0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (12)
  • R250 - R500 (86)
  • R500+ (1,344)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Circuit Engineering & Cryptography & Hacking (Paperback): Solis Tech Circuit Engineering & Cryptography & Hacking (Paperback)
Solis Tech
R545 Discovery Miles 5 450 Ships in 10 - 15 working days
Cryptography & Robotics (Paperback): Solis Tech Cryptography & Robotics (Paperback)
Solis Tech
R266 Discovery Miles 2 660 Ships in 10 - 15 working days
Time Delay Measurements of Key Generation Process on Smart Cards (Paperback): Penny Hill Press Inc Time Delay Measurements of Key Generation Process on Smart Cards (Paperback)
Penny Hill Press Inc; Naval Postgraduate School
R347 Discovery Miles 3 470 Ships in 10 - 15 working days
GnuPG - Using the GNU Privacy Guard (Paperback): The Gnupg Project GnuPG - Using the GNU Privacy Guard (Paperback)
The Gnupg Project
R679 Discovery Miles 6 790 Ships in 10 - 15 working days
Journal of Cyber Security and Mobility (5-3) (Paperback): Antoni Gobeo, Connor Fowler, William J. Buchanan Journal of Cyber Security and Mobility (5-3) (Paperback)
Antoni Gobeo, Connor Fowler, William J. Buchanan
R1,065 Discovery Miles 10 650 Ships in 10 - 15 working days
Cryptography & Open Source (Paperback): Solis Tech Cryptography & Open Source (Paperback)
Solis Tech
R264 Discovery Miles 2 640 Ships in 10 - 15 working days
Shishi - Kerberos 5 Implementation (Paperback): Simon Josefsson Shishi - Kerberos 5 Implementation (Paperback)
Simon Josefsson
R823 Discovery Miles 8 230 Ships in 10 - 15 working days
Cryptography & Human-Computer Interaction (Paperback): Solis Tech Cryptography & Human-Computer Interaction (Paperback)
Solis Tech
R709 Discovery Miles 7 090 Ships in 10 - 15 working days
Principles of Computer Security Lab Manual, Fourth Edition (Paperback, 4th edition): Vincent Nestler, Keith Harrison, Matthew... Principles of Computer Security Lab Manual, Fourth Edition (Paperback, 4th edition)
Vincent Nestler, Keith Harrison, Matthew Hirsch, Wm. Arthur Conklin
R2,004 Discovery Miles 20 040 Ships in 10 - 15 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Practice the Computer Security Skills You Need to Succeed! 40+ lab exercises challenge you to solve problems based on realistic case studies Step-by-step scenarios require you to think critically Lab analysis tests measure your understanding of lab results Key term quizzes help build your vocabulary Labs can be performed on a Windows, Linux, or Mac platform with the use of virtual machines In this Lab Manual, you'll practice Configuring workstation network connectivity Analyzing network communication Establishing secure network application communication using TCP/IP protocols Penetration testing with Nmap, metasploit, password cracking, Cobalt Strike, and other tools Defending against network application attacks, including SQL injection, web browser exploits, and email attacks Combatting Trojans, man-in-the-middle attacks, and steganography Hardening a host computer, using antivirus applications, and configuring firewalls Securing network communications with encryption, secure shell (SSH), secure copy (SCP), certificates, SSL, and IPsec Preparing for and detecting attacks Backing up and restoring data Handling digital forensics and incident response Instructor resources available: This lab manual supplements the textbook Principles of Computer Security, Fourth Edition, which is available separately Virtual machine files Solutions to the labs are not included in the book and are only available to adopting instructors

Recommendation for Cryptographic Key Generation Nist Sp 800-133 - Nist Sp 800-133 (Paperback): National Institute of Standards... Recommendation for Cryptographic Key Generation Nist Sp 800-133 - Nist Sp 800-133 (Paperback)
National Institute of Standards and Tech
R419 Discovery Miles 4 190 Ships in 10 - 15 working days
Minoli-Cordovana's Authoritative Computer and Network Security Dictionary (Paperback): D Minoli Minoli-Cordovana's Authoritative Computer and Network Security Dictionary (Paperback)
D Minoli
R1,672 Discovery Miles 16 720 Ships in 12 - 19 working days

A dictionary and handbook that defines the field and provides unique insight

Turn to Minoli-Cordovana's Authoritative Computer and Network Security Dictionary for clear, concise, and up-to-date definitions of terms, concepts, methods, solutions, and tools in the field of computer and network security. About 5,555 security- and IT-related words and phrases are defined. Drawing their definitions from their work experience and from a variety of established and respected sources, the authors have created a single, up-to-the-minute, and standardized resource that users can trust for accuracy and authority.
The dictionary is written for industry executives, managers, and planners who are charged with the responsibility of protecting their organizations from random, negligent, or planned attacks on their information technology resources. It not only defines terms, but also provides these professionals with critical insight into the terms' use and applicability in the field of IT security. Users can therefore refer to the dictionary as a handbook and guide to provide direction and support in all critical areas of computer and network security.
Using a holistic approach, the dictionary takes a broad view of computer and network security, providing users with a single source that defines the complete field, including:
* Definitions targeting the many resources that need to be protected, such as hosts, systems, OSs, databases, storage, information, communications links, communications network elements, clients, PCs, PDAs, VoIP devices, wireless access points and devices, Bluetooth systems, digital content, e-mail, and more
* Definitions for a core set of general IT and networking topics and terms, focusing on recent threats such as worms, viruses, trojans, physical security, internally based attacks, and social engineering
* Definitions for financial topics and terms that are connected to IT security issues, to support the business case for strong security mechanisms at the firm
With the worldwide financial impact of malicious code estimated at roughly 100 billion dollars a year and the threat of ever-increasing vulnerabilities, this dictionary provides essential support to help identify and reduce security risks and protect network and computer users from hostile applicationsand viruses.

Cryptography InfoSec Pro Guide (Paperback, Ed): Sean Philip Oriyano Cryptography InfoSec Pro Guide (Paperback, Ed)
Sean Philip Oriyano
R980 R842 Discovery Miles 8 420 Save R138 (14%) Ships in 10 - 15 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Security Smarts for the Self-Guided IT ProfessionalThis complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics such as ciphers, algorithms and key exchange, to practical applications such as digital signatures and certificates, the book delivers working tools to data storage architects, security mangers, and others security practitioners who need to possess a thorough understanding of cryptography. True to the hallmarks of all InfoSec Pro Guides, the book imparts the hard-learned lessons and experiences of knowledgeable professionals in security, providing know-how that otherwise takes years to learn. You're led through the Why and How of cryptography, the history of the science, the components of cryptography and how it is applied to various areas in the field of security. Challenging crypto puzzles in every chapter Ready-to-implement cryptographic techniques explained Lingo-Common security terms defined so that you're in the know on the job IMHO-Frank and relevant opinions based on the author's years of industry experience Budget Note-Tips for getting security technologies and processes into your organization's budget In Actual Practice-Exceptions to the rules of security explained in real-world contexts Your Plan-Customizable checklists you can use on the job now Into Action-Tips on how, why, and when to apply new skills and techniques at work

Street Cryptography - A Quick and Dirty Way to Maintain Your Secret Conspiracy (Paperback): Christopher Forrest Street Cryptography - A Quick and Dirty Way to Maintain Your Secret Conspiracy (Paperback)
Christopher Forrest
R219 Discovery Miles 2 190 Ships in 10 - 15 working days
Hashing - Fifty Years of Slicing and Dicing (Hardcover): AG Konheim Hashing - Fifty Years of Slicing and Dicing (Hardcover)
AG Konheim
R4,023 Discovery Miles 40 230 Ships in 10 - 15 working days

Written by one of the developers of the technology, "Hashing" is both a historical document on the development of hashing and an analysis of the applications of hashing in a society increasingly concerned with security. The material in this book is based on courses taught by the author, and key points are reinforced in sample problems and an accompanying instructors manual. Graduate students and researchers in mathematics, cryptography, and security will benefit from this overview of hashing and the complicated mathematics that it requires.

SonicWALL Secure Wireless Networks Integrated Solutions Guide (Paperback): Joe Levy, Khai Tran, Patrick Lydon, Jeremy Pollock,... SonicWALL Secure Wireless Networks Integrated Solutions Guide (Paperback)
Joe Levy, Khai Tran, Patrick Lydon, Jeremy Pollock, Susan Weigand, …
R2,112 Discovery Miles 21 120 Ships in 10 - 15 working days

Nearly forty percent of the world's 1 billion+ Internet users are wireless. It's a truly staggering fact to think that the majority of these wireless implementations are fundamentally insecure, leaving users and private data at risk.
Many wireless proprietors think that the convenience of wireless outweighs the possible risk of insecure impelentation, or that secure wireless is far too complicated to worry about deploying.
"SonicWALL(r) Secure Wireless Networks Integrated Solutions Guide" provides a systematic approach to creating secure wireless networks, using the Plan, Design, Implement, and Optimize model. This introduction to wireless network security is both comprehensive and easy to understand. Using straightforward language, this book describes deployment best practices, what SonicWALL security appliances do, and how they interoperate within an existing or new network. It begins with brief overviews of the theory of risk management, the history of wireless networks, and today s top five wireless threats. Real-world case studies highlight wireless solution business drivers for education, healthcare, retail and hospitality, and government agencies, as well as their respective regulatory compliance requirements. SonicWALL believes that the days of being forced to accept inherent risk in wireless networking are over. By using modern security standards and sound network design methods, your wireless network should be just as secure as your wired network.
Wireless networks can be made as secure as wired networks, and deploying this type of security can be far less complicated than you think. In this book, and through their massive product offerings, SonicWALL gives you (the secure wireless network hopeful) all of the planning, implementation, and optimizing tools you need to do wireless. Securely.
* Official guide from SonicWALL
* Written by SonicWALL engineers and documentation specialists
* Appropriate for all audiences, from the small proprietor to the enterprise IT specialist
* A complete reference to plan, design, implement, and optimize a secure wireless network with SonicWALL's extensive wireless product offerings"

Software Forensics (Paperback, Ed): Robert Slade Software Forensics (Paperback, Ed)
Robert Slade
R1,148 R987 Discovery Miles 9 870 Save R161 (14%) Ships in 10 - 15 working days

Software forensics -- analyzing program code to track, identify, and prosecute computer virus perpetrators -- has emerged as one of the most promising and technically challenging aspects of information management and security.


This is a technical tutorial that thoroughly examines the programming tools, investigative and analysis methods, and legal implications of the complex evidence chain. Also included are eye-opening case studies, including the famous Enron case, and sample code from real criminal investigations.


Written by a security consultant whose clients include the Canadian Government, Software Forensics covers:



* Basic concepts

* Hackers, crackers, and phreaks

* Objects of analysis: text strings, source code, machine code

* User interfaces and commands

* Program structures and versions

* Virus families

* Function indicators

* Stylistic analysis

* and much more


There is no better or faster way for programmers, security analysts and consultants, security officers in the enterprise, application developers, lawyers, judges, and anyone else interested in software forensics to get up to speed on forensic programming tools and methods and the nature of cyber evidence.
Configuring IPCop Firewalls: Closing Borders with Open Source (Paperback, New): Barrie Dempster, James Eaton-Lee Configuring IPCop Firewalls: Closing Borders with Open Source (Paperback, New)
Barrie Dempster, James Eaton-Lee
R1,125 Discovery Miles 11 250 Ships in 10 - 15 working days

This book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic IPCop concepts, then moves to introduce basic IPCop configurations, before covering advanced uses of IPCop. This book is for both experienced and new IPCop users. IPCop is a powerful, open source, Linux based firewall distribution for primarily Small Office Or Home (SOHO) networks, although it can be used in larger networks. It provides most of the features that you would expect a modern firewall to have, and what is most important is that it sets this all up for you in a highly automated and simplified way. This book is an easy introduction to this popular application. After introducing and explaining the foundations of firewalling and networking and why they're important, the book moves on to cover using IPCop, from installing it, through configuring it, to more advanced features, such as configuring IPCop to work as an IDS, VPN and using it for bandwidth management. While providing necessary theoretical background, the book takes a practical approach, presenting sample configurations for home users, small businesses, and large businesses. The book contains plenty of illustrative examples. Chapter 1 briefly introduces some firewall and networking concepts. The chapter introduces the roles of several common networking devices and explains how firewalls fit into this. Chapter 2 introduces the IPCop package itself, discussing how IPCop's red/orange/blue/green interfaces fit into a network topology. It then covers the configuration of IPCop in other common roles, such as those of a web proxy, DHCP, DNS, time, and VPN server. Chapter 3 covers three sample scenarios where we learn how to deploy IPCop, how IPCop interfaces connect to each other and to the network as a whole. Chapter 4 covers installing IPCop. It outlines the system configuration required to run IPCop, and explains the configuration required to get IPCop up and running. In Chapter 5, we will learn how to employ the various tools IPCop provides us with to administrate, operate, troubleshoot, and monitor our IPCop firewall Chapter 6 starts off with explaining the need for an IDS in our system and then goes on to explain how to use the SNORT IDS with IPCop. Chapter 7 introduces the VPN concept and explains how to set up an IPSec VPN configuration for a system. Special focus is laid on configuring the blue zone - a secured wireless network augmenting the security of a wireless segment, even one already using WEP or WPA. Chapter 8 demonstrates how to manage bandwidth using IPCop making use of traffic shaping techniques and cache management. The chapter also covers the configuration of the Squid web proxy and caching system. Chapter 9 focuses on the vast range of add-ons available to configure IPCop to suit our needs. We see how to install add-ons and then learn more about common add-ons like SquidGuard, Enhanced Filtering, Blue Access, LogSend, and CopFilter. Chapter 10 covers IPCop security risks, patch management and some security and auditing tools and tests. Chapter 11 outlines the support IPCop users have in the form of mailing lists and IRC. The book is suitable for anyone interested in securing their networks with IPCop - from those new to networking and firewalls, to networking and IT Professionals with previous experience of IPCop. No knowledge of Linux or IPCop is required.

Codebreaking - A Practical Guide (Paperback): Elonka Dunin, Klaus Schmeh Codebreaking - A Practical Guide (Paperback)
Elonka Dunin, Klaus Schmeh 1
R537 R491 Discovery Miles 4 910 Save R46 (9%) Ships in 9 - 17 working days

'The best book on codebreaking I have read', SIR DERMOT TURING 'Brings back the joy I felt when I first read about these things as a kid', PHIL ZIMMERMANN 'This is at last the single book on codebreaking that you must have. If you are not yet addicted to cryptography, this book will get you addicted. Read, enjoy, and test yourself on history's great still-unbroken messages!' JARED DIAMOND is the Pulitzer Prize-winning author of Guns, Germs, and Steel; Collapse; and other international bestsellers 'This is THE book about codebreaking. Very concise, very inclusive and easy to read', ED SCHEIDT 'Riveting', MIKE GODWIN 'Approachable and compelling', GLEN MIRANKER This practical guide to breaking codes and solving cryptograms by two world experts, Elonka Dunin and Klaus Schmeh, describes the most common encryption techniques along with methods to detect and break them. It fills a gap left by outdated or very basic-level books. This guide also covers many unsolved messages. The Zodiac Killer sent four encrypted messages to the police. One was solved; the other three were not. Beatrix Potter's diary and the Voynich Manuscript were both encrypted - to date, only one of the two has been deciphered. The breaking of the so-called Zimmerman Telegram during the First World War changed the course of history. Several encrypted wartime military messages remain unsolved to this day. Tens of thousands of other encrypted messages, ranging from simple notes created by children to encrypted postcards and diaries in people's attics, are known to exist. Breaking these cryptograms fascinates people all over the world, and often gives people insight into the lives of their ancestors. Geocachers, computer gamers and puzzle fans also require codebreaking skills. This is a book both for the growing number of enthusiasts obsessed with real-world mysteries, and also fans of more challenging puzzle books. Many people are obsessed with trying to solve famous crypto mysteries, including members of the Kryptos community (led by Elonka Dunin) trying to solve a decades-old cryptogram on a sculpture at the centre of CIA Headquarters; readers of the novels of Dan Brown as well as Elonka Dunin's The Mammoth Book of Secret Code Puzzles (UK)/The Mammoth Book of Secret Codes and Cryptograms (US); historians who regularly encounter encrypted documents; perplexed family members who discover an encrypted postcard or diary in an ancestor's effects; law-enforcement agents who are confronted by encrypted messages, which also happens more often than might be supposed; members of the American Cryptogram Association (ACA); geocachers (many caches involve a crypto puzzle); puzzle fans; and computer gamers (many games feature encryption puzzles). The book's focus is very much on breaking pencil-and-paper, or manual, encryption methods. Its focus is also largely on historical encryption. Although manual encryption has lost much of its importance due to computer technology, many people are still interested in deciphering messages of this kind.

Cryptography for Developers (Paperback): Tom St Denis Cryptography for Developers (Paperback)
Tom St Denis
R2,033 Discovery Miles 20 330 Ships in 10 - 15 working days

The only guide for software developers who must learn and implement cryptography safely and cost effectively.
The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.
* The author is the developer of the industry standard cryptographic suite of tools called LibTom
* A regular expert speaker at industry conferences and events on this development
* The book has a companion Web site with over 300-pages of text on implementing multiple precision arithmetic

Enemy at the Water Cooler - True Stories of Insider Threats and Enterprise Security Management Countermeasures (Paperback):... Enemy at the Water Cooler - True Stories of Insider Threats and Enterprise Security Management Countermeasures (Paperback)
Brian T Contos
R1,660 Discovery Miles 16 600 Ships in 10 - 15 working days

The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist threats, and hackers. It addresses the steps organizations must take to address insider threats at a people, process, and technology level.
Today's headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats, and terrorists. They represent the next wave of security threats but still possess nowhere near the devastating potential of the most insidious threat: the insider. This is not the bored 16-year-old hacker. We are talking about insiders like you and me, trusted employees with access to information - consultants, contractors, partners, visitors, vendors, and cleaning crews. Anyone in an organization's building or networks that possesses some level of trust.
* Full coverage of this hot topic for virtually every global 5000 organization, government agency, and individual interested in security.
* Brian Contos is the Chief Security Officer for one of the most well known, profitable and respected security software companies in the U.S.-ArcSight.

Applied Cryptanalysis - Breaking Ciphers in the Real World (Hardcover, New): M Stamp Applied Cryptanalysis - Breaking Ciphers in the Real World (Hardcover, New)
M Stamp
R3,090 Discovery Miles 30 900 Ships in 12 - 19 working days

A case-based approach to cryptanalysis that explains how and why attacks can happen

Applied Cryptanalysis focuses on practical attacks on real-world ciphers. Using detailed case studies, the authors demonstrate how modern cryptographic systems are broken, and they do so with a minimum of complex mathematics and technical jargon. All major classes of attacks are covered, providing IT professionals with the knowledge necessary for effective security implementation within their organizations. Each chapter concludes with a series of problems that enables the reader to practice and fine-tune their own cryptanalysis skills. Applied Cryptanalysis can serve as a textbook for a cryptanalysis course or for independent study.

The text is organized around four major themes:

Classic Crypto offers an overview of a few classical cryptosystems, introducing and illustrating the basic principles, concepts, and vocabulary. The authors then cover World War II cipher machines, specifically the German Enigma, Japanese Purple, and American Sigaba.

Symmetric Ciphers analyzes shift registers and correlation attacks, as well as attacks on three specific stream ciphers: ORYX, RC4 (as used in WEP), and PKZIP. In addition, block ciphers are studied: Hellman's Time-Memory Trade-Off attack is discussed and three specific block ciphers are analyzed in detail (CMEA, Akelarre, and FEAL).

Hash Functions presents hash function design, birthday attacks, and the "Nostradamus" attack. Then the MD4 attack is examined, which serves as a precursor for the authors' highly detailed analysis of the recent attack on MD5.

Public Key Crypto includes an overview of several public key cryptosystems including theknapsack, Diffie-Hellman, Arithmetica, RSA, Rabin cipher, NTRU, and ElGamal. Factoring and discrete log attacks are analyzed, and the recent timing attacks on RSA are discussed in detail.

Clear and concise, this practical case-based approach to cryptanalysis is a valuable and timely resource.

How to Cheat at Managing Information Security (Paperback): Mark Osborne How to Cheat at Managing Information Security (Paperback)
Mark Osborne
R1,403 Discovery Miles 14 030 Ships in 10 - 15 working days

This is the only book that covers all the topics that any budding security manager needs to know This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks.
These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non technical principle and practices of security and provides basic information about the technical details of many of the products - real products, not just theory.
Written by a well known Chief Information Security Officer, this book gives the information security manager all the working knowledge needed to: Design the organization chart of his new security organization Design and implement policies and strategies Navigate his way through jargon filled meetings Understand the design flaws of his E-commerce and DMZ infrastructure
* A clearly defined guide to designing the organization chart of a new security organization and how to implement policies and strategies
* Navigate through jargon filled meetings with this handy aid
* Provides information on understanding the design flaws of E-commerce and DMZ infrastructure"

Information Security:  Contemporary Cases - Contemporary Cases (Paperback, New edition): Marie A Wright, John S Kakalik Information Security: Contemporary Cases - Contemporary Cases (Paperback, New edition)
Marie A Wright, John S Kakalik
R1,642 Discovery Miles 16 420 Ships in 10 - 15 working days

Information Security: Contemporary Cases Addresses Fundamental Information Security Concepts In Realistic Scenarios. Through A Series Of Substantive Cases, Different Aspects Of Information Security Are Addressed By Real Organizations. The Organizations Include Kraft Foods, Advo, IBM, SRA, Aetna, The FBI, And The Yale New Haven Center For Emergency Preparedness And Disaster Response. Case Topics Include Data Protection, Integrating IT And Physical Security, Contingency Planning, Disaster Recovery, Network Security, Hardware Design, Encryption, Standards Compliance, Tracking Intruders, And Training And Awareness Programs. This Casebook Will Enable Students To Develop The Practical Understanding Needed For Today's Information Security And Information Assurance Profession.

BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic (Paperback): Tom St Denis BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic (Paperback)
Tom St Denis
R1,615 Discovery Miles 16 150 Ships in 10 - 15 working days

Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages only provide support for integers which are relatively small and single precision. The purpose of this text is to instruct the reader regarding how to implement efficient multiple precision algorithms.
Bignum math is the backbone of modern computer security algorithms. It is the ability to work with hundred-digit numbers efficiently using techniques that are both elegant and occasionally bizarre. This book introduces the reader to the concept of bignum algorithms and proceeds to build an entire library of functionality from the ground up. Through the use of theory, pseudo-code and actual fielded C source code the book explains each and every algorithm that goes into a modern bignum library. Excellent for the student as a learning tool and practitioner as a reference alike BigNum Math is for anyone with a background in computer science who has taken introductory level mathematic courses. The text is for students learning mathematics and cryptography as well as the practioner who needs a reference for any of the algorithms documented within.
* Complete coverage of Karatsuba Multiplication, the Barrett Algorithm, Toom-Cook 3-Way Multiplication, and More
* Tom St Denis is the developer of the industry standard cryptographic suite of tools called LibTom.
* This book provides step-by-step exercises to enforce concepts

Firewall Policies and VPN Configurations (Paperback): Syngress, Dale Liu, Stephanie Miller, Mark Lucas, Abhishek Singh,... Firewall Policies and VPN Configurations (Paperback)
Syngress, Dale Liu, Stephanie Miller, Mark Lucas, Abhishek Singh, …
R1,725 Discovery Miles 17 250 Ships in 10 - 15 working days

A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security.
This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper s NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of their vulnerability and their complexity, VPN policies are covered in more depth with numerous tips for troubleshooting remote connections.
. The only book that focuses on creating policies that apply to multiple products.
. Included is a bonus chapter on using Ethereal, the most popular protocol analyzer, to monitor and analyze network traffic.
. Shows what features can be controlled by a policy, and walks you through the steps for writing the policy to fit the objective at hand"

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,573 Discovery Miles 35 730
Blockchain 2035 - The Digital DNA of…
Andrew D Knapp, Jared C Tate Hardcover R1,523 Discovery Miles 15 230
Technical Articles about the Voynich…
National Security Agency Hardcover R630 Discovery Miles 6 300
Cryptocurrencies and Blockchain…
Keizer Soeze Hardcover R1,469 R1,221 Discovery Miles 12 210
Multimedia Security - Steganography and…
Hardcover R2,158 Discovery Miles 21 580
Protecting Privacy through Homomorphic…
Kristin Lauter, Wei Dai, … Hardcover R3,121 Discovery Miles 31 210
How to Cheat at Windows System…
Pawan K. Bhardwaj Paperback R996 Discovery Miles 9 960
Information Security - Foundations…
Ali Ismail Awad, Michael Fairhurst Hardcover R3,728 R3,357 Discovery Miles 33 570
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R673 Discovery Miles 6 730
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R539 Discovery Miles 5 390

 

Partners