0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (86)
  • R500+ (1,283)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Exploring Blockchain in Healthcare - Implementation and Impact of Distributed Database Across Pharmaceutical Supply Chain,... Exploring Blockchain in Healthcare - Implementation and Impact of Distributed Database Across Pharmaceutical Supply Chain, Drugs Administration, Healthcare Insurance and Patient Administration (Paperback)
Anurag Srivastava
R1,000 Discovery Miles 10 000 Ships in 18 - 22 working days
Nft for Beginners - Learn the Basics of Investing in Digital Crypto Art and Collectibles to Make a Profit (2022 Guide for... Nft for Beginners - Learn the Basics of Investing in Digital Crypto Art and Collectibles to Make a Profit (2022 Guide for Newbies) (Paperback)
Shaun Badman
R557 R506 Discovery Miles 5 060 Save R51 (9%) Ships in 18 - 22 working days
Puzzles on Cypercrime and God's Mathematics (Paperback): John Ting Puzzles on Cypercrime and God's Mathematics (Paperback)
John Ting
R307 Discovery Miles 3 070 Ships in 18 - 22 working days
Metaverse Investing & Marketing Book - Guide to Web 3.0, Non-Fungible Tokens (NFTs) Virtual Real Estate, Games, Development and... Metaverse Investing & Marketing Book - Guide to Web 3.0, Non-Fungible Tokens (NFTs) Virtual Real Estate, Games, Development and Future of the metaverse. (Paperback)
Doran Pauley
R572 Discovery Miles 5 720 Ships in 18 - 22 working days
Limitations and Future Applications of Quantum Cryptography (Paperback): Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia,... Limitations and Future Applications of Quantum Cryptography (Paperback)
Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia, Raees Ahmad Khan
R4,736 Discovery Miles 47 360 Ships in 18 - 22 working days

The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country's sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography. Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing.

Ethereum - Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency (Paperback): Paul Paxton Ethereum - Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency (Paperback)
Paul Paxton
R318 R291 Discovery Miles 2 910 Save R27 (8%) Ships in 18 - 22 working days
Impact of Digital Transformation on Security Policies and Standards (Paperback): Gunasekaran Manogaran, Bharath Bhushan, Sam... Impact of Digital Transformation on Security Policies and Standards (Paperback)
Gunasekaran Manogaran, Bharath Bhushan, Sam Goundar, Vaishali Ravindra Thakare
R4,594 Discovery Miles 45 940 Ships in 18 - 22 working days

Digital transformation is a revolutionary technology that will play a vital role in major industries, including global governments. These administrations are taking the initiative to incorporate digital programs with their objective being to provide digital infrastructure as a basic utility for every citizen, provide on demand services with superior governance, and empower their citizens digitally. However, security and privacy are major barriers in adopting these mechanisms, as organizations and individuals are concerned about their private and financial data. Impact of Digital Transformation on Security Policies and Standards is an essential research book that examines the policies, standards, and mechanisms for security in all types of digital applications and focuses on blockchain and its imminent impact on financial services in supporting smart government, along with bitcoin and the future of digital payments. Highlighting topics such as cryptography, privacy management, and e-government, this book is ideal for security analysts, data scientists, academicians, policymakers, security professionals, IT professionals, government officials, finance professionals, researchers, and students.

Luck Follows the Brave - From Refugee Camps, Abuse, and Suicide Loss to Living the Dream (Paperback): Aida S?ibic? Luck Follows the Brave - From Refugee Camps, Abuse, and Suicide Loss to Living the Dream (Paperback)
Aida Šibić; Edited by Laura L Bush
R448 Discovery Miles 4 480 Ships in 18 - 22 working days
Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency... Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency + 10 Best Defi Projects and Strategies to Maximize Your Profits (Paperback)
Harper Fraley
R573 R517 Discovery Miles 5 170 Save R56 (10%) Ships in 18 - 22 working days
Nomenclatura - Encyclopedia of modern Cryptography and Internet Security - From AutoCrypt and Exponential Encryption to... Nomenclatura - Encyclopedia of modern Cryptography and Internet Security - From AutoCrypt and Exponential Encryption to Zero-Knowledge-Proof Keys [Paperback] (Paperback)
Linda A Bertram, Gunther Van Dooble
R809 Discovery Miles 8 090 Ships in 18 - 22 working days
NFT (Non-Fungible Token) For Beginners - THE QUICK & EASY GUIDE Explore The Top NFT Collections Across Multiple Protocols Like... NFT (Non-Fungible Token) For Beginners - THE QUICK & EASY GUIDE Explore The Top NFT Collections Across Multiple Protocols Like Ethereum, BSC, And Flow (Paperback)
Megalodona Streamings
R395 R365 Discovery Miles 3 650 Save R30 (8%) Ships in 18 - 22 working days
Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Paperback): Rebecca Slayton Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Paperback)
Rebecca Slayton
R2,035 Discovery Miles 20 350 Ships in 18 - 22 working days

In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more. While other books have documented the development of public key cryptography, this is the first to provide a comprehensive insiders' perspective on the full impacts of public key cryptography, including six original chapters by nine distinguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman. The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy.

Introduction to Bitcoin - Understanding Peer-to-Peer Networks, Digital Signatures, the Blockchain, Proof-of-Work, Mining,... Introduction to Bitcoin - Understanding Peer-to-Peer Networks, Digital Signatures, the Blockchain, Proof-of-Work, Mining, Network Attacks, Bitcoin Core Software, and Wallet Safety (With Color Images & Diagrams) (Paperback)
David Ricardo
R256 Discovery Miles 2 560 Ships in 18 - 22 working days
The Crypto Kid (Paperback): Jackson Shembekar The Crypto Kid (Paperback)
Jackson Shembekar
R323 R298 Discovery Miles 2 980 Save R25 (8%) Ships in 18 - 22 working days
Cryptocurrency for Beginners - How to Master Blockchain, Defi and start Investing in Bitcoin and Altcoins (Paperback): Zeph... Cryptocurrency for Beginners - How to Master Blockchain, Defi and start Investing in Bitcoin and Altcoins (Paperback)
Zeph Pascall
R638 Discovery Miles 6 380 Ships in 18 - 22 working days
Metaverse Mastery - Understand and Profit from Virtual Worlds and Land, NFTs, Web3, Blockchain, VR, Gaming, A.I, Art &... Metaverse Mastery - Understand and Profit from Virtual Worlds and Land, NFTs, Web3, Blockchain, VR, Gaming, A.I, Art & Cryptocurrencies (Paperback)
Cameron Belford
R298 Discovery Miles 2 980 Ships in 18 - 22 working days
Essential Cryptography for JavaScript Developers - A practical guide to leveraging common cryptographic operations in Node.js... Essential Cryptography for JavaScript Developers - A practical guide to leveraging common cryptographic operations in Node.js and the browser (Paperback)
Alessandro Segala
R901 Discovery Miles 9 010 Ships in 18 - 22 working days

Discover how to take advantage of common cryptographic operations to build safer apps that respect users' privacy with the help of examples in JavaScript for Node.js and browsers Key Features Understand how to implement common cryptographic operations in your code with practical examples Learn about picking modern safe algorithms, which libraries you should rely on, and how to use them correctly Build modern and secure applications that respect your users' privacy with cryptography Book DescriptionIf you're a software developer, this book will give you an introduction to cryptography, helping you understand how to make the most of it for your applications. The book contains extensive code samples in JavaScript, both for Node.js and for frontend apps running in a web browser, although the core concepts can be used by developers working with any programming language and framework. With a purely hands-on approach that is focused on sharing actionable knowledge, you'll learn about the common categories of cryptographic operations that you can leverage in all apps you're developing, including hashing, encryption with symmetric, asymmetric and hybrid ciphers, and digital signatures. You'll learn when to use these operations and how to choose and implement the most popular algorithms to perform them, including SHA-2, Argon2, AES, ChaCha20-Poly1305, RSA, and Elliptic Curve Cryptography. Later, you'll learn how to deal with password and key management. All code in this book is written in JavaScript and designed to run in Node.js or as part of frontend apps for web browsers. By the end of this book, you'll be able to build solutions that leverage cryptography to protect user privacy, offer better security against an expanding and more complex threat landscape, help meet data protection requirements, and unlock new opportunities. What you will learn Write JavaScript code that uses cryptography running within a Node.js environment for the server-side or in frontend applications for web browsers Use modern, safe hashing functions for calculating digests and key derivation, including SHA-2 and Argon2 Practice encrypting messages and files with a symmetric key using AES and ChaCha20-Poly1305 Use asymmetric and hybrid encryption, leveraging RSA and Elliptic Curve Cryptography with ECDH and ECIES Calculate and verify digital signatures using RSA and ECDSA/EdDSA Manage passwords and encryption keys safely Who this book is forThis cryptography book is an introductory guide for software developers who don't necessarily have a background in cryptography but are interested in learning how to integrate it in their solutions, correctly and safely. You'll need to have at least intermediate-level knowledge of building apps with JavaScript and familiarity with Node.js to make the most of this book.

Computer & Internet Security - A Hands-on Approach (Paperback, 3rd ed.): Wenliang Du Computer & Internet Security - A Hands-on Approach (Paperback, 3rd ed.)
Wenliang Du
R1,630 Discovery Miles 16 300 Ships in 18 - 22 working days
Guideline for Using Cryptographic Standards in the Federal Government - Cryptographic Mechanisms: NIST SP 800-175B Rev. 1... Guideline for Using Cryptographic Standards in the Federal Government - Cryptographic Mechanisms: NIST SP 800-175B Rev. 1 (Paperback)
National Institute of Standards and Tech
R526 Discovery Miles 5 260 Ships in 18 - 22 working days
Password Log Book and Internet Addresses I Can't Remember (Paperback): Pick Me Read Me Press Password Log Book and Internet Addresses I Can't Remember (Paperback)
Pick Me Read Me Press
R280 R258 Discovery Miles 2 580 Save R22 (8%) Ships in 18 - 22 working days
Computer Security - A Hands-on Approach (Paperback, 3rd ed.): Wenliang Du Computer Security - A Hands-on Approach (Paperback, 3rd ed.)
Wenliang Du
R1,173 Discovery Miles 11 730 Ships in 18 - 22 working days
CYBERSECURITY and HACKING for Beginners - The Essential Guide to Mastering Computer Network Security and Learning all the... CYBERSECURITY and HACKING for Beginners - The Essential Guide to Mastering Computer Network Security and Learning all the Defensive Actions to Protect Yourself from Network Dangers, Including the Basics of Kali Linux (Paperback)
Robert M Huss
R433 R399 Discovery Miles 3 990 Save R34 (8%) Ships in 18 - 22 working days
Kali Linux - Comprehensive Beginners Guide to Learn Kali Linux Step by Step (Paperback): Ethan Thorpe Kali Linux - Comprehensive Beginners Guide to Learn Kali Linux Step by Step (Paperback)
Ethan Thorpe
R499 Discovery Miles 4 990 Ships in 18 - 22 working days
Utilizing Blockchain Technologies in Manufacturing and Logistics Management (Paperback): S. B. Goyal, Nijalingappa Pradeep,... Utilizing Blockchain Technologies in Manufacturing and Logistics Management (Paperback)
S. B. Goyal, Nijalingappa Pradeep, Piyush Kumar Shukla, Mangesh M. Ghonge, Renjith V. Ravi
R4,736 Discovery Miles 47 360 Ships in 18 - 22 working days

Blockchain technology has the potential to utterly transform supply chains, streamline processes, and improve the whole of security. Manufacturers across the globe face challenges with forecasting demand, controlling inventory, and accelerating digital transformation to cater to the challenges of changing market dynamics and evolving customer expectations. Hence, blockchain should be seen as an investment in future-readiness and customer-centricity, not as an experimental technology. Utilizing Blockchain Technologies in Manufacturing and Logistics Management explores the strengths of blockchain adaptation in manufacturing industries and logistics management, which include product traceability, supply chain transparency, compliance monitoring, and auditability, and also examines the current open issues and future research trends of blockchain. Leveraging blockchain technology into a manufacturing enterprise can enhance its security and reduce the rates of systematic failures. Covering topics such as fraud detection, Industry 4.0, and security threats, this book is a ready premier reference for graduate and post-graduate students, academicians, researchers, industrialists, consultants, and entrepreneurs, as well as micro, small, and medium enterprises.

Cryptocurrency Trading - A Crypto Investing Guide for Beginners - BITCOIN, ETHEREUM, LITECOIN (Paperback): Megalodona Streamings Cryptocurrency Trading - A Crypto Investing Guide for Beginners - BITCOIN, ETHEREUM, LITECOIN (Paperback)
Megalodona Streamings
R342 R314 Discovery Miles 3 140 Save R28 (8%) Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Dark Heart
Tom Riley, Anjli Mohindra, … DVD R368 Discovery Miles 3 680
Java 7 Pocket Guide
Robert Liguori Paperback R334 R311 Discovery Miles 3 110
eMarketing: Marketing in a Digital World
Yathika Gowpall Paperback R440 Discovery Miles 4 400
Billions - Season 7 - The Final Season
Damian Lewis, Paul Giamatti, … DVD R526 Discovery Miles 5 260
Object-Process Methodology - A Holistic…
E. F. Crawley Hardcover R2,476 Discovery Miles 24 760
Fullstack D3 and Data Visualization…
Amelia Wattenberger Hardcover R2,500 Discovery Miles 25 000
Silent Witness - Season 22
Emilia Fox, David Caves, … DVD R529 R315 Discovery Miles 3 150
The Crown - Season 4
Olivia Colman, Gillian Anderson, … DVD  (1)
R417 Discovery Miles 4 170
The White Lotus - Season 3
Leslie Bibb, Walton Goggins DVD R585 Discovery Miles 5 850
Frozen Planet - The Complete Series
David Attenborough DVD  (1)
R620 R330 Discovery Miles 3 300

 

Partners