![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
Privacy and Copyright protection is a very important issue in our digital society, where a very large amount of multimedia data are generated and distributed daily using different kinds of consumer electronic devices and very popular communication channels, such as the Web and social networks. This book introduces state-of-the-art technology on data hiding and copyright protection of digital images, and offers a solid basis for future study and research. Steganographic technique overcomes the traditional cryptographic approach, providing new solutions for secure data transmission without raising users' malicious intention. In steganography, some secret information can be inserted into the original data in imperceptible and efficient ways to avoid distortion of the image, and enhance the embedding capacity, respectively. Digital watermarking also adopts data hiding techniques for copyright protection and tampering verification of multimedia data. In watermarking, an illegitimate copy can be recognised by testing the presence of a valid watermark and a dispute on the ownership of the image resolved. Different kinds of steganographic and watermarking techniques, providing different features and diverse characteristics, have been presented in this book. This book provides a reference for theoretical problems as well as practical solutions and applications for steganography and watermarking techniques. In particular, both the academic community (graduate student, post-doc and faculty) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staff and managers, security managers) will find this book interesting.
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this practical book is for you. Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you have a working knowledge of cryptography. The book covers SSLv2, TLS 1.0, and TLS 1.2, including implementations of the relevant cryptographic protocols, secure hashing, certificate parsing, certificate generation, and more. Coverage includes: * Understanding Internet Security * Protecting against Eavesdroppers with Symmetric Cryptography * Secure Key Exchange over an Insecure Medium with Public Key Cryptography * Authenticating Communications Using Digital Signatures * Creating a Network of Trust Using X.509 Certificates * A Usable, Secure Communications Protocol: Client-Side TLS * Adding Server-Side TLS 1.0 Support * Advanced SSL Topics * Adding TLS 1.2 Support to Your TLS Library * Other Applications of SSL * A Binary Representation of Integers: A Primer * Installing TCPDump and OpenSSL * Understanding the Pitfalls of SSLv2 Set up and launch a working implementation of SSL with this practical guide.
Identity Matching ist die Grundlage fur die Suche mit und nach Personendaten. Und die betreibt heutzutage die ganze Welt: Banken suchen Geldwascher in ihren Kundendateien, Polizeibehoerden uberprufen Verdachtige mit ihren Registern und Privatpersonen stoebern alte Bekannte im Web auf. Mittels Identity Matching besorgen sich Studenten Fachartikel, Journalisten Nachrichten, Vermieter Bonitatsauskunfte und Verkaufer ihre nachsten Marketing-Opfer. Das Problem bisher ist: Sobald wir den Namen nicht genau so schreiben, wie er in der Quelle reprasentiert ist, finden wir ihn nicht. Jetzt hebt die Linguistik das Identity Matching auf ein neues Niveau. Mit dem Wissen uber Sprachen, Schriften und globale Namenskonventionen ist eine zugleich prazise und zuverlassige Personensuche moeglich. Dieses Buch beschreibt, was linguistisches Identity Matching ist, und gibt Ihnen praktische Tipps, wie auch Sie davon profitieren koennen.
Implement bulletproof Cisco security the battle-tested "Hacking Exposed" way. . Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. "Hacking Exposed Cisco Networks" shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised networks. All device-specific and network-centered security issues are covered alongside real-world examples, in-depth case studies, and detailed countermeasures. Its all here--from switch, router, firewall, wireless, and VPN vulnerabilities to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. Youll prevent tomorrows catastrophe by learning how new flaws in Cisco-centered networks are discovered and abused by cyber-criminals. Plus, youll get undocumented Cisco commands, security evaluation templates, and vital security tools from hackingexposedcisco.com.. . . Use the tried-and-true "Hacking Exposed" methodology to find, exploit, and plug security holes in Cisco devices and networks. Locate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning. Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels . Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities. Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers. Find out how IOS exploits are written and if a Cisco router can be used as an attack platform. Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR. Prevent secret keys cracking, sneakydata link attacks, routing protocol exploits, and malicious physical access. . . .
A case-based approach to cryptanalysis that explains how and why attacks can happen Applied Cryptanalysis focuses on practical attacks on real-world ciphers. Using detailed case studies, the authors demonstrate how modern cryptographic systems are broken, and they do so with a minimum of complex mathematics and technical jargon. All major classes of attacks are covered, providing IT professionals with the knowledge necessary for effective security implementation within their organizations. Each chapter concludes with a series of problems that enables the reader to practice and fine-tune their own cryptanalysis skills. Applied Cryptanalysis can serve as a textbook for a cryptanalysis course or for independent study. The text is organized around four major themes: Classic Crypto offers an overview of a few classical cryptosystems, introducing and illustrating the basic principles, concepts, and vocabulary. The authors then cover World War II cipher machines, specifically the German Enigma, Japanese Purple, and American Sigaba. Symmetric Ciphers analyzes shift registers and correlation attacks, as well as attacks on three specific stream ciphers: ORYX, RC4 (as used in WEP), and PKZIP. In addition, block ciphers are studied: Hellman's Time-Memory Trade-Off attack is discussed and three specific block ciphers are analyzed in detail (CMEA, Akelarre, and FEAL). Hash Functions presents hash function design, birthday attacks, and the "Nostradamus" attack. Then the MD4 attack is examined, which serves as a precursor for the authors' highly detailed analysis of the recent attack on MD5. Public Key Crypto includes an overview of several public key cryptosystems including theknapsack, Diffie-Hellman, Arithmetica, RSA, Rabin cipher, NTRU, and ElGamal. Factoring and discrete log attacks are analyzed, and the recent timing attacks on RSA are discussed in detail. Clear and concise, this practical case-based approach to cryptanalysis is a valuable and timely resource.
The term 'spyware' is not well defined. Generally it is used to refer to any software that is downloaded onto a person's computer without their knowledge. Spyware may collect information about a computer user's activities and transmit that information to someone else. It may change computer settings, or cause 'pop-up' advertisements to appear (in that context, it is called 'adware'). Spyware may redirect a Web browser to a site different from what the user intended to visit, or change the user's home page. A type of spyware called 'keylogging' software records individual keystrokes, even if the author modifies or deletes what was written, or if the characters do not appear on the monitor. Thus, passwords, credit card numbers, and other personally identifiable information may be captured and relayed to unauthorised recipients. Some of these software programs have legitimate applications the computer user wants. They obtain the moniker 'spyware' when they are installed surreptitiously, or perform additional functions of which the user is unaware. Users typically do not realise that spyware is on their computer. They may have unknowingly downloaded it from the Internet by clicking within a website, or it might have been included in an attachment to an electronic mail message (e-mail) or embedded in other software. According to a survey and tests conducted by America Online and the National Cyber Security Alliance, 80% of computers in the test group were infected by spyware or adware, and 89% of the users of those computers were unaware of it. The Federal Trade Commission (FTC) issued a consumer alert on spyware in October 2004. It provided a list of warning signs that might indicate that a computer is infected with spyware, and advice on what to do if it is. This new book helps shed light on this insidious nightmare created by members of the human race to wreck havoc on the remainder.
From the exclusive publishers of Oracle Press Books, here is the only book available offering complete coverage of RMAN (Recovery Manager), Oracle’s free backup and recovery technology. An indispensable resource for new Oracle users, database administrators, and system administrators.
The historic European Union Directive on Data Protection will take effect in October 1998. A key provision will prohibit transfer of personal information from Europe to other countries if they lack "adequate" protection of privacy. If enforced as written, the Directive could create enormous obstacles to commerce between Europe and other countries, such as the United States, that do not have comprehensive privacy statutes. In this book, Peter Swire and Robert Litan provide the first detailed analysis of the sector-by-sector effects of the Directive. They examine such topics as the text of the Directive, the tension between privacy laws and modern information technologies, issues affecting a wide range of businesses and other organizations, effects on the financial services sector, and effects on other prominent sectors with large transborder data flows. In light of the many and significant effects of the Directive as written, the book concludes with detailed policy recommendations on how to avoid a coming trade war with Europe. The book will be of interest to the wide range of individuals and organizations affected by the important new European privacy laws. More generally, the privacy clash discussed in the book will prove a major precedent for how electronic commerce and world data flows will be governed in the Internet Age.
Maintaining the high standards of prior editions, Security Analysis puts at your fingertips the authoritative guidance on analyzing securities that generations of investment bankers have come to rely on.
In recent years, a considerable amount of effort has been devoted, both in industry and academia, towards the design, performance analysis and evaluation of modulation schemes to be used in wireless and optical networks, towards the development of the next and future generations of mobile cellular communication systems. Modulation Theory is intended to serve as a complementary textbook for courses dealing with Modulation Theory or Communication Systems, but also as a professional book, for engineers who need to update their knowledge in the communications area. The modulation aspects presented in the book use modern concepts of stochastic processes, such as autocorrelation and power spectrum density, which are novel for undergraduate texts or professional books, and provides a general approach for the theory, with real life results, applied to professional design. This text is suitable for the undergraduate as well as the initial graduate levels of Electrical Engineering courses, and is useful for the professional who wants to review or get acquainted with the a modern exposition of the modulation theory. The book covers signal representations for most known waveforms, Fourier analysis, and presents an introduction to Fourier transform and signal spectrum, including the concepts of convolution, autocorrelation and power spectral density, for deterministic signals. It introduces the concepts of probability, random variables and stochastic processes, including autocorrelation, cross-correlation, power spectral and cross-spectral densities, for random signals, and their applications to the analysis of linear systems. This chapter also includes the response of specific non-linear systems, such as power amplifiers. The book presents amplitude modulation with random signals, including analog and digital signals, and discusses performance evaluation methods, presents quadrature amplitude modulation using random signals. Several modulation schemes are discussed, including SSB, QAM, ISB, C-QUAM, QPSK and MSK. Their autocorrelation and power spectrum densities are computed. A thorough discussion on angle modulation with random modulating signals, along with frequency and phase modulation, and orthogonal frequency division multiplexing is provided. Their power spectrum densities are computed using the Wiener-Khintchin theorem.
Cybersecurity could be defined as, beginning of the concept of trust and belief in cyber transactions. The era of computing began in the 20th century, with an enormous investment on computational research. Software programing languages were the foundational blocks of history of computing. Progressive research then led to networking, bringing about the formation of connectivity. Along with these creations, there was an accompanying factor of compromise on data privacy and hacking of data. This factor was the introduction to cyber security. This book is primarily created for the objective of knowledge sharing and knowledge-enabling on the conceptual ideologies of the cybersecurity. This book is aimed at students, early-career researchers, and also advanced researchers and professionals. The case studies described in the book create renewed knowledge on the innovations built on the applied theories of cybersecurity. These case studies focus on the financial markets and space technologies.
Providing the perfect blend of basic security theory and practical software security programming, Software Security Technologies: A Programmatic Approach offers a valuable introduction to the field of software security. Divided into three parts, this comprehensive guide encourages readers to master their security skills by building on the basics. The first section of the book is devoted to fundamental security theories that govern common software security technical issues. Coverage then progresses to a focus on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. Using these theories and programming practices as a foundation, the book concludes with a section on security in practice, demonstrating how the conceptual and practical materials covered in the first two sections are applied in real-world scenarios. All of these topics are explained using a straightforward approach, so that readers can grasp the information quickly and easily, gaining the confidence they need to further develop their skills in software security technologies.
Discover a managerially-focused overview of information security with a thorough presentation of how to most effectively administer it with MANAGEMENT OF INFORMATION SECURITY, 5E. Insightful, engaging content prepares you to become an information security management practitioner able to secure systems and networks in a world where continuously emerging threats, ever-present attacks, and the success of criminals illustrate the weaknesses in current information technologies. You'll develop both the information security skills and practical experience that organizations are looking for as they strive to ensure more secure computing environments. This edition offers a tightened focus on key executive and managerial aspects of information security while still emphasizing the foundational material to reinforce key concepts. Updated content reflects the most recent developments in the field, including NIST, ISO, and security governance. |
You may like...
Perspectives on Web Services - Applying…
Olaf Zimmermann, Mark Tomlinson, …
Hardcover
Assembly Language Using the Raspberry Pi…
Robert Dunne
Hardcover
Underlying Standards that Support…
Laura Bright, Johanna Goderre
Paperback
R1,103
Discovery Miles 11 030
XML in Data Management - Understanding…
Peter Aiken, M. David Allen
Paperback
R1,150
Discovery Miles 11 500
Rational Decisions in Organisations…
Frederic Adam, Dorota Kuchta, …
Paperback
R1,498
Discovery Miles 14 980
|