0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (86)
  • R500+ (1,283)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Hijacked By Hackers Be Afraid - Be very, Very Afraid (Paperback): Michael Klein Hijacked By Hackers Be Afraid - Be very, Very Afraid (Paperback)
Michael Klein
R418 Discovery Miles 4 180 Ships in 18 - 22 working days
Classical Encryption - Classical Ciphers (Paperback): Andre Girardot Classical Encryption - Classical Ciphers (Paperback)
Andre Girardot
R599 Discovery Miles 5 990 Ships in 18 - 22 working days
Cryptography - Cryptography Theory & Practice Made Easy! (Paperback): Solis Tech Cryptography - Cryptography Theory & Practice Made Easy! (Paperback)
Solis Tech
R245 Discovery Miles 2 450 Ships in 18 - 22 working days
Journal of Cyber Security and Mobility (5-3) (Paperback): Antoni Gobeo, Connor Fowler, William J. Buchanan Journal of Cyber Security and Mobility (5-3) (Paperback)
Antoni Gobeo, Connor Fowler, William J. Buchanan
R987 Discovery Miles 9 870 Ships in 18 - 22 working days
Leading Issues in Cyber Warfare and Security (Paperback): Julie Ryan Leading Issues in Cyber Warfare and Security (Paperback)
Julie Ryan
R769 Discovery Miles 7 690 Ships in 18 - 22 working days
Cryptography & Open Source (Paperback): Solis Tech Cryptography & Open Source (Paperback)
Solis Tech
R243 Discovery Miles 2 430 Ships in 18 - 22 working days
Cryptography & CompTIA A+ (Paperback): Solis Tech Cryptography & CompTIA A+ (Paperback)
Solis Tech
R244 Discovery Miles 2 440 Ships in 18 - 22 working days
Cryptography & Robotics (Paperback): Solis Tech Cryptography & Robotics (Paperback)
Solis Tech
R245 Discovery Miles 2 450 Ships in 18 - 22 working days
Security of Block Ciphers - From Algorithm Design to Hardware Implementation (Hardcover): K Sakiyama Security of Block Ciphers - From Algorithm Design to Hardware Implementation (Hardcover)
K Sakiyama
R2,704 Discovery Miles 27 040 Ships in 18 - 22 working days

A comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel analysis * Written by authors known within the academic cryptography community, this book presents the latest developments in current research * Unique in its combination of both algorithmic-level design and hardware-level implementation; this all-round approach - algorithm to implementation covers security from start to completion * Deals with AES (Advanced Encryption standard), one of the most used symmetric-key ciphers, which helps the reader to learn the fundamental theory of cryptanalysis and practical applications of side-channel analysis

Principles of Computer Security Lab Manual, Fourth Edition (Paperback, 4th edition): Vincent Nestler, Keith Harrison, Matthew... Principles of Computer Security Lab Manual, Fourth Edition (Paperback, 4th edition)
Vincent Nestler, Keith Harrison, Matthew Hirsch, Wm. Arthur Conklin
R1,852 Discovery Miles 18 520 Ships in 18 - 22 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Practice the Computer Security Skills You Need to Succeed! 40+ lab exercises challenge you to solve problems based on realistic case studies Step-by-step scenarios require you to think critically Lab analysis tests measure your understanding of lab results Key term quizzes help build your vocabulary Labs can be performed on a Windows, Linux, or Mac platform with the use of virtual machines In this Lab Manual, you'll practice Configuring workstation network connectivity Analyzing network communication Establishing secure network application communication using TCP/IP protocols Penetration testing with Nmap, metasploit, password cracking, Cobalt Strike, and other tools Defending against network application attacks, including SQL injection, web browser exploits, and email attacks Combatting Trojans, man-in-the-middle attacks, and steganography Hardening a host computer, using antivirus applications, and configuring firewalls Securing network communications with encryption, secure shell (SSH), secure copy (SCP), certificates, SSL, and IPsec Preparing for and detecting attacks Backing up and restoring data Handling digital forensics and incident response Instructor resources available: This lab manual supplements the textbook Principles of Computer Security, Fourth Edition, which is available separately Virtual machine files Solutions to the labs are not included in the book and are only available to adopting instructors

GNU GSS Library - Generic Security Service (Paperback): Simon Josefsson GNU GSS Library - Generic Security Service (Paperback)
Simon Josefsson
R495 Discovery Miles 4 950 Ships in 18 - 22 working days
Shishi - Kerberos 5 Implementation (Paperback): Simon Josefsson Shishi - Kerberos 5 Implementation (Paperback)
Simon Josefsson
R765 Discovery Miles 7 650 Ships in 18 - 22 working days
GnuTLS Reference Manual (Paperback): Simon Josefsson, Daiki Ueno, Carolin Latze GnuTLS Reference Manual (Paperback)
Simon Josefsson, Daiki Ueno, Carolin Latze
R784 Discovery Miles 7 840 Ships in 18 - 22 working days
GnuPG - Using the GNU Privacy Guard (Paperback): The Gnupg Project GnuPG - Using the GNU Privacy Guard (Paperback)
The Gnupg Project
R632 Discovery Miles 6 320 Ships in 18 - 22 working days
Candidate Multilinear Maps (Paperback): Sanjam Garg Candidate Multilinear Maps (Paperback)
Sanjam Garg
R1,305 Discovery Miles 13 050 Ships in 18 - 22 working days

The aim of cryptography is to design primitives and protocols that withstand adversarial behavior. Information theoretic cryptography, how-so-ever desirable, is extremely restrictive and most non-trivial cryptographic tasks are known to be information theoretically impossible. In order to realize sophisticated cryptographic primitives, we forgo information theoretic security and assume limitations on what can be efficiently computed. In other words we attempt to build secure systems conditioned on some computational intractability assumption such as factoring, discrete log, decisional Diffie-Hellman, learning with errors, and many more. In this work, based on the 2013 ACM Doctoral Dissertation Award-winning thesis, we put forth new plausible lattice-based constructions with properties that approximate the sought after multilinear maps. The multilinear analog of the decision Diffie-Hellman problem appears to be hard in our construction, and this allows for their use in cryptography. These constructions open doors to providing solutions to a number of important open problems.

Cryptography InfoSec Pro Guide (Paperback, Ed): Sean Philip Oriyano Cryptography InfoSec Pro Guide (Paperback, Ed)
Sean Philip Oriyano
R903 R782 Discovery Miles 7 820 Save R121 (13%) Ships in 18 - 22 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Security Smarts for the Self-Guided IT ProfessionalThis complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics such as ciphers, algorithms and key exchange, to practical applications such as digital signatures and certificates, the book delivers working tools to data storage architects, security mangers, and others security practitioners who need to possess a thorough understanding of cryptography. True to the hallmarks of all InfoSec Pro Guides, the book imparts the hard-learned lessons and experiences of knowledgeable professionals in security, providing know-how that otherwise takes years to learn. You're led through the Why and How of cryptography, the history of the science, the components of cryptography and how it is applied to various areas in the field of security. Challenging crypto puzzles in every chapter Ready-to-implement cryptographic techniques explained Lingo-Common security terms defined so that you're in the know on the job IMHO-Frank and relevant opinions based on the author's years of industry experience Budget Note-Tips for getting security technologies and processes into your organization's budget In Actual Practice-Exceptions to the rules of security explained in real-world contexts Your Plan-Customizable checklists you can use on the job now Into Action-Tips on how, why, and when to apply new skills and techniques at work

Computational Number Theory and Modern Cryptograph y (Hardcover): S.Y. Yan Computational Number Theory and Modern Cryptograph y (Hardcover)
S.Y. Yan
R2,593 Discovery Miles 25 930 Ships in 18 - 22 working days

The only book to provide a unified view of the interplay between computational number theory and cryptography Computational number theory and modern cryptography are two of the most important and fundamental research fields in information security. In this book, Song Y. Yang combines knowledge of these two critical fields, providing a unified view of the relationships between computational number theory and cryptography. The author takes an innovative approach, presenting mathematical ideas first, thereupon treating cryptography as an immediate application of the mathematical concepts. The book also presents topics from number theory, which are relevant for applications in public-key cryptography, as well as modern topics, such as coding and lattice based cryptography for post-quantum cryptography. The author further covers the current research and applications for common cryptographic algorithms, describing the mathematical problems behind these applications in a manner accessible to computer scientists and engineers. * Makes mathematical problems accessible to computer scientists and engineers by showing their immediate application * Presents topics from number theory relevant for public-key cryptography applications * Covers modern topics such as coding and lattice based cryptography for post-quantum cryptography * Starts with the basics, then goes into applications and areas of active research * Geared at a global audience; classroom tested in North America, Europe, and Asia * Incudes exercises in every chapter * Instructor resources available on the book s Companion Website Computational Number Theory and Modern Cryptography is ideal for graduate and advanced undergraduate students in computer science, communications engineering, cryptography and mathematics. Computer scientists, practicing cryptographers, and other professionals involved in various security schemes will also find this book to be a helpful reference.

Recommendation for Cryptographic Key Generation Nist Sp 800-133 - Nist Sp 800-133 (Paperback): National Institute of Standards... Recommendation for Cryptographic Key Generation Nist Sp 800-133 - Nist Sp 800-133 (Paperback)
National Institute of Standards and Tech
R386 Discovery Miles 3 860 Ships in 18 - 22 working days
Street Cryptography - A Quick and Dirty Way to Maintain Your Secret Conspiracy (Paperback): Christopher Forrest Street Cryptography - A Quick and Dirty Way to Maintain Your Secret Conspiracy (Paperback)
Christopher Forrest
R202 Discovery Miles 2 020 Ships in 18 - 22 working days
Hashing - Fifty Years of Slicing and Dicing (Hardcover): AG Konheim Hashing - Fifty Years of Slicing and Dicing (Hardcover)
AG Konheim
R3,712 Discovery Miles 37 120 Ships in 18 - 22 working days

Written by one of the developers of the technology, "Hashing" is both a historical document on the development of hashing and an analysis of the applications of hashing in a society increasingly concerned with security. The material in this book is based on courses taught by the author, and key points are reinforced in sample problems and an accompanying instructors manual. Graduate students and researchers in mathematics, cryptography, and security will benefit from this overview of hashing and the complicated mathematics that it requires.

Oracle Forensics - Accessing Oracle Security Vulnerabilities (Paperback, New): Paul M. Wright Oracle Forensics - Accessing Oracle Security Vulnerabilities (Paperback, New)
Paul M. Wright
R1,500 Discovery Miles 15 000 Ships in 18 - 22 working days

Today's Oracle professionals are challenged to protect their mission-critical data from many types of threats. Electronic data is being stolen is record amounts, and criminals are constantly devising sophisticated tools to breech your Oracle firewall. With advanced Oracle Forensics we can now proactively ensure the safety and security of our Oracle data, and all Oracle Forensics techniques are part of the due diligence that is required for all production databases. A failure to apply Forensics techniques to identify unseen threats can lead to a disaster, and this book is required reading for every Oracle DBA. This indispensable book is authored by Paul Wright, the world's top Oracle forensics expert, and the father of the field of Oracle Forensics. Packed with insights and expert tips, this is the definitive reference for all Oracle professional who are charged with protecting their valuable corporate information.

SonicWALL Secure Wireless Networks Integrated Solutions Guide (Paperback): Joe Levy, Khai Tran, Patrick Lydon, Jeremy Pollock,... SonicWALL Secure Wireless Networks Integrated Solutions Guide (Paperback)
Joe Levy, Khai Tran, Patrick Lydon, Jeremy Pollock, Susan Weigand, …
R1,951 Discovery Miles 19 510 Ships in 18 - 22 working days

Nearly forty percent of the world's 1 billion+ Internet users are wireless. It's a truly staggering fact to think that the majority of these wireless implementations are fundamentally insecure, leaving users and private data at risk.
Many wireless proprietors think that the convenience of wireless outweighs the possible risk of insecure impelentation, or that secure wireless is far too complicated to worry about deploying.
"SonicWALL(r) Secure Wireless Networks Integrated Solutions Guide" provides a systematic approach to creating secure wireless networks, using the Plan, Design, Implement, and Optimize model. This introduction to wireless network security is both comprehensive and easy to understand. Using straightforward language, this book describes deployment best practices, what SonicWALL security appliances do, and how they interoperate within an existing or new network. It begins with brief overviews of the theory of risk management, the history of wireless networks, and today s top five wireless threats. Real-world case studies highlight wireless solution business drivers for education, healthcare, retail and hospitality, and government agencies, as well as their respective regulatory compliance requirements. SonicWALL believes that the days of being forced to accept inherent risk in wireless networking are over. By using modern security standards and sound network design methods, your wireless network should be just as secure as your wired network.
Wireless networks can be made as secure as wired networks, and deploying this type of security can be far less complicated than you think. In this book, and through their massive product offerings, SonicWALL gives you (the secure wireless network hopeful) all of the planning, implementation, and optimizing tools you need to do wireless. Securely.
* Official guide from SonicWALL
* Written by SonicWALL engineers and documentation specialists
* Appropriate for all audiences, from the small proprietor to the enterprise IT specialist
* A complete reference to plan, design, implement, and optimize a secure wireless network with SonicWALL's extensive wireless product offerings"

Configuring IPCop Firewalls: Closing Borders with Open Source (Paperback, New): Barrie Dempster, James Eaton-Lee Configuring IPCop Firewalls: Closing Borders with Open Source (Paperback, New)
Barrie Dempster, James Eaton-Lee
R1,043 Discovery Miles 10 430 Ships in 18 - 22 working days

This book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic IPCop concepts, then moves to introduce basic IPCop configurations, before covering advanced uses of IPCop. This book is for both experienced and new IPCop users. IPCop is a powerful, open source, Linux based firewall distribution for primarily Small Office Or Home (SOHO) networks, although it can be used in larger networks. It provides most of the features that you would expect a modern firewall to have, and what is most important is that it sets this all up for you in a highly automated and simplified way. This book is an easy introduction to this popular application. After introducing and explaining the foundations of firewalling and networking and why they're important, the book moves on to cover using IPCop, from installing it, through configuring it, to more advanced features, such as configuring IPCop to work as an IDS, VPN and using it for bandwidth management. While providing necessary theoretical background, the book takes a practical approach, presenting sample configurations for home users, small businesses, and large businesses. The book contains plenty of illustrative examples. Chapter 1 briefly introduces some firewall and networking concepts. The chapter introduces the roles of several common networking devices and explains how firewalls fit into this. Chapter 2 introduces the IPCop package itself, discussing how IPCop's red/orange/blue/green interfaces fit into a network topology. It then covers the configuration of IPCop in other common roles, such as those of a web proxy, DHCP, DNS, time, and VPN server. Chapter 3 covers three sample scenarios where we learn how to deploy IPCop, how IPCop interfaces connect to each other and to the network as a whole. Chapter 4 covers installing IPCop. It outlines the system configuration required to run IPCop, and explains the configuration required to get IPCop up and running. In Chapter 5, we will learn how to employ the various tools IPCop provides us with to administrate, operate, troubleshoot, and monitor our IPCop firewall Chapter 6 starts off with explaining the need for an IDS in our system and then goes on to explain how to use the SNORT IDS with IPCop. Chapter 7 introduces the VPN concept and explains how to set up an IPSec VPN configuration for a system. Special focus is laid on configuring the blue zone - a secured wireless network augmenting the security of a wireless segment, even one already using WEP or WPA. Chapter 8 demonstrates how to manage bandwidth using IPCop making use of traffic shaping techniques and cache management. The chapter also covers the configuration of the Squid web proxy and caching system. Chapter 9 focuses on the vast range of add-ons available to configure IPCop to suit our needs. We see how to install add-ons and then learn more about common add-ons like SquidGuard, Enhanced Filtering, Blue Access, LogSend, and CopFilter. Chapter 10 covers IPCop security risks, patch management and some security and auditing tools and tests. Chapter 11 outlines the support IPCop users have in the form of mailing lists and IRC. The book is suitable for anyone interested in securing their networks with IPCop - from those new to networking and firewalls, to networking and IT Professionals with previous experience of IPCop. No knowledge of Linux or IPCop is required.

Cryptography for Developers (Paperback): Tom St Denis Cryptography for Developers (Paperback)
Tom St Denis
R1,879 Discovery Miles 18 790 Ships in 18 - 22 working days

The only guide for software developers who must learn and implement cryptography safely and cost effectively.
The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.
* The author is the developer of the industry standard cryptographic suite of tools called LibTom
* A regular expert speaker at industry conferences and events on this development
* The book has a companion Web site with over 300-pages of text on implementing multiple precision arithmetic

How to Cheat at Managing Information Security (Paperback): Mark Osborne How to Cheat at Managing Information Security (Paperback)
Mark Osborne
R1,298 Discovery Miles 12 980 Ships in 18 - 22 working days

This is the only book that covers all the topics that any budding security manager needs to know This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks.
These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non technical principle and practices of security and provides basic information about the technical details of many of the products - real products, not just theory.
Written by a well known Chief Information Security Officer, this book gives the information security manager all the working knowledge needed to: Design the organization chart of his new security organization Design and implement policies and strategies Navigate his way through jargon filled meetings Understand the design flaws of his E-commerce and DMZ infrastructure
* A clearly defined guide to designing the organization chart of a new security organization and how to implement policies and strategies
* Navigate through jargon filled meetings with this handy aid
* Provides information on understanding the design flaws of E-commerce and DMZ infrastructure"

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cybersecurity in Smart Homes…
Khatoun Hardcover R3,483 Discovery Miles 34 830
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,170 Discovery Miles 61 700
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R778 R682 Discovery Miles 6 820
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Technical Articles about the Voynich…
National Security Agency Hardcover R597 Discovery Miles 5 970
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,170 Discovery Miles 61 700
InfoSecurity 2008 Threat Analysis
Craig Schiller, Seth Fogie, … Paperback R1,146 Discovery Miles 11 460
Corporate Cybersecurity - Identifying…
J. Jackson Hardcover R2,573 Discovery Miles 25 730
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
Conflicts, Crimes and Regulations in…
SY Laurent Hardcover R3,743 Discovery Miles 37 430

 

Partners