0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (13)
  • R250 - R500 (88)
  • R500+ (1,342)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Hacking - 2 Books In 1 Bargain: The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical... Hacking - 2 Books In 1 Bargain: The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples & The Beginner's Complete Guide to Computer Hacking and Penetration Testing (Paperback)
Miles Price
R632 Discovery Miles 6 320 Ships in 10 - 15 working days
Time Delay Measurements of Key Generation Process on Smart Cards (Paperback): Penny Hill Press Inc Time Delay Measurements of Key Generation Process on Smart Cards (Paperback)
Penny Hill Press Inc; Naval Postgraduate School
R347 Discovery Miles 3 470 Ships in 10 - 15 working days
Cryptography & Hacking (Paperback): Solis Tech Cryptography & Hacking (Paperback)
Solis Tech
R522 Discovery Miles 5 220 Ships in 10 - 15 working days
Hacking for Beginners - The Complete Guide (Paperback): Tim Barnes Hacking for Beginners - The Complete Guide (Paperback)
Tim Barnes
R436 Discovery Miles 4 360 Ships in 10 - 15 working days
Hands-On Bitcoin Programming with Python - Build powerful online payment centric applications with Python (Paperback): Harish... Hands-On Bitcoin Programming with Python - Build powerful online payment centric applications with Python (Paperback)
Harish Kumar Garg
R686 Discovery Miles 6 860 Ships in 10 - 15 working days

Simplified Python programming for Bitcoin and blockchain Key Features Build Bitcoin applications in Python with the help of simple examples Mine Bitcoins, program Bitcoin-enabled APIs and transaction graphs, and build trading bots Analyze Bitcoin transactions and produce visualizations using Python data analysis tools Book DescriptionBitcoin is a cryptocurrency that's changing the face of online payments. Hands-On Bitcoin Programming with Python teaches you to build software applications for mining and creating Bitcoins using Python. This book starts with the basics of both Bitcoin and blockchain and gives you an overview of these inherent concepts by showing you how to build Bitcoin-driven applications with Python. Packed with clear instructions and practical examples, you will learn to understand simple Python coding examples that work with this cryptocurrency. By the end of the book, you'll be able to mine Bitcoins, accept Bitcoin payments on the app, and work with the basics of blockchain technology to create simply distributed ledgers. What you will learn Master the Bitcoin APIs in Python to manipulate Bitcoin from your Python apps Build your own Bitcoin trading bots to buy Bitcoins at a lower price and sell them at a higher price Write scripts to process Bitcoin payments through a website or app Develop software for Bitcoin mining to create Bitcoin currency on your own computer hardware Create your own keys, addresses, and wallets in Python code Write software to analyze Bitcoin transactions and produce reports, graphs, and other visualizations Who this book is forHands-On Bitcoin Programming with Python consists of examples that will teach you to build your own Bitcoin application. You will learn to write scripts, build software for mining, and create Bitcoins using Python. Anyone with prior Python experience, who wants to explore Python Bitcoin programming and start building Bitcoin-driven Python apps, will find this book useful.

FIPS PUBs 197, 198, 199 (Paperback): National Institute of Standards and Tech FIPS PUBs 197, 198, 199 (Paperback)
National Institute of Standards and Tech
R450 Discovery Miles 4 500 Ships in 10 - 15 working days
GnuTLS Reference Manual (Paperback): Simon Josefsson, Daiki Ueno, Carolin Latze GnuTLS Reference Manual (Paperback)
Simon Josefsson, Daiki Ueno, Carolin Latze
R844 Discovery Miles 8 440 Ships in 10 - 15 working days
Hands-On Cryptography with Python - Leverage the power of Python to encrypt and decrypt data (Paperback): Samuel Bowne Hands-On Cryptography with Python - Leverage the power of Python to encrypt and decrypt data (Paperback)
Samuel Bowne
R839 Discovery Miles 8 390 Ships in 10 - 15 working days

Learn to evaluate and compare data encryption methods and attack cryptographic systems Key Features Explore popular and important cryptographic methods Compare cryptographic modes and understand their limitations Learn to perform attacks on cryptographic systems Book DescriptionCryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly. Hands-On Cryptography with Python starts by showing you how to encrypt and evaluate your data. The book will then walk you through various data encryption methods,such as obfuscation, hashing, and strong encryption, and will show how you can attack cryptographic systems. You will learn how to create hashes, crack them, and will understand why they are so different from each other. In the concluding chapters, you will use three NIST-recommended systems: the Advanced Encryption Standard (AES), the Secure Hash Algorithm (SHA), and the Rivest-Shamir-Adleman (RSA). By the end of this book, you will be able to deal with common errors in encryption. What you will learn Protect data with encryption and hashing Explore and compare various encryption methods Encrypt data using the Caesar Cipher technique Make hashes and crack them Learn how to use three NIST-recommended systems: AES, SHA, and RSA Understand common errors in encryption and exploit them Who this book is forHands-On Cryptography with Python is for security professionals who want to learn to encrypt and evaluate data, and compare different encryption methods.

Secure Processors Part II - Intel SGX Security Analysis and MIT Sanctum Architecture (Paperback): Victor Costan, Ilia Lebedev,... Secure Processors Part II - Intel SGX Security Analysis and MIT Sanctum Architecture (Paperback)
Victor Costan, Ilia Lebedev, Srinivas Devadas
R1,981 Discovery Miles 19 810 Ships in 10 - 15 working days

This monograph is the second of a two-part survey and analysis of the state of the art in secure processor systems, with a specific focus on remote software attestation and software isolation. The first part established the taxonomy and prerequisite concepts relevant to an examination of the state of the art in trusted remote computation: attested software isolation containers (enclaves). This second part extends Part I's description of Intel's Software Guard Extensions (SGX), an available and documented enclave-capable system, with a rigorous security analysis of SGX as a system for trusted remote computation. This part documents the authors' concerns over the shortcomings of SGX as a secure system and introduces the MIT Sanctum processor developed by the authors: a system designed to offer stronger security guarantees, lend itself better to analysis and formal verification, and offer a more straightforward and complete threat model than the Intel system, all with an equivalent programming model. This two-part work advocates a principled, transparent, and well scrutinized approach to system design, and argues that practical guarantees of privacy and integrity for remote computation are achievable at a reasonable design cost and performance overhead. See also: Secure Processors Part I: Background, Taxonomy for Secure Enclaves and Intel SGX Architecture (ISBN 978-1-68083-300-3). Part I of this survey establishes the taxonomy and prerequisite concepts relevant to an examination of the state of the art in trusted remote computation: attested software isolation containers (enclaves).

Cryptocurrency - The Ultimate Guide on Cryptocurrency (Paperback): Neo Monefa Cryptocurrency - The Ultimate Guide on Cryptocurrency (Paperback)
Neo Monefa
R363 Discovery Miles 3 630 Ships in 10 - 15 working days
Mastering Blockchain - Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition (Paperback,... Mastering Blockchain - Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition (Paperback, 2nd Revised edition)
Imran Bashir
R1,516 Discovery Miles 15 160 Ships in 10 - 15 working days

Learn about cryptography and cryptocurrencies, so you can build highly secure, decentralized applications and conduct trusted in-app transactions. Key Features Get to grips with the underlying technical principles and implementations of blockchain Build powerful applications using Ethereum to secure transactions and create smart contracts Explore cryptography, mine cryptocurrencies, and solve scalability issues with this comprehensive guide Book DescriptionA blockchain is a distributed ledger that is replicated across multiple nodes and enables immutable, transparent and cryptographically secure record-keeping of transactions. The blockchain technology is the backbone of cryptocurrencies, and it has applications in finance, government, media and almost all other industries. Mastering Blockchain, Second Edition has been thoroughly updated and revised to provide a detailed description of this leading technology and its implementation in the real world. This book begins with the technical foundations of blockchain technology, teaching you the fundamentals of distributed systems, cryptography and how it keeps data secure. You will learn about the mechanisms behind cryptocurrencies and how to develop applications using Ethereum, a decentralized virtual machine. You will also explore different other blockchain solutions and get an introduction to business blockchain frameworks under Hyperledger, a collaborative effort for the advancement of blockchain technologies hosted by the Linux Foundation. You will also be shown how to implement blockchain solutions beyond currencies, Internet of Things with blockchain, blockchain scalability, and the future scope of this fascinating and powerful technology. What you will learn Master the theoretical and technical foundations of the blockchain technology Understand the concept of decentralization, its impact, and its relationship with blockchain technology Master how cryptography is used to secure data - with practical examples Grasp the inner workings of blockchain and the mechanisms behind bitcoin and alternative cryptocurrencies Understand the theoretical foundations of smart contracts Learn how Ethereum blockchain works and how to develop decentralized applications using Solidity and relevant development frameworks Identify and examine applications of the blockchain technology - beyond currencies Investigate alternative blockchain solutions including Hyperledger, Corda, and many more Explore research topics and the future scope of blockchain technology Who this book is forThis book will appeal to those who wish to build fast, highly secure, transactional applications. It targets people who are familiar with the concept of blockchain and are comfortable with a programming language.

Blockchain Technology And Hacking - Digital Economy Financial Framework With Blockchain And Beginners Guide To Learn Hacking... Blockchain Technology And Hacking - Digital Economy Financial Framework With Blockchain And Beginners Guide To Learn Hacking Computers and Mobile Hacking (Paperback)
Isaac D Cody
R591 Discovery Miles 5 910 Ships in 10 - 15 working days
Tor - Remaining Anonymous on the Dark Net in an Era of NSA Spying (Paperback): Miles Price Tor - Remaining Anonymous on the Dark Net in an Era of NSA Spying (Paperback)
Miles Price
R351 Discovery Miles 3 510 Ships in 10 - 15 working days
Cryptography & Comptia A+ (Paperback): Solis Tech Cryptography & Comptia A+ (Paperback)
Solis Tech
R460 Discovery Miles 4 600 Ships in 10 - 15 working days
Game Theory and Machine Learning for Cyber Security (Hardcover): CA Kamhoua Game Theory and Machine Learning for Cyber Security (Hardcover)
CA Kamhoua
R3,316 Discovery Miles 33 160 Ships in 12 - 19 working days

GAME THEORY AND MACHINE LEARNING FOR CYBER SECURITY Move beyond the foundations of machine learning and game theory in cyber security to the latest research in this cutting-edge field In Game Theory and Machine Learning for Cyber Security, a team of expert security researchers delivers a collection of central research contributions from both machine learning and game theory applicable to cybersecurity. The distinguished editors have included resources that address open research questions in game theory and machine learning applied to cyber security systems and examine the strengths and limitations of current game theoretic models for cyber security. Readers will explore the vulnerabilities of traditional machine learning algorithms and how they can be mitigated in an adversarial machine learning approach. The book offers a comprehensive suite of solutions to a broad range of technical issues in applying game theory and machine learning to solve cyber security challenges. Beginning with an introduction to foundational concepts in game theory, machine learning, cyber security, and cyber deception, the editors provide readers with resources that discuss the latest in hypergames, behavioral game theory, adversarial machine learning, generative adversarial networks, and multi-agent reinforcement learning. Readers will also enjoy: A thorough introduction to game theory for cyber deception, including scalable algorithms for identifying stealthy attackers in a game theoretic framework, honeypot allocation over attack graphs, and behavioral games for cyber deception An exploration of game theory for cyber security, including actionable game-theoretic adversarial intervention detection against advanced persistent threats Practical discussions of adversarial machine learning for cyber security, including adversarial machine learning in 5G security and machine learning-driven fault injection in cyber-physical systems In-depth examinations of generative models for cyber security Perfect for researchers, students, and experts in the fields of computer science and engineering, Game Theory and Machine Learning for Cyber Security is also an indispensable resource for industry professionals, military personnel, researchers, faculty, and students with an interest in cyber security.

Malware + Robotics + Cryptography (Paperback): Solis Tech Malware + Robotics + Cryptography (Paperback)
Solis Tech
R512 Discovery Miles 5 120 Ships in 10 - 15 working days
Hacking Made Simple - Full Beginners Guide To Master Hacking (Paperback): Project Syntax Hacking Made Simple - Full Beginners Guide To Master Hacking (Paperback)
Project Syntax
R300 Discovery Miles 3 000 Ships in 10 - 15 working days
Blockchain & FinTech - A Comprehensive Blueprint to Understanding Blockchain & Financial Technology. 2 Books in 1. (Paperback):... Blockchain & FinTech - A Comprehensive Blueprint to Understanding Blockchain & Financial Technology. 2 Books in 1. (Paperback)
Richard Hayen
R615 Discovery Miles 6 150 Ships in 10 - 15 working days
Hacking University Graduation Edition - 4 Manuscripts (Computer, Mobile, Python & Linux): Hacking Computers, Mobile Devices,... Hacking University Graduation Edition - 4 Manuscripts (Computer, Mobile, Python & Linux): Hacking Computers, Mobile Devices, Apps, Game Consoles and Learn Python & Linux (Paperback)
Isaac D Cody
R721 Discovery Miles 7 210 Ships in 10 - 15 working days
Secure Processors Part I - Background, Taxonomy for Secure Enclaves and Intel SGX Architecture (Paperback): Victor-Vlad Costan,... Secure Processors Part I - Background, Taxonomy for Secure Enclaves and Intel SGX Architecture (Paperback)
Victor-Vlad Costan, Ilia Lebedev, Srinivas Devadas
R2,325 Discovery Miles 23 250 Ships in 10 - 15 working days

This monograph is the first in a two-part survey and analysis of the state of the art in secure processor systems, with a specific focus on remote software attestation and software isolation. It first examines the relevant concepts in computer architecture and cryptography, and then surveys attack vectors and existing processor systems claiming security for remote computation and/or software isolation. It examines, in detail, the modern isolation container (enclave) primitive as a means to minimize trusted software given practical trusted hardware and reasonable performance overhead. Specifically, this work examines the programming model and software design considerations of Intel's Software Guard Extensions (SGX), as it is an available and documented enclave-capable system. This work advocates a principled, transparent, and well-scrutinized approach to secure system design, and argues that practical guarantees of privacy and integrity for remote computation are achievable at a reasonable design cost and performance overhead. See also: Secure Processors Part II: Intel SGX Security Analysis and MIT Sanctum Architecture Part II (ISBN 978-1-68083-302-7). Part II of this survey a deep dive into the implementation and security evaluation of two modern enclave-capable secure processor systems: SGX and MIT's Sanctum. The complex but insufficient threat model employed by SGX motivates Sanctum, which achieves stronger security guarantees under software attacks with an equivalent programming model.

Hacking University - Learn Python Computer Programming from Scratch & Precisely Learn How The Linux Operating Command Line... Hacking University - Learn Python Computer Programming from Scratch & Precisely Learn How The Linux Operating Command Line Works 2 Manuscript Bundle: The Ultimate Beginners Guide in Mastering Python and a Complete Step by Step Guide in Learning Linux (Paperback)
Isaac D Cody
R561 Discovery Miles 5 610 Ships in 10 - 15 working days
The Encrypted Book of Passwords (Paperback, 2nd edition): Raef Meeuwisse The Encrypted Book of Passwords (Paperback, 2nd edition)
Raef Meeuwisse
R312 Discovery Miles 3 120 Ships in 10 - 15 working days
Hacking University - Mobile Phone & App Hacking And Complete Beginners Guide to Learn Linux: Hacking Mobile Devices, Tablets,... Hacking University - Mobile Phone & App Hacking And Complete Beginners Guide to Learn Linux: Hacking Mobile Devices, Tablets, Game Consoles, Apps and Precisely Learn and Conquer the Linux Operating System (Paperback)
Isaac D Cody
R540 Discovery Miles 5 400 Ships in 10 - 15 working days
Circuit Engineering + Cryptography + Raspberry Pi 2 (Paperback): Solis Tech Circuit Engineering + Cryptography + Raspberry Pi 2 (Paperback)
Solis Tech
R293 Discovery Miles 2 930 Ships in 10 - 15 working days
Cryptography & Human-Computer Interaction (Paperback): Solis Tech Cryptography & Human-Computer Interaction (Paperback)
Solis Tech
R709 Discovery Miles 7 090 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,406 R1,302 Discovery Miles 13 020
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R539 Discovery Miles 5 390
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,573 Discovery Miles 35 730
TLS Mastery
Michael W Lucas Hardcover R970 R875 Discovery Miles 8 750
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R834 Discovery Miles 8 340
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R819 Discovery Miles 8 190
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R673 Discovery Miles 6 730
Simple Steps to Data Encryption - A…
Pete Loshin Paperback R720 Discovery Miles 7 200
New Research on the Voynich Manuscript…
National Security Agency Hardcover R568 Discovery Miles 5 680
Protecting Privacy through Homomorphic…
Kristin Lauter, Wei Dai, … Hardcover R3,121 Discovery Miles 31 210

 

Partners