0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (85)
  • R500+ (1,287)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Maximum Windows 2000 Security (Paperback): Anonymous, Mark Burnett, L Locher, Chris Doyle, Chris Amaris, Rand Morimoto Maximum Windows 2000 Security (Paperback)
Anonymous, Mark Burnett, L Locher, Chris Doyle, Chris Amaris, …
R1,289 R1,093 Discovery Miles 10 930 Save R196 (15%) Ships in 18 - 22 working days

Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.

Topics include:

  • Physical & File System Security,
  • Password Security,
  • Malicious Code,
  • Windows 2000 Network Security Architecture and Professional Protocols,
  • Web Server Security,
  • Denial of Service Attacks,
  • Intrusion Detection,
  • Hacking Secure Code in Windows 2000.
  • Wireless Security (Paperback): Merrit Maxim, David Pollino Wireless Security (Paperback)
    Merrit Maxim, David Pollino
    R1,360 R1,133 Discovery Miles 11 330 Save R227 (17%) Ships in 18 - 22 working days

    Get full details on major mobile/wireless clients and operating systems--including Windows CE, Palm OS, UNIX, and Windows. You’ll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security -- the most trusted name in e-security -- this is your one-stop guide to wireless security.

    mCommerce Security:  A Beginner's Guide (Paperback): Kapil Raina, Anurag Harsh mCommerce Security: A Beginner's Guide (Paperback)
    Kapil Raina, Anurag Harsh
    R1,169 R1,003 Discovery Miles 10 030 Save R166 (14%) Ships in 18 - 22 working days

    Learn to implement a solid mCommerce security plan--from start to finish

    Many businesses today recognize mobile commerce--mCommerce--as a way to increase revenue and offer customers a new level of convenience. Mobile phones and PDAs can now be used for online banking, purchasing tickets, messaging, and much more. For any transaction, security is a top priority--and this becomes increasingly complex when wireless and mobile applications are involved. This practical introductory guide clearly explains different mCommerce applications and their associated security risks. Through case studies, you'll learn best practices for implementing specific security methods in key industries--including banking, retail, entertainment, military, travel, and healthcare. The book also contains 8 pages of blueprints that depict secure end-to-end mCommerce architecture as well as identify key vulnerability points.Explore the latest security topics for both business and consumer mCommerce applications Improve services offered to customers through secure mCommerce applications Get details on various types of mobile applications and understand their security risks--including commerce, payments, information, communications, gaming, and military Discover the differences between mobile versus wired security Address mobile security issues in key industries such as banking and finance, travel, manufacturing, entertainment, public services, and defense Recognize the time- and cost-saving benefits of secured mCommerce applications through comprehensive case studies Preview the security of future mobile applications--such as 3G/4G networks and wearable computers

    Hacker's Challenge (Paperback): Mike Schiffman Hacker's Challenge (Paperback)
    Mike Schiffman
    R888 R782 Discovery Miles 7 820 Save R106 (12%) Ships in 18 - 22 working days

    "A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.

    Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and incident response skills with 20 real-world hacks presented by upper-echelon security experts. Important topics are covered, including Denial of Service, wireless technologies, Web attacks, and malicious code. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and possible clues, technical background such as log files and network maps, and a series of questions for you to solve. Then, in Part II, you get a detailed analysis of how the experts solved each incident.

    Excerpt from "The Insider":

    The Challenge:

    Kris, a software company's senior I.T. staffer, got a call from the helpdesk....Users were complaining that the entire contents of their inbox, outbox, and deleted items folders had completely disappeared....The following Monday, Kris found that the entire Exchange database had been deleted....The attacker sent an email from a Yahoo! account taking responsibility for the attacks....The e-mail had been sent from a machine within the victim's network. Kris brought in an external security team who immediately began their investigation...In addition to gathering physical security logs, Microsoft Exchange logs, and virtual private network (VPN) logs they interviewed key people inside the company....

    The Solution:

    After reviewing the log files included in the challenge, propose your assessment--whendid the deletion of e-mail accounts begin and end, which users were connected to the VPN at the time, and what IP addresses were the users connecting from? Then, turn to the experts' answers to find out what really happened.

    Contributing authors include:

    Top security professionals from @stake, Foundstone, Guardent, The Honeynet Project, University of Washington, Fortrex Technologies, SecureMac.com, AnchorIS.com, and the National Guard Information Warfare unit.

    PKI: Implementing & Managing E-Security (Paperback): Andrew Nash, Derek Brink, William Duane, Celia Joseph PKI: Implementing & Managing E-Security (Paperback)
    Andrew Nash, Derek Brink, William Duane, Celia Joseph
    R1,391 R1,164 Discovery Miles 11 640 Save R227 (16%) Ships in 18 - 22 working days

    Written by the experts at RSA Security, this book will show you how to secure transactions and develop customer trust in e-commerce through the use of PKI technology. Part of the RSA Press Series.

    Rethinking Public Key Infrastructures and Digital Certificates - Building in Privacy (Paperback): Stefan Brands Rethinking Public Key Infrastructures and Digital Certificates - Building in Privacy (Paperback)
    Stefan Brands
    R1,177 Discovery Miles 11 770 Ships in 18 - 22 working days

    Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are already widely used for authenticating and encrypting email and software, and eventually will be built into any device or piece of software that must be able to communicate securely. There is a serious problem, however, with this unavoidable trend: unless drastic measures are taken, everyone will be forced to communicate via what will be the most pervasive electronic surveillance tool ever built. There will also be abundant opportunity for misuse of digital certificates by hackers, unscrupulous employees, government agencies, financial institutions, insurance companies, and so on.In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that. Furthermore, different actions by the same person cannot be linked. Certificate holders have control over what information is disclosed, and to whom. Subsets of the proposed cryptographic building blocks can be used in combination, allowing a cookbook approach to the design of public key infrastructures. Potential applications include electronic cash, electronic postage, digital rights management, pseudonyms for online chat rooms, health care information storage, electronic voting, and even electronic gambling.

    At Large - The Strange Case of the World's Biggest Internet Invasion (Paperback, New Ed): Charles C Mann, David H. Freedman At Large - The Strange Case of the World's Biggest Internet Invasion (Paperback, New Ed)
    Charles C Mann, David H. Freedman
    R494 Discovery Miles 4 940 Ships in 18 - 22 working days

    Hailed as "a chilling portrait" by The Boston Globe and "a crafty thriller" by Newsweek, this astonishing story of an obsessive hacker promises to change the way you look at the Internet forever.

    At Large chronicles the massive manhunt that united hard-nosed FBI agents, computer nerds, and uptight security bureaucrats against an elusive computer outlaw who broke into highly secured computer systems at banks, universities, federal agencies, and top-secret military weapons-research sites. Here is "a real-life tale of cops vs. hackers, by two technology writers with a flair for turning a complicated crime and investigation into a fast-moving edge-of-your-seat story" (Kirkus Reviews, starred). At Large blows the lid off the frightening vulnerability of the global online network, which leaves not only systems, but also individuals, exposed.

    The New Hacker's Dictionary (Paperback, third edition): Eric S. Raymond The New Hacker's Dictionary (Paperback, third edition)
    Eric S. Raymond
    R1,825 Discovery Miles 18 250 Ships in 10 - 15 working days

    This new edition of the hacker's own phenomenally successful lexicon includes more than 100 new entries and updates or revises 200 more. This new edition of the hacker's own phenomenally successful lexicon includes more than 100 new entries and updates or revises 200 more. Historically and etymologically richer than its predecessor, it supplies additional background on existing entries and clarifies the murky origins of several important jargon terms (overturning a few long-standing folk etymologies) while still retaining its high giggle value. Sample definition hacker n. [originally, someone who makes furniture with an axe] 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. 2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming. 3. A person capable of appreciating {hack value}. 4. A person who is good at programming quickly. 5. An expert at a particular program, or one who frequently does work using it or on it; as in `a UNIX hacker'. (Definitions 1 through 5 are correlated, and people who fit them congregate.) 6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example. 7. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations. 8. [deprecated] A malicious meddler who tries to discover sensitive information by poking around. Hence `password hacker', `network hacker'. The correct term is {cracker}. The term 'hacker' also tends to connote membership in the global community defined by the net (see {network, the} and {Internet address}). It also implies that the person described is seen to subscribe to some version of the hacker ethic (see {hacker ethic, the}). It is better to be described as a hacker by others than to describe oneself that way. Hackers consider themselves something of an elite (a meritocracy based on ability), though one to which new members are gladly welcome. There is thus a certain ego satisfaction to be had in identifying yourself as a hacker (but if you claim to be one and are not, you'll quickly be labeled {bogus}). See also {wannabee}.

    Cybersecurity - The Essential Body Of Knowledge (Paperback, New edition): Dan Shoemaker, Wm. Conklin Cybersecurity - The Essential Body Of Knowledge (Paperback, New edition)
    Dan Shoemaker, Wm. Conklin
    R1,462 R1,346 Discovery Miles 13 460 Save R116 (8%) Ships in 10 - 15 working days

    CYBERSECURITY: THE ESSENTIAL BODY OF KNOWLEDGE provides a comprehensive, trustworthy framework of practices for assuring information security. This book is organized to help readers understand how the various roles and functions within cybersecurity practice can be combined and leveraged to produce a secure organization. In this unique book, concepts are not presented as stagnant theory; instead, the content is interwoven in a real world adventure story that runs throughout. In the story, a fictional company experiences numerous pitfalls of cyber security and the reader is immersed in the everyday practice of securing the company through various characters' efforts. This approach grabs learners' attention and assists them in visualizing the application of the content to real-world issues that they will face in their professional life. Derived from the Department of Homeland Security's Essential Body of Knowledge (EBK) for IT Security, this book is an indispensable resource dedicated to understanding the framework, roles, and competencies involved with information security.

    Sicherheit und Kryptographie im Internet - Theorie und Praxis (German, Paperback, 5., erw. u. akt. Aufl. 2020): Joerg Schwenk Sicherheit und Kryptographie im Internet - Theorie und Praxis (German, Paperback, 5., erw. u. akt. Aufl. 2020)
    Joerg Schwenk
    R1,829 Discovery Miles 18 290 Ships in 18 - 22 working days

    Das vorliegende Buch bietet eine strukturierte, gut lesbare Einfuhrung zu den wichtigsten Sicherheitsstandards im Internet. Hierzu zahlen bekannte Standards wie TLS, OpenPGP, S/MIME, SSH, IPsec und WPA, aber auch die versteckten Sicherheitsfeatures aus der Microsoft-Welt (PPTP, Kerberos), dem Mobilfunk, DNSSEC, Single-Sign-On-Protokollen und Datenformaten wie XML und JSON. Das Verstandnis fur diese Standards und deren Weiterentwicklung wird durch eine detaillierte Beschreibung der bekannten Angriffe vertieft, insbesondere fur TLS liegt hier umfangreiches Material vor. Die 5. Auflage wurde erheblich erweitert und aktualisiert. Neue Themen sind unter anderem die WLAN-Standards WPA2 und WPA3, die neue TLS-Version 1.3, Kerberos, Anti-SPAM-Techniken und moderne Single-Sign-On-Protokolle. Das Thema TLS wird voellig neu dargestellt, und die Kapitel zu E-Mail-Sicherheit und IPsec deutlich erweitert. Eine umfangreiche Einfuhrung in praktische Aspekte der Kryptographie macht dieses Buch ohne zusatzliche Literatur nutzbar.

    The Database Hacker's Handbook - Defending Database Servers (Paperback): D Litchfield The Database Hacker's Handbook - Defending Database Servers (Paperback)
    D Litchfield
    R1,149 R978 Discovery Miles 9 780 Save R171 (15%) Ships in 18 - 22 working days

    Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling-and relentless.
    In this essential follow-up to The Shellcoder's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. You'll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.
    * Identify and plug the new holes in Oracle and Microsoft(r) SQL Server
    * Learn the best defenses for IBM's DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers
    * Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access
    * Recognize vulnerabilities peculiar to each database
    * Find out what the attackers already know
    Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts, and programs available for download.

    Minoli-Cordovana's Authoritative Computer and Network Security Dictionary (Paperback): D Minoli Minoli-Cordovana's Authoritative Computer and Network Security Dictionary (Paperback)
    D Minoli
    R1,647 Discovery Miles 16 470 Ships in 18 - 22 working days

    A dictionary and handbook that defines the field and provides unique insight

    Turn to Minoli-Cordovana's Authoritative Computer and Network Security Dictionary for clear, concise, and up-to-date definitions of terms, concepts, methods, solutions, and tools in the field of computer and network security. About 5,555 security- and IT-related words and phrases are defined. Drawing their definitions from their work experience and from a variety of established and respected sources, the authors have created a single, up-to-the-minute, and standardized resource that users can trust for accuracy and authority.
    The dictionary is written for industry executives, managers, and planners who are charged with the responsibility of protecting their organizations from random, negligent, or planned attacks on their information technology resources. It not only defines terms, but also provides these professionals with critical insight into the terms' use and applicability in the field of IT security. Users can therefore refer to the dictionary as a handbook and guide to provide direction and support in all critical areas of computer and network security.
    Using a holistic approach, the dictionary takes a broad view of computer and network security, providing users with a single source that defines the complete field, including:
    * Definitions targeting the many resources that need to be protected, such as hosts, systems, OSs, databases, storage, information, communications links, communications network elements, clients, PCs, PDAs, VoIP devices, wireless access points and devices, Bluetooth systems, digital content, e-mail, and more
    * Definitions for a core set of general IT and networking topics and terms, focusing on recent threats such as worms, viruses, trojans, physical security, internally based attacks, and social engineering
    * Definitions for financial topics and terms that are connected to IT security issues, to support the business case for strong security mechanisms at the firm
    With the worldwide financial impact of malicious code estimated at roughly 100 billion dollars a year and the threat of ever-increasing vulnerabilities, this dictionary provides essential support to help identify and reduce security risks and protect network and computer users from hostile applicationsand viruses.

    Cryptography and Network Security: Principles and Practice, Global Edition (Paperback, 7th edition): William Stallings Cryptography and Network Security: Principles and Practice, Global Edition (Paperback, 7th edition)
    William Stallings
    R1,122 Discovery Miles 11 220 Ships in 4 - 6 working days

    For courses in Cryptography, Computer Security, and Network Security The Principles and Practice of Cryptography and Network Security Stallings' Cryptography and Network Security introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by a network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security: practical applications that have been implemented and are in use to provide network security. This edition streamlines subject matter with new and updated material - including Sage, one of the most important features of the book. Sage is an open-source, multiplatform, freeware package that implements a very powerful, flexible, and easily learned mathematics and computer algebra system. It provides hands-on experience with cryptographic algorithms and supporting homework assignments. With Sage, students learn a powerful tool that can be used for virtually any mathematical application. The book also provides an unparalleled degree of support for instructors and students to ensure a successful teaching and learning experience.

    Vorlesungen uber Informatik - Band 1: Grundlagen und funktionales Programmieren (German, Paperback, 4., uberarb. Aufl. 2006):... Vorlesungen uber Informatik - Band 1: Grundlagen und funktionales Programmieren (German, Paperback, 4., uberarb. Aufl. 2006)
    Gerhard Goos, Wolf Zimmermann
    R760 Discovery Miles 7 600 Ships in 18 - 22 working days

    Dieses Lehrbuch bietet eine fundierte Einfuhrung in die grundlegenden Begriffe und Methoden der Informatik. Die Autoren stellen dabei die Prinzipien der System-Modellierung und der Entwicklung von Software in den Mittelpunkt der Darstellung.

    Der hier vorliegende Band vermittelt die wesentlichen Grundbegriffe und theoretischen Grundlagen der Informatik, wie z.B. Algebren, Relationen, elementare Logik, funktionales Programmieren, abstrakte Datentypen. Die vierte Auflage des bewahrten Lehrbuches ist grundlegend uberarbeitet und aktualisiert worden.

    Der Text richtet sich an Studierende im Grundstudium an Universitaten und Fachhochschulen und basiert auf der langjahrigen Erfahrung der Autoren in der Ausbildung angehender Informatiker."

    Das MMIX-Buch - Ein Praxisnaher Zugang Zur Informatik (German, Hardcover, 2002 ed.): Heidi Anlauff, Axel Boettcher, Martin... Das MMIX-Buch - Ein Praxisnaher Zugang Zur Informatik (German, Hardcover, 2002 ed.)
    Heidi Anlauff, Axel Boettcher, Martin Ruckert
    R1,036 Discovery Miles 10 360 Ships in 18 - 22 working days

    Dieses Lehrbuch gibt eine praxisnahe Einfuhrung in die Informatik.
    Zunachst werden die Grundlagen der Kodierung und der Informationsdarstellung abgehandelt und Kontroll- und Datenstrukturen vorgestellt. Anschliessend werden Architekturmerkmale von Prozessoren (RISC und CISC) sowie Mechanismen der Systemsteuerung wie Pipelining und Interrupts erlautert. Es folgt eine Beschreibung der wichtigsten Funktionen eines Betriebssystems wie die Organisation von Prozessen und die Speicherverwaltung.
    Die Darstellung erfolgt mittels des Modellprozessors MMIX, der von Donald E. Knuth in seinem Standardwerk "The Art of Computer Programming" entwickelt wurde. Die Funktionsweise dieses Prozessors wird in einem eigenen Kapitel ausfuhrlich beschrieben. Ferner werden die Programmierumgebung des MMIX und seine Assemblersprache MMIXAL in erganzenden Anhangen zusammengestellt."

    IT-Sicherheit fur Dummies (German, Paperback): Rw Gerling IT-Sicherheit fur Dummies (German, Paperback)
    Rw Gerling
    R667 Discovery Miles 6 670 Ships in 10 - 15 working days
    Serious Cryptography - A Practical Introduction to Modern Encryption (Paperback): Jean-Philippe Aumasson Serious Cryptography - A Practical Introduction to Modern Encryption (Paperback)
    Jean-Philippe Aumasson
    R1,269 R821 Discovery Miles 8 210 Save R448 (35%) Ships in 10 - 15 working days

    Serious Cryptography is the much anticipated review of modern cryptography by cryptographer JP Aumasson. This is a book for readers who want to understand how cryptography works in today's world. The book is suitable for a wide audience, yet is filled with mathematical concepts and meaty discussions of how the various cryptographic mechanisms work. Chapters cover the notion of secure encryption, randomness, block ciphers and ciphers, hash functions and message authentication codes, public-key crypto including RSA, Diffie-Hellman, and elliptic curves, as well as TLS and post-quantum cryptography. Numerous code examples and real use cases throughout will help practitioners to understand the core concepts behind modern cryptography, as well as how to choose the best algorithm or protocol and ask the right questions of vendors. Aumasson discusses core concepts like computational security and forward secrecy, as well as strengths and limitations of cryptographic functionalities related to

    New Trends in Cryptographic Systems (Hardcover): Nadia Nedjah, Luiza Macedo Mourelle New Trends in Cryptographic Systems (Hardcover)
    Nadia Nedjah, Luiza Macedo Mourelle
    R5,441 R4,307 Discovery Miles 43 070 Save R1,134 (21%) Ships in 10 - 15 working days

    Cryptography is the study of methods to transform information from its original comprehensible form into a scrambled incomprehensible form, such that its content can only be disclosed to some qualified persons. In the past, cryptography helped ensure secrecy in important communications, such as those of spies, military leaders, and diplomats. In recent decades, it has expanded in two main ways: firstly, it provides mechanisms for more than just keeping secrets through schemes like digital signatures, digital cash, etc; secondly, cryptography is used by almost all computer users as it is embedded into the infrastructure for computing and telecommunications. Cryptography ensures secure communications through confidentiality, integrity, authenticity and non-repudiation. Cryptography has evolved over the years from Julius Cesar's cipher, which simply shifts the letters of the words a fixed number of times, to the sophisticated RSA algorithm, which was invented by Ronald L. Rivest, Adi Shamir and Leonard M. Adleman, and the elegant AES cipher (Advanced Encryption Standard), which was invented by Joan Daemen and Vincent Rijmen. The need for fast but secure cryptographic systems is growing bigger. Therefore, dedicated hardware for cryptography is becoming a key issue for designers. With the spread of reconfigurable hardware such as FPGAs, embedded cryptographic hardware became cost-effective. Nevertheless, it is worthy to note that nowadays, even hardwired cryptographic algorithms are not safe. Attacks based on power consumption and electromagnetic Analysis, such as SPA, DPA and EMA have been successfully used to retrieve secret information stored in cryptographic devices. Besides performance in terms of area and throughput, designer of embedded cryptographic hardware must worry about the leakage of their implementations. The content of this book is divided into three main parts, which are focused on new trends in cryptographic hardware, arithmetic and factoring.

    Quantum Blockchain: An Emerging Cryptographic Para digm (Hardcover): Dhana Raj Quantum Blockchain: An Emerging Cryptographic Para digm (Hardcover)
    Dhana Raj
    R4,536 Discovery Miles 45 360 Ships in 9 - 17 working days

    QUANTUM BLOCKCHAIN While addressing the security challenges and threats in blockchain, this book is also an introduction to quantum cryptography for engineering researchers and students in the realm of information security. Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. By utilizing unique quantum features of nature, quantum cryptography methods offer everlasting security. The applicability of quantum cryptography is explored in this book. It describes the state-of-the-art of quantum blockchain techniques and sketches how they can be implemented in standard communication infrastructure. Highlighting a wide range of topics such as quantum cryptography, quantum blockchain, post-quantum blockchain, and quantum blockchain in Industry 4.0, this book also provides the future research directions of quantum blockchain in terms of quantum resilience, data management, privacy issues, sustainability, scalability, and quantum blockchain interoperability. Above all, it explains the mathematical ideas that underpin the methods of post-quantum cryptography security. Readers will find in this book a comprehensiveness of the subject including: The key principles of quantum computation that solve the factoring issue. A discussion of a variety of potential post-quantum public-key encryption and digital signature techniques. Explanations of quantum blockchain in cybersecurity, healthcare, and Industry 4.0. Audience The book is for security analysts, data scientists, vulnerability analysts, professionals, academicians, researchers, industrialists, and students working in the fields of (quantum) blockchain, cybersecurity, cryptography, and artificial intelligence with regard to smart cities and Internet of Things.

    Security and Privacy in the Digital Era (Hardcover): C Guerrier Security and Privacy in the Digital Era (Hardcover)
    C Guerrier
    R3,762 Discovery Miles 37 620 Ships in 18 - 22 working days

    "The state, that must eradicate all feelings of insecurity, even potential ones, has been caught in a spiral of exception, suspicion and oppression that may lead to a complete disappearance of liberties." Mireille Delmas Marty, Libertes et surete dans un monde dangereux, 2010 This book will examine the security/freedom duo in space and time with regards to electronic communications and technologies used in social control. It will follow a diachronic path from the relative balance between philosophy and human rights, very dear to Western civilization (at the end of the 20th Century), to the current situation, where there seems to be less freedom in terms of security to the point that some scholars have wondered whether privacy should be redefined in this era. The actors involved (the Western states, digital firms, human rights organizations etc.) have seen their roles impact the legal and political science fields.

    Super Secreto - Verschlusselung fur alle - Abhoersicher in die Dritte Epoche der Kryptographie. (Tutorial- &... Super Secreto - Verschlusselung fur alle - Abhoersicher in die Dritte Epoche der Kryptographie. (Tutorial- & Taschenbuch-Ausgabe zur Einfuhrung in die streng-geheime Kommunikation und Derivative Kryptographie.) (German, Paperback)
    Theo Tenzer
    R787 Discovery Miles 7 870 Ships in 18 - 22 working days
    Computer and Information Security Handbook (Hardcover, 3rd edition): John Vacca Computer and Information Security Handbook (Hardcover, 3rd edition)
    John Vacca
    R3,126 R2,797 Discovery Miles 27 970 Save R329 (11%) Ships in 10 - 15 working days

    Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries. Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more. Online chapters can also be found on the book companion website: https://www.elsevier.com/books-and-journals/book-companion/9780128038437

    Verschlusseln, Signieren, Angreifen - Eine Kompakte Einfuhrung in Die Kryptografie (German, Paperback, 1. Aufl. 2019 ed.): Olaf... Verschlusseln, Signieren, Angreifen - Eine Kompakte Einfuhrung in Die Kryptografie (German, Paperback, 1. Aufl. 2019 ed.)
    Olaf Manz
    R805 Discovery Miles 8 050 Ships in 18 - 22 working days

    Dieses Buch erlautert kompakt, ohne theoretischen UEberbau und mit moeglichst wenig mathematischem Formalismus die wesentlichen Konzepte bei der Verschlusselung schutzenswerter Nachrichten und Daten. Hierbei liegt der Fokus auf der Beschreibung der historisch und fur die Praxis wichtigen Chiffrier-, Signatur- und Authentifikationsverfahren. Dabei wird sowohl auf symmetrische Verschlusselungen als auch auf Public-Key-Chiffren eingegangen. Angesprochen werden jeweils auch die Strategien, mit deren Hilfe man Verschlusselungen angreift und zu "knacken" versucht. Besonderer Wert gelegt wird auf die Darstellung des praktischen Einsatzes von Chiffren, insbesondere im alltaglichen Umfeld. Das Buch eignet sich fur Arbeitsgruppen an MINT-Schulen und die MINT-Lehrerfortbildung, fur Einfuhrungskurse an Hochschulen wie auch fur interessierte Schuler und Erwachsene.

    Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December... Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010, Proceedings (Paperback, Edition.)
    Guang Gong, Kishan Chand Gupta
    R1,430 Discovery Miles 14 300 Ships in 18 - 22 working days

    Strong Pseudorandompermutations or SPRPs,which were introduced byLuby andRacko? [4], formalize the well established cryptographic notion ofblock ciphers.They provided a construction of SPRP, well known as LRconstruction, which was motivated by the structure of DES[6].The basicbuildingblock is the so called 2n-bit Feistel permutation (or LR round permutation) LR based F K on an n-bitpseudorandomfunction (PRF) F : K n LR (x ,x)=(F (x )?x ,x ),x ,x?{0,1} . F 1 2 K 1 2 1 1 2 K Theirconstruction consists (see Fig 1) offour rounds of Feistel permutations (or three rounds, for PRP), each round involves an application ofanindependent PRF(i.e.with independentrandomkeys K ,K ,K , and K ). More precisely, 1 2 3 4 LR and LR are PRP and SPRP respectively where K ,K ,K K ,K ,K ,K 1 2 3 1 2 3 4 LR := LR := LR (...(LR (*))...). K ,...,K F ,...,F F F 1 r K K K K r r 1 1 After this work, many results are known improvingperformance (reducingthe number of invocations of F )[5] and reducingthekey-sizes (i.e. reusingthe K roundkeys [7,8,10,12,11] orgenerate more keysfromsinglekey by usinga PRF[2]). However there are some limitations.Forexample,wecannotuseas few as single-keyLR (unless wetweak the roundpermutation) orasfew as two-roundsince they are not secure. Distinguishing attacks forsome other LR constructionsarealso known [8]. We list some oftheknow related results (see Table 1). Here all keys K ,K ,...are independently chosen.

    Hardware-Based Computer Security Techniques to Defeat Hackers - From Biometrics to Quantum Cryptography (Hardcover): RR Dube Hardware-Based Computer Security Techniques to Defeat Hackers - From Biometrics to Quantum Cryptography (Hardcover)
    RR Dube
    R3,064 Discovery Miles 30 640 Ships in 18 - 22 working days

    Presents primary hardware-based computer security approaches in an easy-to-read toolbox format

    Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware-based security devices.

    This book provides a road map of the hardware-based security devices that can defeat--and prevent--attacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers:

    Cryptography

    Key generation and distribution

    The qualities of security solutions

    Secure co-processors

    Secure bootstrap loading

    Secure memory management and trusted execution technology

    Trusted Platform Module (TPM)

    Field Programmable Gate Arrays (FPGAs)

    Hardware-based authentification

    Biometrics

    Tokens

    Location technologies

    Hardware-Based Computer Security Techniques to Defeat Hackers includes a chapter devoted entirely to showing readers how they can implement the strategies and technologies discussed. Finally, it concludes with two examples of security systems put into practice.

    The information and critical analysis techniques provided in this user-friendly book are invaluable for a range of professionals, including IT personnel, computer engineers, computer security specialists, electrical engineers, software engineers, and industry analysts.

    Free Delivery
    Pinterest Twitter Facebook Google+
    You may like...
    Physical Changes in Matter Matter for…
    Baby Professor Hardcover R689 R613 Discovery Miles 6 130
    Implementations of Logic Programming…
    Evan Tick, Giancarlo Succi Hardcover R2,797 Discovery Miles 27 970
    Functional Structure in Morphology and…
    Peter Juul Nielsen Hardcover R5,842 Discovery Miles 58 420
    The Oxford Handbook of Pragmatics
    Yan Huang Hardcover R4,534 Discovery Miles 45 340
    Handbook of Open Source Tools
    Sandeep Koranne Hardcover R4,418 Discovery Miles 44 180
    Computational Finance Using C and C…
    George Levy Hardcover R1,972 R1,841 Discovery Miles 18 410
    Java - Practical Guide for Programmers
    Michael Sikora Paperback R1,050 Discovery Miles 10 500
    Distributed Services with Go - Your…
    Travis Jeffrey Paperback R907 Discovery Miles 9 070
    CCEA GCSE Chemistry
    Nora Henry, Alyn G. Mcfarland Paperback R1,029 Discovery Miles 10 290
    Gcse Chemistry Aqa Revision Guide…
    CGP Books Mixed media product  (1)
    R231 Discovery Miles 2 310

     

    Partners