0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (14)
  • R250 - R500 (89)
  • R500+ (1,357)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Stealing The Network - How to Own the Box (Paperback): Syngress Stealing The Network - How to Own the Box (Paperback)
Syngress
R1,715 Discovery Miles 17 150 Ships in 10 - 15 working days

"Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems.
Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness accounts
A highly provocative expose of advanced security exploits
Written by some of the most high profile "White Hats," "Black Hats" and "Gray Hats"
Gives readers a "first ever" look inside some of the most notorious network intrusions

IIS Security (Paperback): Marty Jost IIS Security (Paperback)
Marty Jost
R1,526 R1,273 Discovery Miles 12 730 Save R253 (17%) Ships in 10 - 15 working days

Protect your IIS server with help from this authoritative book. Covering all basic security tools that come with IIS -- and explaining their weaknesses -- this complete guide shows you how to utilize encryption, authorization, filtering, and other restrictive techniques to protect against attacks and other security violations.

The Manager's Handbook for Corporate Security - Establishing and Managing a Successful Assets Protection Program... The Manager's Handbook for Corporate Security - Establishing and Managing a Successful Assets Protection Program (Hardcover)
Gerald L. Kovacich, Edward Halibozek
R2,665 Discovery Miles 26 650 Ships in 10 - 15 working days

Kovacich and Halibozek offer you the benefit of more than 55 years of combined experience in government and corporate security. Throughout the book, the authors use a fictional global corporation as a model to provide continual real-world challenges and solutions. New and experienced managers alike will find a wealth of information and practical advice to help you develop strategic and tactical plans and manage your daily operations.
* Contains real case examples to illustrate practical application of concepts
* Thoroughly covers the integration of physical, computer and information security goals for complete security awareness
* A handy reference for managers to quickly find and implement the security solutions they need

Implementing Intrusion Detection Systems - A Hands -On Guide for Securing the Network (Paperback): T Crothers Implementing Intrusion Detection Systems - A Hands -On Guide for Securing the Network (Paperback)
T Crothers
R1,324 R1,104 Discovery Miles 11 040 Save R220 (17%) Ships in 10 - 15 working days

* Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective
* Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS
* Features coverage of the recently revised IETF IDS specification
* Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling
* Provides step-by-step instructions for configuration procedures

Annotation for the Semantic Web (Hardcover): S. Handschuh, S. Staab Annotation for the Semantic Web (Hardcover)
S. Handschuh, S. Staab
R2,880 Discovery Miles 28 800 Ships in 10 - 15 working days

The Semantic Web aims at machine agents that thrive on explicitly specified semantics of content in order to search, filter, condense, or negotiate knowledge for their human users. A core technology for making the Semantic Web happen, but also to leverage application areas like Knowledge Management and E-Business, is the field of Semantic Annotation, which turns human-understandable content into a machine understandable form. This book reports on the broad range of technologies that are used to achieve this translation and nourish 3rd millennium applications. The book starts with a survey of the oldest semantic annotations, viz. indexing of publications in libraries. It continues with several techniques for the explicit construction of semantic annotations, including approaches for collaboration and Semantic Web metadata. One of the major means for improving the semantic annotation task is information extraction and much can be learned from the semantic tagging of linguistic corpora. In particular, information extraction is gaining prominence for automating the formerly purely manual annotation task - at least to some extent.An important subclass of information extraction tasks is the goal-oriented extraction of content from HTML and / or XML resources.

Checkpoint Next Generation Security Administration (Paperback): Syngress Checkpoint Next Generation Security Administration (Paperback)
Syngress
R2,065 Discovery Miles 20 650 Ships in 10 - 15 working days

Unparalleled security management that IT professionals have been waiting for.
Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. CheckPoint recently announced a ground-breaking user interface that meets the computer industry's Internet security requirements. The Next Generation User Interface is easy to use and offers unparalleled security management capabilities by creating a visual picture of security operations.
CheckPoint Next Generation Security Administration will be a comprehensive reference to CheckPoint's newest suite of products and will contain coverage of: Next Generation User Interface, Next Generation Management, Next Generation Performance, Next Generation VPN Clients, and Next Generation Systems.
CheckPoint are a company to watch, they have captured over 50% of the VPN market and over 40% of the firewall market according to IDC Research
Over 29,000 IT professionals are CheckPont Certified
This is the first book to covers all components of CheckPoint's new suite of market-leading security products - it will be in demand
Understand NGX R65 Operational Changes:
SVN Architecture, New VPN-1 Features, Additional Features, VPN-1 Power VSX
Deploy SmartClients and SmartManagement:
SmartDashboard, SmartMap, SmartView Tracker, SmartView Monitor, SmartUpdate, SmartLSM, Secure Client Packaging Tool, Management Plug-Ins, Check Point Configuration/cpconfig
Drive the Management Portal:
A Tour of the Dashboard, What s New in SmartDashboard NGX, Your First Security Policy, Other Useful Controls on the Dashboard, Managing Connectra and Interspect Gateways, Smart Portal
Master Advanced Authentication:
Authentication Overview, Users and Administrators, SmartDirectory, User Authentication, Session Authentication, Client Authentication
Use Advanced VPN Concepts for Tunnel Monitoring:
Encryption Overview, VPN Communities, Policy-Based VPN, Route-Based VPN
Configure Advanced VPN Client Installations:
SecuRemote, Secure Client, Office Mode, Visitor Mode, Windows L2TP Integration, SSL Network Extender, Backup Gateways, Multiple Entry Point VPNs
Deploy and Configure SmartDefense:
Network Security, Application Intelligence, Web Intelligence
Get Inside Secure Platform:
Installation, Configuration, Secure Platform Shell, Secure Shell
Learn Advanced Troubleshooting Techniques:
NGX Debugging, Packet Analysis, Log Troubleshooting, VPN Analysis, VPN Client Analysis, ClusterXL Troubleshooting"

Hacker's Challenge (Paperback): Mike Schiffman Hacker's Challenge (Paperback)
Mike Schiffman
R964 R842 Discovery Miles 8 420 Save R122 (13%) Ships in 10 - 15 working days

"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.

Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and incident response skills with 20 real-world hacks presented by upper-echelon security experts. Important topics are covered, including Denial of Service, wireless technologies, Web attacks, and malicious code. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and possible clues, technical background such as log files and network maps, and a series of questions for you to solve. Then, in Part II, you get a detailed analysis of how the experts solved each incident.

Excerpt from "The Insider":

The Challenge:

Kris, a software company's senior I.T. staffer, got a call from the helpdesk....Users were complaining that the entire contents of their inbox, outbox, and deleted items folders had completely disappeared....The following Monday, Kris found that the entire Exchange database had been deleted....The attacker sent an email from a Yahoo! account taking responsibility for the attacks....The e-mail had been sent from a machine within the victim's network. Kris brought in an external security team who immediately began their investigation...In addition to gathering physical security logs, Microsoft Exchange logs, and virtual private network (VPN) logs they interviewed key people inside the company....

The Solution:

After reviewing the log files included in the challenge, propose your assessment--whendid the deletion of e-mail accounts begin and end, which users were connected to the VPN at the time, and what IP addresses were the users connecting from? Then, turn to the experts' answers to find out what really happened.

Contributing authors include:

Top security professionals from @stake, Foundstone, Guardent, The Honeynet Project, University of Washington, Fortrex Technologies, SecureMac.com, AnchorIS.com, and the National Guard Information Warfare unit.

Video Coding for Mobile Communications - Efficiency, Complexity and Resilience (Hardcover): Mohammed E. Al-Mualla, C. Nishan... Video Coding for Mobile Communications - Efficiency, Complexity and Resilience (Hardcover)
Mohammed E. Al-Mualla, C. Nishan Canagarajah, David R. Bull
R3,944 Discovery Miles 39 440 Ships in 10 - 15 working days

In order for wireless devices to function, the signals must be coded in standard ways so that the sender and the receiver can communicate. This area of video source coding is one of the key challenges in the worldwide push to deliver full video communications over wireless devices. This important new book reviews current progress in this field and looks at how to solve some of the most important technology issues in the months and years ahead.
The vision of being able to communicate from anywhere, at any time, and with any type of information is on its way to becoming reality. This natural convergence of mobile communications and multimedia is a field that is expected to achieve unprecedented growth and commercial success. Current wireless communication devices support a number of basic multimedia services (voice, messages, basic internet access), but have coding problems that need to be solved before "real-time" mobile video communication can be achieved.
Addresses the emerging field of mobile multimedia communications

A Guide to Data Compression Methods (Paperback, 2002): David Salomon A Guide to Data Compression Methods (Paperback, 2002)
David Salomon
R1,549 Discovery Miles 15 490 Ships in 10 - 15 working days

Many faces of modern computing - from archiving data to coding theory to image processing ż rely heavily on data compression. This new and practical guide explains the process of compressing all types of computer data, as well as the use of significant methods and algorithms. Its purpose is to succinctly describe both the principles underlying the field of data compression and how to use the key methods effectively. A Guide to Data Compression Methods concentrates on general concepts and methods and describes them with a minimal amount of mathematical detail. It presents the main approaches to data compression, describes the most important algorithms, and includes straightforward examples. Statistical, dictionary, and wavelet methodologies are addressed in specific chapters, as well as image, video, and audio compression. The reader can expect to gain a basic understanding of the key algorithms and methods used to compress data for storage and transmission. Topics and features: ż All core methods are clearly explained with realistic examples, and some computer code is included ż Accessible presentation, with only minimum computer and mathematics technical background ż Discussion of wavelet methods and JPEG 2000 ż Appendix lists all algorithms presented in the book ż CD-ROM included compromising computer code from the book and extensive public-domain compression utility programs This book is an invaluable practical reference and guide for all practitioners and professionals in computer science, software engineering, and programming.

Planning for PKI - Best Practices Guide for Deploying Public Key Infrastructure (Paperback): R Housley Planning for PKI - Best Practices Guide for Deploying Public Key Infrastructure (Paperback)
R Housley
R1,843 R1,292 Discovery Miles 12 920 Save R551 (30%) Out of stock

An in-depth technical guide to the security technology driving Internet e-commerce.

"Planning for PKI" examines this cornerstone Internet security technology. Written by two of the architects of the Internet PKI standards, this book provides authoritative technical guidance for network engineers, architects, and managers who need to implement the right PKI architecture for their organization. Readers will learn that building a successful PKI is an on going process, not a one-time event. The authors discuss results and lessons learned from three early PKI deployments, helping readers avoid the pitfalls and emulate the successes of early PKI adopters.

Using plain and direct language, the authors share their extensive knowledge of PKI standards development in the Internet Engineering Task Force (IETF) and elsewhere. Subtle points about the Internet PKI standards are liberally sprinkled throughout the book. These nuggets provide insight into the intent of some of the esoteric topics in the standards, enabling greater interoperability.

"Planning for PKI" gathers the PKI state-of-the-art into one volume, covering everything from PKI history to emerging PKI-related technologies.

Securing Windows NT/2000 Servers for the Internet (Paperback): Stefan Norberg Securing Windows NT/2000 Servers for the Internet (Paperback)
Stefan Norberg
R694 R541 Discovery Miles 5 410 Save R153 (22%) Out of stock

In recent years, Windows NT and 2000 systems have emerged as viable platforms for Internet servers, but securing Windows for Internet use is a complex task. This concise guide simplifies the task by paring down installation and configuration instructions into a series of security checklists for security administration, including hardening servers for use as "bastion hosts," performing secure remote administration with OpenSSH, TCP Wrappers, VNC, and the new Windows 2000 Terminal Services.

At Large - The Strange Case of the World's Biggest Internet Invasion (Paperback, New Ed): Charles C Mann, David H. Freedman At Large - The Strange Case of the World's Biggest Internet Invasion (Paperback, New Ed)
Charles C Mann, David H. Freedman
R530 Discovery Miles 5 300 Ships in 10 - 15 working days

Hailed as "a chilling portrait" by The Boston Globe and "a crafty thriller" by Newsweek, this astonishing story of an obsessive hacker promises to change the way you look at the Internet forever.

At Large chronicles the massive manhunt that united hard-nosed FBI agents, computer nerds, and uptight security bureaucrats against an elusive computer outlaw who broke into highly secured computer systems at banks, universities, federal agencies, and top-secret military weapons-research sites. Here is "a real-life tale of cops vs. hackers, by two technology writers with a flair for turning a complicated crime and investigation into a fast-moving edge-of-your-seat story" (Kirkus Reviews, starred). At Large blows the lid off the frightening vulnerability of the global online network, which leaves not only systems, but also individuals, exposed.

Cryptography and Computational Number Theory - Workshop in Singapore, 1999 (Hardcover): Igor E Shparlinski, Etc, Kwook-Yan Lam,... Cryptography and Computational Number Theory - Workshop in Singapore, 1999 (Hardcover)
Igor E Shparlinski, Etc, Kwook-Yan Lam, Wang, Huaxiong University of Wollongong, Australia), Chaoping Xing
R2,667 Discovery Miles 26 670 Ships in 10 - 15 working days

The fields of cryptography and computational number theory have recently witnessed a rapid development, which was the subject of the CCNT workshop in Singapore in November 1999. Its aim was to stimulate further research in information and computer security as well as the design and implementation of number theoretic cryptosystems and other related areas. Another achievement of the meeting was the collaboration of mathematicians, computer scientists, practical cryptographers and engineers in academia, industry and government. The present volume comprises a selection of refereed papers originating from this event, presenting either a survey of some area or original and new results. They concern many different aspects of the field such as theory, techniques, applications and practical experience. It provides a state-of-the-art report on some number theoretical issues of significance to cryptography.

Digitale Signatur (German, Paperback): Frank Bitzer, Klaus M Brisch Digitale Signatur (German, Paperback)
Frank Bitzer, Klaus M Brisch
R1,290 Discovery Miles 12 900 Ships in 12 - 17 working days

Digitale Kommunikation dringt in immer mehr Bereiche privater und unternehmerischer Anwendungsfelder ein. Seit 1997 sind die gesetzlichen Rahmenbedingungen in Deutschland fur rechtlich gesicherte Vorgange im Internet geschaffen. Zentraler Bestandteil ist die digitale Signatur. Die Autoren erklaren anschaulich und detailliert deren Konzept und Einsatzmoglichkeiten. Die Funktionen von Signatur, Trustcenter, Chipkarte und asymmetrischem Schlusselverfahren werden dargestellt und durch zahlreiche Diagramme verdeutlicht. Die Informationen dienen als Entscheidungsgrundlage fur den Einsatz der digitalen Signatur in Firmen, Institutionen und Behorden. Die Anwendungsbeispiele beziehen sich auf Business-to-Business- und Business-to-Customer-Beziehungen in Intranet und Internet. Das Werk wendet sich vor allem an Produzenten digitaler Medien sowie Entscheider in Wirtschaft und Verwaltung.

Computer Security (Hardcover, 3rd edition): John M Carroll Computer Security (Hardcover, 3rd edition)
John M Carroll
R2,281 Discovery Miles 22 810 Ships in 10 - 15 working days

Computer Security, Third Edition contains the best ideas on recent advances in computer hardware and the spread of personal computer technology. It includes a complete and comprehensive introduction to computer security, as well as coverage of computer crime, systems security, and cryptology. Convinced that there is no such thing as computer security, only various degrees of insecurity, John Carroll presents the best concepts that high technology, classical security practice, and common sense have to offer to help reduce insecurity to the lowest possible level. This thoroughly enhanced third edition is an essential text for everyone involved with the operation and security of the computer complexes that are the heart of today's businesses. In addition to completely updating the original matter, Computer Security, Third Edition includes new information on: computer crime and the law; physical security; communications; surveillance; and risk management.

Protecting Business Information - A Manager's Guide (Hardcover): James A. Schweitzer Protecting Business Information - A Manager's Guide (Hardcover)
James A. Schweitzer
R2,169 Discovery Miles 21 690 Ships in 10 - 15 working days

'Protecting Business Information: A Manager's guide' is an introduction to the information resource, its sensitivity, value and susceptibility to risk. This book provides an outline for a business information security program and provides clear answers to the why and how of information protection.
Protecting Business Information' provides detailed processes for analysis, leading to a complete and adequate information classification. It includes a thorough description of the methods for information classification.
A valuable guide based on the author's fifteen year's experience in building and implementing information security programs for large, worldwide businesses.
Provides a basis for the reasoning behind information protection processes.
Suggests practical means for aligning an information security investment with business needs.

The Politics of Privacy - Planning for Personal Data Systems as Powerful Technologies (Hardcover): James B. Rule, Etc The Politics of Privacy - Planning for Personal Data Systems as Powerful Technologies (Hardcover)
James B. Rule, Etc; Edited by James Rule
R1,940 Discovery Miles 19 400 Ships in 10 - 15 working days
Verschlusseln, Signieren, Angreifen - Eine Kompakte Einfuhrung in Die Kryptografie (German, Paperback, 1. Aufl. 2019 ed.): Olaf... Verschlusseln, Signieren, Angreifen - Eine Kompakte Einfuhrung in Die Kryptografie (German, Paperback, 1. Aufl. 2019 ed.)
Olaf Manz
R867 Discovery Miles 8 670 Ships in 10 - 15 working days

Dieses Buch erlautert kompakt, ohne theoretischen UEberbau und mit moeglichst wenig mathematischem Formalismus die wesentlichen Konzepte bei der Verschlusselung schutzenswerter Nachrichten und Daten. Hierbei liegt der Fokus auf der Beschreibung der historisch und fur die Praxis wichtigen Chiffrier-, Signatur- und Authentifikationsverfahren. Dabei wird sowohl auf symmetrische Verschlusselungen als auch auf Public-Key-Chiffren eingegangen. Angesprochen werden jeweils auch die Strategien, mit deren Hilfe man Verschlusselungen angreift und zu "knacken" versucht. Besonderer Wert gelegt wird auf die Darstellung des praktischen Einsatzes von Chiffren, insbesondere im alltaglichen Umfeld. Das Buch eignet sich fur Arbeitsgruppen an MINT-Schulen und die MINT-Lehrerfortbildung, fur Einfuhrungskurse an Hochschulen wie auch fur interessierte Schuler und Erwachsene.

Guide to Automotive Connectivity and Cybersecurity - Trends, Technologies, Innovations and Applications (Hardcover, 1st ed.... Guide to Automotive Connectivity and Cybersecurity - Trends, Technologies, Innovations and Applications (Hardcover, 1st ed. 2019)
Dietmar P. F Moeller, Roland E. Haas
R3,013 Discovery Miles 30 130 Ships in 10 - 15 working days

This comprehensive text/reference presents an in-depth review of the state of the art of automotive connectivity and cybersecurity with regard to trends, technologies, innovations, and applications. The text describes the challenges of the global automotive market, clearly showing where the multitude of innovative activities fit within the overall effort of cutting-edge automotive innovations, and provides an ideal framework for understanding the complexity of automotive connectivity and cybersecurity. Topics and features: discusses the automotive market, automotive research and development, and automotive electrical/electronic and software technology; examines connected cars and autonomous vehicles, and methodological approaches to cybersecurity to avoid cyber-attacks against vehicles; provides an overview on the automotive industry that introduces the trends driving the automotive industry towards smart mobility and autonomous driving; reviews automotive research and development, offering background on the complexity involved in developing new vehicle models; describes the technologies essential for the evolution of connected cars, such as cyber-physical systems and the Internet of Things; presents case studies on Car2Go and car sharing, car hailing and ridesharing, connected parking, and advanced driver assistance systems; includes review questions and exercises at the end of each chapter. The insights offered by this practical guide will be of great value to graduate students, academic researchers and professionals in industry seeking to learn about the advanced methodologies in automotive connectivity and cybersecurity.

Cryptography and Network Security: Principles and Practice, Global Edition (Paperback, 7th edition): William Stallings Cryptography and Network Security: Principles and Practice, Global Edition (Paperback, 7th edition)
William Stallings
R1,231 Discovery Miles 12 310 Ships in 2 - 4 working days

For courses in Cryptography, Computer Security, and Network Security The Principles and Practice of Cryptography and Network Security Stallings' Cryptography and Network Security introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by a network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security: practical applications that have been implemented and are in use to provide network security. This edition streamlines subject matter with new and updated material - including Sage, one of the most important features of the book. Sage is an open-source, multiplatform, freeware package that implements a very powerful, flexible, and easily learned mathematics and computer algebra system. It provides hands-on experience with cryptographic algorithms and supporting homework assignments. With Sage, students learn a powerful tool that can be used for virtually any mathematical application. The book also provides an unparalleled degree of support for instructors and students to ensure a successful teaching and learning experience.

Vorlesungen uber Informatik - Band 1: Grundlagen und funktionales Programmieren (German, Paperback, 4., uberarb. Aufl. 2006):... Vorlesungen uber Informatik - Band 1: Grundlagen und funktionales Programmieren (German, Paperback, 4., uberarb. Aufl. 2006)
Gerhard Goos, Wolf Zimmermann
R819 Discovery Miles 8 190 Ships in 10 - 15 working days

Dieses Lehrbuch bietet eine fundierte Einfuhrung in die grundlegenden Begriffe und Methoden der Informatik. Die Autoren stellen dabei die Prinzipien der System-Modellierung und der Entwicklung von Software in den Mittelpunkt der Darstellung.

Der hier vorliegende Band vermittelt die wesentlichen Grundbegriffe und theoretischen Grundlagen der Informatik, wie z.B. Algebren, Relationen, elementare Logik, funktionales Programmieren, abstrakte Datentypen. Die vierte Auflage des bewahrten Lehrbuches ist grundlegend uberarbeitet und aktualisiert worden.

Der Text richtet sich an Studierende im Grundstudium an Universitaten und Fachhochschulen und basiert auf der langjahrigen Erfahrung der Autoren in der Ausbildung angehender Informatiker."

Everyday Cryptography - Fundamental Principles and Applications (Paperback, 2nd Revised edition): Keith Martin Everyday Cryptography - Fundamental Principles and Applications (Paperback, 2nd Revised edition)
Keith Martin
R1,728 Discovery Miles 17 280 Ships in 9 - 15 working days

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the Internet, mobile phones, Wi-Fi networks, payment cards, Tor, and Bitcoin. This book is intended to be introductory, self-contained, and widely accessible. It is suitable as a first read on cryptography. Almost no prior knowledge of mathematics is required since the book deliberately avoids the details of the mathematics techniques underpinning cryptographic mechanisms. Instead our focus will be on what a normal user or practitioner of information security needs to know about cryptography in order to understand the design and use of everyday cryptographic applications. By focusing on the fundamental principles of modern cryptography rather than the technical details of current cryptographic technology, the main part this book is relatively timeless, and illustrates the application of these principles by considering a number of contemporary applications of cryptography. Following the revelations of former NSA contractor Edward Snowden, the book considers the wider societal impact of use of cryptography and strategies for addressing this. A reader of this book will not only be able to understand the everyday use of cryptography, but also be able to interpret future developments in this fascinating and crucially important area of technology.

Das MMIX-Buch - Ein Praxisnaher Zugang Zur Informatik (German, Hardcover, 2002 ed.): Heidi Anlauff, Axel Boettcher, Martin... Das MMIX-Buch - Ein Praxisnaher Zugang Zur Informatik (German, Hardcover, 2002 ed.)
Heidi Anlauff, Axel Boettcher, Martin Ruckert
R1,118 Discovery Miles 11 180 Ships in 10 - 15 working days

Dieses Lehrbuch gibt eine praxisnahe Einfuhrung in die Informatik.
Zunachst werden die Grundlagen der Kodierung und der Informationsdarstellung abgehandelt und Kontroll- und Datenstrukturen vorgestellt. Anschliessend werden Architekturmerkmale von Prozessoren (RISC und CISC) sowie Mechanismen der Systemsteuerung wie Pipelining und Interrupts erlautert. Es folgt eine Beschreibung der wichtigsten Funktionen eines Betriebssystems wie die Organisation von Prozessen und die Speicherverwaltung.
Die Darstellung erfolgt mittels des Modellprozessors MMIX, der von Donald E. Knuth in seinem Standardwerk "The Art of Computer Programming" entwickelt wurde. Die Funktionsweise dieses Prozessors wird in einem eigenen Kapitel ausfuhrlich beschrieben. Ferner werden die Programmierumgebung des MMIX und seine Assemblersprache MMIXAL in erganzenden Anhangen zusammengestellt."

Entzifferte Geheimnisse - Methoden Und Maximen Der Kryptologie (German, Hardcover, 3rd 3., Uberarb. U. Erw. Aufl. 2000 ed.):... Entzifferte Geheimnisse - Methoden Und Maximen Der Kryptologie (German, Hardcover, 3rd 3., Uberarb. U. Erw. Aufl. 2000 ed.)
Friedrich L. Bauer
R1,736 Discovery Miles 17 360 Ships in 10 - 15 working days

Die Kryptologie, eine jahrtausendealte "Geheimwissenschaft," gewinnt zusehends praktische Bedeutung fur den Schutz von Kommunikationswegen, Datenbanken und Software. Neben ihre Nutzung in rechnergestutzten offentlichen Nachrichtensystemen ("public keys") treten mehr und mehr rechnerinterne Anwendungen, wie Zugriffsberechtigungen und der Quellenschutz von Software. - Der erste Teil des Buches behandelt die Geheimschriften und ihren Gebrauch - die Kryptographie. Dabei wird auch auf das aktuelle Thema "Kryptographie und Grundrechte des Burgers" eingegangen. Im zweiten Teil wird das Vorgehen zum unbefugten Entziffern einer Geheimschrift - die Kryptanalyse - besprochen, wobei insbesondere Hinweise zur Beurteilung der Verfahrenssicherheit gegeben werden. Mit der vorliegenden dritten Auflage wurde das Werk auf den neuesten Stand gebracht. - Das Buch setzt nur mathematische Grundkenntnisse voraus. Mit einer Fulle spannender, lustiger und bisweilen anzuglicher Geschichten aus der historischen Kryptologie gewurzt, ist es auch fur Laien reizvoll zu lesen."

Serious Cryptography - A Practical Introduction to Modern Encryption (Paperback): Jean-Philippe Aumasson Serious Cryptography - A Practical Introduction to Modern Encryption (Paperback)
Jean-Philippe Aumasson
R1,296 R879 Discovery Miles 8 790 Save R417 (32%) Ships in 12 - 17 working days

Serious Cryptography is the much anticipated review of modern cryptography by cryptographer JP Aumasson. This is a book for readers who want to understand how cryptography works in today's world. The book is suitable for a wide audience, yet is filled with mathematical concepts and meaty discussions of how the various cryptographic mechanisms work. Chapters cover the notion of secure encryption, randomness, block ciphers and ciphers, hash functions and message authentication codes, public-key crypto including RSA, Diffie-Hellman, and elliptic curves, as well as TLS and post-quantum cryptography. Numerous code examples and real use cases throughout will help practitioners to understand the core concepts behind modern cryptography, as well as how to choose the best algorithm or protocol and ask the right questions of vendors. Aumasson discusses core concepts like computational security and forward secrecy, as well as strengths and limitations of cryptographic functionalities related to

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Passive Voices (On the Subject of…
Kristina Mendicino Hardcover R2,190 R1,892 Discovery Miles 18 920
Fighting Fantasy: Sorcery 3: The Seven…
Steve Jackson Paperback R180 Discovery Miles 1 800
Downsizing Prisons - How to Reduce Crime…
Michael Jacobson Hardcover R2,616 Discovery Miles 26 160
BioKid Probiotic Chewable Tablets for…
R399 R350 Discovery Miles 3 500
Ending the Death Penalty - The European…
A. Hammel Hardcover R1,529 Discovery Miles 15 290
Candle Birthday Large Foil (Number-0)
R196 Discovery Miles 1 960
The Sick Child in Early Modern England…
Hannah Newton Hardcover R4,086 R3,458 Discovery Miles 34 580
Khoki Art & Craft Water Paint Set - 42…
R201 R155 Discovery Miles 1 550
The Gay Science - Intimate Experiments…
Kane Race Hardcover R4,325 Discovery Miles 43 250
Kamala Harris, Volume 67
Maria Isabel Sanchez Vegara Hardcover R254 R229 Discovery Miles 2 290

 

Partners