0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (86)
  • R500+ (1,283)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback): William Gamble The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback)
William Gamble
R446 Discovery Miles 4 460 Ships in 18 - 22 working days
Implementing Computational Intelligence Techniques for Security Systems Design (Paperback): Yousif Abdullatif Albastaki, Wasan... Implementing Computational Intelligence Techniques for Security Systems Design (Paperback)
Yousif Abdullatif Albastaki, Wasan Awad
R4,149 Discovery Miles 41 490 Ships in 18 - 22 working days

Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms that take advantage of approaches based on computational intelligence techniques, such as genetic algorithms, genetic programming, and so on, have been proposed to solve these issues. Implementing Computational Intelligence Techniques for Security Systems Design is an essential research book that explores the application of computational intelligence and other advanced techniques in information security, which will contribute to a better understanding of the factors that influence successful security systems design. Featuring a range of topics such as encryption, self-healing systems, and cyber fraud, this book is ideal for security analysts, IT specialists, computer engineers, software developers, technologists, academicians, researchers, practitioners, and students.

Is the consumer willing to adopt the innovative cryptocurrency Bitcoin as a payment method? (Paperback): Liutauras Rokas Is the consumer willing to adopt the innovative cryptocurrency Bitcoin as a payment method? (Paperback)
Liutauras Rokas
R1,388 Discovery Miles 13 880 Ships in 18 - 22 working days
Shue's, CompTIA Security+, Exam SY0-601, Study Supplement (Paperback): Mark Schumacher Shue's, CompTIA Security+, Exam SY0-601, Study Supplement (Paperback)
Mark Schumacher
R648 Discovery Miles 6 480 Ships in 18 - 22 working days
Kali Linux - 3 in 1: Beginners Guide+ Simple and Effective Strategies+ Advance Method and Strategies to learn Kali Linux... Kali Linux - 3 in 1: Beginners Guide+ Simple and Effective Strategies+ Advance Method and Strategies to learn Kali Linux (Paperback)
Ethan Thorpe
R1,025 Discovery Miles 10 250 Ships in 18 - 22 working days
Cryptography & Malware (Paperback): Solis Tech Cryptography & Malware (Paperback)
Solis Tech
R468 Discovery Miles 4 680 Ships in 18 - 22 working days
Circuit Engineering & Cryptography (Paperback): Solis Tech Circuit Engineering & Cryptography (Paperback)
Solis Tech
R486 Discovery Miles 4 860 Ships in 18 - 22 working days
NetScaler Hacks - 10 Hacks for the Citrix NetScaler ADC/MPX/SDX - Extend the life of this hardware with amazing ideas for... NetScaler Hacks - 10 Hacks for the Citrix NetScaler ADC/MPX/SDX - Extend the life of this hardware with amazing ideas for legacy Citrix NetScaler ADC/MPX/SDX hardware. (Paperback)
Joseph Moses
R446 Discovery Miles 4 460 Ships in 18 - 22 working days
Digital Forensics with Kali Linux - Perform data acquisition, data recovery, network forensics, and malware analysis with Kali... Digital Forensics with Kali Linux - Perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x, 2nd Edition (Paperback, 2nd Revised edition)
Shiva V.N Parasram
R1,402 Discovery Miles 14 020 Ships in 18 - 22 working days

Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reporting Key Features Perform evidence acquisition, preservation, and analysis using a variety of Kali Linux tools Use PcapXray to perform timeline analysis of malware and network activity Implement the concept of cryptographic hashing and imaging using Kali Linux Book DescriptionKali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics. It has a wide range of tools to help for digital forensics investigations and incident response mechanisms. This updated second edition of Digital Forensics with Kali Linux covers the latest version of Kali Linux and The Sleuth Kit. You'll get to grips with modern techniques for analysis, extraction, and reporting using advanced tools such as FTK Imager, hex editor, and Axiom. Updated to cover digital forensics basics and advancements in the world of modern forensics, this book will also delve into the domain of operating systems. Progressing through the chapters, you'll explore various formats for file storage, including secret hiding places unseen by the end user or even the operating system. The book will also show you how to create forensic images of data and maintain integrity using hashing tools. Finally, you'll cover advanced topics such as autopsies and acquiring investigation data from networks, operating system memory, and quantum cryptography. By the end of this book, you'll have gained hands-on experience of implementing all the pillars of digital forensics: acquisition, extraction, analysis, and presentation, all using Kali Linux tools. What you will learn Get up and running with powerful Kali Linux tools for digital investigation and analysis Perform internet and memory forensics with Volatility and Xplico Understand filesystems, storage, and data fundamentals Become well-versed with incident response procedures and best practices Perform ransomware analysis using labs involving actual ransomware Carry out network forensics and analysis using NetworkMiner and other tools Who this book is forThis Kali Linux book is for forensics and digital investigators, security analysts, or anyone interested in learning digital forensics using Kali Linux. Basic knowledge of Kali Linux will be helpful to gain a better understanding of the concepts covered.

Solidity Programming Essentials - A beginner's guide to build smart contracts for Ethereum and blockchain (Paperback):... Solidity Programming Essentials - A beginner's guide to build smart contracts for Ethereum and blockchain (Paperback)
Ritesh Modi
R940 Discovery Miles 9 400 Ships in 18 - 22 working days

Learn the most powerful and primary programming language for writing smart contracts and find out how to write, deploy, and test smart contracts in Ethereum. Key Features Get you up and running with Solidity Programming language Build Ethereum Smart Contracts with Solidity as your scripting language Learn to test and deploy the smart contract to your private Blockchain Book DescriptionSolidity is a contract-oriented language whose syntax is highly influenced by JavaScript, and is designed to compile code for the Ethereum Virtual Machine. Solidity Programming Essentials will be your guide to understanding Solidity programming to build smart contracts for Ethereum and blockchain from ground-up. We begin with a brief run-through of blockchain, Ethereum, and their most important concepts or components. You will learn how to install all the necessary tools to write, test, and debug Solidity contracts on Ethereum. Then, you will explore the layout of a Solidity source file and work with the different data types. The next set of recipes will help you work with operators, control structures, and data structures while building your smart contracts. We take you through function calls, return types, function modifers, and recipes in object-oriented programming with Solidity. Learn all you can on event logging and exception handling, as well as testing and debugging smart contracts. By the end of this book, you will be able to write, deploy, and test smart contracts in Ethereum. This book will bring forth the essence of writing contracts using Solidity and also help you develop Solidity skills in no time. What you will learn Learn the basics and foundational concepts of Solidity and Ethereum Explore the Solidity language and its uniqueness in depth Create new accounts and submit transactions to blockchain Get to know the complete language in detail to write smart contracts Learn about major tools to develop and deploy smart contracts Write defensive code using exception handling and error checking Understand Truffle basics and the debugging process Who this book is forThis book is for anyone who would like to get started with Solidity Programming for developing an Ethereum smart contract. No prior knowledge of EVM is required.

Time Override - Prophetic Images from the Future Decoded (Paperback): Dylan Clearfield Time Override - Prophetic Images from the Future Decoded (Paperback)
Dylan Clearfield
R461 R427 Discovery Miles 4 270 Save R34 (7%) Ships in 18 - 22 working days
Cryptographic Algorithms (Paperback): Gerard Swedberg Cryptographic Algorithms (Paperback)
Gerard Swedberg
R1,563 Discovery Miles 15 630 Ships in 18 - 22 working days
Quality Assurance + Cryptography + Human-Computer Interaction (Paperback): Solis Tech Quality Assurance + Cryptography + Human-Computer Interaction (Paperback)
Solis Tech
R232 Discovery Miles 2 320 Ships in 18 - 22 working days
Humorous Cryptograms - 300 Large Print Puzzles To Keep You Entertained (Large print, Paperback, Large type / large print... Humorous Cryptograms - 300 Large Print Puzzles To Keep You Entertained (Large print, Paperback, Large type / large print edition)
Game Nest
R322 Discovery Miles 3 220 Ships in 18 - 22 working days
Kali Linux - Simple and Effective Approach to Learn Kali Linux (Paperback): Ethan Thorpe Kali Linux - Simple and Effective Approach to Learn Kali Linux (Paperback)
Ethan Thorpe
R499 Discovery Miles 4 990 Ships in 18 - 22 working days
The Art of Hacking - Ancient Wisdom for Cybersecurity Defense (Paperback): Ken May The Art of Hacking - Ancient Wisdom for Cybersecurity Defense (Paperback)
Ken May
R455 R425 Discovery Miles 4 250 Save R30 (7%) Ships in 18 - 22 working days
Bitcoin Basics - A Beginner's Guide to Bitcoin and Blockchain (Paperback): Marc Gordon Bitcoin Basics - A Beginner's Guide to Bitcoin and Blockchain (Paperback)
Marc Gordon
R210 Discovery Miles 2 100 Ships in 18 - 22 working days
Big Seven Study (2016) - 7 open source Crypto-Messengers to be compared (English/Deutsch): or: Comprehensive Confidentiality... Big Seven Study (2016) - 7 open source Crypto-Messengers to be compared (English/Deutsch): or: Comprehensive Confidentiality Review & Audit of GoldBug, Encrypting E-Mail-Client & Secure Instant Messenger. (Paperback)
David Adams, Ann-Kathrin Maier
R657 Discovery Miles 6 570 Ships in 18 - 22 working days
Cybersecurity - Essential Guide for Beginners to Learn Basic Methods of Cybersecurity (Paperback): Henry George Cybersecurity - Essential Guide for Beginners to Learn Basic Methods of Cybersecurity (Paperback)
Henry George
R501 Discovery Miles 5 010 Ships in 18 - 22 working days
Cyber Warfare - Truth, Tactics, and Strategies - Strategic concepts and truths to help you and your organization survive on the... Cyber Warfare - Truth, Tactics, and Strategies - Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare (Paperback)
Dr. Chase Cunningham; Foreword by Gregory J. Touhill
R854 Discovery Miles 8 540 Ships in 18 - 22 working days

Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat. Key Features Define and determine a cyber-defence strategy based on current and past real-life examples Understand how future technologies will impact cyber warfare campaigns and society Future-ready yourself and your business against any cyber threat Book DescriptionThe era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare - Truth, Tactics, and Strategies takes you on a journey through the myriad of cyber attacks and threats that are present in a world powered by AI, big data, autonomous vehicles, drones video, and social media. Dr. Chase Cunningham uses his military background to provide you with a unique perspective on cyber security and warfare. Moving away from a reactive stance to one that is forward-looking, he aims to prepare people and organizations to better defend themselves in a world where there are no borders or perimeters. He demonstrates how the cyber landscape is growing infinitely more complex and is continuously evolving at the speed of light. The book not only covers cyber warfare, but it also looks at the political, cultural, and geographical influences that pertain to these attack methods and helps you understand the motivation and impacts that are likely in each scenario. Cyber Warfare - Truth, Tactics, and Strategies is as real-life and up-to-date as cyber can possibly be, with examples of actual attacks and defense techniques, tools. and strategies presented for you to learn how to think about defending your own systems and data. What you will learn Hacking at scale - how machine learning (ML) and artificial intelligence (AI) skew the battlefield Defending a boundaryless enterprise Using video and audio as weapons of influence Uncovering DeepFakes and their associated attack vectors Using voice augmentation for exploitation Defending when there is no perimeter Responding tactically to counter-campaign-based attacks Who this book is forThis book is for any engineer, leader, or professional with either a responsibility for cyber security within their organizations, or an interest in working in this ever-growing field.

Ethereum Cookbook - Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps... Ethereum Cookbook - Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps (Paperback)
Manoj P R
R1,204 Discovery Miles 12 040 Ships in 18 - 22 working days

Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of Ethereum Key Features Build end-to-end decentralized Ethereum apps using Truffle, Web3, and Solidity Explore various solution-based recipes to build smart contracts and foolproof decentralized applications Develop decentralized marketplaces from scratch, build wallets, and manage transactions Book DescriptionEthereum and Blockchain will change the way software is built for business transactions. Most industries have been looking to leverage these new technologies to gain efficiencies and create new business models and opportunities. The Ethereum Cookbook covers various solutions such as setting up Ethereum, writing smart contracts, and creating tokens, among others. You'll learn about the security vulnerabilities, along with other protocols of Ethereum. Once you have understood the basics, you'll move on to exploring various design decisions and tips to make your application scalable and secure. In addition to this, you'll work with various Ethereum packages such as Truffle, Web3, and Ganache. By the end of this book, you'll have comprehensively grasped the Ethereum principles and ecosystem. What you will learn Efficiently write smart contracts in Ethereum Build scalable distributed applications and deploy them Use tools and frameworks to develop, deploy, and test your application Use block explorers such as Etherscan to find a specific transaction Create your own tokens, initial coin offerings (ICOs), and games Understand various security flaws in smart contracts in order to avoid them Who this book is forThe Ethereum Cookbook is for you if you are a software engineer, Blockchain developer, or research scientist who wants to build smart contracts, develop decentralized applications, and facilitate peer-to-peer transaction. It is assumed that you are familiar with Blockchain concepts and have sound knowledge of JavaScript.

Quantum Computing and Blockchain in Business - Exploring the applications, challenges, and collision of quantum computing and... Quantum Computing and Blockchain in Business - Exploring the applications, challenges, and collision of quantum computing and blockchain (Paperback)
Arunkumar Krishnakumar
R1,078 Discovery Miles 10 780 Ships in 18 - 22 working days

Fintech veteran and venture capitalist, Arunkumar Krishnakumar, cuts through the hype to bring us a first-hand look into how quantum computing and Blockchain together could redefine industries and life as we know it. Key Features Take a practical perspective on quantum computing and Blockchain technologies and their impacts on key industries Gain insights from experts who are applying quantum computing or Blockchain in their fields See where quantum computing and Blockchain are heading, and where the two may intersect Book DescriptionAre quantum computing and Blockchain on a collision course or will they be the most important trends of this decade to disrupt industries and life as we know it? Fintech veteran and venture capitalist Arunkumar Krishnakumar cuts through the hype to bring us a first-hand look into how quantum computing and Blockchain together are redefining industries, including fintech, healthcare, and research. Through a series of interviews with domain experts, he also explores these technologies' potential to transform national and global governance and policies - from how elections are conducted and how smart cities can be designed and optimized for the environment, to what cyberwarfare enabled by quantum cryptography might look like. In doing so, he also highlights challenges that these technologies have to overcome to go mainstream. Quantum Computing and Blockchain in Business explores the potential changes that quantum computing and Blockchain might bring about in the real world. After expanding on the key concepts and techniques, such as applied cryptography, qubits, and digital annealing, that underpin quantum computing and Blockchain, the book dives into how major industries will be impacted by these technologies. Lastly, we consider how the two technologies may come together in a complimentary way. What you will learn Understand the fundamentals of quantum computing and Blockchain Gain insights from the experts who are using quantum computing and Blockchain Discover the implications of these technologies for governance and healthcare Learn how Blockchain and quantum computing may influence logistics and finance Understand how these technologies are impacting research in areas such as chemistry Find out how these technologies may help the environment and influence smart city development Understand the implications for cybersecurity as these technologies evolve Who this book is forThis book is for tech enthusiasts - developers, architects, managers, consultants, and venture capitalists - working in or interested in the latest developments in quantum computing and blockchain. While the book introduces key ideas, terms, and techniques used in these technologies, the main goal of this book is to prime readers for the practical adoption and applications of these technologies across varies industries and walks of life.

Asiaccs '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security (Paperback): Asiaccs Asiaccs '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security (Paperback)
Asiaccs
R5,923 Discovery Miles 59 230 Ships in 18 - 22 working days
Hyperledger Cookbook - Over 40 recipes implementing the latest Hyperledger blockchain frameworks and tools (Paperback): Xun... Hyperledger Cookbook - Over 40 recipes implementing the latest Hyperledger blockchain frameworks and tools (Paperback)
Xun (Brian) Wu, ChuanFeng Zhang, Andrew Zhang
R972 Discovery Miles 9 720 Ships in 18 - 22 working days

Explore the entire Hyperledger blockchain family, including frameworks such as Fabric, Sawtooth, Indy, Burrow, and Iroha; and tools such as Composer, Explorer, and Caliper. Key Features Plan, design, and create a full-fledged private decentralized application using Hyperledger services Master the ins and outs of the Hyperledger network using real-world examples Packed with problem-solution-based recipes to tackle pain areas in the blockchain development cycle Book DescriptionHyperledger is an open-source project and creates private blockchain applications for a range of domains. This book will be your desk reference as you explore common and not-so-common challenges faced while building blockchain networks using Hyperledger services. We'll work through all Hyperledger platform modules to understand their services and features and build end-to-end blockchain applications using various frameworks and tools supported by Hyperledger. This book's independent, recipe-based approach (packed with real-world examples) will familiarize you with the blockchain development cycle. From modeling a business network to integrating with various tools, you will cover it all. We'll cover common and not-so-common challenges faced in the blockchain life cycle. Later, we'll delve into how we can interact with the Hyperledger Fabric blockchain, covering all the principles you need to master, such as chaincode, smart contracts, and much more. We'll also address the scalability and security issues currently faced in blockchain development. By the end of this book, you will be able to implement each recipe to plan, design, and create a full-fledged, private, decentralized application to meet organizational needs. What you will learn Create the most popular permissioned blockchain network with Fabric and Composer Build permissioned and permission-less blockchains using Sawtooth Utilize built-in Iroha asset/account management with role-based permissions Implement and run Ethereum smart contracts with Burrow Get to grips with security and scalability in Hyperledger Explore and view blockchain data using Hyperledger Explorer Produce reports containing performance indicators and benchmarks using Caliper Who this book is forThis book is for blockchain developers who want to understand how they can apply Hyperledger services in their day-to-day projects. This book uses a recipe-based approach to help you use Hyperledger to build powerful, decentralized autonomous applications. We assume the reader has a basic knowledge of the Blockchain technology and cryptography concepts

Information Security: Theory and Practice (Hardcover): Conner Casini Information Security: Theory and Practice (Hardcover)
Conner Casini
R3,167 R2,870 Discovery Miles 28 700 Save R297 (9%) Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cryptographic Solutions for Secure…
Kannan Balasubramanian, K. Mala, … Hardcover R5,077 Discovery Miles 50 770
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,321 R1,228 Discovery Miles 12 280
Architectures and Frameworks for…
Nansi Shi Hardcover R6,093 Discovery Miles 60 930
Conflicts, Crimes and Regulations in…
SY Laurent Hardcover R3,743 Discovery Miles 37 430
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R549 R503 Discovery Miles 5 030
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,170 Discovery Miles 61 700
Cybersecurity in Smart Homes…
Khatoun Hardcover R3,483 Discovery Miles 34 830
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610

 

Partners