0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (78)
  • R250 - R500 (115)
  • R500+ (1,464)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Coding and Cryptology - Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings (Paperback,... Coding and Cryptology - Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings (Paperback, Edition.)
Yeow Meng Chee, Zhenbo Guo, San Ling, Fengjing Shao, Yuansheng Tang, …
R1,762 R1,479 Discovery Miles 14 790 Save R283 (16%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC 2011, held in Qingdao, China, May 30-June 3, 2011. The 19 revised full technical papers are contributed by the invited speakers of the workshop. The papers were carefully reviewed and cover a broad range of foundational and methodological as well as applicative issues in coding and cryptology, as well as related areas such as combinatorics.

Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011, Proceedings... Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011, Proceedings (Paperback, Edition.)
Yuval Ishai
R2,371 R1,982 Discovery Miles 19 820 Save R389 (16%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 8th Theory of Cryptography Conference, TCC 2011, held in Providence, Rhode Island, USA, in March 2011. The 35 revised full papers are presented together with 2 invited talks and were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on hardness amplification, leakage resilience, tamper resilience, encryption, composable security, secure computation, privacy, coin tossing and pseudorandomness, black-box constructions and separations, and black box separations.

Intelligent Watermarking Techniques (With Cd-rom) (Hardcover): Peter Jeng-shyang Pan, Hsiang-Cheh Huang, Lakhmi C. Jain Intelligent Watermarking Techniques (With Cd-rom) (Hardcover)
Peter Jeng-shyang Pan, Hsiang-Cheh Huang, Lakhmi C. Jain
R4,596 Discovery Miles 45 960 Ships in 10 - 15 working days

Watermarking techniques involve the concealment of information within a text or images and the transmission of this information to the receiver with minimum distortion. This is a very new area of research. The techniques will have a significant effect on defence, business, copyright protection and other fields where information needs to be protected at all costs from attackers. This book presents the recent advances in the theory and implementation of watermarking techniques. It brings together, for the first time, the successful applications of intelligent paradigms (including comparisons with conventional methods) in many areas. The accompanying CD-Rom provides readers with source codes and executables to put into practice general topics in watermarking. Intelligent Watermarking Techniques will be of great value to undergraduate and postgraduate students in many disciplines, including engineering and computer science. It is also targeted at researchers, scientists and engineers.

Advances in Cryptology -- CRYPTO 2010 - 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010,... Advances in Cryptology -- CRYPTO 2010 - 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings (Paperback, Edition.)
Tal Rabin
R2,848 R2,370 Discovery Miles 23 700 Save R478 (17%) Ships in 10 - 15 working days

CRYPTO2010,the30thAnnualInternationalCryptologyConference,wassp- sored by the International Association for Cryptologic Research (IACR) in - operation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of C- ifornia at Santa Barbara. The conference was held in Santa Barbara, Calif- nia, during August 15-19, 2010, in conjunction with CHES 2010 (Workshop on Cryptographic Hardware and Embedded Systems). Zul?kar Ramzan served as the General Chair. The conference received 203 submissions. The quality of the submissions was very high, and the selection process was a challenging one. The Program C- mittee, aided by a 159 external reviewers,reviewed the submissions and after an intensive review period the committee accepted 41 of these submissions. Three submissions were merged into a single paper and two papers were merged into a single talk, yielding a total of 39 papers in the proceedings and 38 presen- tions at the conference. The revised versions of the 39 papers appearing in the proceedings were not subject to editorial review and the authors bear full - sponsibility for their contents. The best-paper award was awarded to the paper "Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness" by Craig Gentry. The conference featured two invited presentations. This year we celebrated 25 years from the publication of the ground-breaking work of Sha? Goldwasser, Silvio Micali and Charles Racko? "The Knowledge Complexity of Interactive Proof-Systems.

Adaptive Cryptographic Access Control (Hardcover, 2010 ed.): Anne V. D. M. Kayem, Selim G Akl, Patrick Martin Adaptive Cryptographic Access Control (Hardcover, 2010 ed.)
Anne V. D. M. Kayem, Selim G Akl, Patrick Martin
R3,063 R2,406 Discovery Miles 24 060 Save R657 (21%) Ships in 10 - 15 working days

Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Applications of cryptographic access control will benefit companies, governments and the military where structured access to information is essential.

The purpose of this book is to highlight the need for adaptability in cryptographic access control schemes that are geared for dynamic environments, such as the Internet. Adaptive Cryptographic Access Control presents the challenges of designing hierarchical cryptographic key management algorithms to implement Adaptive Access Control in dynamic environments and suggest solutions that will overcome these challenges.

Adaptive Cryptographic Access Control is a cutting-edge book focusing specifically on this topic in relation to security and cryptographic access control. Both the theoretical and practical aspects and approaches of cryptographic access control are introduced in this book. Case studies and examples are provided throughout this book.

Coding Theory And Cryptology (Paperback): Harald Niederreiter Coding Theory And Cryptology (Paperback)
Harald Niederreiter
R1,116 Discovery Miles 11 160 Ships in 10 - 15 working days

The inaugural research program of the Institute for Mathematical Sciences at the National University of Singapore took place from July to December 2001 and was devoted to coding theory and cryptology. As part of the program, tutorials for graduate students and junior researchers were given by world-renowned scholars. These tutorials covered fundamental aspects of coding theory and cryptology and were designed to prepare for original research in these areas. The present volume collects the expanded lecture notes of these tutorials. The topics range from mathematical areas such as computational number theory, exponential sums and algebraic function fields through coding-theory subjects such as extremal problems, quantum error-correcting codes and algebraic-geometry codes to cryptologic subjects such as stream ciphers, public-key infrastructures, key management, authentication schemes and distributed system security.

Cryptology For Engineers: An Application-oriented Mathematical Introduction (Hardcover): Robert Schmied Cryptology For Engineers: An Application-oriented Mathematical Introduction (Hardcover)
Robert Schmied
R2,100 Discovery Miles 21 000 Ships in 10 - 15 working days

Cryptology is increasingly becoming one of the most essential topics of interest in everyday life. Digital communication happens by transferring data between at least two participants - But do we want to disclose private information while executing a sensitive bank transfer? How about allowing third-party entities to eavesdrop on private calls while performing an important secret business discussion? Do we want to allow ambient communication concerning us to be manipulated while control software is driving our autonomous car along a steep slope? Questions like these make it clear why issues of security are a great concern in our increasingly augmented world.Cryptology for Engineers is a study of digital security in communications systems. The book covers the cryptographical functionalities of ciphering, hash generation, digital signature generation, key management and random number generation, with a clear sense of the mathematical background on the one hand and engineers' requirements on the other. Numerous examples computable by hand or with a small additional cost in most cases are provided inside.

Cyber Crime and Cyber Terrorism Investigator's Handbook (Paperback): Babak Akhgar, Andrew Staniforth, Francesca Bosco Cyber Crime and Cyber Terrorism Investigator's Handbook (Paperback)
Babak Akhgar, Andrew Staniforth, Francesca Bosco
R908 Discovery Miles 9 080 Ships in 10 - 15 working days

Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare. Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator's Handbook will serve as your best reference to the modern world of cyber crime.

Theory of Cryptography - Sixth Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009,... Theory of Cryptography - Sixth Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009, Proceedings (Paperback, 2009 ed.)
Omer Reingold
R2,660 R2,331 Discovery Miles 23 310 Save R329 (12%) Ships in 10 - 15 working days

TCC 2009, the 6th Theory of Cryptography Conference, was held in San Fr- cisco, CA, USA, March 15-17, 2009. TCC 2009 was sponsored by the Inter- tional Association for Cryptologic Research (IACR) and was organized in - operation with the Applied Crypto Group at Stanford University. The General Chair of the conference was Dan Boneh. The conference received 109 submissions, of which the Program Comm- tee selected 33 for presentation at the conference. These proceedings consist of revised versions of those 33 papers. The revisions were not reviewed, and the authors bear full responsibility for the contents of their papers. The conference program also included two invited talks: "The Di?erential Privacy Frontier," given by Cynthia Dwork and "Some Recent Progress in Lattice-Based Crypt- raphy," given by Chris Peikert. I thank the Steering Committee of TCC for entrusting me with the resp- sibility for the TCC 2009 program. I thank the authors of submitted papers for their contributions. The general impression of the Program Committee is that the submissions were of very high quality, and there were many more papers we wanted to accept than we could. The review process was therefore very - warding but the selection was very delicate and challenging. I am grateful for the dedication, thoroughness, and expertise ofthe ProgramCommittee. Obse- ing the way the members of the committee operated makes me as con?dent as possible of the outcome of our selection process.

Secure Multi-Party Non-Repudiation Protocols and Applications (Hardcover, 1st Edition.
2nd Printing. 2008): Jose A. Onieva,... Secure Multi-Party Non-Repudiation Protocols and Applications (Hardcover, 1st Edition. 2nd Printing. 2008)
Jose A. Onieva, Jianying Zhou
R3,268 R2,685 Discovery Miles 26 850 Save R583 (18%) Ships in 10 - 15 working days

The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. This book is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. The book is also suitable as an advanced-level text or reference book for students in computer science.

Transactions on Data Hiding and Multimedia Security III (Paperback, 2008 ed.): Yun Q. Shi Transactions on Data Hiding and Multimedia Security III (Paperback, 2008 ed.)
Yun Q. Shi
R1,743 R1,454 Discovery Miles 14 540 Save R289 (17%) Ships in 10 - 15 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results.

This third issue contains five contributions in the areas of steganography and digital watermarking. The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic scheme. Finally, this volume includes two papers that focus on digital watermarking and data hiding. The fourth paper introduces and analyzes a new covert channel and the fifth contribution analyzes the performance of additive attacks against quantization-based data hiding methods.

Information Hiding - 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers... Information Hiding - 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers (Paperback, 2007 ed.)
Teddy Furon, Francois Cayre, Gwenael DoerrG, Patrick Bas
R2,006 R1,680 Discovery Miles 16 800 Save R326 (16%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH 2007, held in Saint Malo, France, in June 2007.

The 25 revised full papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on new steganographic schemes, watermarking schemes, computer security, steganography and code theory, watermarking security, steganalysis, watermarking and re-synchronization, fingerprinting, forensics, and steganalysis.

Vulnerability Analysis and Defense for the Internet (Hardcover, 2008 ed.): Abhishek Singh Vulnerability Analysis and Defense for the Internet (Hardcover, 2008 ed.)
Abhishek Singh; Contributions by B Singh, H. Joseph
R3,549 R2,833 Discovery Miles 28 330 Save R716 (20%) Ships in 10 - 15 working days

Vulnerability analysis, also known as vulnerability assessment, is a process that defines, identifies, and classifies the security holes, or vulnerabilities, in a computer, network, or application. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use. Vulnerability Analysis and Defense for the Internet provides packet captures, flow charts and pseudo code, which enable a user to identify if an application/protocol is vulnerable. This edited volume also includes case studies that discuss the latest exploits.

Information Security and Cryptology - ICISC 2007 - 10th International Conference, Seoul, Korea, November 29-30, 2007,... Information Security and Cryptology - ICISC 2007 - 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings (Paperback)
Kil-Hyun Nam, Gwangsoo Rhee
R1,894 R1,589 Discovery Miles 15 890 Save R305 (16%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ICISC 2007, held in Seoul, Korea, November 29-30, 2007.

The 28 revised full papers presented have gone through two rounds of reviewing and improvement and were selected from 123 submissions. The papers are organized in topical sections on cryptoanalysis, access control, system security, biometrics, cryptographic protocols, hash functions, block and stream ciphers, copyright protection, smart/java cards, elliptic curve cryptosystems as well as authentication and authorization.

Recent Advances in Intrusion Detection - 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007,... Recent Advances in Intrusion Detection - 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, Proceedings (Paperback, 2007 ed.)
Christopher Kruegel, Richard Lippmann, Andrew Clark
R1,885 R1,580 Discovery Miles 15 800 Save R305 (16%) Ships in 10 - 15 working days

Here are the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection. The 17 full papers were carefully reviewed. Each one represents an important contribution to the study of intrusion detection. Papers cover anomaly detection, attacks, system evaluation and threat assessment, malware collection and analysis, anomaly- and specification-based detection, and network intrusion detection.

Data Security in Cloud Computing, Volume II (Paperback): Giulio D'Agostino Data Security in Cloud Computing, Volume II (Paperback)
Giulio D'Agostino
R1,092 Discovery Miles 10 920 Ships in 7 - 11 working days
Data Security in Cloud Computing, Volume I (Paperback): Giulio D'Agostino Data Security in Cloud Computing, Volume I (Paperback)
Giulio D'Agostino
R1,095 Discovery Miles 10 950 Ships in 7 - 11 working days
Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October... Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings (Paperback, 2006 ed.)
Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama
R2,160 R1,993 Discovery Miles 19 930 Save R167 (8%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First International Workshop on Security, IWSEC 2006, held in Kyoto, Japan in October 2006. The 30 revised full papers presented were carefully reviewed and selected from 147 submissions.

Privacy Enhancing Technologies - 5th International Workshop, PET 2005, Cavtat, Croatia, May 30 - June 1, 2005, Revised Selected... Privacy Enhancing Technologies - 5th International Workshop, PET 2005, Cavtat, Croatia, May 30 - June 1, 2005, Revised Selected Papers (Paperback, 2006 ed.)
George Danezis, David Martin
R1,791 R1,508 Discovery Miles 15 080 Save R283 (16%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed postproceedings of the 5th International Workshop on Privacy Enhancing Technologies, PET 2006, held in Cavtat, Croatia, in May and June 2005. The 17 revised full papers presented were carefully selected from 74 submissions during two rounds of reviewing and improvement. The papers address most current privacy enhancing technologies in various application contexts.

Foundations of Computer Security (Hardcover, 2006 ed.): David Salomon Foundations of Computer Security (Hardcover, 2006 ed.)
David Salomon
R1,501 R1,264 Discovery Miles 12 640 Save R237 (16%) Ships in 10 - 15 working days

Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its comprehensive treatment of all the major areas of computer security aims to give readers a complete foundation in the field of Computer Security. Exercises are given throughout the book and are intended to strengthening the readera (TM)s knowledge - answers are also provided.

Written in a clear, easy to understand style, aimed towards advanced undergraduates and non-experts who want to know about the security problems confronting them everyday. The technical level of the book is low and requires no mathematics, and only a basic concept of computers and computations. Foundations of Computer Security will be an invaluable tool for students and professionals alike.

The Database Hacker's Handbook - Defending Database Servers (Paperback): David Litchfield, Chris Anley, John Heasman, Bill... The Database Hacker's Handbook - Defending Database Servers (Paperback)
David Litchfield, Chris Anley, John Heasman, Bill Grindlay
R844 R605 Discovery Miles 6 050 Save R239 (28%) Ships in 10 - 15 working days

Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling-and relentless.
In this essential follow-up to The Shellcoder's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. You'll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.
* Identify and plug the new holes in Oracle and Microsoft(r) SQL Server
* Learn the best defenses for IBM's DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers
* Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access
* Recognize vulnerabilities peculiar to each database
* Find out what the attackers already know
Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts, and programs available for download.

Foundations of Security Analysis and Design III - FOSAD 2004/2005 Tutorial Lectures (Paperback, 2005 ed.): Alessandro Aldini,... Foundations of Security Analysis and Design III - FOSAD 2004/2005 Tutorial Lectures (Paperback, 2005 ed.)
Alessandro Aldini, Roberto Gorrieri, Fabio Martinelli
R1,231 Discovery Miles 12 310 Ships in 10 - 15 working days

The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of - search groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security aspects. The Int- national School on Foundations of Security Analysis and Design (FOSAD, see http: //www.sti.uniurb.it/events/fosad/)has been one of the foremost events - tablishedwiththegoalofdisseminatingknowledgeinthiscriticalarea, especially for young researchers approaching the ?eld and graduate students coming from less-favoured and non-leading countries. The FOSAD school is held annually at the Residential Centre of Bertinoro (http: //www.ceub.it/), in the fascinating setting of a former convent and ep- copal fortress that has been transformed into a modern conference facility with computing services and Internet access. Since the ?rst school, in 2000, FOSAD hasattractedmorethan250participantsand50lecturersfromallovertheworld. A collection of tutorial lectures from FOSAD 2000 was published in Springer s LNCS volume 2171. Some of the tutorials given at the two successive schools (FOSAD 2001 and 2002) are gathered in a second volume, LNCS 2946. To c- tinue this tradition, the present volume collects a set of tutorials fromthe fourth FOSAD, held in 2004, and from FOSAD 2005."

Machine Learning and Data Mining for Computer Security - Methods and Applications (Hardcover, 2006 ed.): Marcus A. Maloof Machine Learning and Data Mining for Computer Security - Methods and Applications (Hardcover, 2006 ed.)
Marcus A. Maloof
R3,535 R2,908 Discovery Miles 29 080 Save R627 (18%) Ships in 10 - 15 working days

"Machine Learning and Data Mining for Computer Security" provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This book has a strong focus on information processing and combines and extends results from computer security.

The first part of the book surveys the data sources, the learning and mining methods, evaluation methodologies, and past work relevant for computer security. The second part of the book consists of articles written by the top researchers working in this area. These articles deals with topics of host-based intrusion detection through the analysis of audit trails, of command sequences and of system calls as well as network intrusion detection through the analysis of TCP packets and the detection of malicious executables.

This book fills the great need for a book that collects and frames work on developing and applying methods from machine learning and data mining to problems in computer security.

Optical and Digital Techniques for Information Security (Hardcover, and and): Bahram Javidi Optical and Digital Techniques for Information Security (Hardcover, and and)
Bahram Javidi
R3,510 R2,886 Discovery Miles 28 860 Save R624 (18%) Ships in 10 - 15 working days

There are wide-ranging implications in information security beyond national defense. Securing our information has implications for virtually all aspects of our lives, including protecting the privacy of our ?nancial transactions and medical records, facilitating all operations of government, maintaining the integrity of national borders, securing important facilities, ensuring the safety of our food and commercial products, protecting the safety of our aviation system-even safeguarding the integrity of our very identity against theft. Information security is a vital element in all of these activities, particularly as information collection and distribution become ever more connected through electronic information delivery systems and commerce. This book encompasses results of research investigation and technologies that can be used to secure, protect, verify, and authenticate objects and inf- mation from theft, counterfeiting, and manipulation by unauthorized persons and agencies. The book has drawn on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information p- cessing, mathematical algorithms, quantum optics, computer-based infor- tion systems, sensors, detectors, and biometrics to report novel technologies that can be applied to information-security issues. The book is unique because it has diverse contributions from the ?eld of optics, which is a new emerging technology for security, and digital techniques that are very accessible and can be interfaced with optics to produce highly e?ective security systems.

Forensic Computing (Hardcover, 2nd ed. 2007): Anthony Sammes, Brian Jenkinson Forensic Computing (Hardcover, 2nd ed. 2007)
Anthony Sammes, Brian Jenkinson
R1,992 Discovery Miles 19 920 Ships in 10 - 15 working days

In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how the contents of computer systems can be recovered, even when hidden or subverted by criminals. Equally important, they demonstrate how to insure that computer evidence is admissible in court. Updated to meet ACPO 2003 guidelines, Forensic Computing: A Practitioner's Guide offers: methods for recovering evidence information from computer systems; principles of password protection and data encryption; evaluation procedures used in circumventing a system's internal security safeguards, and full search and seizure protocols for experts and police officers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Security Awareness - Applying Practical…
Mark Ciampa Paperback R746 R641 Discovery Miles 6 410
The Truth Machine - The Blockchain and…
Michael J. Casey, Paul Vigna Paperback  (1)
R399 R304 Discovery Miles 3 040
Guide to Network Defense and…
Randy Weaver, Dean Farwood, … Paperback R1,206 R1,019 Discovery Miles 10 190
The Art of Deception - Controlling the…
Kevin D. Mitnick, William L Simon Paperback R319 R217 Discovery Miles 2 170
Management of Information Security
Michael Whitman, Herbert Mattord Paperback R937 R803 Discovery Miles 8 030
Practical Cryptology and Web Security
P.K. Yuen Paperback R2,035 R1,422 Discovery Miles 14 220
The Official (ISC)2 Guide to the CCSP…
Adam Gordon Hardcover R1,608 Discovery Miles 16 080
You CAN Stop Stupid - Stopping Losses…
Ira Winkler, Dr. Tracy Celaya Brown Paperback R778 R627 Discovery Miles 6 270
Animal Biometrics - Techniques and…
Santosh Kumar, Sanjay Kumar Singh, … Hardcover R2,385 Discovery Miles 23 850
Mastering Blockchain - Unlocking the…
Lorne Lantz, Daniel Cawrey Paperback R1,422 R1,085 Discovery Miles 10 850

 

Partners