0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (101)
  • R500+ (1,350)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Computers Under Attack - Intruders, Worms and Viruses (Paperback, New): Peter Denning Computers Under Attack - Intruders, Worms and Viruses (Paperback, New)
Peter Denning
R1,060 Discovery Miles 10 600 Ships in 10 - 15 working days

This book is broken down into 6 parts. The first describes the emergence of a worldwide network of computers, here called Worldnet, and the practices that people have engaged in as a result. The second part describes the problem of electronic breakins. The third part deals with the phenomenon of worms. The fourth part deals with viruses. The fifth part of the book gives a glimpse of the worlds in which hackers live. The final part deals with the social context in which people make ethical and moral interpretations and propose new laws.

Guide to Network Defense and Countermeasures (Paperback, 3rd edition): Randy Weaver, Dawn Weaver, Dean Farwood Guide to Network Defense and Countermeasures (Paperback, 3rd edition)
Randy Weaver, Dawn Weaver, Dean Farwood
R1,785 Discovery Miles 17 850 Ships in 9 - 15 working days

GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES provides a thorough guide to perimeter defense fundamentals, including intrusion detection and firewalls. This trusted text also covers more advanced topics such as security policies, network address translation (NAT), packet filtering and analysis, proxy servers, virtual private networks (VPN), and network traffic signatures. Thoroughly updated, the new third edition reflects the latest technology, trends, and techniques including virtualization, VMware, IPv6, and ICMPv6 structure, making it easier for current and aspiring professionals to stay on the cutting edge and one step ahead of potential security threats. A clear writing style and numerous screenshots and illustrations make even complex technical material easier to understand, while tips, activities, and projects throughout the text allow you to hone your skills by applying what you learn. Perfect for students and professionals alike in this high-demand, fast-growing field, GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES, Third Edition, is a must-have resource for success as a network security professional.

Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008, Proceedings (Paperback, 2008 ed.)
Nigel Smart
R1,552 Discovery Miles 15 520 Ships in 10 - 15 working days

These are the proceedings of Eurocrypt 2008, the 27th Annual IACR Eu- crypt Conference. The conference was sponsored by the International Asso- ation for Cryptologic Research (www.iacr.org), this year in cooperation with Tubitak (www.tubitak.gov.tr). The Eurocrypt 2008 Program Committee (PC) consisted of 28 members whose names are listed on the next page. There were 163 papers submitted to the conference and the PC chose 31 of them. Each paper was assigned to at least three PC members, who either handled it themselves or assigned it to an external referee. After the reviews were submitted, the committee deliberated both online for severalweeks and?nally ina face-to-facemeetingheldinBristol. Papers were refereed anonymously, with PC papers having a minimum of ?ve reviewers. All of our deliberations were aided by theWeb Submission and- viewSoftware written and maintainedby Shai Halevi. In addition to noti?cation of the decision of the committee, authors received reviews; the default for any report given to the committee was that it should be available to the authors as well.

Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings... Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings (Paperback, 2007 ed.)
Josef Pieprzyk, Hossein Ghodosi, Ed Dawson
R1,528 Discovery Miles 15 280 Ships in 10 - 15 working days

Here is a highly relevant book that covers a wide array of key aspects in information security. It constitutes the refereed proceedings of the 12th Australasian Conference on Information Security and Privacy held in Townsville, Australia in July 2007. The 33 revised full papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on stream ciphers, hashing, biometrics, secret sharing, cryptanalysis, public key cryptography, authentication, e-commerce, and security.

Smart Home Hacks (Paperback): Gordon Meyer Smart Home Hacks (Paperback)
Gordon Meyer
R718 R522 Discovery Miles 5 220 Save R196 (27%) Ships in 12 - 17 working days

So much of what is commonplace today was once considered impossible, or at least wishful thinking. Laser beams in the operating room, cars with built-in guidance systems, cell phones with email access. There's just no getting around the fact that technology always has, and always will be, very cool.

But technology isn't only cool; it's also very smart. That's why one of the hottest technological trends nowadays is the creation of smart homes.

At an increasing rate, people are turning their homes into state-of-the-art machines, complete with more switches, sensors, and actuators than you can shake a stick at. Whether you want to equip your home with motion detectors for added security, install computer-controlled lights for optimum convenience, or even mount an in-home web cam or two purely for entertainment, the world is now your oyster. Ah, but like anything highly technical, creating a smart home is typically easier said than done.

Thankfully, "Smart Home Hacks" takes the guesswork out of the process. Through a seemingly unending array of valuable tips, tools, and techniques, "Smart Home Hacks" explains in clear detail how to use Mac, Windows, or Linux to achieve the automated home of your dreams. In no time, you'll learn how to turn a loose collection of sensors and switches into a well-automated and well-functioning home no matter what your technical level may be.

"Smart Home Hacks" covers a litany of stand-alone and integrated smart home solutions designed to enhance safety, comfort, and convenience in new and existing homes. Kitchens, bedrooms, home offices, living rooms, and even bathrooms are all candidates for smart automation and therefore are all addressed in"Smart Home Hacks,"

Intelligently written by engineering guru and George Jetson wannabe, Gordon Meyer, "Smart Home Hacks" leaves no stone unturned. From what to purchase to how to use your remote control, it's the ultimate guide to understanding and implementing complete or partial home automation.

Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings... Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007, Proceedings (Paperback, 2007 ed.)
Christopher C. Yang, Daniel Zeng, Michael Chau, Kuiyu Chang, Qing Yang, …
R1,592 Discovery Miles 15 920 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2007, held in Chengdu, China in April 2007. Coverage includes crime analysis, emergency response and surveillance, intrusion detection, network security, data and text mining, cybercrime and information access and security, intrusion detection, network security, terrorism informatics and crime analysis.

Hacker's Challenge 3 (Paperback, 3rd edition): David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi Hacker's Challenge 3 (Paperback, 3rd edition)
David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi
R1,685 R1,329 Discovery Miles 13 290 Save R356 (21%) Ships in 10 - 15 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The stories about phishing attacks against banks are so true-to-life, it's chilling." --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker's Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you'll get a detailed analysis of how the experts solved each incident.

Everyday Cryptography - Fundamental Principles and Applications (Paperback, 2nd Revised edition): Keith Martin Everyday Cryptography - Fundamental Principles and Applications (Paperback, 2nd Revised edition)
Keith Martin
R1,705 Discovery Miles 17 050 Ships in 9 - 15 working days

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the Internet, mobile phones, Wi-Fi networks, payment cards, Tor, and Bitcoin. This book is intended to be introductory, self-contained, and widely accessible. It is suitable as a first read on cryptography. Almost no prior knowledge of mathematics is required since the book deliberately avoids the details of the mathematics techniques underpinning cryptographic mechanisms. Instead our focus will be on what a normal user or practitioner of information security needs to know about cryptography in order to understand the design and use of everyday cryptographic applications. By focusing on the fundamental principles of modern cryptography rather than the technical details of current cryptographic technology, the main part this book is relatively timeless, and illustrates the application of these principles by considering a number of contemporary applications of cryptography. Following the revelations of former NSA contractor Edward Snowden, the book considers the wider societal impact of use of cryptography and strategies for addressing this. A reader of this book will not only be able to understand the everyday use of cryptography, but also be able to interpret future developments in this fascinating and crucially important area of technology.

Digital Media Steganography - Principles, Algorithms, and Advances (Paperback): Mahmoud Hassaballah Digital Media Steganography - Principles, Algorithms, and Advances (Paperback)
Mahmoud Hassaballah
R2,513 Discovery Miles 25 130 Ships in 12 - 17 working days

The common use of the Internet and cloud services in transmission of large amounts of data over open networks and insecure channels, exposes that private and secret data to serious situations. Ensuring the information transmission over the Internet is safe and secure has become crucial, consequently information security has become one of the most important issues of human communities because of increased data transmission over social networks. Digital Media Steganography: Principles, Algorithms, and Advances covers fundamental theories and algorithms for practical design, while providing a comprehensive overview of the most advanced methodologies and modern techniques in the field of steganography. The topics covered present a collection of high-quality research works written in a simple manner by world-renowned leaders in the field dealing with specific research problems. It presents the state-of-the-art as well as the most recent trends in digital media steganography.

Hardening Cisco Routers (Paperback): Thomas Akin Hardening Cisco Routers (Paperback)
Thomas Akin
R588 R423 Discovery Miles 4 230 Save R165 (28%) Ships in 12 - 17 working days

This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. This is a reference for protecting the protectors, and author Thomas Akin supplies all the tools necessary to turn a potential vulnerability into a strength.

Theory of Cryptography - First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004,... Theory of Cryptography - First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings (Paperback, 2004 ed.)
Moni Naor
R3,026 Discovery Miles 30 260 Ships in 10 - 15 working days

I thank Sha? Goldwasser for chairing this conference and making all the necessaryarrangementsatMIT.Sha?inturnistremendouslygratefultoJoanne Talbot who coordinated the conference facilities, hotels, Web page, budgets, and the conference chair relentlessly and without a single complaint. Thank you Joanne. I thank Mihir Bellare for chairing the Steering Committee of TCC and the members of the committee (see the list in the pages that follow) for helping out with many issues concerning the conference, including the proceedings and the TCC Web-site. Finally a big thanks is due to Oded Goldreich who initiated this endeavor and pushed hard for it. Rehovot, Israel Moni Naor December 2003 Program Chair TCC 2004 VII External Referees Masayuki Abe Daniel Gottesman Jesper Buus Nielsen Luis van Ahn Jens Groth Adriana Palacio Michael Backes Shai Halevi Erez Petrank Boaz Barak Danny Harnik Benny Pinkas Amos Beimel Alejandro Hevia Tal Rabin Mihir Bellare Thomas Jakobsen Oded Regev Alexandra Boldyreva Markus Jakobsson Amit Sahai Harry Buhrman Ari Juels Jean-Pierre Seifert Christian Cachin Jonathan Katz Adam Smith Jan Camenisch Hugo Krawczyk Martijn Stam Claude Cr epeau Eyal Kushilevitz Yael Tauman Kalai Anand Desai Yehuda Lindell Michael Waidner Yan Zong Ding Anna Lysyanskaya John Watrous Yevgeniy Dodis Tal Malkin Douglas Wikstr] om Marc Fischlin David Meyer Bogdan Warinschi Juan Garay Ashwin Nayak Stephanie Wehner Rosario Gennaro Gregory Neven Ke Yang TCC Steering Committee Mihir Bellare (Chair) UCSD, USA ? Ivan Damg? ard Arhus University, Denmark Oded Goldreich Weizmann Institute, Israel and Radcli?e Institute, USA Sha? Goldwasser MIT, USA and Weizmann Institute, Israel"

Global Electronic Commerce - A Policy Primer (Paperback, illustrated edition): Catherine Mann, Sue Eckert, Sarah Cleeland Knight Global Electronic Commerce - A Policy Primer (Paperback, illustrated edition)
Catherine Mann, Sue Eckert, Sarah Cleeland Knight
R504 R424 Discovery Miles 4 240 Save R80 (16%) Ships in 12 - 17 working days

Electronic commerce is changing the way that businesses and consumers interact with each other; the products they create, buy, and sell; and the way that they communicate, learn, and become informed. How can policymakers position their countries and themselves to take advantage of this new environment? How should policymaking adjust to a more global, more networked, and more information-rich marketplace where relationships and jurisdictions between the governments, businesses, and citizens of different countries increasingly overlap? How can governments effectively harness rapidly changing technologies and partner with both domestic and foreign private sectors to reap the greatest benefits for their constituents?

This primer answers these questions using both general analysis and specific examples. It addresses in particular the needs of policymakers in emerging markets who must formulate and refine policies that affect e-commerce in areas ranging from telecommunications and finance to international trade and domestic distribution as well as taxation and privacy. Companies considering doing business in these economies also will find that the examples offer insights into the issues that policymakers face, the different policy approaches that they choose, and the market opportunities that result as more and more economies embrace global electronic commerce.

Artificial Immune System - Applications in Computer Security (Hardcover): Y Tan Artificial Immune System - Applications in Computer Security (Hardcover)
Y Tan
R2,463 Discovery Miles 24 630 Ships in 12 - 17 working days

This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security * Covers all of the current achievements in computer security based on immune principles, which were obtained by the Computational Intelligence Laboratory of Peking University, China * Includes state-of-the-art information on designing and developing artificial immune systems (AIS) and AIS-based solutions to computer security issues * Presents new concepts such as immune danger theory, immune concentration, and class-wise information gain (CIG)

Sicherheit und Kryptographie im Internet - Theorie und Praxis (German, Paperback, 5., erw. u. akt. Aufl. 2020): Joerg Schwenk Sicherheit und Kryptographie im Internet - Theorie und Praxis (German, Paperback, 5., erw. u. akt. Aufl. 2020)
Joerg Schwenk
R1,798 Discovery Miles 17 980 Ships in 10 - 15 working days

Das vorliegende Buch bietet eine strukturierte, gut lesbare Einfuhrung zu den wichtigsten Sicherheitsstandards im Internet. Hierzu zahlen bekannte Standards wie TLS, OpenPGP, S/MIME, SSH, IPsec und WPA, aber auch die versteckten Sicherheitsfeatures aus der Microsoft-Welt (PPTP, Kerberos), dem Mobilfunk, DNSSEC, Single-Sign-On-Protokollen und Datenformaten wie XML und JSON. Das Verstandnis fur diese Standards und deren Weiterentwicklung wird durch eine detaillierte Beschreibung der bekannten Angriffe vertieft, insbesondere fur TLS liegt hier umfangreiches Material vor. Die 5. Auflage wurde erheblich erweitert und aktualisiert. Neue Themen sind unter anderem die WLAN-Standards WPA2 und WPA3, die neue TLS-Version 1.3, Kerberos, Anti-SPAM-Techniken und moderne Single-Sign-On-Protokolle. Das Thema TLS wird voellig neu dargestellt, und die Kapitel zu E-Mail-Sicherheit und IPsec deutlich erweitert. Eine umfangreiche Einfuhrung in praktische Aspekte der Kryptographie macht dieses Buch ohne zusatzliche Literatur nutzbar.

Improving your C# Skills - Solve modern challenges with functional programming and test-driven techniques of C# (Paperback):... Improving your C# Skills - Solve modern challenges with functional programming and test-driven techniques of C# (Paperback)
Ovais Mehboob Ahmed Khan, John Callaway, Clayton Hunt, Rod Stephens
R1,349 Discovery Miles 13 490 Ships in 10 - 15 working days

Conquer complex and interesting programming challenges by building robust and concurrent applications with caches, cryptography, and parallel programming. Key Features Understand how to use .NET frameworks like the Task Parallel Library (TPL)and CryptoAPI Develop a containerized application based on microservices architecture Gain insights into memory management techniques in .NET Core Book DescriptionThis Learning Path shows you how to create high performing applications and solve programming challenges using a wide range of C# features. You'll begin by learning how to identify the bottlenecks in writing programs, highlight common performance pitfalls, and apply strategies to detect and resolve these issues early. You'll also study the importance of micro-services architecture for building fast applications and implementing resiliency and security in .NET Core. Then, you'll study the importance of defining and testing boundaries, abstracting away third-party code, and working with different types of test double, such as spies, mocks, and fakes. In addition to describing programming trade-offs, this Learning Path will also help you build a useful toolkit of techniques, including value caching, statistical analysis, and geometric algorithms. This Learning Path includes content from the following Packt products: C# 7 and .NET Core 2.0 High Performance by Ovais Mehboob Ahmed Khan Practical Test-Driven Development using C# 7 by John Callaway, Clayton Hunt The Modern C# Challenge by Rod Stephens What you will learn Measure application performance using BenchmarkDotNet Leverage the Task Parallel Library (TPL) and Parallel Language Integrated Query (PLINQ)library to perform asynchronous operations Modify a legacy application to make it testable Use LINQ and PLINQ to search directories for files matching patterns Find areas of polygons using geometric operations Randomize arrays and lists with extension methods Use cryptographic techniques to encrypt and decrypt strings and files Who this book is forIf you want to improve the speed of your code and optimize the performance of your applications, or are simply looking for a practical resource on test driven development, this is the ideal Learning Path for you. Some familiarity with C# and .NET will be beneficial.

Web Security Testing Cookbook (Paperback): Brian Hope Web Security Testing Cookbook (Paperback)
Brian Hope
R935 R670 Discovery Miles 6 700 Save R265 (28%) Ships in 12 - 17 working days

Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc security assessments, these recipes are repeatable, concise, and systematic-perfect for integrating into your regular test suite. Recipes cover the basics from observing messages between clients and servers to multi-phase tests that script the login and execution of web application features. By the end of the book, you'll be able to build tests pinpointed at Ajax functions, as well as large multi-step tests for the usual suspects: cross-site scripting and injection attacks. This book helps you: Obtain, install, and configure useful-and free-security testing tools Understand how your application communicates with users, so you can better simulate attacks in your tests Choose from many different methods that simulate common attacks such as SQL injection, cross-site scripting, and manipulating hidden form fields Make your tests repeatable by using the scripts and examples in the recipes as starting points for automated tests

Don't live in dread of the midnight phone call telling you that your site has been hacked. With Web Security Testing Cookbook and the free tools used in the book's examples, you can incorporate security coverage into your test suite, and sleep in peace.

Multimedia Security Volume 1: Authentication and Data Hiding (Hardcover): W Puech Multimedia Security Volume 1: Authentication and Data Hiding (Hardcover)
W Puech
R3,695 Discovery Miles 36 950 Ships in 12 - 17 working days

Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis.

Snort Cookbook (Paperback): Angela Orebaugh Snort Cookbook (Paperback)
Angela Orebaugh; Contributions by Simon Biles, Jacob Babbin
R936 R672 Discovery Miles 6 720 Save R264 (28%) Ships in 12 - 17 working days

If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new "Snort Cookbook" will save countless hours of sifting through dubious online advice or wordy tutorials in order to leverage the full power of SNORT.

Each recipe in the popular and practical problem-solution-discussion O'Reilly cookbook format contains a clear and thorough description of the problem, a concise but complete discussion of a solution, and real-world examples that illustrate that solution. The "Snort Cookbook" covers important issues that sys admins and security pros will us everyday, such as:

installation

optimization

logging

alerting

rules and signatures

detecting viruses

countermeasures

detecting common attacks

administration

honeypots

log analysis

But the "Snort Cookbook" offers far more than quick cut-and-paste solutions to frustrating security issues. Those who learn best in the trenches--and don't have the hours to spare to pore over tutorials or troll online for best-practice snippets of advice--will find that the solutions offered in this ultimate Snort sourcebook not only solveimmediate problems quickly, but also showcase the best tips and tricks they need to master be security gurus--and still have a life.

Cyber Crime and Cyber Terrorism Investigator's Handbook (Paperback): Babak Akhgar, Andrew Staniforth, Francesca Bosco Cyber Crime and Cyber Terrorism Investigator's Handbook (Paperback)
Babak Akhgar, Andrew Staniforth, Francesca Bosco
R1,084 Discovery Miles 10 840 Ships in 12 - 17 working days

Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare. Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator's Handbook will serve as your best reference to the modern world of cyber crime.

Programming NET Security (Paperback): Adam Freeman Programming NET Security (Paperback)
Adam Freeman
R1,222 R876 Discovery Miles 8 760 Save R346 (28%) Ships in 12 - 17 working days

With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of experience can still allow a program to be used in an unintended way, Programming .NET Security shows you how the various tools will help you write secure applications.

Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I (Paperback, 1st ed. 2019)
Yuval Ishai, Vincent Rijmen
R3,411 Discovery Miles 34 110 Ships in 10 - 15 working days

The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019. The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers are organized into the following topical sections: ABE and CCA security; succinct arguments and secure messaging; obfuscation; block ciphers; differential privacy; bounds for symmetric cryptography; non-malleability; blockchain and consensus; homomorphic primitives; standards; searchable encryption and ORAM; proofs of work and space; secure computation; quantum, secure computation and NIZK, lattice-based cryptography; foundations; efficient secure computation; signatures; information-theoretic cryptography; and cryptanalysis.

Java Security 2e (Paperback, 2nd Revised edition): Scott Oaks Java Security 2e (Paperback, 2nd Revised edition)
Scott Oaks
R1,321 R934 Discovery Miles 9 340 Save R387 (29%) Ships in 12 - 17 working days

The second edition focuses on the platform features of Java that provide security--the class loader, bytecode verifier, and security manager--and recent additions to Java that enhance this security model: digital signatures, security providers, and the access controller. The book covers in depth the security model of Java 2, version 1.3, including the two new security APIs: JAAS and JSSE.

Digital Forensics and Watermarking - 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018,... Digital Forensics and Watermarking - 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings (Paperback, 1st ed. 2019)
Chang D. Yoo, Yun Qing Shi, Hyoung Joong Kim, Alessandro Piva, Gwangsu Kim
R1,501 Discovery Miles 15 010 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17th International Workshop on Digital Forensics and Watermarking, IWDW 2018, held on Jeju Island, Korea, in October 2018.The 25 papers presented in this volume were carefully reviewed and selected from 43 submissions. The contributions are covering the following topics: deep neural networks for digital forensics; steganalysis and identification; watermarking; reversible data hiding; steganographic algorithms; identification and security; deep generative models for forgery and its detection.

Java Crytography (Paperback): Jonathon Knudsen Java Crytography (Paperback)
Jonathon Knudsen
R1,059 R754 Discovery Miles 7 540 Save R305 (29%) Ships in 12 - 17 working days

Java Cryptography teaches you how to write secure programs using Java's cryptographic tools. It includes thorough discussions of the java.security package and the Java Cryptography Extensions (JCE), showing you how to use security providers and even implement your own provider. It discusses authentication, key management, public and private key encryption, and includes a secure talk application that encrypts all data sent over the network. If you work with sensitive data, you'll find this book indispensable.

Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and... Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I (Paperback, 1st ed. 2017)
Tsuyoshi Takagi, Thomas Peyrin
R3,188 Discovery Miles 31 880 Ships in 10 - 15 working days

The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,154 Discovery Miles 31 540
Cryptographic Solutions for Secure…
Kannan Balasubramanian, K. Mala, … Hardcover R5,274 Discovery Miles 52 740
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R784 Discovery Miles 7 840
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,512 Discovery Miles 65 120
Advances in Enterprise Information…
Hardcover R4,863 R4,377 Discovery Miles 43 770
Providing Sound Foundations for…
Oded Goldreich Hardcover R3,177 Discovery Miles 31 770
New Research on the Voynich Manuscript…
National Security Agency Hardcover R503 Discovery Miles 5 030
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R494 Discovery Miles 4 940
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,512 Discovery Miles 65 120
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R639 Discovery Miles 6 390

 

Partners