0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (14)
  • R250 - R500 (85)
  • R500+ (1,292)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Approximative Public Key Kryptosysteme (German, Paperback): Patrick Horster, Hartmut Isselhorst Approximative Public Key Kryptosysteme (German, Paperback)
Patrick Horster, Hartmut Isselhorst
R1,719 Discovery Miles 17 190 Ships in 18 - 22 working days

In der vorliegenden Arbeit werden die Einsatzmoglichkeiten approximativer Verfahren fur Public-Key-Kryptosysteme untersucht. Dazu werden in einer allgemeinverstandlichen Einleitung die notwendigen Grundlagen erarbeitet. Im Anschluss daran werden Resultate uber eine reellwertige Approximation periodischer und nichtperiodischer Funktionen fur Verschlusselungssysteme mit offentlichem Schlussel entwickelt. Weiterhin werden die kryptologischen Eigenschaften rationaler Zahlen untersucht. Diese fliessen in die Entwicklung eines neuen Konzeptes fur ein Public-Key-Kryptosystem ein, die Public-Key-Hill-Chiffre, die auch digitale Unterschriften zulasst. Zur Abrundung der Thematik werden weitere Anwendungen in verwandten Gebieten dargestellt: die exakte Arithmetik mit rationalen Zahlen auf der Basis von Gleitkommazahlen und ein neuer Ansatz fur Faktorisierungsalgorithmen. Damit ist das zentrale Ergebnis die Benutzung rationaler Zahlen in Public-Key-Kryptosystemen, die eine neue Forschungsrichtung innerhalb der Kryptologie eroffnen konnte. Der fachkundige Leser erhalt Informationen uber neue Forschungsansatze und Methoden in der Kryptologie, fachfremde Leser erhalten einen guten Uberblick uber die Problemstellung der Entwicklung neuer Public-Key-Kryptosysteme.

Blockchain for Non IT Professionals - An Example Driven, Metaphorical Approach (Paperback): Srinivas Mahankali Blockchain for Non IT Professionals - An Example Driven, Metaphorical Approach (Paperback)
Srinivas Mahankali
R389 Discovery Miles 3 890 Ships in 18 - 22 working days
Cryptocurrency for Beginners - How to Master Blockchain, Defi and start Investing in Bitcoin and Altcoins (Paperback): Zeph... Cryptocurrency for Beginners - How to Master Blockchain, Defi and start Investing in Bitcoin and Altcoins (Paperback)
Zeph Pascall
R638 Discovery Miles 6 380 Ships in 18 - 22 working days
Crypto Currency Trading Tracker - Cryptocurrency Coin Tracker for Your Portofolio Investory Stock Trading Log Book (Paperback):... Crypto Currency Trading Tracker - Cryptocurrency Coin Tracker for Your Portofolio Investory Stock Trading Log Book (Paperback)
Sasha Apfel
R309 R287 Discovery Miles 2 870 Save R22 (7%) Ships in 18 - 22 working days
Exploring Blockchain in Healthcare - Implementation and Impact of Distributed Database Across Pharmaceutical Supply Chain,... Exploring Blockchain in Healthcare - Implementation and Impact of Distributed Database Across Pharmaceutical Supply Chain, Drugs Administration, Healthcare Insurance and Patient Administration (Paperback)
Anurag Srivastava
R1,000 Discovery Miles 10 000 Ships in 18 - 22 working days
Metaverse Investing & Marketing Book - Guide to Web 3.0, Non-Fungible Tokens (NFTs) Virtual Real Estate, Games, Development and... Metaverse Investing & Marketing Book - Guide to Web 3.0, Non-Fungible Tokens (NFTs) Virtual Real Estate, Games, Development and Future of the metaverse. (Paperback)
Doran Pauley
R572 Discovery Miles 5 720 Ships in 18 - 22 working days
Limitations and Future Applications of Quantum Cryptography (Paperback): Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia,... Limitations and Future Applications of Quantum Cryptography (Paperback)
Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia, Raees Ahmad Khan
R4,736 Discovery Miles 47 360 Ships in 18 - 22 working days

The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country's sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography. Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing.

Ethereum - Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency (Paperback): Paul Paxton Ethereum - Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency (Paperback)
Paul Paxton
R318 R291 Discovery Miles 2 910 Save R27 (8%) Ships in 18 - 22 working days
Nft for Beginners - Learn the Basics of Investing in Digital Crypto Art and Collectibles to Make a Profit (2022 Guide for... Nft for Beginners - Learn the Basics of Investing in Digital Crypto Art and Collectibles to Make a Profit (2022 Guide for Newbies) (Paperback)
Shaun Badman
R557 R506 Discovery Miles 5 060 Save R51 (9%) Ships in 18 - 22 working days
Impact of Digital Transformation on Security Policies and Standards (Paperback): Gunasekaran Manogaran, Bharath Bhushan, Sam... Impact of Digital Transformation on Security Policies and Standards (Paperback)
Gunasekaran Manogaran, Bharath Bhushan, Sam Goundar, Vaishali Ravindra Thakare
R4,594 Discovery Miles 45 940 Ships in 18 - 22 working days

Digital transformation is a revolutionary technology that will play a vital role in major industries, including global governments. These administrations are taking the initiative to incorporate digital programs with their objective being to provide digital infrastructure as a basic utility for every citizen, provide on demand services with superior governance, and empower their citizens digitally. However, security and privacy are major barriers in adopting these mechanisms, as organizations and individuals are concerned about their private and financial data. Impact of Digital Transformation on Security Policies and Standards is an essential research book that examines the policies, standards, and mechanisms for security in all types of digital applications and focuses on blockchain and its imminent impact on financial services in supporting smart government, along with bitcoin and the future of digital payments. Highlighting topics such as cryptography, privacy management, and e-government, this book is ideal for security analysts, data scientists, academicians, policymakers, security professionals, IT professionals, government officials, finance professionals, researchers, and students.

Nomenclatura - Encyclopedia of modern Cryptography and Internet Security - From AutoCrypt and Exponential Encryption to... Nomenclatura - Encyclopedia of modern Cryptography and Internet Security - From AutoCrypt and Exponential Encryption to Zero-Knowledge-Proof Keys [Paperback] (Paperback)
Linda A Bertram, Gunther Van Dooble
R809 Discovery Miles 8 090 Ships in 18 - 22 working days
Super Secreto - The Third Epoch of Cryptography - Multiple, exponential, quantum-secure and above all, simple and practical... Super Secreto - The Third Epoch of Cryptography - Multiple, exponential, quantum-secure and above all, simple and practical Encryption for Everyone (Paperback)
Theo Tenzer
R853 Discovery Miles 8 530 Ships in 18 - 22 working days
Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency... Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency + 10 Best Defi Projects and Strategies to Maximize Your Profits (Paperback)
Harper Fraley
R573 R517 Discovery Miles 5 170 Save R56 (10%) Ships in 18 - 22 working days
NFT (Non-Fungible Token) For Beginners - THE QUICK & EASY GUIDE Explore The Top NFT Collections Across Multiple Protocols Like... NFT (Non-Fungible Token) For Beginners - THE QUICK & EASY GUIDE Explore The Top NFT Collections Across Multiple Protocols Like Ethereum, BSC, And Flow (Paperback)
Megalodona Streamings
R395 R365 Discovery Miles 3 650 Save R30 (8%) Ships in 18 - 22 working days
Introduction to Bitcoin - Understanding Peer-to-Peer Networks, Digital Signatures, the Blockchain, Proof-of-Work, Mining,... Introduction to Bitcoin - Understanding Peer-to-Peer Networks, Digital Signatures, the Blockchain, Proof-of-Work, Mining, Network Attacks, Bitcoin Core Software, and Wallet Safety (With Color Images & Diagrams) (Paperback)
David Ricardo
R256 Discovery Miles 2 560 Ships in 18 - 22 working days
Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Paperback): Rebecca Slayton Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Paperback)
Rebecca Slayton
R2,035 Discovery Miles 20 350 Ships in 18 - 22 working days

In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more. While other books have documented the development of public key cryptography, this is the first to provide a comprehensive insiders' perspective on the full impacts of public key cryptography, including six original chapters by nine distinguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman. The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy.

The Crypto Kid (Paperback): Jackson Shembekar The Crypto Kid (Paperback)
Jackson Shembekar
R323 R298 Discovery Miles 2 980 Save R25 (8%) Ships in 18 - 22 working days
Essential Cryptography for JavaScript Developers - A practical guide to leveraging common cryptographic operations in Node.js... Essential Cryptography for JavaScript Developers - A practical guide to leveraging common cryptographic operations in Node.js and the browser (Paperback)
Alessandro Segala
R901 Discovery Miles 9 010 Ships in 18 - 22 working days

Discover how to take advantage of common cryptographic operations to build safer apps that respect users' privacy with the help of examples in JavaScript for Node.js and browsers Key Features Understand how to implement common cryptographic operations in your code with practical examples Learn about picking modern safe algorithms, which libraries you should rely on, and how to use them correctly Build modern and secure applications that respect your users' privacy with cryptography Book DescriptionIf you're a software developer, this book will give you an introduction to cryptography, helping you understand how to make the most of it for your applications. The book contains extensive code samples in JavaScript, both for Node.js and for frontend apps running in a web browser, although the core concepts can be used by developers working with any programming language and framework. With a purely hands-on approach that is focused on sharing actionable knowledge, you'll learn about the common categories of cryptographic operations that you can leverage in all apps you're developing, including hashing, encryption with symmetric, asymmetric and hybrid ciphers, and digital signatures. You'll learn when to use these operations and how to choose and implement the most popular algorithms to perform them, including SHA-2, Argon2, AES, ChaCha20-Poly1305, RSA, and Elliptic Curve Cryptography. Later, you'll learn how to deal with password and key management. All code in this book is written in JavaScript and designed to run in Node.js or as part of frontend apps for web browsers. By the end of this book, you'll be able to build solutions that leverage cryptography to protect user privacy, offer better security against an expanding and more complex threat landscape, help meet data protection requirements, and unlock new opportunities. What you will learn Write JavaScript code that uses cryptography running within a Node.js environment for the server-side or in frontend applications for web browsers Use modern, safe hashing functions for calculating digests and key derivation, including SHA-2 and Argon2 Practice encrypting messages and files with a symmetric key using AES and ChaCha20-Poly1305 Use asymmetric and hybrid encryption, leveraging RSA and Elliptic Curve Cryptography with ECDH and ECIES Calculate and verify digital signatures using RSA and ECDSA/EdDSA Manage passwords and encryption keys safely Who this book is forThis cryptography book is an introductory guide for software developers who don't necessarily have a background in cryptography but are interested in learning how to integrate it in their solutions, correctly and safely. You'll need to have at least intermediate-level knowledge of building apps with JavaScript and familiarity with Node.js to make the most of this book.

Applied Approach to Privacy and Security for the Internet of Things (Paperback): Parag Chatterjee, Emmanuel Benoist, Asoke Nath Applied Approach to Privacy and Security for the Internet of Things (Paperback)
Parag Chatterjee, Emmanuel Benoist, Asoke Nath
R4,972 Discovery Miles 49 720 Ships in 18 - 22 working days

From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities. Applied Approach to Privacy and Security for the Internet of Things is a collection of innovative research on the methods and applied aspects of security in IoT-based systems by discussing core concepts and studying real-life scenarios. While highlighting topics including malware propagation, smart home vulnerabilities, and bio-sensor safety, this book is ideally designed for security analysts, software security engineers, researchers, computer engineers, data scientists, security professionals, practitioners, academicians, and students seeking current research on the various aspects of privacy and security within IoT.

Metaverse Mastery - Understand and Profit from Virtual Worlds and Land, NFTs, Web3, Blockchain, VR, Gaming, A.I, Art &... Metaverse Mastery - Understand and Profit from Virtual Worlds and Land, NFTs, Web3, Blockchain, VR, Gaming, A.I, Art & Cryptocurrencies (Paperback)
Cameron Belford
R298 Discovery Miles 2 980 Ships in 18 - 22 working days
Computer & Internet Security - A Hands-on Approach (Paperback, 3rd ed.): Wenliang Du Computer & Internet Security - A Hands-on Approach (Paperback, 3rd ed.)
Wenliang Du
R1,630 Discovery Miles 16 300 Ships in 18 - 22 working days
Guideline for Using Cryptographic Standards in the Federal Government - Cryptographic Mechanisms: NIST SP 800-175B Rev. 1... Guideline for Using Cryptographic Standards in the Federal Government - Cryptographic Mechanisms: NIST SP 800-175B Rev. 1 (Paperback)
National Institute of Standards and Tech
R526 Discovery Miles 5 260 Ships in 18 - 22 working days
Bitcoin Trading for Beginners, Dummies & Idiots (Paperback): Giovanni Rigters Bitcoin Trading for Beginners, Dummies & Idiots (Paperback)
Giovanni Rigters
R422 R392 Discovery Miles 3 920 Save R30 (7%) Ships in 18 - 22 working days
Password Log Book and Internet Addresses I Can't Remember (Paperback): Pick Me Read Me Press Password Log Book and Internet Addresses I Can't Remember (Paperback)
Pick Me Read Me Press
R280 R258 Discovery Miles 2 580 Save R22 (8%) Ships in 18 - 22 working days
Computer Security - A Hands-on Approach (Paperback, 3rd ed.): Wenliang Du Computer Security - A Hands-on Approach (Paperback, 3rd ed.)
Wenliang Du
R1,173 Discovery Miles 11 730 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,170 Discovery Miles 61 700
OS X Exploits and Defense - Own…
Paul Baccas, Kevin Finisterre, … Paperback R1,278 Discovery Miles 12 780
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,170 Discovery Miles 61 700
Cybersecurity in Smart Homes…
Khatoun Hardcover R3,483 Discovery Miles 34 830
Sockets, Shellcode, Porting, and Coding…
James C Foster Paperback R1,135 Discovery Miles 11 350
Information Security - Foundations…
Ali Ismail Awad, Michael Fairhurst Hardcover R3,433 R3,098 Discovery Miles 30 980
Conflicts, Crimes and Regulations in…
SY Laurent Hardcover R3,743 Discovery Miles 37 430
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R549 R503 Discovery Miles 5 030
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260

 

Partners