0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (85)
  • R500+ (1,287)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Time Override - Prophetic Images from the Future Decoded (Paperback): Dylan Clearfield Time Override - Prophetic Images from the Future Decoded (Paperback)
Dylan Clearfield
R461 R427 Discovery Miles 4 270 Save R34 (7%) Ships in 18 - 22 working days
Kali linux - learn now how kali linux works, how hacking with kali linux with this step by step guide for beginners and which... Kali linux - learn now how kali linux works, how hacking with kali linux with this step by step guide for beginners and which tools you need to hack + practical exercises (Paperback)
Adam Harris
R443 Discovery Miles 4 430 Ships in 18 - 22 working days
Cryptographic Algorithms (Paperback): Gerard Swedberg Cryptographic Algorithms (Paperback)
Gerard Swedberg
R1,563 Discovery Miles 15 630 Ships in 18 - 22 working days
Quality Assurance + Cryptography + Human-Computer Interaction (Paperback): Solis Tech Quality Assurance + Cryptography + Human-Computer Interaction (Paperback)
Solis Tech
R232 Discovery Miles 2 320 Ships in 18 - 22 working days
Kali Linux - Simple and Effective Approach to Learn Kali Linux (Paperback): Ethan Thorpe Kali Linux - Simple and Effective Approach to Learn Kali Linux (Paperback)
Ethan Thorpe
R499 Discovery Miles 4 990 Ships in 18 - 22 working days
The I-Coin Explained - The World's First Crypto Mined by Individuals Based on the Quality of Their Emotions (Paperback):... The I-Coin Explained - The World's First Crypto Mined by Individuals Based on the Quality of Their Emotions (Paperback)
Maxime Drouin
R732 Discovery Miles 7 320 Ships in 18 - 22 working days
Blockchain, Cryptocurrencies & The Future (Paperback): Brian McNicol, Muthu Pannirselvam Blockchain, Cryptocurrencies & The Future (Paperback)
Brian McNicol, Muthu Pannirselvam
R766 R670 Discovery Miles 6 700 Save R96 (13%) Ships in 18 - 22 working days
Big Seven Study (2016) - 7 open source Crypto-Messengers to be compared (English/Deutsch): or: Comprehensive Confidentiality... Big Seven Study (2016) - 7 open source Crypto-Messengers to be compared (English/Deutsch): or: Comprehensive Confidentiality Review & Audit of GoldBug, Encrypting E-Mail-Client & Secure Instant Messenger. (Paperback)
David Adams, Ann-Kathrin Maier
R657 Discovery Miles 6 570 Ships in 18 - 22 working days
Cybersecurity - Essential Guide for Beginners to Learn Basic Methods of Cybersecurity (Paperback): Henry George Cybersecurity - Essential Guide for Beginners to Learn Basic Methods of Cybersecurity (Paperback)
Henry George
R501 Discovery Miles 5 010 Ships in 18 - 22 working days
Cyber Warfare - Truth, Tactics, and Strategies - Strategic concepts and truths to help you and your organization survive on the... Cyber Warfare - Truth, Tactics, and Strategies - Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare (Paperback)
Dr. Chase Cunningham; Foreword by Gregory J. Touhill
R854 Discovery Miles 8 540 Ships in 18 - 22 working days

Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat. Key Features Define and determine a cyber-defence strategy based on current and past real-life examples Understand how future technologies will impact cyber warfare campaigns and society Future-ready yourself and your business against any cyber threat Book DescriptionThe era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare - Truth, Tactics, and Strategies takes you on a journey through the myriad of cyber attacks and threats that are present in a world powered by AI, big data, autonomous vehicles, drones video, and social media. Dr. Chase Cunningham uses his military background to provide you with a unique perspective on cyber security and warfare. Moving away from a reactive stance to one that is forward-looking, he aims to prepare people and organizations to better defend themselves in a world where there are no borders or perimeters. He demonstrates how the cyber landscape is growing infinitely more complex and is continuously evolving at the speed of light. The book not only covers cyber warfare, but it also looks at the political, cultural, and geographical influences that pertain to these attack methods and helps you understand the motivation and impacts that are likely in each scenario. Cyber Warfare - Truth, Tactics, and Strategies is as real-life and up-to-date as cyber can possibly be, with examples of actual attacks and defense techniques, tools. and strategies presented for you to learn how to think about defending your own systems and data. What you will learn Hacking at scale - how machine learning (ML) and artificial intelligence (AI) skew the battlefield Defending a boundaryless enterprise Using video and audio as weapons of influence Uncovering DeepFakes and their associated attack vectors Using voice augmentation for exploitation Defending when there is no perimeter Responding tactically to counter-campaign-based attacks Who this book is forThis book is for any engineer, leader, or professional with either a responsibility for cyber security within their organizations, or an interest in working in this ever-growing field.

Ethereum Cookbook - Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps... Ethereum Cookbook - Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps (Paperback)
Manoj P R
R1,204 Discovery Miles 12 040 Ships in 18 - 22 working days

Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of Ethereum Key Features Build end-to-end decentralized Ethereum apps using Truffle, Web3, and Solidity Explore various solution-based recipes to build smart contracts and foolproof decentralized applications Develop decentralized marketplaces from scratch, build wallets, and manage transactions Book DescriptionEthereum and Blockchain will change the way software is built for business transactions. Most industries have been looking to leverage these new technologies to gain efficiencies and create new business models and opportunities. The Ethereum Cookbook covers various solutions such as setting up Ethereum, writing smart contracts, and creating tokens, among others. You'll learn about the security vulnerabilities, along with other protocols of Ethereum. Once you have understood the basics, you'll move on to exploring various design decisions and tips to make your application scalable and secure. In addition to this, you'll work with various Ethereum packages such as Truffle, Web3, and Ganache. By the end of this book, you'll have comprehensively grasped the Ethereum principles and ecosystem. What you will learn Efficiently write smart contracts in Ethereum Build scalable distributed applications and deploy them Use tools and frameworks to develop, deploy, and test your application Use block explorers such as Etherscan to find a specific transaction Create your own tokens, initial coin offerings (ICOs), and games Understand various security flaws in smart contracts in order to avoid them Who this book is forThe Ethereum Cookbook is for you if you are a software engineer, Blockchain developer, or research scientist who wants to build smart contracts, develop decentralized applications, and facilitate peer-to-peer transaction. It is assumed that you are familiar with Blockchain concepts and have sound knowledge of JavaScript.

Computer Hacking - The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners (Paperback): Tim Warren Computer Hacking - The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners (Paperback)
Tim Warren
R316 R289 Discovery Miles 2 890 Save R27 (9%) Ships in 18 - 22 working days
Asiaccs '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security (Paperback): Asiaccs Asiaccs '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security (Paperback)
Asiaccs
R5,923 Discovery Miles 59 230 Ships in 18 - 22 working days
Advanced Blockchain Development - Build highly secure, decentralized applications and conduct secure transactions (Paperback):... Advanced Blockchain Development - Build highly secure, decentralized applications and conduct secure transactions (Paperback)
Imran Bashir, Narayan Prusty
R1,311 Discovery Miles 13 110 Ships in 18 - 22 working days

Explore distributed ledger technology, decentralization, and smart contracts and develop real-time decentralized applications with Ethereum and Solidity Key Features Get to grips with the underlying technical principles and implementations of blockchain Build powerful applications using Ethereum to secure transactions and create smart contracts Gain advanced insights into cryptography and cryptocurrencies Book DescriptionBlockchain technology is a distributed ledger with applications in industries such as finance, government, and media. This Learning Path is your guide to building blockchain networks using Ethereum, JavaScript, and Solidity. You will get started by understanding the technical foundations of blockchain technology, including distributed systems, cryptography and how this digital ledger keeps data secure. Further into the chapters, you'll gain insights into developing applications using Ethereum and Hyperledger. As you build on your knowledge of Ether security, mining , smart contracts, and Solidity, you'll learn how to create robust and secure applications that run exactly as programmed without being affected by fraud, censorship, or third-party interference. Toward the concluding chapters, you'll explore how blockchain solutions can be implemented in applications such as IoT apps, in addition to its use in currencies. The Learning Path will also highlight how you can increase blockchain scalability and even discusses the future scope of this fascinating and powerful technology. By the end of this Learning Path, you'll be equipped with the skills you need to tackle pain points encountered in the blockchain life cycle and confidently design and deploy decentralized applications. This Learning Path includes content from the following Packt products: Mastering Blockchain - Second Edition by Imran Bashir Building Blockchain Projects by Narayan Prusty What you will learn Understand why decentralized applications are important Discover the mechanisms behind bitcoin and alternative cryptocurrencies Master how cryptography is used to secure data with the help of examples Maintain, monitor, and manage your blockchain solutions Create Ethereum wallets Explore research topics and the future scope of blockchain technology Who this book is forThis Learning Path is designed for blockchain developers who want to build decentralized applications and smart contracts from scratch using Hyperledger. Basic familiarity with any programming language will be useful to get started with this Learning Path.

Hyperledger Cookbook - Over 40 recipes implementing the latest Hyperledger blockchain frameworks and tools (Paperback): Xun... Hyperledger Cookbook - Over 40 recipes implementing the latest Hyperledger blockchain frameworks and tools (Paperback)
Xun (Brian) Wu, ChuanFeng Zhang, Andrew Zhang
R972 Discovery Miles 9 720 Ships in 18 - 22 working days

Explore the entire Hyperledger blockchain family, including frameworks such as Fabric, Sawtooth, Indy, Burrow, and Iroha; and tools such as Composer, Explorer, and Caliper. Key Features Plan, design, and create a full-fledged private decentralized application using Hyperledger services Master the ins and outs of the Hyperledger network using real-world examples Packed with problem-solution-based recipes to tackle pain areas in the blockchain development cycle Book DescriptionHyperledger is an open-source project and creates private blockchain applications for a range of domains. This book will be your desk reference as you explore common and not-so-common challenges faced while building blockchain networks using Hyperledger services. We'll work through all Hyperledger platform modules to understand their services and features and build end-to-end blockchain applications using various frameworks and tools supported by Hyperledger. This book's independent, recipe-based approach (packed with real-world examples) will familiarize you with the blockchain development cycle. From modeling a business network to integrating with various tools, you will cover it all. We'll cover common and not-so-common challenges faced in the blockchain life cycle. Later, we'll delve into how we can interact with the Hyperledger Fabric blockchain, covering all the principles you need to master, such as chaincode, smart contracts, and much more. We'll also address the scalability and security issues currently faced in blockchain development. By the end of this book, you will be able to implement each recipe to plan, design, and create a full-fledged, private, decentralized application to meet organizational needs. What you will learn Create the most popular permissioned blockchain network with Fabric and Composer Build permissioned and permission-less blockchains using Sawtooth Utilize built-in Iroha asset/account management with role-based permissions Implement and run Ethereum smart contracts with Burrow Get to grips with security and scalability in Hyperledger Explore and view blockchain data using Hyperledger Explorer Produce reports containing performance indicators and benchmarks using Caliper Who this book is forThis book is for blockchain developers who want to understand how they can apply Hyperledger services in their day-to-day projects. This book uses a recipe-based approach to help you use Hyperledger to build powerful, decentralized autonomous applications. We assume the reader has a basic knowledge of the Blockchain technology and cryptography concepts

Information Security: Theory and Practice (Hardcover): Conner Casini Information Security: Theory and Practice (Hardcover)
Conner Casini
R3,167 R2,870 Discovery Miles 28 700 Save R297 (9%) Ships in 18 - 22 working days
Data Security and Communication Networks (Hardcover): Malcolm Becker Data Security and Communication Networks (Hardcover)
Malcolm Becker
R3,080 R2,793 Discovery Miles 27 930 Save R287 (9%) Ships in 18 - 22 working days
Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage... Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage Control Mechanism (Paperback)
Yuri A Bogachev
R331 R312 Discovery Miles 3 120 Save R19 (6%) Ships in 18 - 22 working days
Data Security and Cryptography (Hardcover): Gina Simpson Data Security and Cryptography (Hardcover)
Gina Simpson
R3,168 R2,871 Discovery Miles 28 710 Save R297 (9%) Ships in 18 - 22 working days
Recommendation for Pair-Wise Key Establishment Using Integer Factorization Cryptography - Nist Sp 800-56b REV 2 (Paperback):... Recommendation for Pair-Wise Key Establishment Using Integer Factorization Cryptography - Nist Sp 800-56b REV 2 (Paperback)
National Institute of Standards and Tech
R636 Discovery Miles 6 360 Ships in 18 - 22 working days
Blockchain for Decision Makers - A systematic guide to using blockchain for improving your business (Paperback): Romain Tormen Blockchain for Decision Makers - A systematic guide to using blockchain for improving your business (Paperback)
Romain Tormen
R901 Discovery Miles 9 010 Ships in 18 - 22 working days

Understand how blockchain works and explore a variety of strategies to implement it in your organization effectively Key Features Become familiar with business challenges faced by companies when using blockchain Discover how companies implement blockchain to monetize and secure their data Study real-world examples to understand blockchain and its use in organizations Book DescriptionIn addition to cryptocurrencies, blockchain-based apps are being developed in different industries such as banking, supply chain, and healthcare to achieve digital transformation and enhance user experience. Blockchain is not only about Bitcoin or cryptocurrencies, but also about different technologies such as peer-to-peer networks, consensus mechanisms, and cryptography. These technologies together help sustain trustless environments in which digital value can be transferred between individuals without intermediaries. This book will help you understand the basics of blockchain such as consensus protocols, decentralized applications, and tokenization. You'll focus on how blockchain is used today in different industries and the technological challenges faced while implementing a blockchain strategy. The book also enables you, as a decision maker, to understand blockchain from a technical perspective and evaluate its applicability in your business. Finally, you'll get to grips with blockchain frameworks such as Hyperledger and Quorum and their usability. By the end of this book, you'll have learned about the current use cases of blockchain and be able to implement a blockchain strategy on your own. What you will learn Become well-versed with how blockchain works Understand the difference between blockchain and Bitcoin Learn how blockchain is being used in different industry verticals such as finance and retail Delve into the technological and organizational challenges of implementing blockchain Explore the possibilities that blockchain can unlock for decision makers Choose a blockchain framework best suited for your projects from options such as Ethereum and Hyperledger Fabric Who this book is forThis book is for CXOs, business professionals, organization leaders, decision makers, technology enthusiasts, and managers who wish to understand how blockchain is implemented in different organizations, its impact, and how it can be customized according to business needs. Prior experience with blockchain is not required.

Blockchain Development with Hyperledger - Build decentralized applications with Hyperledger Fabric and Composer (Paperback):... Blockchain Development with Hyperledger - Build decentralized applications with Hyperledger Fabric and Composer (Paperback)
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O'Dowd, …
R1,486 Discovery Miles 14 860 Ships in 18 - 22 working days

Learn quick and effective techniques for developing blockchain-based distributed ledgers with ease Key Features Discover why blockchain is a game changer in the technology landscape Set up blockchain networks using Hyperledger Fabric Write smart contracts at speed with Hyperledger Composer Book DescriptionBlockchain and Hyperledger are open source technologies that power the development of decentralized applications. This Learning Path is your helpful reference for exploring and building blockchain networks using Ethereum, Hyperledger Fabric, and Hyperledger Composer. Blockchain Development with Hyperledger will start off by giving you an overview of blockchain and demonstrating how you can set up an Ethereum development environment for developing, packaging, building, and testing campaign-decentralized applications. You'll then explore the de facto language Solidity, which you can use to develop decentralized applications in Ethereum. Following this, you'll be able to configure Hyperledger Fabric and use it to build private blockchain networks and applications that connect to them. Toward the later chapters, you'll learn how to design and launch a network, and even implement smart contracts in chain code. By the end of this Learning Path, you'll be able to build and deploy your own decentralized applications by addressing the key pain points encountered in the blockchain life cycle. This Learning Path includes content from the following Packt products: Blockchain Quick Start Guide by Xun (Brian) Wu and Weimin Sun Hands-On Blockchain with Hyperledger by Nitin Gaur et al. What you will learn Understand why decentralized applications are necessary Develop and test a decentralized application with Hyperledger Fabric and Hyperledger Composer Write and test a smart contract using Solidity Design transaction models and chain code with Golang Deploy the Composer REpresentational State Transfer (REST) Gateway to access Composer transactions Maintain, monitor, and manage your blockchain solutions Who this book is forThis Learning Path is designed for blockchain developers who want to build decentralized applications and smart contracts from scratch using Hyperledger. Basic familiarity with or exposure to any programming language will be useful to get started with this course.

Security with Go - Explore the power of Golang to secure host, web, and cloud services (Paperback): John Daniel Leon Security with Go - Explore the power of Golang to secure host, web, and cloud services (Paperback)
John Daniel Leon
R1,087 Discovery Miles 10 870 Ships in 18 - 22 working days

The first stop for your security needs when using Go, covering host, network, and cloud security for ethical hackers and defense against intrusion Key Features First introduction to Security with Golang Adopting a Blue Team/Red Team approach Take advantage of speed and inherent safety of Golang Works as an introduction to security for Golang developers Works as a guide to Golang security packages for recent Golang beginners Book DescriptionGo is becoming more and more popular as a language for security experts. Its wide use in server and cloud environments, its speed and ease of use, and its evident capabilities for data analysis, have made it a prime choice for developers who need to think about security. Security with Go is the first Golang security book, and it is useful for both blue team and red team applications. With this book, you will learn how to write secure software, monitor your systems, secure your data, attack systems, and extract information. Defensive topics include cryptography, forensics, packet capturing, and building secure web applications. Offensive topics include brute force, port scanning, packet injection, web scraping, social engineering, and post exploitation techniques. What you will learn Learn the basic concepts and principles of secure programming Write secure Golang programs and applications Understand classic patterns of attack Write Golang scripts to defend against network-level attacks Learn how to use Golang security packages Apply and explore cryptographic methods and packages Learn the art of defending against brute force attacks Secure web and cloud applications Who this book is forSecurity with Go is aimed at developers with basics in Go to the level that they can write their own scripts and small programs without difficulty. Readers should be familiar with security concepts, and familiarity with Python security applications and libraries is an advantage, but not a necessity.

Cyber Nation - How Venture Capital & Startups Are Protecting America from Cyber Criminals, Threats and Cyber Attacks.... Cyber Nation - How Venture Capital & Startups Are Protecting America from Cyber Criminals, Threats and Cyber Attacks. (Paperback)
Ross Blankenship
R495 Discovery Miles 4 950 Ships in 18 - 22 working days
Providing Sound Foundations for Cryptography - On the work of Shafi Goldwasser and Silvio Micali (Paperback): Oded Goldreich Providing Sound Foundations for Cryptography - On the work of Shafi Goldwasser and Silvio Micali (Paperback)
Oded Goldreich
R2,624 Discovery Miles 26 240 Ships in 18 - 22 working days

Cryptography is concerned with the construction of schemes that withstand any abuse. A cryptographic scheme is constructed so as to maintain a desired functionality, even under malicious attempts aimed at making it deviate from its prescribed behavior. The design of cryptographic systems must be based on firm foundations, whereas ad hoc approaches and heuristics are a very dangerous way to go. These foundations were developed mostly in the 1980s, in works that are all co-authored by Shafi Goldwasser and/or Silvio Micali. These works have transformed cryptography from an engineering discipline, lacking sound theoretical foundations, into a scientific field possessing a well-founded theory, which influences practice as well as contributes to other areas of theoretical computer science. This book celebrates these works, which were the basis for bestowing the 2012 A.M. Turing Award upon Shafi Goldwasser and Silvio Micali. A significant portion of this book reproduces some of these works, and another portion consists of scientific perspectives by some of their former students. The highlight of the book is provided by a few chapters that allow the readers to meet Shafi and Silvio in person. These include interviews with them, their biographies and their Turing Award lectures.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Investigating Matter and Weight Matter…
Baby Professor Hardcover R689 R613 Discovery Miles 6 130
Sputnik to Smartphones - A Half-Century…
Mary Virginia Orna Hardcover R5,488 Discovery Miles 54 880
Edexcel International GCSE (9-1…
David Johnston, Neil Dixon Paperback R274 Discovery Miles 2 740
New Gcse Chemistry Edexcel Revision…
CGP Books Mixed media product R224 Discovery Miles 2 240
The Syntax of Ellipsis - Evidence from…
Jeroen Van Craenenbroeck Hardcover R2,156 Discovery Miles 21 560
Languaging Without Languages - Beyond…
Robin Sabino Hardcover R3,073 Discovery Miles 30 730
Inside Matter - What Is It Made Of…
Baby Professor Hardcover R689 R613 Discovery Miles 6 130
Edexcel GCSE (9-1) Chemistry Student…
Nigel Saunders, Mark Levesley, … Paperback R1,126 Discovery Miles 11 260
A Grammar of Coastal Marind
Bruno Olsson Hardcover R5,179 Discovery Miles 51 790
A Comparative Grammar of Borgomanerese
Christina Tortora Hardcover R3,858 Discovery Miles 38 580

 

Partners