0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (85)
  • R500+ (1,288)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Nft for Beginners - Learn the Basics of Investing in Digital Crypto Art and Collectibles to Make a Profit (2022 Guide for... Nft for Beginners - Learn the Basics of Investing in Digital Crypto Art and Collectibles to Make a Profit (2022 Guide for Newbies) (Paperback)
Shaun Badman
R557 R506 Discovery Miles 5 060 Save R51 (9%) Ships in 18 - 22 working days
Puzzles on Cypercrime and God's Mathematics (Paperback): John Ting Puzzles on Cypercrime and God's Mathematics (Paperback)
John Ting
R307 Discovery Miles 3 070 Ships in 18 - 22 working days
Metaverse Investing & Marketing Book - Guide to Web 3.0, Non-Fungible Tokens (NFTs) Virtual Real Estate, Games, Development and... Metaverse Investing & Marketing Book - Guide to Web 3.0, Non-Fungible Tokens (NFTs) Virtual Real Estate, Games, Development and Future of the metaverse. (Paperback)
Doran Pauley
R572 Discovery Miles 5 720 Ships in 18 - 22 working days
Metaverse Mastery - Understand and Profit from Virtual Worlds and Land, NFTs, Web3, Blockchain, VR, Gaming, A.I, Art &... Metaverse Mastery - Understand and Profit from Virtual Worlds and Land, NFTs, Web3, Blockchain, VR, Gaming, A.I, Art & Cryptocurrencies (Paperback)
Cameron Belford
R298 Discovery Miles 2 980 Ships in 18 - 22 working days
Limitations and Future Applications of Quantum Cryptography (Paperback): Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia,... Limitations and Future Applications of Quantum Cryptography (Paperback)
Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia, Raees Ahmad Khan
R4,736 Discovery Miles 47 360 Ships in 18 - 22 working days

The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country's sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography. Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing.

Pseudorandomness and Cryptographic Applications (Paperback): Michael Luby Pseudorandomness and Cryptographic Applications (Paperback)
Michael Luby
R2,776 Discovery Miles 27 760 Ships in 18 - 22 working days

A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that "looks" just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construction of a private key cryptosystem that is secure against chosen plaintext attack.

There do not seem to be natural examples of functions that are pseudorandom generators. On the other hand, there do seem to be a variety of natural examples of another basic primitive: the one-way function. A function is one-way if it is easy to compute but hard for any efficient adversary to invert on average.

The first half of the book shows how to construct a pseudorandom generator from any one-way function. Building on this, the second half of the book shows how to construct other useful cryptographic primitives, such as private key cryptosystems, pseudorandom function generators, pseudorandom permutation generators, digital signature schemes, bit commitment protocols, and zero-knowledge interactive proof systems. The book stresses rigorous definitions and proofs.

Ethereum - Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency (Paperback): Paul Paxton Ethereum - Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency (Paperback)
Paul Paxton
R318 R291 Discovery Miles 2 910 Save R27 (8%) Ships in 18 - 22 working days
Cyber Security - The complete guide to cyber threats and protection (Paperback, 2nd ed.): David Sutton Cyber Security - The complete guide to cyber threats and protection (Paperback, 2nd ed.)
David Sutton
R887 Discovery Miles 8 870 Ships in 9 - 17 working days
Impact of Digital Transformation on Security Policies and Standards (Paperback): Gunasekaran Manogaran, Bharath Bhushan, Sam... Impact of Digital Transformation on Security Policies and Standards (Paperback)
Gunasekaran Manogaran, Bharath Bhushan, Sam Goundar, Vaishali Ravindra Thakare
R4,594 Discovery Miles 45 940 Ships in 18 - 22 working days

Digital transformation is a revolutionary technology that will play a vital role in major industries, including global governments. These administrations are taking the initiative to incorporate digital programs with their objective being to provide digital infrastructure as a basic utility for every citizen, provide on demand services with superior governance, and empower their citizens digitally. However, security and privacy are major barriers in adopting these mechanisms, as organizations and individuals are concerned about their private and financial data. Impact of Digital Transformation on Security Policies and Standards is an essential research book that examines the policies, standards, and mechanisms for security in all types of digital applications and focuses on blockchain and its imminent impact on financial services in supporting smart government, along with bitcoin and the future of digital payments. Highlighting topics such as cryptography, privacy management, and e-government, this book is ideal for security analysts, data scientists, academicians, policymakers, security professionals, IT professionals, government officials, finance professionals, researchers, and students.

Transformation of Cryptography - Fundamental concepts of Encryption, Milestones, Mega-Trends and sustainable Change in regard... Transformation of Cryptography - Fundamental concepts of Encryption, Milestones, Mega-Trends and sustainable Change in regard to Secret Communications and its Nomenclatura (Paperback)
Linda A Bertram, Gunther Van Dooble
R260 Discovery Miles 2 600 Ships in 18 - 22 working days
Luck Follows the Brave - From Refugee Camps, Abuse, and Suicide Loss to Living the Dream (Paperback): Aida S?ibic? Luck Follows the Brave - From Refugee Camps, Abuse, and Suicide Loss to Living the Dream (Paperback)
Aida Šibić; Edited by Laura L Bush
R448 Discovery Miles 4 480 Ships in 18 - 22 working days
Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency... Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency + 10 Best Defi Projects and Strategies to Maximize Your Profits (Paperback)
Harper Fraley
R573 R517 Discovery Miles 5 170 Save R56 (10%) Ships in 18 - 22 working days
Nomenclatura - Encyclopedia of modern Cryptography and Internet Security - From AutoCrypt and Exponential Encryption to... Nomenclatura - Encyclopedia of modern Cryptography and Internet Security - From AutoCrypt and Exponential Encryption to Zero-Knowledge-Proof Keys [Paperback] (Paperback)
Linda A Bertram, Gunther Van Dooble
R809 Discovery Miles 8 090 Ships in 18 - 22 working days
Cryptocurrency Trading - A Crypto Investing Guide for Beginners - BITCOIN, ETHEREUM, LITECOIN (Paperback): Megalodona Streamings Cryptocurrency Trading - A Crypto Investing Guide for Beginners - BITCOIN, ETHEREUM, LITECOIN (Paperback)
Megalodona Streamings
R342 R314 Discovery Miles 3 140 Save R28 (8%) Ships in 18 - 22 working days
NFT (Non-Fungible Token) For Beginners - THE QUICK & EASY GUIDE Explore The Top NFT Collections Across Multiple Protocols Like... NFT (Non-Fungible Token) For Beginners - THE QUICK & EASY GUIDE Explore The Top NFT Collections Across Multiple Protocols Like Ethereum, BSC, And Flow (Paperback)
Megalodona Streamings
R395 R365 Discovery Miles 3 650 Save R30 (8%) Ships in 18 - 22 working days
Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Paperback): Rebecca Slayton Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Paperback)
Rebecca Slayton
R2,035 Discovery Miles 20 350 Ships in 18 - 22 working days

In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more. While other books have documented the development of public key cryptography, this is the first to provide a comprehensive insiders' perspective on the full impacts of public key cryptography, including six original chapters by nine distinguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman. The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy.

Introduction to Bitcoin - Understanding Peer-to-Peer Networks, Digital Signatures, the Blockchain, Proof-of-Work, Mining,... Introduction to Bitcoin - Understanding Peer-to-Peer Networks, Digital Signatures, the Blockchain, Proof-of-Work, Mining, Network Attacks, Bitcoin Core Software, and Wallet Safety (With Color Images & Diagrams) (Paperback)
David Ricardo
R256 Discovery Miles 2 560 Ships in 18 - 22 working days
The Crypto Kid (Paperback): Jackson Shembekar The Crypto Kid (Paperback)
Jackson Shembekar
R323 R298 Discovery Miles 2 980 Save R25 (8%) Ships in 18 - 22 working days
Cryptocurrency for Beginners - How to Master Blockchain, Defi and start Investing in Bitcoin and Altcoins (Paperback): Zeph... Cryptocurrency for Beginners - How to Master Blockchain, Defi and start Investing in Bitcoin and Altcoins (Paperback)
Zeph Pascall
R638 Discovery Miles 6 380 Ships in 18 - 22 working days
Password Log Book and Internet Addresses I Can't Remember (Paperback): Pick Me Read Me Press Password Log Book and Internet Addresses I Can't Remember (Paperback)
Pick Me Read Me Press
R280 R258 Discovery Miles 2 580 Save R22 (8%) Ships in 18 - 22 working days
Computer & Internet Security - A Hands-on Approach (Paperback, 3rd ed.): Wenliang Du Computer & Internet Security - A Hands-on Approach (Paperback, 3rd ed.)
Wenliang Du
R1,630 Discovery Miles 16 300 Ships in 18 - 22 working days
Essential Cryptography for JavaScript Developers - A practical guide to leveraging common cryptographic operations in Node.js... Essential Cryptography for JavaScript Developers - A practical guide to leveraging common cryptographic operations in Node.js and the browser (Paperback)
Alessandro Segala
R901 Discovery Miles 9 010 Ships in 18 - 22 working days

Discover how to take advantage of common cryptographic operations to build safer apps that respect users' privacy with the help of examples in JavaScript for Node.js and browsers Key Features Understand how to implement common cryptographic operations in your code with practical examples Learn about picking modern safe algorithms, which libraries you should rely on, and how to use them correctly Build modern and secure applications that respect your users' privacy with cryptography Book DescriptionIf you're a software developer, this book will give you an introduction to cryptography, helping you understand how to make the most of it for your applications. The book contains extensive code samples in JavaScript, both for Node.js and for frontend apps running in a web browser, although the core concepts can be used by developers working with any programming language and framework. With a purely hands-on approach that is focused on sharing actionable knowledge, you'll learn about the common categories of cryptographic operations that you can leverage in all apps you're developing, including hashing, encryption with symmetric, asymmetric and hybrid ciphers, and digital signatures. You'll learn when to use these operations and how to choose and implement the most popular algorithms to perform them, including SHA-2, Argon2, AES, ChaCha20-Poly1305, RSA, and Elliptic Curve Cryptography. Later, you'll learn how to deal with password and key management. All code in this book is written in JavaScript and designed to run in Node.js or as part of frontend apps for web browsers. By the end of this book, you'll be able to build solutions that leverage cryptography to protect user privacy, offer better security against an expanding and more complex threat landscape, help meet data protection requirements, and unlock new opportunities. What you will learn Write JavaScript code that uses cryptography running within a Node.js environment for the server-side or in frontend applications for web browsers Use modern, safe hashing functions for calculating digests and key derivation, including SHA-2 and Argon2 Practice encrypting messages and files with a symmetric key using AES and ChaCha20-Poly1305 Use asymmetric and hybrid encryption, leveraging RSA and Elliptic Curve Cryptography with ECDH and ECIES Calculate and verify digital signatures using RSA and ECDSA/EdDSA Manage passwords and encryption keys safely Who this book is forThis cryptography book is an introductory guide for software developers who don't necessarily have a background in cryptography but are interested in learning how to integrate it in their solutions, correctly and safely. You'll need to have at least intermediate-level knowledge of building apps with JavaScript and familiarity with Node.js to make the most of this book.

Quantum Computing and Blockchain in Business - Exploring the applications, challenges, and collision of quantum computing and... Quantum Computing and Blockchain in Business - Exploring the applications, challenges, and collision of quantum computing and blockchain (Paperback)
Arunkumar Krishnakumar
R1,078 Discovery Miles 10 780 Ships in 18 - 22 working days

Fintech veteran and venture capitalist, Arunkumar Krishnakumar, cuts through the hype to bring us a first-hand look into how quantum computing and Blockchain together could redefine industries and life as we know it. Key Features Take a practical perspective on quantum computing and Blockchain technologies and their impacts on key industries Gain insights from experts who are applying quantum computing or Blockchain in their fields See where quantum computing and Blockchain are heading, and where the two may intersect Book DescriptionAre quantum computing and Blockchain on a collision course or will they be the most important trends of this decade to disrupt industries and life as we know it? Fintech veteran and venture capitalist Arunkumar Krishnakumar cuts through the hype to bring us a first-hand look into how quantum computing and Blockchain together are redefining industries, including fintech, healthcare, and research. Through a series of interviews with domain experts, he also explores these technologies' potential to transform national and global governance and policies - from how elections are conducted and how smart cities can be designed and optimized for the environment, to what cyberwarfare enabled by quantum cryptography might look like. In doing so, he also highlights challenges that these technologies have to overcome to go mainstream. Quantum Computing and Blockchain in Business explores the potential changes that quantum computing and Blockchain might bring about in the real world. After expanding on the key concepts and techniques, such as applied cryptography, qubits, and digital annealing, that underpin quantum computing and Blockchain, the book dives into how major industries will be impacted by these technologies. Lastly, we consider how the two technologies may come together in a complimentary way. What you will learn Understand the fundamentals of quantum computing and Blockchain Gain insights from the experts who are using quantum computing and Blockchain Discover the implications of these technologies for governance and healthcare Learn how Blockchain and quantum computing may influence logistics and finance Understand how these technologies are impacting research in areas such as chemistry Find out how these technologies may help the environment and influence smart city development Understand the implications for cybersecurity as these technologies evolve Who this book is forThis book is for tech enthusiasts - developers, architects, managers, consultants, and venture capitalists - working in or interested in the latest developments in quantum computing and blockchain. While the book introduces key ideas, terms, and techniques used in these technologies, the main goal of this book is to prime readers for the practical adoption and applications of these technologies across varies industries and walks of life.

You Are The #1 Target (Hardcover): The World Experts You Are The #1 Target (Hardcover)
The World Experts
R642 Discovery Miles 6 420 Ships in 18 - 22 working days
Guideline for Using Cryptographic Standards in the Federal Government - Cryptographic Mechanisms: NIST SP 800-175B Rev. 1... Guideline for Using Cryptographic Standards in the Federal Government - Cryptographic Mechanisms: NIST SP 800-175B Rev. 1 (Paperback)
National Institute of Standards and Tech
R526 Discovery Miles 5 260 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
IUTAM Symposium on Scaling in Solid…
F. M. Borodich Hardcover R2,822 Discovery Miles 28 220
A Letter to Jacob Bryant, Esq - in…
Joseph Priestley Paperback R374 Discovery Miles 3 740
The Tragedie of Julius Caesar
Edward de Vere Hardcover R971 Discovery Miles 9 710
Operator Semigroups Meet Complex…
Wolfgang Arendt, Ralph Chill, … Hardcover R4,916 Discovery Miles 49 160
The Theory of Human Progression and…
Patrick Edward] [Dove Paperback R676 Discovery Miles 6 760
Artificial Intelligence in Real Estate…
Bob Mather Hardcover R849 Discovery Miles 8 490
Flight Mechanics Modeling and Analysis
Jitendra R. Raol, Jatinder Singh Hardcover R3,555 Discovery Miles 35 550
Bayesian Inference on Complicated Data
Niansheng Tang Hardcover R3,055 Discovery Miles 30 550
Agent-Based Modeling and Network…
Akira Namatame, Shu-Heng Chen Hardcover R2,970 Discovery Miles 29 700
Mathematical Models of Tumor-Immune…
Amina Eladdadi, Peter Kim, … Hardcover R3,957 R3,427 Discovery Miles 34 270

 

Partners