0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (86)
  • R500+ (1,283)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

mCommerce Security:  A Beginner's Guide (Paperback): Kapil Raina, Anurag Harsh mCommerce Security: A Beginner's Guide (Paperback)
Kapil Raina, Anurag Harsh
R1,169 R1,003 Discovery Miles 10 030 Save R166 (14%) Ships in 18 - 22 working days

Learn to implement a solid mCommerce security plan--from start to finish

Many businesses today recognize mobile commerce--mCommerce--as a way to increase revenue and offer customers a new level of convenience. Mobile phones and PDAs can now be used for online banking, purchasing tickets, messaging, and much more. For any transaction, security is a top priority--and this becomes increasingly complex when wireless and mobile applications are involved. This practical introductory guide clearly explains different mCommerce applications and their associated security risks. Through case studies, you'll learn best practices for implementing specific security methods in key industries--including banking, retail, entertainment, military, travel, and healthcare. The book also contains 8 pages of blueprints that depict secure end-to-end mCommerce architecture as well as identify key vulnerability points.Explore the latest security topics for both business and consumer mCommerce applications Improve services offered to customers through secure mCommerce applications Get details on various types of mobile applications and understand their security risks--including commerce, payments, information, communications, gaming, and military Discover the differences between mobile versus wired security Address mobile security issues in key industries such as banking and finance, travel, manufacturing, entertainment, public services, and defense Recognize the time- and cost-saving benefits of secured mCommerce applications through comprehensive case studies Preview the security of future mobile applications--such as 3G/4G networks and wearable computers

PKI: Implementing & Managing E-Security (Paperback): Andrew Nash, Derek Brink, William Duane, Celia Joseph PKI: Implementing & Managing E-Security (Paperback)
Andrew Nash, Derek Brink, William Duane, Celia Joseph
R1,391 R1,164 Discovery Miles 11 640 Save R227 (16%) Ships in 18 - 22 working days

Written by the experts at RSA Security, this book will show you how to secure transactions and develop customer trust in e-commerce through the use of PKI technology. Part of the RSA Press Series.

Rethinking Public Key Infrastructures and Digital Certificates - Building in Privacy (Paperback): Stefan Brands Rethinking Public Key Infrastructures and Digital Certificates - Building in Privacy (Paperback)
Stefan Brands
R1,177 Discovery Miles 11 770 Ships in 18 - 22 working days

Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are already widely used for authenticating and encrypting email and software, and eventually will be built into any device or piece of software that must be able to communicate securely. There is a serious problem, however, with this unavoidable trend: unless drastic measures are taken, everyone will be forced to communicate via what will be the most pervasive electronic surveillance tool ever built. There will also be abundant opportunity for misuse of digital certificates by hackers, unscrupulous employees, government agencies, financial institutions, insurance companies, and so on.In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that. Furthermore, different actions by the same person cannot be linked. Certificate holders have control over what information is disclosed, and to whom. Subsets of the proposed cryptographic building blocks can be used in combination, allowing a cookbook approach to the design of public key infrastructures. Potential applications include electronic cash, electronic postage, digital rights management, pseudonyms for online chat rooms, health care information storage, electronic voting, and even electronic gambling.

At Large - The Strange Case of the World's Biggest Internet Invasion (Paperback, New Ed): Charles C Mann, David H. Freedman At Large - The Strange Case of the World's Biggest Internet Invasion (Paperback, New Ed)
Charles C Mann, David H. Freedman
R494 Discovery Miles 4 940 Ships in 18 - 22 working days

Hailed as "a chilling portrait" by The Boston Globe and "a crafty thriller" by Newsweek, this astonishing story of an obsessive hacker promises to change the way you look at the Internet forever.

At Large chronicles the massive manhunt that united hard-nosed FBI agents, computer nerds, and uptight security bureaucrats against an elusive computer outlaw who broke into highly secured computer systems at banks, universities, federal agencies, and top-secret military weapons-research sites. Here is "a real-life tale of cops vs. hackers, by two technology writers with a flair for turning a complicated crime and investigation into a fast-moving edge-of-your-seat story" (Kirkus Reviews, starred). At Large blows the lid off the frightening vulnerability of the global online network, which leaves not only systems, but also individuals, exposed.

The New Hacker's Dictionary (Paperback, third edition): Eric S. Raymond The New Hacker's Dictionary (Paperback, third edition)
Eric S. Raymond
R1,839 Discovery Miles 18 390 Ships in 10 - 15 working days

This new edition of the hacker's own phenomenally successful lexicon includes more than 100 new entries and updates or revises 200 more. This new edition of the hacker's own phenomenally successful lexicon includes more than 100 new entries and updates or revises 200 more. Historically and etymologically richer than its predecessor, it supplies additional background on existing entries and clarifies the murky origins of several important jargon terms (overturning a few long-standing folk etymologies) while still retaining its high giggle value. Sample definition hacker n. [originally, someone who makes furniture with an axe] 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. 2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming. 3. A person capable of appreciating {hack value}. 4. A person who is good at programming quickly. 5. An expert at a particular program, or one who frequently does work using it or on it; as in `a UNIX hacker'. (Definitions 1 through 5 are correlated, and people who fit them congregate.) 6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example. 7. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations. 8. [deprecated] A malicious meddler who tries to discover sensitive information by poking around. Hence `password hacker', `network hacker'. The correct term is {cracker}. The term 'hacker' also tends to connote membership in the global community defined by the net (see {network, the} and {Internet address}). It also implies that the person described is seen to subscribe to some version of the hacker ethic (see {hacker ethic, the}). It is better to be described as a hacker by others than to describe oneself that way. Hackers consider themselves something of an elite (a meritocracy based on ability), though one to which new members are gladly welcome. There is thus a certain ego satisfaction to be had in identifying yourself as a hacker (but if you claim to be one and are not, you'll quickly be labeled {bogus}). See also {wannabee}.

Cybersecurity - The Essential Body Of Knowledge (Paperback, New edition): Dan Shoemaker, Wm. Conklin Cybersecurity - The Essential Body Of Knowledge (Paperback, New edition)
Dan Shoemaker, Wm. Conklin
R1,462 R1,346 Discovery Miles 13 460 Save R116 (8%) Ships in 10 - 15 working days

CYBERSECURITY: THE ESSENTIAL BODY OF KNOWLEDGE provides a comprehensive, trustworthy framework of practices for assuring information security. This book is organized to help readers understand how the various roles and functions within cybersecurity practice can be combined and leveraged to produce a secure organization. In this unique book, concepts are not presented as stagnant theory; instead, the content is interwoven in a real world adventure story that runs throughout. In the story, a fictional company experiences numerous pitfalls of cyber security and the reader is immersed in the everyday practice of securing the company through various characters' efforts. This approach grabs learners' attention and assists them in visualizing the application of the content to real-world issues that they will face in their professional life. Derived from the Department of Homeland Security's Essential Body of Knowledge (EBK) for IT Security, this book is an indispensable resource dedicated to understanding the framework, roles, and competencies involved with information security.

The Art of Intrusion - The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (Paperback, New ed): KD Mitnick The Art of Intrusion - The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (Paperback, New ed)
KD Mitnick
R405 R369 Discovery Miles 3 690 Save R36 (9%) Ships in 9 - 17 working days

Hacker extraordinaire, Kevin Mitnick delivers the explosive encore to his bestselling "The Art of Deception". Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling "The Art of Deception", Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair raising stories of real life computer break ins and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him and whose exploits Mitnick now reveals in detail for the first time, including: a group of friends who won nearly a million dollars in Las Vegas by reverse engineering slot machines; two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems; two convicts who joined forces to become hackers inside a Texas prison; and, a "Robin Hood" hacker who penetrated the computer systems of many prominent companies and then told them how he gained access. With riveting "you are there" descriptions of real computer break ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience and attract the attention of both law enforcement agencies and the media.

Sicherheit und Kryptographie im Internet - Theorie und Praxis (German, Paperback, 5., erw. u. akt. Aufl. 2020): Joerg Schwenk Sicherheit und Kryptographie im Internet - Theorie und Praxis (German, Paperback, 5., erw. u. akt. Aufl. 2020)
Joerg Schwenk
R1,829 Discovery Miles 18 290 Ships in 18 - 22 working days

Das vorliegende Buch bietet eine strukturierte, gut lesbare Einfuhrung zu den wichtigsten Sicherheitsstandards im Internet. Hierzu zahlen bekannte Standards wie TLS, OpenPGP, S/MIME, SSH, IPsec und WPA, aber auch die versteckten Sicherheitsfeatures aus der Microsoft-Welt (PPTP, Kerberos), dem Mobilfunk, DNSSEC, Single-Sign-On-Protokollen und Datenformaten wie XML und JSON. Das Verstandnis fur diese Standards und deren Weiterentwicklung wird durch eine detaillierte Beschreibung der bekannten Angriffe vertieft, insbesondere fur TLS liegt hier umfangreiches Material vor. Die 5. Auflage wurde erheblich erweitert und aktualisiert. Neue Themen sind unter anderem die WLAN-Standards WPA2 und WPA3, die neue TLS-Version 1.3, Kerberos, Anti-SPAM-Techniken und moderne Single-Sign-On-Protokolle. Das Thema TLS wird voellig neu dargestellt, und die Kapitel zu E-Mail-Sicherheit und IPsec deutlich erweitert. Eine umfangreiche Einfuhrung in praktische Aspekte der Kryptographie macht dieses Buch ohne zusatzliche Literatur nutzbar.

The Database Hacker's Handbook - Defending Database Servers (Paperback): D Litchfield The Database Hacker's Handbook - Defending Database Servers (Paperback)
D Litchfield
R1,149 R978 Discovery Miles 9 780 Save R171 (15%) Ships in 18 - 22 working days

Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling-and relentless.
In this essential follow-up to The Shellcoder's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. You'll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.
* Identify and plug the new holes in Oracle and Microsoft(r) SQL Server
* Learn the best defenses for IBM's DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers
* Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access
* Recognize vulnerabilities peculiar to each database
* Find out what the attackers already know
Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts, and programs available for download.

Minoli-Cordovana's Authoritative Computer and Network Security Dictionary (Paperback): D Minoli Minoli-Cordovana's Authoritative Computer and Network Security Dictionary (Paperback)
D Minoli
R1,647 Discovery Miles 16 470 Ships in 18 - 22 working days

A dictionary and handbook that defines the field and provides unique insight

Turn to Minoli-Cordovana's Authoritative Computer and Network Security Dictionary for clear, concise, and up-to-date definitions of terms, concepts, methods, solutions, and tools in the field of computer and network security. About 5,555 security- and IT-related words and phrases are defined. Drawing their definitions from their work experience and from a variety of established and respected sources, the authors have created a single, up-to-the-minute, and standardized resource that users can trust for accuracy and authority.
The dictionary is written for industry executives, managers, and planners who are charged with the responsibility of protecting their organizations from random, negligent, or planned attacks on their information technology resources. It not only defines terms, but also provides these professionals with critical insight into the terms' use and applicability in the field of IT security. Users can therefore refer to the dictionary as a handbook and guide to provide direction and support in all critical areas of computer and network security.
Using a holistic approach, the dictionary takes a broad view of computer and network security, providing users with a single source that defines the complete field, including:
* Definitions targeting the many resources that need to be protected, such as hosts, systems, OSs, databases, storage, information, communications links, communications network elements, clients, PCs, PDAs, VoIP devices, wireless access points and devices, Bluetooth systems, digital content, e-mail, and more
* Definitions for a core set of general IT and networking topics and terms, focusing on recent threats such as worms, viruses, trojans, physical security, internally based attacks, and social engineering
* Definitions for financial topics and terms that are connected to IT security issues, to support the business case for strong security mechanisms at the firm
With the worldwide financial impact of malicious code estimated at roughly 100 billion dollars a year and the threat of ever-increasing vulnerabilities, this dictionary provides essential support to help identify and reduce security risks and protect network and computer users from hostile applicationsand viruses.

Vorlesungen uber Informatik - Band 1: Grundlagen und funktionales Programmieren (German, Paperback, 4., uberarb. Aufl. 2006):... Vorlesungen uber Informatik - Band 1: Grundlagen und funktionales Programmieren (German, Paperback, 4., uberarb. Aufl. 2006)
Gerhard Goos, Wolf Zimmermann
R760 Discovery Miles 7 600 Ships in 18 - 22 working days

Dieses Lehrbuch bietet eine fundierte Einfuhrung in die grundlegenden Begriffe und Methoden der Informatik. Die Autoren stellen dabei die Prinzipien der System-Modellierung und der Entwicklung von Software in den Mittelpunkt der Darstellung.

Der hier vorliegende Band vermittelt die wesentlichen Grundbegriffe und theoretischen Grundlagen der Informatik, wie z.B. Algebren, Relationen, elementare Logik, funktionales Programmieren, abstrakte Datentypen. Die vierte Auflage des bewahrten Lehrbuches ist grundlegend uberarbeitet und aktualisiert worden.

Der Text richtet sich an Studierende im Grundstudium an Universitaten und Fachhochschulen und basiert auf der langjahrigen Erfahrung der Autoren in der Ausbildung angehender Informatiker."

Das MMIX-Buch - Ein Praxisnaher Zugang Zur Informatik (German, Hardcover, 2002 ed.): Heidi Anlauff, Axel Boettcher, Martin... Das MMIX-Buch - Ein Praxisnaher Zugang Zur Informatik (German, Hardcover, 2002 ed.)
Heidi Anlauff, Axel Boettcher, Martin Ruckert
R1,036 Discovery Miles 10 360 Ships in 18 - 22 working days

Dieses Lehrbuch gibt eine praxisnahe Einfuhrung in die Informatik.
Zunachst werden die Grundlagen der Kodierung und der Informationsdarstellung abgehandelt und Kontroll- und Datenstrukturen vorgestellt. Anschliessend werden Architekturmerkmale von Prozessoren (RISC und CISC) sowie Mechanismen der Systemsteuerung wie Pipelining und Interrupts erlautert. Es folgt eine Beschreibung der wichtigsten Funktionen eines Betriebssystems wie die Organisation von Prozessen und die Speicherverwaltung.
Die Darstellung erfolgt mittels des Modellprozessors MMIX, der von Donald E. Knuth in seinem Standardwerk "The Art of Computer Programming" entwickelt wurde. Die Funktionsweise dieses Prozessors wird in einem eigenen Kapitel ausfuhrlich beschrieben. Ferner werden die Programmierumgebung des MMIX und seine Assemblersprache MMIXAL in erganzenden Anhangen zusammengestellt."

Quantum Blockchain: An Emerging Cryptographic Para digm (Hardcover): Dhana Raj Quantum Blockchain: An Emerging Cryptographic Para digm (Hardcover)
Dhana Raj
R4,536 Discovery Miles 45 360 Ships in 9 - 17 working days

QUANTUM BLOCKCHAIN While addressing the security challenges and threats in blockchain, this book is also an introduction to quantum cryptography for engineering researchers and students in the realm of information security. Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. By utilizing unique quantum features of nature, quantum cryptography methods offer everlasting security. The applicability of quantum cryptography is explored in this book. It describes the state-of-the-art of quantum blockchain techniques and sketches how they can be implemented in standard communication infrastructure. Highlighting a wide range of topics such as quantum cryptography, quantum blockchain, post-quantum blockchain, and quantum blockchain in Industry 4.0, this book also provides the future research directions of quantum blockchain in terms of quantum resilience, data management, privacy issues, sustainability, scalability, and quantum blockchain interoperability. Above all, it explains the mathematical ideas that underpin the methods of post-quantum cryptography security. Readers will find in this book a comprehensiveness of the subject including: The key principles of quantum computation that solve the factoring issue. A discussion of a variety of potential post-quantum public-key encryption and digital signature techniques. Explanations of quantum blockchain in cybersecurity, healthcare, and Industry 4.0. Audience The book is for security analysts, data scientists, vulnerability analysts, professionals, academicians, researchers, industrialists, and students working in the fields of (quantum) blockchain, cybersecurity, cryptography, and artificial intelligence with regard to smart cities and Internet of Things.

Security and Privacy in the Digital Era (Hardcover): C Guerrier Security and Privacy in the Digital Era (Hardcover)
C Guerrier
R3,762 Discovery Miles 37 620 Ships in 18 - 22 working days

"The state, that must eradicate all feelings of insecurity, even potential ones, has been caught in a spiral of exception, suspicion and oppression that may lead to a complete disappearance of liberties." Mireille Delmas Marty, Libertes et surete dans un monde dangereux, 2010 This book will examine the security/freedom duo in space and time with regards to electronic communications and technologies used in social control. It will follow a diachronic path from the relative balance between philosophy and human rights, very dear to Western civilization (at the end of the 20th Century), to the current situation, where there seems to be less freedom in terms of security to the point that some scholars have wondered whether privacy should be redefined in this era. The actors involved (the Western states, digital firms, human rights organizations etc.) have seen their roles impact the legal and political science fields.

Super Secreto - Verschlusselung fur alle - Abhoersicher in die Dritte Epoche der Kryptographie. (Tutorial- &... Super Secreto - Verschlusselung fur alle - Abhoersicher in die Dritte Epoche der Kryptographie. (Tutorial- & Taschenbuch-Ausgabe zur Einfuhrung in die streng-geheime Kommunikation und Derivative Kryptographie.) (German, Paperback)
Theo Tenzer
R787 Discovery Miles 7 870 Ships in 18 - 22 working days
Computer and Information Security Handbook (Hardcover, 3rd edition): John Vacca Computer and Information Security Handbook (Hardcover, 3rd edition)
John Vacca
R3,126 R2,797 Discovery Miles 27 970 Save R329 (11%) Ships in 10 - 15 working days

Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries. Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more. Online chapters can also be found on the book companion website: https://www.elsevier.com/books-and-journals/book-companion/9780128038437

Verschlusseln, Signieren, Angreifen - Eine Kompakte Einfuhrung in Die Kryptografie (German, Paperback, 1. Aufl. 2019 ed.): Olaf... Verschlusseln, Signieren, Angreifen - Eine Kompakte Einfuhrung in Die Kryptografie (German, Paperback, 1. Aufl. 2019 ed.)
Olaf Manz
R805 Discovery Miles 8 050 Ships in 18 - 22 working days

Dieses Buch erlautert kompakt, ohne theoretischen UEberbau und mit moeglichst wenig mathematischem Formalismus die wesentlichen Konzepte bei der Verschlusselung schutzenswerter Nachrichten und Daten. Hierbei liegt der Fokus auf der Beschreibung der historisch und fur die Praxis wichtigen Chiffrier-, Signatur- und Authentifikationsverfahren. Dabei wird sowohl auf symmetrische Verschlusselungen als auch auf Public-Key-Chiffren eingegangen. Angesprochen werden jeweils auch die Strategien, mit deren Hilfe man Verschlusselungen angreift und zu "knacken" versucht. Besonderer Wert gelegt wird auf die Darstellung des praktischen Einsatzes von Chiffren, insbesondere im alltaglichen Umfeld. Das Buch eignet sich fur Arbeitsgruppen an MINT-Schulen und die MINT-Lehrerfortbildung, fur Einfuhrungskurse an Hochschulen wie auch fur interessierte Schuler und Erwachsene.

Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December... Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010, Proceedings (Paperback, Edition.)
Guang Gong, Kishan Chand Gupta
R1,430 Discovery Miles 14 300 Ships in 18 - 22 working days

Strong Pseudorandompermutations or SPRPs,which were introduced byLuby andRacko? [4], formalize the well established cryptographic notion ofblock ciphers.They provided a construction of SPRP, well known as LRconstruction, which was motivated by the structure of DES[6].The basicbuildingblock is the so called 2n-bit Feistel permutation (or LR round permutation) LR based F K on an n-bitpseudorandomfunction (PRF) F : K n LR (x ,x)=(F (x )?x ,x ),x ,x?{0,1} . F 1 2 K 1 2 1 1 2 K Theirconstruction consists (see Fig 1) offour rounds of Feistel permutations (or three rounds, for PRP), each round involves an application ofanindependent PRF(i.e.with independentrandomkeys K ,K ,K , and K ). More precisely, 1 2 3 4 LR and LR are PRP and SPRP respectively where K ,K ,K K ,K ,K ,K 1 2 3 1 2 3 4 LR := LR := LR (...(LR (*))...). K ,...,K F ,...,F F F 1 r K K K K r r 1 1 After this work, many results are known improvingperformance (reducingthe number of invocations of F )[5] and reducingthekey-sizes (i.e. reusingthe K roundkeys [7,8,10,12,11] orgenerate more keysfromsinglekey by usinga PRF[2]). However there are some limitations.Forexample,wecannotuseas few as single-keyLR (unless wetweak the roundpermutation) orasfew as two-roundsince they are not secure. Distinguishing attacks forsome other LR constructionsarealso known [8]. We list some oftheknow related results (see Table 1). Here all keys K ,K ,...are independently chosen.

Hardware-Based Computer Security Techniques to Defeat Hackers - From Biometrics to Quantum Cryptography (Hardcover): RR Dube Hardware-Based Computer Security Techniques to Defeat Hackers - From Biometrics to Quantum Cryptography (Hardcover)
RR Dube
R3,064 Discovery Miles 30 640 Ships in 18 - 22 working days

Presents primary hardware-based computer security approaches in an easy-to-read toolbox format

Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware-based security devices.

This book provides a road map of the hardware-based security devices that can defeat--and prevent--attacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers:

Cryptography

Key generation and distribution

The qualities of security solutions

Secure co-processors

Secure bootstrap loading

Secure memory management and trusted execution technology

Trusted Platform Module (TPM)

Field Programmable Gate Arrays (FPGAs)

Hardware-based authentification

Biometrics

Tokens

Location technologies

Hardware-Based Computer Security Techniques to Defeat Hackers includes a chapter devoted entirely to showing readers how they can implement the strategies and technologies discussed. Finally, it concludes with two examples of security systems put into practice.

The information and critical analysis techniques provided in this user-friendly book are invaluable for a range of professionals, including IT personnel, computer engineers, computer security specialists, electrical engineers, software engineers, and industry analysts.

Defending the Digital Frontier - Practical Security for Management 2e (Hardcover, 2nd Edition): J Babiak Defending the Digital Frontier - Practical Security for Management 2e (Hardcover, 2nd Edition)
J Babiak
R781 Discovery Miles 7 810 Ships in 18 - 22 working days

Defending the Digital Frontier

Second Edition

"The book recognizes, and correctly characterizes, digital security according to one of the fundamental tenets of IT governance: security, like IT governance, is a management issue, not a technical one. This book takes a very practical approach to a critical issue, and provides executive management with sound, cost-effective techniques grounded in business realities. Management and the C-suite will do well to keep these techniques in mind when formulating IT strategies that are aligned with and support business goals."
--Marios Damianides
CISA, CISM, CPA, CA, International President, Information Systems Audit and Control Association and IT Governance Institute

"Ernst & Young has done a superb job in demonstrating why the integrity of Digital Information Systems is fundamental to success. The authors show that protecting computers from attack is only a small part of this task. This book focuses on handling systemic risk and complexity--the inevitable problems that arise when you integrate computerized information systems with human activity systems: namely the company itself, customers, suppliers, competitors, as well as the broader political and regulatory environment. I can recommend it as essential reading to all senior executives."
--Ian Angell
Professor of Information Systems, London School of Economics

"The CBI considers security of information to be a major issue for individuals and businesses in the growing digital world. This book makes clear, that the key to success in this new environment is in using technology effectively--technology cannot make a badly organised business good, but it can make agood business better. Ernst & Young has identified critical organisational and management processes that global companies need to implement to ensure that technology effectively secures information assets that are at the heart of today's economy."
--Digby Jones
Director General, CBI

Einfuhrung in Die Quanteninformatik - Quantenkryptografie, Teleportation Und Quantencomputing (German, Paperback, 2011 ed.):... Einfuhrung in Die Quanteninformatik - Quantenkryptografie, Teleportation Und Quantencomputing (German, Paperback, 2011 ed.)
Gilbert Brands
R1,307 Discovery Miles 13 070 Ships in 18 - 22 working days

Ausgehend von der Theorie und den Protokollen der Quantenkryptografie werden in dem Band die Servicequalitaten vorgestellt, die angesichts der aktuellen technischen Moeglichkeiten erreichbar sind. Unter Berucksichtigung wenig beachteter Gesichtspunkte der Kryptoanalyse diskutiert der Autor die erreichbare Sicherheit und untersucht die Moeglichkeiten des Quantencomputing. Anhand praxisnaher Aufgaben koennen Leser ihr Wissen vertiefen und lernen, die Techniken kritisch zu bewerten. Mit Programmieranleitung fur Simulationsversuche auf dem eigenen Rechner.

Digitalization and Control of Industrial Cyber-Physical Systems: Concepts, Technologies and Applications (Hardcover): Cardin Digitalization and Control of Industrial Cyber-Physical Systems: Concepts, Technologies and Applications (Hardcover)
Cardin
R3,510 Discovery Miles 35 100 Ships in 18 - 22 working days

Industrial cyber-physical systems operate simultaneously in the physical and digital worlds of business and are now a cornerstone of the fourth industrial revolution. Increasingly, these systems are becoming the way forward for academics and industrialists alike. The very essence of these systems, however, is often misunderstood or misinterpreted. This book thus sheds light on the problem areas surrounding cyber-physical systems and provides the reader with the key principles for understanding and illustrating them. Presented using a pedagogical approach, with numerous examples of applications, this book is the culmination of more than ten years of study by the Intelligent Manufacturing and Services Systems (IMS2) French research group, part of the MACS (Modeling, Analysis and Control of Dynamic Systems) research group at the CNRS. It is intended both for engineers who are interested in emerging industrial developments and for master's level students wishing to learn about the industrial systems of the future.

The United States of Anonymous - How the First Amendment Shaped Online Speech (Hardcover): Jeff Kosseff The United States of Anonymous - How the First Amendment Shaped Online Speech (Hardcover)
Jeff Kosseff
R616 R550 Discovery Miles 5 500 Save R66 (11%) Ships in 18 - 22 working days

In The United States of Anonymous, Jeff Kosseff explores how the right to anonymity has shaped American values, politics, business, security, and discourse, particularly as technology has enabled people to separate their identities from their communications. Legal and political debates surrounding online privacy often focus on the Fourth Amendment's protection against unreasonable searches and seizures, overlooking the history and future of an equally powerful privacy right: the First Amendment's protection of anonymity. The United States of Anonymous features extensive and engaging interviews with people involved in the highest profile anonymity cases, as well as with those who have benefited from, and been harmed by, anonymous communications. Through these interviews, Kosseff explores how courts have protected anonymity for decades and, likewise, how law and technology have allowed individuals to control how much, if any, identifying information is associated with their communications. From blocking laws that prevent Ku Klux Klan members from wearing masks to restraining Alabama officials from forcing the NAACP to disclose its membership lists, and to refusing companies' requests to unmask online critics, courts have recognized that anonymity is a vital part of our free speech protections. The United States of Anonymous weighs the tradeoffs between the right to hide identity and the harms of anonymity, concluding that we must maintain a strong, if not absolute, right to anonymous speech.

NFT per Programmatori - Mini corso per programmatori e startup (Italian, Paperback): Gian Angelo Geminiani NFT per Programmatori - Mini corso per programmatori e startup (Italian, Paperback)
Gian Angelo Geminiani
R686 Discovery Miles 6 860 Ships in 18 - 22 working days
Hacking - 2 B cher in 1: Der Vollst ndige Anf ngerleitfaden Zum Erlernen Ethischen Hackens Mit Python Und Praktischen... Hacking - 2 B cher in 1: Der Vollst ndige Anf ngerleitfaden Zum Erlernen Ethischen Hackens Mit Python Und Praktischen Beispielen & Der Anf nger Leitfaden F r Computer Hacking Und Penetration Testen (German, Paperback)
Miles Price
R593 Discovery Miles 5 930 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Philosophy Of Education Today - An…
P Higgs, M. Letseka Paperback R144 Discovery Miles 1 440
Cross-linguistic Influences in…
Danuta Gabrys-Barker Hardcover R4,018 Discovery Miles 40 180
The Nature of the Industrial Innovation…
Gunnar H Sohlenius Hardcover R2,843 Discovery Miles 28 430
Enhancing Learning and Teaching Through…
Chenicheri Sid Nair, Arun Patil, … Paperback R1,320 Discovery Miles 13 200
Sociocultural Theory and L2…
Remi A. van Compernolle Hardcover R3,012 Discovery Miles 30 120
Relabeling in Language Genesis
Claire Lefebvre Hardcover R3,843 Discovery Miles 38 430
Innovative Approaches in Teaching…
Barry Lee Reynolds, (Mark) Feng Teng Hardcover R3,458 Discovery Miles 34 580
Creole Languages and Language…
Herman Wekker Hardcover R3,340 Discovery Miles 33 400
Practical guide to facilitating language…
M. Wessels Paperback  (2)
R569 Discovery Miles 5 690
Careers - An Organisational Perspective
Melinde Coetzee, Dries Schreuder Paperback R716 R653 Discovery Miles 6 530

 

Partners