0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (14)
  • R250 - R500 (89)
  • R500+ (1,357)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Tor Anonymity Network 101 - An Introduction to The Most Private Part of The Internet (Paperback): Steven Gates Tor Anonymity Network 101 - An Introduction to The Most Private Part of The Internet (Paperback)
Steven Gates
R606 Discovery Miles 6 060 Ships in 10 - 15 working days
Quantum Cryptography and the Future of Cyber Security (Paperback): Nirbhay Kumar Chaubey, Bhavesh B. Prajapati Quantum Cryptography and the Future of Cyber Security (Paperback)
Nirbhay Kumar Chaubey, Bhavesh B. Prajapati
R5,405 Discovery Miles 54 050 Ships in 10 - 15 working days

The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more robust security options. Quantum cryptography is sound, and its practical implementations are becoming more mature. Many applications can use quantum cryptography as a backbone, including key distribution, secure direct communications, large prime factorization, e-commerce, e-governance, quantum internet, and more. For this reason, quantum cryptography is gaining interest and importance among computer and security professionals. Quantum Cryptography and the Future of Cyber Security is an essential scholarly resource that provides the latest research and advancements in cryptography and cyber security through quantum applications. Highlighting a wide range of topics such as e-commerce, machine learning, and privacy, this book is ideal for security analysts, systems engineers, software security engineers, data scientists, vulnerability analysts, professionals, academicians, researchers, security professionals, policymakers, and students.

SSL/TLS Under Lock and Key - A Guide to Understanding SSL/TLS Cryptography (Paperback, Black and White ed.): Hollie Acres SSL/TLS Under Lock and Key - A Guide to Understanding SSL/TLS Cryptography (Paperback, Black and White ed.)
Hollie Acres; Paul Baka, Jeremy Schatten
R462 R430 Discovery Miles 4 300 Save R32 (7%) Ships in 10 - 15 working days
Pseudorandomness and Cryptographic Applications (Paperback): Michael Luby Pseudorandomness and Cryptographic Applications (Paperback)
Michael Luby
R2,028 Discovery Miles 20 280 Ships in 12 - 17 working days

A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that "looks" just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construction of a private key cryptosystem that is secure against chosen plaintext attack.

There do not seem to be natural examples of functions that are pseudorandom generators. On the other hand, there do seem to be a variety of natural examples of another basic primitive: the one-way function. A function is one-way if it is easy to compute but hard for any efficient adversary to invert on average.

The first half of the book shows how to construct a pseudorandom generator from any one-way function. Building on this, the second half of the book shows how to construct other useful cryptographic primitives, such as private key cryptosystems, pseudorandom function generators, pseudorandom permutation generators, digital signature schemes, bit commitment protocols, and zero-knowledge interactive proof systems. The book stresses rigorous definitions and proofs.

A Reference or Randomness Beacons - NiSTIR 8213 (Paperback): National Institute of Standards and Tech A Reference or Randomness Beacons - NiSTIR 8213 (Paperback)
National Institute of Standards and Tech
R687 Discovery Miles 6 870 Ships in 10 - 15 working days
Applied Approach to Privacy and Security for the Internet of Things (Paperback): Parag Chatterjee, Emmanuel Benoist, Asoke Nath Applied Approach to Privacy and Security for the Internet of Things (Paperback)
Parag Chatterjee, Emmanuel Benoist, Asoke Nath
R5,392 Discovery Miles 53 920 Ships in 10 - 15 working days

From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities. Applied Approach to Privacy and Security for the Internet of Things is a collection of innovative research on the methods and applied aspects of security in IoT-based systems by discussing core concepts and studying real-life scenarios. While highlighting topics including malware propagation, smart home vulnerabilities, and bio-sensor safety, this book is ideally designed for security analysts, software security engineers, researchers, computer engineers, data scientists, security professionals, practitioners, academicians, and students seeking current research on the various aspects of privacy and security within IoT.

SSL/TLS Under Lock and Key - A Guide to Understanding SSL/TLS Cryptography (Paperback, Colour ed.): Hollie Acres SSL/TLS Under Lock and Key - A Guide to Understanding SSL/TLS Cryptography (Paperback, Colour ed.)
Hollie Acres; Paul Baka, Jeremy Schatten
R608 R552 Discovery Miles 5 520 Save R56 (9%) Ships in 10 - 15 working days
Mastering Blockchain - A deep dive into distributed ledgers, consensus protocols, smart contracts, DApps, cryptocurrencies,... Mastering Blockchain - A deep dive into distributed ledgers, consensus protocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more, 3rd Edition (Paperback, 3rd Revised edition)
Imran Bashir
R2,337 Discovery Miles 23 370 Ships in 10 - 15 working days

Develop a deeper understanding of what's under the hood of blockchain with this technical reference guide on one of the most disruptive modern technologies Key Features Updated with four new chapters on consensus algorithms, Ethereum 2.0, tokenization, and enterprise blockchains Learn about key elements of blockchain theory such as decentralization, cryptography, and consensus protocols Get to grips with Solidity, Web3, cryptocurrencies, smart contract development and solve scalability, security and privacy issues Discover the architecture of different distributed ledger platforms including Ethereum, Bitcoin, Hyperledger Fabric, Hyperledger Sawtooth, Corda and Quorum Book DescriptionBlockchain is the backbone of cryptocurrencies, with applications in finance, government, media, and other industries. With a legacy of providing technologists with executable insights, this new edition of Mastering Blockchain is thoroughly revised and updated to the latest blockchain research with four new chapters on consensus algorithms, Serenity (the update that will introduce Ethereum 2.0), tokenization, and enterprise blockchains. This book covers the basics, including blockchain's technical underpinnings, cryptography and consensus protocols. It also provides you with expert knowledge on decentralization, decentralized application development on Ethereum, Bitcoin, alternative coins, smart contracts, alternative blockchains, and Hyperledger. Further, you will explore blockchain solutions beyond cryptocurrencies such as the Internet of Things with blockchain, enterprise blockchains, tokenization using blockchain, and consider the future scope of this fascinating and disruptive technology. By the end of this book, you will have gained a thorough comprehension of the various facets of blockchain and understand their potential in diverse real-world scenarios. What you will learn Grasp the mechanisms behind Bitcoin, Ethereum, and alternative cryptocurrencies Understand cryptography and its usage in blockchain Understand the theoretical foundations of smart contracts Develop decentralized applications using Solidity, Remix, Truffle, Ganache and Drizzle Identify and examine applications of blockchain beyond cryptocurrencies Understand the architecture and development of Ethereum 2.0 Explore research topics and the future scope of blockchain Who this book is forIf you are a technologist, business executive, a student or an enthusiast who wishes to explore the fascinating world of blockchain technology, smart contracts, decentralized applications and distributed systems then this book is for you. Basic familiarity with a beginner-level command of a programming language would be a plus.

Caesura in Cryptography [Paperback] - My first Workshop about Encryption - An Introduction with Teaching and Learning Material... Caesura in Cryptography [Paperback] - My first Workshop about Encryption - An Introduction with Teaching and Learning Material for School, University and Leisure. (Paperback)
Evelyn Ackermann, Michael Klein
R944 Discovery Miles 9 440 Ships in 10 - 15 working days
Blockchain for Decision Makers - A systematic guide to using blockchain for improving your business (Paperback): Romain Tormen Blockchain for Decision Makers - A systematic guide to using blockchain for improving your business (Paperback)
Romain Tormen
R972 Discovery Miles 9 720 Ships in 10 - 15 working days

Understand how blockchain works and explore a variety of strategies to implement it in your organization effectively Key Features Become familiar with business challenges faced by companies when using blockchain Discover how companies implement blockchain to monetize and secure their data Study real-world examples to understand blockchain and its use in organizations Book DescriptionIn addition to cryptocurrencies, blockchain-based apps are being developed in different industries such as banking, supply chain, and healthcare to achieve digital transformation and enhance user experience. Blockchain is not only about Bitcoin or cryptocurrencies, but also about different technologies such as peer-to-peer networks, consensus mechanisms, and cryptography. These technologies together help sustain trustless environments in which digital value can be transferred between individuals without intermediaries. This book will help you understand the basics of blockchain such as consensus protocols, decentralized applications, and tokenization. You'll focus on how blockchain is used today in different industries and the technological challenges faced while implementing a blockchain strategy. The book also enables you, as a decision maker, to understand blockchain from a technical perspective and evaluate its applicability in your business. Finally, you'll get to grips with blockchain frameworks such as Hyperledger and Quorum and their usability. By the end of this book, you'll have learned about the current use cases of blockchain and be able to implement a blockchain strategy on your own. What you will learn Become well-versed with how blockchain works Understand the difference between blockchain and Bitcoin Learn how blockchain is being used in different industry verticals such as finance and retail Delve into the technological and organizational challenges of implementing blockchain Explore the possibilities that blockchain can unlock for decision makers Choose a blockchain framework best suited for your projects from options such as Ethereum and Hyperledger Fabric Who this book is forThis book is for CXOs, business professionals, organization leaders, decision makers, technology enthusiasts, and managers who wish to understand how blockchain is implemented in different organizations, its impact, and how it can be customized according to business needs. Prior experience with blockchain is not required.

Beginning Ethereum and Solidity with React (Paperback): Greg Lim Beginning Ethereum and Solidity with React (Paperback)
Greg Lim
R407 R377 Discovery Miles 3 770 Save R30 (7%) Ships in 10 - 15 working days
Bitcoin Basics - A Beginner's Guide to Bitcoin and Blockchain (Paperback): Marc Gordon Bitcoin Basics - A Beginner's Guide to Bitcoin and Blockchain (Paperback)
Marc Gordon
R228 Discovery Miles 2 280 Ships in 10 - 15 working days
The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback): William Gamble The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback)
William Gamble
R484 Discovery Miles 4 840 Ships in 10 - 15 working days
The I-Coin Explained - The World's First Crypto Mined by Individuals Based on the Quality of Their Emotions (Paperback):... The I-Coin Explained - The World's First Crypto Mined by Individuals Based on the Quality of Their Emotions (Paperback)
Maxime Drouin
R787 Discovery Miles 7 870 Ships in 10 - 15 working days
The Bitcoin Standard - The Essential Guide to Bitcoin for Beginners, Discover How Strategies and Tips on How You Can Master... The Bitcoin Standard - The Essential Guide to Bitcoin for Beginners, Discover How Strategies and Tips on How You Can Master Bitcoin and Earn Huge Profits (Paperback)
J H Damp
R457 R417 Discovery Miles 4 170 Save R40 (9%) Ships in 10 - 15 working days
Time Override - Prophetic Images from the Future Decoded (Paperback): Dylan Clearfield Time Override - Prophetic Images from the Future Decoded (Paperback)
Dylan Clearfield
R501 R463 Discovery Miles 4 630 Save R38 (8%) Ships in 10 - 15 working days
The Art of Hacking - Ancient Wisdom for Cybersecurity Defense (Paperback): Ken May The Art of Hacking - Ancient Wisdom for Cybersecurity Defense (Paperback)
Ken May
R494 R461 Discovery Miles 4 610 Save R33 (7%) Ships in 10 - 15 working days
Cybersecurity - Essential Guide for Beginners to Learn Basic Methods of Cybersecurity (Paperback): Henry George Cybersecurity - Essential Guide for Beginners to Learn Basic Methods of Cybersecurity (Paperback)
Henry George
R537 Discovery Miles 5 370 Ships in 10 - 15 working days
Codaspy'19 - Proceedings of the 2019 International Symposium on Data and Application Security and Privacy (Paperback):... Codaspy'19 - Proceedings of the 2019 International Symposium on Data and Application Security and Privacy (Paperback)
Codaspy'19
R2,820 Discovery Miles 28 200 Ships in 10 - 15 working days
Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage... Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage Control Mechanism (Paperback)
Yuri A Bogachev
R359 R339 Discovery Miles 3 390 Save R20 (6%) Ships in 10 - 15 working days
Digital Forensics with Kali Linux - Perform data acquisition, data recovery, network forensics, and malware analysis with Kali... Digital Forensics with Kali Linux - Perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x, 2nd Edition (Paperback, 2nd Revised edition)
Shiva V.N Parasram
R1,515 Discovery Miles 15 150 Ships in 10 - 15 working days

Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reporting Key Features Perform evidence acquisition, preservation, and analysis using a variety of Kali Linux tools Use PcapXray to perform timeline analysis of malware and network activity Implement the concept of cryptographic hashing and imaging using Kali Linux Book DescriptionKali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics. It has a wide range of tools to help for digital forensics investigations and incident response mechanisms. This updated second edition of Digital Forensics with Kali Linux covers the latest version of Kali Linux and The Sleuth Kit. You'll get to grips with modern techniques for analysis, extraction, and reporting using advanced tools such as FTK Imager, hex editor, and Axiom. Updated to cover digital forensics basics and advancements in the world of modern forensics, this book will also delve into the domain of operating systems. Progressing through the chapters, you'll explore various formats for file storage, including secret hiding places unseen by the end user or even the operating system. The book will also show you how to create forensic images of data and maintain integrity using hashing tools. Finally, you'll cover advanced topics such as autopsies and acquiring investigation data from networks, operating system memory, and quantum cryptography. By the end of this book, you'll have gained hands-on experience of implementing all the pillars of digital forensics: acquisition, extraction, analysis, and presentation, all using Kali Linux tools. What you will learn Get up and running with powerful Kali Linux tools for digital investigation and analysis Perform internet and memory forensics with Volatility and Xplico Understand filesystems, storage, and data fundamentals Become well-versed with incident response procedures and best practices Perform ransomware analysis using labs involving actual ransomware Carry out network forensics and analysis using NetworkMiner and other tools Who this book is forThis Kali Linux book is for forensics and digital investigators, security analysts, or anyone interested in learning digital forensics using Kali Linux. Basic knowledge of Kali Linux will be helpful to gain a better understanding of the concepts covered.

Security Tokens and Stablecoins Quick Start Guide - Learn how to build STO and stablecoin decentralized applications... Security Tokens and Stablecoins Quick Start Guide - Learn how to build STO and stablecoin decentralized applications (Paperback)
Weimin Sun, Xun (Brian) Wu, Angela Kwok
R887 Discovery Miles 8 870 Ships in 10 - 15 working days

A complete guide to understanding, developing, and testing popular security-token smart contracts Key Features Understand key Blockchain and Ethereum platforms concepts Step-by-step guide to developing STO smart contracts on Ethereum Monetize digital tokens under various U.S. securities laws Book DescriptionThe failure of initial coin offerings (ICOs) is no accident, as most ICOs do not link to a real asset and are not regulated. Realizing the shortcomings of ICOs, the blockchain community and potential investors embraced security token offerings (STOs) and stablecoins enthusiastically. In this book, we start with an overview of the blockchain technology along with its basic concepts. We introduce the concept behind STO, and cover the basic requirements for launching a STO and the relevant regulations governing its issuance. We discuss U.S. securities laws development in launching security digital tokens using blockchain technology and show some real use cases. We also explore the process of STO launches and legal considerations. We introduce popular security tokens in the current blockchain space and talk about how to develop a security token DApp, including smart contract development for ERC1404 tokens. Later, you'll learn to build frontend side functionalities to interact with smart contracts. Finally, we discuss stablecoin technical design functionalities for issuing and operating STO tokens by interacting with Ethereum smart contracts. By the end of this book, you will have learned more about STOs and gained a detailed knowledge of building relevant applications-all with the help of practical examples. What you will learn Understand the basic requirements for launching a security token offering Explore various US securities laws governing the offering of security digital tokens Get to grips with the stablecoin concept with the help of use cases Learn how to develop security token decentralized applications Understand the difference between ERC-20 and ERC-721 tokens Learn how to set up a development environment and build security tokens Explore the technical design of stablecoins Who this book is forThis book is ideal for blockchain beginners and business user developers who want to quickly master popular Security Token Offerings and stablecoins. Readers will learn how to develop blockchain/digital cryptos, guided by U.S. securities laws and utilizing some real use cases. Prior exposure to an Object-Oriented Programming language such as JavaScript would be an advantage, but is not mandatory.

Hyperledger Cookbook - Over 40 recipes implementing the latest Hyperledger blockchain frameworks and tools (Paperback): Xun... Hyperledger Cookbook - Over 40 recipes implementing the latest Hyperledger blockchain frameworks and tools (Paperback)
Xun (Brian) Wu, ChuanFeng Zhang, Andrew Zhang
R1,048 Discovery Miles 10 480 Ships in 10 - 15 working days

Explore the entire Hyperledger blockchain family, including frameworks such as Fabric, Sawtooth, Indy, Burrow, and Iroha; and tools such as Composer, Explorer, and Caliper. Key Features Plan, design, and create a full-fledged private decentralized application using Hyperledger services Master the ins and outs of the Hyperledger network using real-world examples Packed with problem-solution-based recipes to tackle pain areas in the blockchain development cycle Book DescriptionHyperledger is an open-source project and creates private blockchain applications for a range of domains. This book will be your desk reference as you explore common and not-so-common challenges faced while building blockchain networks using Hyperledger services. We'll work through all Hyperledger platform modules to understand their services and features and build end-to-end blockchain applications using various frameworks and tools supported by Hyperledger. This book's independent, recipe-based approach (packed with real-world examples) will familiarize you with the blockchain development cycle. From modeling a business network to integrating with various tools, you will cover it all. We'll cover common and not-so-common challenges faced in the blockchain life cycle. Later, we'll delve into how we can interact with the Hyperledger Fabric blockchain, covering all the principles you need to master, such as chaincode, smart contracts, and much more. We'll also address the scalability and security issues currently faced in blockchain development. By the end of this book, you will be able to implement each recipe to plan, design, and create a full-fledged, private, decentralized application to meet organizational needs. What you will learn Create the most popular permissioned blockchain network with Fabric and Composer Build permissioned and permission-less blockchains using Sawtooth Utilize built-in Iroha asset/account management with role-based permissions Implement and run Ethereum smart contracts with Burrow Get to grips with security and scalability in Hyperledger Explore and view blockchain data using Hyperledger Explorer Produce reports containing performance indicators and benchmarks using Caliper Who this book is forThis book is for blockchain developers who want to understand how they can apply Hyperledger services in their day-to-day projects. This book uses a recipe-based approach to help you use Hyperledger to build powerful, decentralized autonomous applications. We assume the reader has a basic knowledge of the Blockchain technology and cryptography concepts

Mastering Ethereum - Implement advanced blockchain applications using Ethereum-supported tools, services, and protocols... Mastering Ethereum - Implement advanced blockchain applications using Ethereum-supported tools, services, and protocols (Paperback)
Merunas Grincalaitis
R972 Discovery Miles 9 720 Ships in 10 - 15 working days

An expert guide to implementing fast, secure, and scalable decentralized applications that work with thousands of users in real time Key Features Implement advanced features of the Ethereum network to build powerful decentralized applications Build smart contracts on different domains using the programming techniques of Solidity and Vyper Explore the architecture of Ethereum network to understand advanced use cases of blockchain development Book DescriptionEthereum is one of the commonly used platforms for building blockchain applications. It's a decentralized platform for applications that can run exactly as programmed without being affected by fraud, censorship, or third-party interference. This book will give you a deep understanding of how blockchain works so that you can discover the entire ecosystem, core components, and its implementations. You will get started by understanding how to configure and work with various Ethereum protocols for developing dApps. Next, you will learn to code and create powerful smart contracts that scale with Solidity and Vyper. You will then explore the building blocks of the dApps architecture, and gain insights on how to create your own dApp through a variety of real-world examples. The book will even guide you on how to deploy your dApps on multiple Ethereum instances with the required best practices and techniques. The next few chapters will delve into advanced topics such as, building advanced smart contracts and multi-page frontends using Ethereum blockchain. You will also focus on implementing machine learning techniques to build decentralized autonomous applications, in addition to covering several use cases across a variety of domains such as, social media and e-commerce. By the end of this book, you will have the expertise you need to build decentralized autonomous applications confidently. What you will learn Apply scalability solutions on dApps with Plasma and state channels Understand the important metrics of blockchain for analyzing and determining its state Develop a decentralized web application using React.js and Node.js Create oracles with Node.js to provide external data to smart contracts Get to grips with using Etherscan and block explorers for various transactions Explore web3.js, Solidity, and Vyper for dApps communication Deploy apps with multiple Ethereum instances including TestRPC, private chain, test chain, and mainnet Who this book is forThis book is for anyone who wants to build fast, highly secure, and transactional decentralized applications. If you are an Ethereum developer looking to perfect your existing skills in building powerful blockchain applications, then this book is for you. Basic knowledge of Ethereum and blockchain is necessary to understand the concepts covered in this book.

Computer Hacking - The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners (Paperback): Tim Warren Computer Hacking - The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners (Paperback)
Tim Warren
R343 R313 Discovery Miles 3 130 Save R30 (9%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Social Psychology of Humor
Madelijn Strick, Thomas E. Ford Paperback R1,113 Discovery Miles 11 130
Maped Creativ Plaster Friends - Super
R273 R200 Discovery Miles 2 000
The Experience of Higher Education
Peter Marris Paperback R1,064 Discovery Miles 10 640
Teddy Canvas Painting Kit - Batman…
R147 Discovery Miles 1 470
AFH Kundai Printed Xhosa Kimono (Cream)
R950 R750 Discovery Miles 7 500
The Arithmetic of Function Fields…
David Goss, David R. Hayes, … Hardcover R4,336 Discovery Miles 43 360
Channeling - A Bibliographic Exploration
Joel Bjorling Hardcover R3,892 Discovery Miles 38 920
Handbook of Thin-Layer Chromatography
Joseph Sherma, Bernard Fried Hardcover R10,325 Discovery Miles 103 250
Nuzzle Dog Jacket (Small, Grey)
R399 R153 Discovery Miles 1 530
Faith to Produce Miracles
Brent C Satterfield Phd Paperback R439 R415 Discovery Miles 4 150

 

Partners