0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (87)
  • R500+ (1,283)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Cryptography for Developers (Paperback): Tom St Denis Cryptography for Developers (Paperback)
Tom St Denis
R1,879 Discovery Miles 18 790 Ships in 18 - 22 working days

The only guide for software developers who must learn and implement cryptography safely and cost effectively.
The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.
* The author is the developer of the industry standard cryptographic suite of tools called LibTom
* A regular expert speaker at industry conferences and events on this development
* The book has a companion Web site with over 300-pages of text on implementing multiple precision arithmetic

How to Cheat at Managing Information Security (Paperback): Mark Osborne How to Cheat at Managing Information Security (Paperback)
Mark Osborne
R1,298 Discovery Miles 12 980 Ships in 18 - 22 working days

This is the only book that covers all the topics that any budding security manager needs to know This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks.
These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non technical principle and practices of security and provides basic information about the technical details of many of the products - real products, not just theory.
Written by a well known Chief Information Security Officer, this book gives the information security manager all the working knowledge needed to: Design the organization chart of his new security organization Design and implement policies and strategies Navigate his way through jargon filled meetings Understand the design flaws of his E-commerce and DMZ infrastructure
* A clearly defined guide to designing the organization chart of a new security organization and how to implement policies and strategies
* Navigate through jargon filled meetings with this handy aid
* Provides information on understanding the design flaws of E-commerce and DMZ infrastructure"

Designing Bsd Rootkits (Paperback): Joseph Kong Designing Bsd Rootkits (Paperback)
Joseph Kong
R848 Discovery Miles 8 480 Ships in 18 - 22 working days

Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process. Organized as a tutorial, Designing BSD Rootkits will teach you the fundamentals of programming and developing rootkits under the FreeBSD operating system. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD. Kongs liberal use of examples assumes no prior kernel-hacking experience but doesn't water down the information. All code is thoroughly described and analyzed, and each chapter contains at least one real-world application.Included: The fundamentals of FreeBSD kernel module programming Using call hooking to subvert the FreeBSD kernel Directly manipulating the objects the kernel depends upon for its internal record-keeping Patching kernel code resident in main memory; in other words, altering the kernel's logic while it's still running How to defend against the attacks described Hack the FreeBSD kernel for yourself

Information Security:  Contemporary Cases - Contemporary Cases (Paperback, New edition): Marie A Wright, John S Kakalik Information Security: Contemporary Cases - Contemporary Cases (Paperback, New edition)
Marie A Wright, John S Kakalik
R1,519 Discovery Miles 15 190 Ships in 18 - 22 working days

Information Security: Contemporary Cases Addresses Fundamental Information Security Concepts In Realistic Scenarios. Through A Series Of Substantive Cases, Different Aspects Of Information Security Are Addressed By Real Organizations. The Organizations Include Kraft Foods, Advo, IBM, SRA, Aetna, The FBI, And The Yale New Haven Center For Emergency Preparedness And Disaster Response. Case Topics Include Data Protection, Integrating IT And Physical Security, Contingency Planning, Disaster Recovery, Network Security, Hardware Design, Encryption, Standards Compliance, Tracking Intruders, And Training And Awareness Programs. This Casebook Will Enable Students To Develop The Practical Understanding Needed For Today's Information Security And Information Assurance Profession.

Professional Windows Desktop and Server Hardening (Paperback): RA Grimes Professional Windows Desktop and Server Hardening (Paperback)
RA Grimes
R1,207 R1,035 Discovery Miles 10 350 Save R172 (14%) Ships in 18 - 22 working days

* Shows how to improve Windows desktop and server security by configuring default security before installing off-the-shelf security products* Educates readers about the most significant security threats, building the ultimate defense, operating system hardening, application security, and automating security* As a security consultant, the author has an impressive record-of his clients, not one who followed his recommendations has suffered a virus, worm, Trojan, or successful hacker attack in the past five years* The companion Web site includes author-created custom security templates and group policies that will automate advice given in the book

Codes and Ciphers - A History Of Cryptography (Paperback): Alexander d'Agapeyeff Codes and Ciphers - A History Of Cryptography (Paperback)
Alexander d'Agapeyeff
R740 Discovery Miles 7 400 Ships in 18 - 22 working days

A fascinating work on the history and development of cryptography, from the Egyptians to WWII. Many of the earliest books, particularly those dating back to the 1900s and before, are now extremely scarce and increasingly expensive. Hesperides Press are republishing these classic works in affordable, high quality, modern editions, using the original text and artwork Contents Include - The Beginings of Cryptography - From the Middle Ages Onwards - Signals, Signs, And Secret Languages - Commercial Codes - Military Codes and Ciphers - Types of Codes and Ciphers - Methods of Deciphering - Bibliography

Official (ISC)2 (R) Guide to the CISSP (R)-ISSEP (R) CBK (R) (Hardcover): Susan Hansche Official (ISC)2 (R) Guide to the CISSP (R)-ISSEP (R) CBK (R) (Hardcover)
Susan Hansche
R2,663 R2,321 Discovery Miles 23 210 Save R342 (13%) Ships in 9 - 17 working days

The Official (ISC)2 (R) Guide to the CISSP (R)-ISSEP (R) CBK (R) provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge. The first fully comprehensive guide to the CISSP-ISSEP CBK, this book promotes understanding of the four ISSEP domains: Information Systems Security Engineering (ISSE); Certification and Accreditation; Technical Management; and an Introduction to United States Government Information Assurance Regulations. This volume explains ISSE by comparing it to a traditional Systems Engineering model, enabling you to see the correlation of how security fits into the design and development process for information systems. It also details key points of more than 50 U.S. government policies and procedures that need to be understood in order to understand the CBK and protect U.S. government information. About the Author Susan Hansche, CISSP-ISSEP is the training director for information assurance at Nortel PEC Solutions in Fairfax, Virginia. She has more than 15 years of experience in the field and since 1998 has served as the contractor program manager of the information assurance training program for the U.S. Department of State.

Extreme Exploits - Advanced Defenses Against Hardcore Hacks (Paperback, New): Victor Oppleman, Oliver Friedrichs, Brett Watson Extreme Exploits - Advanced Defenses Against Hardcore Hacks (Paperback, New)
Victor Oppleman, Oliver Friedrichs, Brett Watson
R1,359 R1,132 Discovery Miles 11 320 Save R227 (17%) Ships in 18 - 22 working days

Take network security to the next level!This book has never before published advanced security techniques and step-by-step instructions showing how to defend against devastating vulnerabilities to systems and network infrastructure.Just about every day the media is reporting another hard-core hack against some organisation. It was reported mid-March that hackers had taken over one of Lexis Nexis' databases gaining access to the personal files of as many as 32,000 people. Extreme Exploits provides advanced methodologies and solutions needed to defend against sophisticated exploits by showing them how to use the latest advanced security tools. The book teaches you how little-known vulnerabilities have been successfully exploited in the real world and have wreaked havoc on large-scale networks.

Fundamentals of Network Security (Paperback, Ed): Eric Maiwald Fundamentals of Network Security (Paperback, Ed)
Eric Maiwald
R2,199 Discovery Miles 21 990 Ships in 18 - 22 working days

Lock down your most important information by understanding numerous practical security applications in different environments. Robust coverage includes the most recent advances in technology and the law, including wireless security, biometrics, Windows, IDS technology, as well as the new Patriot Act, homeland security initiatives, and special information on relevant state laws. End-of-chapter review sections include summaries, key term lists, quizzes, and lab projects.

Silence On The Wire - A Field Guide To Passive Reconnaissance And Indirect Attacks (Paperback): Michal Zalewski Silence On The Wire - A Field Guide To Passive Reconnaissance And Indirect Attacks (Paperback)
Michal Zalewski
R1,149 Discovery Miles 11 490 Ships in 18 - 22 working days

There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.

"Silence on the Wire" dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an indepth look at modern computing, from hardware on up, the book helps the system administrator to better understand security issues, and to approach networking from a new, more creative perspective. The sys admin can apply this knowledge to network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, and forensics.

Protect Your Information - With Intrusion Detection (Paperback): Alex Lukatsky Protect Your Information - With Intrusion Detection (Paperback)
Alex Lukatsky
R381 Discovery Miles 3 810 Ships in 10 - 15 working days

Thsi comprehensive reference provides a detailed overview of intrusion detection systems [IDS], offering the latest detection systems, the latest technology in information protection.

Hardening Network Security (Paperback, Ed): John Mallery, Jason Zann, Patrick Kelly, Wesley Noonan, Eric Seagren, Paul Love,... Hardening Network Security (Paperback, Ed)
John Mallery, Jason Zann, Patrick Kelly, Wesley Noonan, Eric Seagren, …
R1,170 R1,003 Discovery Miles 10 030 Save R167 (14%) Ships in 18 - 22 working days

Take a proactive approach to enterprise network security by implementing preventive measures against attacks before they occur. Written by a team of IT security specialists, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Whether you're working on a Windows, UNIX, wireless, or mixed network, you'll get complete details on how to systematically harden your network from the ground up, as well as strategies for getting company-wide support for your security plan. With coverage of all major platforms and applications, this book is an essential security tool for on-the-job IT professionals. Features a four-part hardening methodology:

Do This Now!--Checklist of immediate steps to take to lockdown your system from further attack Take It From The Top--Systematic approach to hardening your enterprise from the top down, focusing on network, data, and software access, storage, and communications Once Is Never Enough!--Ongoing monitoring and assessment plan to keep your network secure, including patch management and auditing How to Succeed at Hardening Network Security--Strategies for getting budget approval, management buy-in, and employee cooperation for your security program

John Mallery is a Managing Consultant at BKD, LLP, and a veteran security specialist.

Jason Zann, CISSP, is an Information Security Consultant for DST Systems.

Patrick Kelly, CISSP, CCSE, MCSE, MCP+I, is an Information Assurance Engineer for ComGlobal Systems, Inc.

Paul Love, MS Network Security, CISSP, CISM, CISA, is a Security Manager with a large financial institution.

Wesley Noonan, MCSE, CCNA, CCDA, NNCSS, Security+, is aSenior Network Consultant for Collective Technologies, LLC.

Eric S. Seagren, CISSP, ISSAP, SCNP, CCNA, CNE, MCP+I, MCSE, is an IT architect, designing secure, scalable, and redundant networks.

Rob Kraft is the director of software development for KCX, Inc. Mark O'Neil is the CTO of Vordel and principal author of "Web Services Security."

Series Editor and author Roberta Bragg, CISSP, MCSE: Security, Security+, writes a column for Redmond Magazine and writes the weekly Security Watch newsletter. She is the author of "Hardening Windows Systems" and several other information security books.

Information Security and Cryptology - ICISC 2001 - 4th International Conference Seoul, Korea, December 6-7, 2001 Proceedings... Information Security and Cryptology - ICISC 2001 - 4th International Conference Seoul, Korea, December 6-7, 2001 Proceedings (Paperback, 2002 ed.)
Kwangjo Kim
R1,590 Discovery Miles 15 900 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th International Conference on Security and Cryptology, ICISC 2001, held in Seoul, Korea, in December 2001. The 32 revised full papers presented together with one invited paper were carefully reviewed and selected from a total of 107 submissions. All current issues of cryptography and cryptanalysis and their applications to securing data, systems, and communications are addressed.

Hardening Windows (Paperback): Jonathan Hassall Hardening Windows (Paperback)
Jonathan Hassall
R299 Discovery Miles 2 990 Ships in 4 - 6 working days

This intermediate-to-advanced guide to implementing preventative security measures for the Windows operating system is the only book that covers NT, 2000, XP, and 2003. This book is designed to provide a quick and easy checklist-style reference to the steps system administrators need to take to anticipate attacks and compromises, and harden Windows NT, 2000, XP, and Server 2003 against them.

Software Forensics (Paperback, Ed): Robert Slade Software Forensics (Paperback, Ed)
Robert Slade
R1,057 R915 Discovery Miles 9 150 Save R142 (13%) Ships in 18 - 22 working days

Software forensics -- analyzing program code to track, identify, and prosecute computer virus perpetrators -- has emerged as one of the most promising and technically challenging aspects of information management and security.


This is a technical tutorial that thoroughly examines the programming tools, investigative and analysis methods, and legal implications of the complex evidence chain. Also included are eye-opening case studies, including the famous Enron case, and sample code from real criminal investigations.


Written by a security consultant whose clients include the Canadian Government, Software Forensics covers:



* Basic concepts

* Hackers, crackers, and phreaks

* Objects of analysis: text strings, source code, machine code

* User interfaces and commands

* Program structures and versions

* Virus families

* Function indicators

* Stylistic analysis

* and much more


There is no better or faster way for programmers, security analysts and consultants, security officers in the enterprise, application developers, lawyers, judges, and anyone else interested in software forensics to get up to speed on forensic programming tools and methods and the nature of cyber evidence.
Symmetrische Verschlusselungsverfahren (German, Paperback, 2003 ed.): Michael Miller Symmetrische Verschlusselungsverfahren (German, Paperback, 2003 ed.)
Michael Miller
R1,118 Discovery Miles 11 180 Ships in 10 - 15 working days

Enigma und Lucifer-Chiffre: das spannende Lehrbuch zur Kryptographie mit Online-Service.
Es wird detailliert beschrieben, was bei der Entwicklung eines symmetrischen Kryptosystems - das den heutigen Anforderungen entspricht - zu berucksichtigen ist. Dazu wird insbesondere die differentielle und die lineare Kryptoanalyse ausfuhrlich erklart."

Hacking the XBOX - An Introduction to Reverse Engineering (Paperback, Unlimited ed): A. Huang Hacking the XBOX - An Introduction to Reverse Engineering (Paperback, Unlimited ed)
A. Huang
R760 Discovery Miles 7 600 Ships in 18 - 22 working days

This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essential reverse engineering skills. The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects of computer security and reverse engineering. "Hacking the Xbox" includes numerous practical guides, such as where to get hacking gear, soldering techniques, debugging tips and an Xbox hardware reference guide.

"Hacking the Xbox" also confronts the social and political issues facing today's hacker by looking forward and discussing the impact of today's legal challenges on legitimate reverse engineering activities. The book includes a chapter written by the Electronic Frontier Foundation (EFF) about the rights and responsibilities of hackers, and concludes by discussing the latest trends and vulnerabilities in secure PC platforms.

PDA Security - Incorporating Handhelds into the Enterprise (Paperback, Ed): David Melnick, Asynchrony Solutions, Inc., Mark... PDA Security - Incorporating Handhelds into the Enterprise (Paperback, Ed)
David Melnick, Asynchrony Solutions, Inc., Mark Dinman, Alexander Muratov
R1,057 Discovery Miles 10 570 Ships in 18 - 22 working days

LOCK IN PDA SECURITY:

* Let an IT security expert help you assess the PDA threat to your business

* Learn what you must do to lock out dangers -- password theft, viruses, electronic eavesdropping, mobile code and wireless vulnerabilities, data corruption, device loss and theft, and other risks

* Maximize and protect the value of increasingly capable personal digital assistants to your organization


DOWNSIZE PDA RISKS. SUPERSIZE PDA REWARDS.


PDAs have moved into the workplace. More than 25 million of them will soon be accessing company networks. Are you prepared? If you’re an information technology or business executive, the time is right to size up the unique security risks these small, portable devices pose. This essential primer for those deploying, managing or using PDAs in the workplace will help you understand and address the challenges presented by this emerging set of technologies. Written by respected IT security experts, PDA Security, shows you how to:

* Assess the level of threat posed by PDAs in your organization

* Develop a measured and enforceable policy response to minimize the risk

* Understand the technical issues and defend against the threats PDAs pose to privacy, theft of sensitive information, system corruption, and other issues of network and data misuse

* Analyze secure solutions for all major handhelds -- Palm, PocketPC, and RIM

* Examine a case study on securing Palm for the work environment

* Learn why solutions almost always involve the operating system

* Discover what White-Hat Hacking reveals about vulnerabilities

* Find profitable ways to integrate PDAs into business plans and networks, while downsizing risks

* Get an insider’s preview of the future of handhelds -- the PCs of the early twenty-first century


With a Foreword by Rebecca Bace, internationally renowned intrusion-detection and network-security specialist and former member of the United States Department of Defense National Security Agency (NSA).


For ongoing news and original content on PDA security, related Web sites, and a calendar of related events, visit www.pdasecurity-book.com
Implementing Intrusion Detection Systems - A Hands -On Guide for Securing the Network (Paperback): T Crothers Implementing Intrusion Detection Systems - A Hands -On Guide for Securing the Network (Paperback)
T Crothers
R1,220 R1,023 Discovery Miles 10 230 Save R197 (16%) Ships in 18 - 22 working days

* Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective
* Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS
* Features coverage of the recently revised IETF IDS specification
* Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling
* Provides step-by-step instructions for configuration procedures

A Guide to Data Compression Methods (Paperback, 2002): David Salomon A Guide to Data Compression Methods (Paperback, 2002)
David Salomon
R1,433 Discovery Miles 14 330 Ships in 18 - 22 working days

Many faces of modern computing - from archiving data to coding theory to image processing ¿ rely heavily on data compression. This new and practical guide explains the process of compressing all types of computer data, as well as the use of significant methods and algorithms. Its purpose is to succinctly describe both the principles underlying the field of data compression and how to use the key methods effectively. A Guide to Data Compression Methods concentrates on general concepts and methods and describes them with a minimal amount of mathematical detail. It presents the main approaches to data compression, describes the most important algorithms, and includes straightforward examples. Statistical, dictionary, and wavelet methodologies are addressed in specific chapters, as well as image, video, and audio compression. The reader can expect to gain a basic understanding of the key algorithms and methods used to compress data for storage and transmission. Topics and features: ¿ All core methods are clearly explained with realistic examples, and some computer code is included ¿ Accessible presentation, with only minimum computer and mathematics technical background ¿ Discussion of wavelet methods and JPEG 2000 ¿ Appendix lists all algorithms presented in the book ¿ CD-ROM included compromising computer code from the book and extensive public-domain compression utility programs This book is an invaluable practical reference and guide for all practitioners and professionals in computer science, software engineering, and programming.

Check Point VPN-1/ FireWall-1 NG Administration (Paperback, Ed): Andrew Ratcliffe, Inti Shah Check Point VPN-1/ FireWall-1 NG Administration (Paperback, Ed)
Andrew Ratcliffe, Inti Shah
R1,399 R1,172 Discovery Miles 11 720 Save R227 (16%) Ships in 18 - 22 working days

Completely reviewed by technical experts at CheckPoint, this valuable tool shows network administrators and engineers the essentials of installing, running, and troubleshooting the Nokia VPN-1/FireWall-1 enterprise system. Includes case studies and ready-to-use applications, and a CD-ROM with sample software and solutions.

Performing Security Analyses of Information Systems (Paperback): Charles L. Smith Performing Security Analyses of Information Systems (Paperback)
Charles L. Smith
R1,114 Discovery Miles 11 140 Ships in 18 - 22 working days

In the aftermath of the 9/11 terrorist attacks, responsible organizations are now even more interested in identifying their specific needs for information system security. This book provides a structured process for assisting any analyst in performing this task.

Windows(R) XP Professional Security (Paperback): C. Weber, Gary Bahadur Windows(R) XP Professional Security (Paperback)
C. Weber, Gary Bahadur
R1,387 R1,160 Discovery Miles 11 600 Save R227 (16%) Ships in 18 - 22 working days

Get comprehensive coverage of XP Professional security with this definitive and focused resource. Work with firewalls and intrusion detection systems, fully utilize XP’s built-in support tools, manage security remotely, and much more.

IIS Security (Paperback): Marty Jost IIS Security (Paperback)
Marty Jost
R1,406 R1,179 Discovery Miles 11 790 Save R227 (16%) Ships in 18 - 22 working days

Protect your IIS server with help from this authoritative book. Covering all basic security tools that come with IIS -- and explaining their weaknesses -- this complete guide shows you how to utilize encryption, authorization, filtering, and other restrictive techniques to protect against attacks and other security violations.

Wireless Security (Paperback): Merrit Maxim, David Pollino Wireless Security (Paperback)
Merrit Maxim, David Pollino
R1,360 R1,133 Discovery Miles 11 330 Save R227 (17%) Ships in 18 - 22 working days

Get full details on major mobile/wireless clients and operating systems--including Windows CE, Palm OS, UNIX, and Windows. You’ll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security -- the most trusted name in e-security -- this is your one-stop guide to wireless security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Validated Designs for Object-oriented…
John Fitzgerald, Peter Gorm Larsen, … Hardcover R2,137 Discovery Miles 21 370
Formal Methods for Open Object-based…
Howard Bowman, John Derrick Hardcover R5,403 Discovery Miles 54 030
Open Multithreaded Transactions - A…
Joerg Kienzle Hardcover R2,685 Discovery Miles 26 850
Seismic Events in Glaciers
Marek Gorski Hardcover R2,634 Discovery Miles 26 340
Encyclopedia of Earthquake Research and…
Daniel Galea Hardcover R2,300 R2,104 Discovery Miles 21 040
Earthquake Engineering
Agnes Nolan Hardcover R2,923 R2,651 Discovery Miles 26 510
Hazards and Monitoring of Volcanic…
J-F Lenat Hardcover R3,506 Discovery Miles 35 060
Econophysics and Sociophysics: Recent…
Frederic Abergel, Hideaki Aoyama, … Hardcover R4,653 Discovery Miles 46 530
Active Lavas - Monitoring and Modelling
Christopher R. J Kilburn, Giuseppe Luongo Hardcover R3,672 Discovery Miles 36 720
The Statistical Stability Phenomenon
Igor I. Gorban Hardcover R4,542 R3,471 Discovery Miles 34 710

 

Partners