0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (85)
  • R500+ (1,287)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Hashing - Fifty Years of Slicing and Dicing (Hardcover): AG Konheim Hashing - Fifty Years of Slicing and Dicing (Hardcover)
AG Konheim
R3,712 Discovery Miles 37 120 Ships in 18 - 22 working days

Written by one of the developers of the technology, "Hashing" is both a historical document on the development of hashing and an analysis of the applications of hashing in a society increasingly concerned with security. The material in this book is based on courses taught by the author, and key points are reinforced in sample problems and an accompanying instructors manual. Graduate students and researchers in mathematics, cryptography, and security will benefit from this overview of hashing and the complicated mathematics that it requires.

Oracle Forensics - Accessing Oracle Security Vulnerabilities (Paperback, New): Paul M. Wright Oracle Forensics - Accessing Oracle Security Vulnerabilities (Paperback, New)
Paul M. Wright
R1,500 Discovery Miles 15 000 Ships in 18 - 22 working days

Today's Oracle professionals are challenged to protect their mission-critical data from many types of threats. Electronic data is being stolen is record amounts, and criminals are constantly devising sophisticated tools to breech your Oracle firewall. With advanced Oracle Forensics we can now proactively ensure the safety and security of our Oracle data, and all Oracle Forensics techniques are part of the due diligence that is required for all production databases. A failure to apply Forensics techniques to identify unseen threats can lead to a disaster, and this book is required reading for every Oracle DBA. This indispensable book is authored by Paul Wright, the world's top Oracle forensics expert, and the father of the field of Oracle Forensics. Packed with insights and expert tips, this is the definitive reference for all Oracle professional who are charged with protecting their valuable corporate information.

Software Forensics (Paperback, Ed): Robert Slade Software Forensics (Paperback, Ed)
Robert Slade
R1,057 R915 Discovery Miles 9 150 Save R142 (13%) Ships in 18 - 22 working days

Software forensics -- analyzing program code to track, identify, and prosecute computer virus perpetrators -- has emerged as one of the most promising and technically challenging aspects of information management and security.


This is a technical tutorial that thoroughly examines the programming tools, investigative and analysis methods, and legal implications of the complex evidence chain. Also included are eye-opening case studies, including the famous Enron case, and sample code from real criminal investigations.


Written by a security consultant whose clients include the Canadian Government, Software Forensics covers:



* Basic concepts

* Hackers, crackers, and phreaks

* Objects of analysis: text strings, source code, machine code

* User interfaces and commands

* Program structures and versions

* Virus families

* Function indicators

* Stylistic analysis

* and much more


There is no better or faster way for programmers, security analysts and consultants, security officers in the enterprise, application developers, lawyers, judges, and anyone else interested in software forensics to get up to speed on forensic programming tools and methods and the nature of cyber evidence.
SonicWALL Secure Wireless Networks Integrated Solutions Guide (Paperback): Joe Levy, Khai Tran, Patrick Lydon, Jeremy Pollock,... SonicWALL Secure Wireless Networks Integrated Solutions Guide (Paperback)
Joe Levy, Khai Tran, Patrick Lydon, Jeremy Pollock, Susan Weigand, …
R1,951 Discovery Miles 19 510 Ships in 18 - 22 working days

Nearly forty percent of the world's 1 billion+ Internet users are wireless. It's a truly staggering fact to think that the majority of these wireless implementations are fundamentally insecure, leaving users and private data at risk.
Many wireless proprietors think that the convenience of wireless outweighs the possible risk of insecure impelentation, or that secure wireless is far too complicated to worry about deploying.
"SonicWALL(r) Secure Wireless Networks Integrated Solutions Guide" provides a systematic approach to creating secure wireless networks, using the Plan, Design, Implement, and Optimize model. This introduction to wireless network security is both comprehensive and easy to understand. Using straightforward language, this book describes deployment best practices, what SonicWALL security appliances do, and how they interoperate within an existing or new network. It begins with brief overviews of the theory of risk management, the history of wireless networks, and today s top five wireless threats. Real-world case studies highlight wireless solution business drivers for education, healthcare, retail and hospitality, and government agencies, as well as their respective regulatory compliance requirements. SonicWALL believes that the days of being forced to accept inherent risk in wireless networking are over. By using modern security standards and sound network design methods, your wireless network should be just as secure as your wired network.
Wireless networks can be made as secure as wired networks, and deploying this type of security can be far less complicated than you think. In this book, and through their massive product offerings, SonicWALL gives you (the secure wireless network hopeful) all of the planning, implementation, and optimizing tools you need to do wireless. Securely.
* Official guide from SonicWALL
* Written by SonicWALL engineers and documentation specialists
* Appropriate for all audiences, from the small proprietor to the enterprise IT specialist
* A complete reference to plan, design, implement, and optimize a secure wireless network with SonicWALL's extensive wireless product offerings"

Configuring IPCop Firewalls: Closing Borders with Open Source (Paperback, New): Barrie Dempster, James Eaton-Lee Configuring IPCop Firewalls: Closing Borders with Open Source (Paperback, New)
Barrie Dempster, James Eaton-Lee
R1,043 Discovery Miles 10 430 Ships in 18 - 22 working days

This book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic IPCop concepts, then moves to introduce basic IPCop configurations, before covering advanced uses of IPCop. This book is for both experienced and new IPCop users. IPCop is a powerful, open source, Linux based firewall distribution for primarily Small Office Or Home (SOHO) networks, although it can be used in larger networks. It provides most of the features that you would expect a modern firewall to have, and what is most important is that it sets this all up for you in a highly automated and simplified way. This book is an easy introduction to this popular application. After introducing and explaining the foundations of firewalling and networking and why they're important, the book moves on to cover using IPCop, from installing it, through configuring it, to more advanced features, such as configuring IPCop to work as an IDS, VPN and using it for bandwidth management. While providing necessary theoretical background, the book takes a practical approach, presenting sample configurations for home users, small businesses, and large businesses. The book contains plenty of illustrative examples. Chapter 1 briefly introduces some firewall and networking concepts. The chapter introduces the roles of several common networking devices and explains how firewalls fit into this. Chapter 2 introduces the IPCop package itself, discussing how IPCop's red/orange/blue/green interfaces fit into a network topology. It then covers the configuration of IPCop in other common roles, such as those of a web proxy, DHCP, DNS, time, and VPN server. Chapter 3 covers three sample scenarios where we learn how to deploy IPCop, how IPCop interfaces connect to each other and to the network as a whole. Chapter 4 covers installing IPCop. It outlines the system configuration required to run IPCop, and explains the configuration required to get IPCop up and running. In Chapter 5, we will learn how to employ the various tools IPCop provides us with to administrate, operate, troubleshoot, and monitor our IPCop firewall Chapter 6 starts off with explaining the need for an IDS in our system and then goes on to explain how to use the SNORT IDS with IPCop. Chapter 7 introduces the VPN concept and explains how to set up an IPSec VPN configuration for a system. Special focus is laid on configuring the blue zone - a secured wireless network augmenting the security of a wireless segment, even one already using WEP or WPA. Chapter 8 demonstrates how to manage bandwidth using IPCop making use of traffic shaping techniques and cache management. The chapter also covers the configuration of the Squid web proxy and caching system. Chapter 9 focuses on the vast range of add-ons available to configure IPCop to suit our needs. We see how to install add-ons and then learn more about common add-ons like SquidGuard, Enhanced Filtering, Blue Access, LogSend, and CopFilter. Chapter 10 covers IPCop security risks, patch management and some security and auditing tools and tests. Chapter 11 outlines the support IPCop users have in the form of mailing lists and IRC. The book is suitable for anyone interested in securing their networks with IPCop - from those new to networking and firewalls, to networking and IT Professionals with previous experience of IPCop. No knowledge of Linux or IPCop is required.

Cryptography for Developers (Paperback): Tom St Denis Cryptography for Developers (Paperback)
Tom St Denis
R1,879 Discovery Miles 18 790 Ships in 18 - 22 working days

The only guide for software developers who must learn and implement cryptography safely and cost effectively.
The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.
* The author is the developer of the industry standard cryptographic suite of tools called LibTom
* A regular expert speaker at industry conferences and events on this development
* The book has a companion Web site with over 300-pages of text on implementing multiple precision arithmetic

How to Cheat at Managing Information Security (Paperback): Mark Osborne How to Cheat at Managing Information Security (Paperback)
Mark Osborne
R1,298 Discovery Miles 12 980 Ships in 18 - 22 working days

This is the only book that covers all the topics that any budding security manager needs to know This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks.
These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non technical principle and practices of security and provides basic information about the technical details of many of the products - real products, not just theory.
Written by a well known Chief Information Security Officer, this book gives the information security manager all the working knowledge needed to: Design the organization chart of his new security organization Design and implement policies and strategies Navigate his way through jargon filled meetings Understand the design flaws of his E-commerce and DMZ infrastructure
* A clearly defined guide to designing the organization chart of a new security organization and how to implement policies and strategies
* Navigate through jargon filled meetings with this handy aid
* Provides information on understanding the design flaws of E-commerce and DMZ infrastructure"

Designing Bsd Rootkits (Paperback): Joseph Kong Designing Bsd Rootkits (Paperback)
Joseph Kong
R848 Discovery Miles 8 480 Ships in 18 - 22 working days

Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process. Organized as a tutorial, Designing BSD Rootkits will teach you the fundamentals of programming and developing rootkits under the FreeBSD operating system. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD. Kongs liberal use of examples assumes no prior kernel-hacking experience but doesn't water down the information. All code is thoroughly described and analyzed, and each chapter contains at least one real-world application.Included: The fundamentals of FreeBSD kernel module programming Using call hooking to subvert the FreeBSD kernel Directly manipulating the objects the kernel depends upon for its internal record-keeping Patching kernel code resident in main memory; in other words, altering the kernel's logic while it's still running How to defend against the attacks described Hack the FreeBSD kernel for yourself

Information Security:  Contemporary Cases - Contemporary Cases (Paperback, New edition): Marie A Wright, John S Kakalik Information Security: Contemporary Cases - Contemporary Cases (Paperback, New edition)
Marie A Wright, John S Kakalik
R1,519 Discovery Miles 15 190 Ships in 18 - 22 working days

Information Security: Contemporary Cases Addresses Fundamental Information Security Concepts In Realistic Scenarios. Through A Series Of Substantive Cases, Different Aspects Of Information Security Are Addressed By Real Organizations. The Organizations Include Kraft Foods, Advo, IBM, SRA, Aetna, The FBI, And The Yale New Haven Center For Emergency Preparedness And Disaster Response. Case Topics Include Data Protection, Integrating IT And Physical Security, Contingency Planning, Disaster Recovery, Network Security, Hardware Design, Encryption, Standards Compliance, Tracking Intruders, And Training And Awareness Programs. This Casebook Will Enable Students To Develop The Practical Understanding Needed For Today's Information Security And Information Assurance Profession.

Professional Windows Desktop and Server Hardening (Paperback): RA Grimes Professional Windows Desktop and Server Hardening (Paperback)
RA Grimes
R1,207 R1,035 Discovery Miles 10 350 Save R172 (14%) Ships in 18 - 22 working days

* Shows how to improve Windows desktop and server security by configuring default security before installing off-the-shelf security products* Educates readers about the most significant security threats, building the ultimate defense, operating system hardening, application security, and automating security* As a security consultant, the author has an impressive record-of his clients, not one who followed his recommendations has suffered a virus, worm, Trojan, or successful hacker attack in the past five years* The companion Web site includes author-created custom security templates and group policies that will automate advice given in the book

Codes and Ciphers - A History Of Cryptography (Paperback): Alexander d'Agapeyeff Codes and Ciphers - A History Of Cryptography (Paperback)
Alexander d'Agapeyeff
R740 Discovery Miles 7 400 Ships in 18 - 22 working days

A fascinating work on the history and development of cryptography, from the Egyptians to WWII. Many of the earliest books, particularly those dating back to the 1900s and before, are now extremely scarce and increasingly expensive. Hesperides Press are republishing these classic works in affordable, high quality, modern editions, using the original text and artwork Contents Include - The Beginings of Cryptography - From the Middle Ages Onwards - Signals, Signs, And Secret Languages - Commercial Codes - Military Codes and Ciphers - Types of Codes and Ciphers - Methods of Deciphering - Bibliography

Extreme Exploits - Advanced Defenses Against Hardcore Hacks (Paperback, New): Victor Oppleman, Oliver Friedrichs, Brett Watson Extreme Exploits - Advanced Defenses Against Hardcore Hacks (Paperback, New)
Victor Oppleman, Oliver Friedrichs, Brett Watson
R1,359 R1,132 Discovery Miles 11 320 Save R227 (17%) Ships in 18 - 22 working days

Take network security to the next level!This book has never before published advanced security techniques and step-by-step instructions showing how to defend against devastating vulnerabilities to systems and network infrastructure.Just about every day the media is reporting another hard-core hack against some organisation. It was reported mid-March that hackers had taken over one of Lexis Nexis' databases gaining access to the personal files of as many as 32,000 people. Extreme Exploits provides advanced methodologies and solutions needed to defend against sophisticated exploits by showing them how to use the latest advanced security tools. The book teaches you how little-known vulnerabilities have been successfully exploited in the real world and have wreaked havoc on large-scale networks.

Fundamentals of Network Security (Paperback, Ed): Eric Maiwald Fundamentals of Network Security (Paperback, Ed)
Eric Maiwald
R2,199 Discovery Miles 21 990 Ships in 18 - 22 working days

Lock down your most important information by understanding numerous practical security applications in different environments. Robust coverage includes the most recent advances in technology and the law, including wireless security, biometrics, Windows, IDS technology, as well as the new Patriot Act, homeland security initiatives, and special information on relevant state laws. End-of-chapter review sections include summaries, key term lists, quizzes, and lab projects.

Hardening Network Security (Paperback, Ed): John Mallery, Jason Zann, Patrick Kelly, Wesley Noonan, Eric Seagren, Paul Love,... Hardening Network Security (Paperback, Ed)
John Mallery, Jason Zann, Patrick Kelly, Wesley Noonan, Eric Seagren, …
R1,170 R1,003 Discovery Miles 10 030 Save R167 (14%) Ships in 18 - 22 working days

Take a proactive approach to enterprise network security by implementing preventive measures against attacks before they occur. Written by a team of IT security specialists, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Whether you're working on a Windows, UNIX, wireless, or mixed network, you'll get complete details on how to systematically harden your network from the ground up, as well as strategies for getting company-wide support for your security plan. With coverage of all major platforms and applications, this book is an essential security tool for on-the-job IT professionals. Features a four-part hardening methodology:

Do This Now!--Checklist of immediate steps to take to lockdown your system from further attack Take It From The Top--Systematic approach to hardening your enterprise from the top down, focusing on network, data, and software access, storage, and communications Once Is Never Enough!--Ongoing monitoring and assessment plan to keep your network secure, including patch management and auditing How to Succeed at Hardening Network Security--Strategies for getting budget approval, management buy-in, and employee cooperation for your security program

John Mallery is a Managing Consultant at BKD, LLP, and a veteran security specialist.

Jason Zann, CISSP, is an Information Security Consultant for DST Systems.

Patrick Kelly, CISSP, CCSE, MCSE, MCP+I, is an Information Assurance Engineer for ComGlobal Systems, Inc.

Paul Love, MS Network Security, CISSP, CISM, CISA, is a Security Manager with a large financial institution.

Wesley Noonan, MCSE, CCNA, CCDA, NNCSS, Security+, is aSenior Network Consultant for Collective Technologies, LLC.

Eric S. Seagren, CISSP, ISSAP, SCNP, CCNA, CNE, MCP+I, MCSE, is an IT architect, designing secure, scalable, and redundant networks.

Rob Kraft is the director of software development for KCX, Inc. Mark O'Neil is the CTO of Vordel and principal author of "Web Services Security."

Series Editor and author Roberta Bragg, CISSP, MCSE: Security, Security+, writes a column for Redmond Magazine and writes the weekly Security Watch newsletter. She is the author of "Hardening Windows Systems" and several other information security books.

Silence On The Wire - A Field Guide To Passive Reconnaissance And Indirect Attacks (Paperback): Michal Zalewski Silence On The Wire - A Field Guide To Passive Reconnaissance And Indirect Attacks (Paperback)
Michal Zalewski
R1,149 Discovery Miles 11 490 Ships in 18 - 22 working days

There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.

"Silence on the Wire" dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an indepth look at modern computing, from hardware on up, the book helps the system administrator to better understand security issues, and to approach networking from a new, more creative perspective. The sys admin can apply this knowledge to network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, and forensics.

Protect Your Information - With Intrusion Detection (Paperback): Alex Lukatsky Protect Your Information - With Intrusion Detection (Paperback)
Alex Lukatsky
R381 Discovery Miles 3 810 Ships in 10 - 15 working days

Thsi comprehensive reference provides a detailed overview of intrusion detection systems [IDS], offering the latest detection systems, the latest technology in information protection.

Information Security and Cryptology - ICISC 2001 - 4th International Conference Seoul, Korea, December 6-7, 2001 Proceedings... Information Security and Cryptology - ICISC 2001 - 4th International Conference Seoul, Korea, December 6-7, 2001 Proceedings (Paperback, 2002 ed.)
Kwangjo Kim
R1,590 Discovery Miles 15 900 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th International Conference on Security and Cryptology, ICISC 2001, held in Seoul, Korea, in December 2001. The 32 revised full papers presented together with one invited paper were carefully reviewed and selected from a total of 107 submissions. All current issues of cryptography and cryptanalysis and their applications to securing data, systems, and communications are addressed.

PDA Security - Incorporating Handhelds into the Enterprise (Paperback, Ed): David Melnick, Asynchrony Solutions, Inc., Mark... PDA Security - Incorporating Handhelds into the Enterprise (Paperback, Ed)
David Melnick, Asynchrony Solutions, Inc., Mark Dinman, Alexander Muratov
R1,057 Discovery Miles 10 570 Ships in 18 - 22 working days

LOCK IN PDA SECURITY:

* Let an IT security expert help you assess the PDA threat to your business

* Learn what you must do to lock out dangers -- password theft, viruses, electronic eavesdropping, mobile code and wireless vulnerabilities, data corruption, device loss and theft, and other risks

* Maximize and protect the value of increasingly capable personal digital assistants to your organization


DOWNSIZE PDA RISKS. SUPERSIZE PDA REWARDS.


PDAs have moved into the workplace. More than 25 million of them will soon be accessing company networks. Are you prepared? If you’re an information technology or business executive, the time is right to size up the unique security risks these small, portable devices pose. This essential primer for those deploying, managing or using PDAs in the workplace will help you understand and address the challenges presented by this emerging set of technologies. Written by respected IT security experts, PDA Security, shows you how to:

* Assess the level of threat posed by PDAs in your organization

* Develop a measured and enforceable policy response to minimize the risk

* Understand the technical issues and defend against the threats PDAs pose to privacy, theft of sensitive information, system corruption, and other issues of network and data misuse

* Analyze secure solutions for all major handhelds -- Palm, PocketPC, and RIM

* Examine a case study on securing Palm for the work environment

* Learn why solutions almost always involve the operating system

* Discover what White-Hat Hacking reveals about vulnerabilities

* Find profitable ways to integrate PDAs into business plans and networks, while downsizing risks

* Get an insider’s preview of the future of handhelds -- the PCs of the early twenty-first century


With a Foreword by Rebecca Bace, internationally renowned intrusion-detection and network-security specialist and former member of the United States Department of Defense National Security Agency (NSA).


For ongoing news and original content on PDA security, related Web sites, and a calendar of related events, visit www.pdasecurity-book.com
Symmetrische Verschlusselungsverfahren (German, Paperback, 2003 ed.): Michael Miller Symmetrische Verschlusselungsverfahren (German, Paperback, 2003 ed.)
Michael Miller
R1,118 Discovery Miles 11 180 Ships in 10 - 15 working days

Enigma und Lucifer-Chiffre: das spannende Lehrbuch zur Kryptographie mit Online-Service.
Es wird detailliert beschrieben, was bei der Entwicklung eines symmetrischen Kryptosystems - das den heutigen Anforderungen entspricht - zu berucksichtigen ist. Dazu wird insbesondere die differentielle und die lineare Kryptoanalyse ausfuhrlich erklart."

Check Point VPN-1/ FireWall-1 NG Administration (Paperback, Ed): Andrew Ratcliffe, Inti Shah Check Point VPN-1/ FireWall-1 NG Administration (Paperback, Ed)
Andrew Ratcliffe, Inti Shah
R1,399 R1,172 Discovery Miles 11 720 Save R227 (16%) Ships in 18 - 22 working days

Completely reviewed by technical experts at CheckPoint, this valuable tool shows network administrators and engineers the essentials of installing, running, and troubleshooting the Nokia VPN-1/FireWall-1 enterprise system. Includes case studies and ready-to-use applications, and a CD-ROM with sample software and solutions.

Implementing Intrusion Detection Systems - A Hands -On Guide for Securing the Network (Paperback): T Crothers Implementing Intrusion Detection Systems - A Hands -On Guide for Securing the Network (Paperback)
T Crothers
R1,220 R1,023 Discovery Miles 10 230 Save R197 (16%) Ships in 18 - 22 working days

* Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective
* Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS
* Features coverage of the recently revised IETF IDS specification
* Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling
* Provides step-by-step instructions for configuration procedures

IIS Security (Paperback): Marty Jost IIS Security (Paperback)
Marty Jost
R1,406 R1,179 Discovery Miles 11 790 Save R227 (16%) Ships in 18 - 22 working days

Protect your IIS server with help from this authoritative book. Covering all basic security tools that come with IIS -- and explaining their weaknesses -- this complete guide shows you how to utilize encryption, authorization, filtering, and other restrictive techniques to protect against attacks and other security violations.

A Guide to Data Compression Methods (Paperback, 2002): David Salomon A Guide to Data Compression Methods (Paperback, 2002)
David Salomon
R1,433 Discovery Miles 14 330 Ships in 18 - 22 working days

Many faces of modern computing - from archiving data to coding theory to image processing ¿ rely heavily on data compression. This new and practical guide explains the process of compressing all types of computer data, as well as the use of significant methods and algorithms. Its purpose is to succinctly describe both the principles underlying the field of data compression and how to use the key methods effectively. A Guide to Data Compression Methods concentrates on general concepts and methods and describes them with a minimal amount of mathematical detail. It presents the main approaches to data compression, describes the most important algorithms, and includes straightforward examples. Statistical, dictionary, and wavelet methodologies are addressed in specific chapters, as well as image, video, and audio compression. The reader can expect to gain a basic understanding of the key algorithms and methods used to compress data for storage and transmission. Topics and features: ¿ All core methods are clearly explained with realistic examples, and some computer code is included ¿ Accessible presentation, with only minimum computer and mathematics technical background ¿ Discussion of wavelet methods and JPEG 2000 ¿ Appendix lists all algorithms presented in the book ¿ CD-ROM included compromising computer code from the book and extensive public-domain compression utility programs This book is an invaluable practical reference and guide for all practitioners and professionals in computer science, software engineering, and programming.

Performing Security Analyses of Information Systems (Paperback): Charles L. Smith Performing Security Analyses of Information Systems (Paperback)
Charles L. Smith
R1,114 Discovery Miles 11 140 Ships in 18 - 22 working days

In the aftermath of the 9/11 terrorist attacks, responsible organizations are now even more interested in identifying their specific needs for information system security. This book provides a structured process for assisting any analyst in performing this task.

Windows(R) XP Professional Security (Paperback): C. Weber, Gary Bahadur Windows(R) XP Professional Security (Paperback)
C. Weber, Gary Bahadur
R1,387 R1,160 Discovery Miles 11 600 Save R227 (16%) Ships in 18 - 22 working days

Get comprehensive coverage of XP Professional security with this definitive and focused resource. Work with firewalls and intrusion detection systems, fully utilize XP’s built-in support tools, manage security remotely, and much more.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Principles of Organic Synthesis
Richard O. C. Norman Paperback R2,563 Discovery Miles 25 630
Oxford International AQA Examinations…
Lawrie Ryan Paperback R946 Discovery Miles 9 460
GCSE Combined Science: Chemistry OCR…
CGP Books Hardcover R226 Discovery Miles 2 260
Ellipsis - Functional Heads, Licensing…
Anne Lobeck Hardcover R3,304 Discovery Miles 33 040
Beyond Functional Sequence - The…
Ur Shlonsky Hardcover R3,582 Discovery Miles 35 820
Aspects of Split Ergativity
Jessica Coon Hardcover R3,843 Discovery Miles 38 430
A Grammar of Nganasan
Beata Wagner-Nagy Hardcover R4,454 Discovery Miles 44 540
Java How to Program, Late Objects…
Paul Deitel, Harvey Deitel Paperback R900 R750 Discovery Miles 7 500
Imperatives and Commands
Alexandra Y. Aikhenvald Hardcover R3,523 Discovery Miles 35 230
Problem Solving with C++ - Global…
Walter Savitch Paperback R2,189 R1,762 Discovery Miles 17 620

 

Partners