Amherst, MA, USA, June 26-28, 2011, Revised Selected Papers (Paperback, 2012)
Ari Juels, Christof Paar
R1,498 Discovery Miles 14 980 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-worksop proceedings of the 7th International Workshop Radio Frequency Identification: Security and Privacy Issues. RFIDSec 2011, held in Amherst, Massachusetts, USA, in June 2011. The 12 revised full papers presented were carefully reviewed and selected from 21 initial submissions for inclusion in the book. The papers focus on minimalism in cryptography, on-tag cryptography, securing RFID with physics, and protocol-level security in RFID.

Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011, Toulouse, France, August 29 -... Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011, Proceedings (Paperback)
Steven Furnell, Costas Lambrinoudakis, Gunther Pernul
R1,873 Discovery Miles 18 730 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2011, held in Toulouse, France, in August/September 2011 in conjunction with DEXA 2011. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: identity and trust management; security and privacy models for pervasive information systems; reliability and security of content and data; authentication and authorization in digital business; intrusion detection and information filtering; management of privacy and confidentiality; and cryptographic protocols/usability of security.

Data Security in Cloud Computing, Volume I (Paperback): Giulio D'Agostino Data Security in Cloud Computing, Volume I (Paperback)
Giulio D'Agostino
R1,134 R941 Discovery Miles 9 410 Save R193 (17%) Ships in 10 - 15 working days
Computers Under Attack - Intruders, Worms and Viruses (Paperback, New): Peter Denning Computers Under Attack - Intruders, Worms and Viruses (Paperback, New)
Peter Denning
R1,101 Discovery Miles 11 010 Ships in 10 - 15 working days

This book is broken down into 6 parts. The first describes the emergence of a worldwide network of computers, here called Worldnet, and the practices that people have engaged in as a result. The second part describes the problem of electronic breakins. The third part deals with the phenomenon of worms. The fourth part deals with viruses. The fifth part of the book gives a glimpse of the worlds in which hackers live. The final part deals with the social context in which people make ethical and moral interpretations and propose new laws.

Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008, Proceedings (Paperback, 2008 ed.)
Nigel Smart
R1,605 Discovery Miles 16 050 Ships in 10 - 15 working days

These are the proceedings of Eurocrypt 2008, the 27th Annual IACR Eu- crypt Conference. The conference was sponsored by the International Asso- ation for Cryptologic Research (www.iacr.org), this year in cooperation with Tubitak (www.tubitak.gov.tr). The Eurocrypt 2008 Program Committee (PC) consisted of 28 members whose names are listed on the next page. There were 163 papers submitted to the conference and the PC chose 31 of them. Each paper was assigned to at least three PC members, who either handled it themselves or assigned it to an external referee. After the reviews were submitted, the committee deliberated both online for severalweeks and?nally ina face-to-facemeetingheldinBristol. Papers were refereed anonymously, with PC papers having a minimum of ?ve reviewers. All of our deliberations were aided by theWeb Submission and- viewSoftware written and maintainedby Shai Halevi. In addition to noti?cation of the decision of the committee, authors received reviews; the default for any report given to the committee was that it should be available to the authors as well.

Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings... Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings (Paperback, 2007 ed.)
Josef Pieprzyk, Hossein Ghodosi, Ed Dawson
R1,580 Discovery Miles 15 800 Ships in 10 - 15 working days

Here is a highly relevant book that covers a wide array of key aspects in information security. It constitutes the refereed proceedings of the 12th Australasian Conference on Information Security and Privacy held in Townsville, Australia in July 2007. The 33 revised full papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on stream ciphers, hashing, biometrics, secret sharing, cryptanalysis, public key cryptography, authentication, e-commerce, and security.

Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings... Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings (Paperback, 2007 ed.)
Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang, Qing Yang, …
R1,645 Discovery Miles 16 450 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2007, held in Chengdu, China in April 2007. Coverage includes crime analysis, emergency response and surveillance, intrusion detection, network security, data and text mining, cybercrime and information access and security, intrusion detection, network security, terrorism informatics and crime analysis.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,573 Discovery Miles 35 730
Implementing the ISO/IEC 27001…
Edward Humphreys Hardcover R2,400 Discovery Miles 24 000
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R834 Discovery Miles 8 340
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,692 Discovery Miles 66 920
Applied Cryptography for Cyber Security…
Hamid R. Nemati, Yang Li Hardcover R4,993 Discovery Miles 49 930
Information Security - Foundations…
Ali Ismail Awad, Michael Fairhurst Hardcover R3,728 R3,357 Discovery Miles 33 570
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R673 Discovery Miles 6 730
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R539 Discovery Miles 5 390
Cryptocurrencies and Blockchain…
Keizer Soeze Hardcover R1,469 R1,221 Discovery Miles 12 210
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R819 Discovery Miles 8 190

 

Partners