0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (85)
  • R500+ (1,287)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Journal of Cyber Security and Mobility (6-2) (Paperback): Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad Journal of Cyber Security and Mobility (6-2) (Paperback)
Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad
R995 Discovery Miles 9 950 Ships in 18 - 22 working days
Kompendium Der Kryptologie - Die Welt Der Elektronischen Sicherheit in Theorie Und Praxis (German, Paperback): Gilbert Brands Kompendium Der Kryptologie - Die Welt Der Elektronischen Sicherheit in Theorie Und Praxis (German, Paperback)
Gilbert Brands
R622 Discovery Miles 6 220 Ships in 18 - 22 working days
Steganography & Watermarking (Hardcover): Ching-Nung Yang, Chia-Chen Lin, Chin-Chen Chang Steganography & Watermarking (Hardcover)
Ching-Nung Yang, Chia-Chen Lin, Chin-Chen Chang
R4,737 Discovery Miles 47 370 Ships in 10 - 15 working days

Privacy and Copyright protection is a very important issue in our digital society, where a very large amount of multimedia data are generated and distributed daily using different kinds of consumer electronic devices and very popular communication channels, such as the Web and social networks. This book introduces state-of-the-art technology on data hiding and copyright protection of digital images, and offers a solid basis for future study and research. Steganographic technique overcomes the traditional cryptographic approach, providing new solutions for secure data transmission without raising users' malicious intention. In steganography, some secret information can be inserted into the original data in imperceptible and efficient ways to avoid distortion of the image, and enhance the embedding capacity, respectively. Digital watermarking also adopts data hiding techniques for copyright protection and tampering verification of multimedia data. In watermarking, an illegitimate copy can be recognised by testing the presence of a valid watermark and a dispute on the ownership of the image resolved. Different kinds of steganographic and watermarking techniques, providing different features and diverse characteristics, have been presented in this book. This book provides a reference for theoretical problems as well as practical solutions and applications for steganography and watermarking techniques. In particular, both the academic community (graduate student, post-doc and faculty) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staff and managers, security managers) will find this book interesting.

Implementing SSL/TLS Using Cryptography and PKI (Paperback): J. Davies Implementing SSL/TLS Using Cryptography and PKI (Paperback)
J. Davies
R1,495 R1,258 Discovery Miles 12 580 Save R237 (16%) Ships in 18 - 22 working days

Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this practical book is for you. Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you have a working knowledge of cryptography. The book covers SSLv2, TLS 1.0, and TLS 1.2, including implementations of the relevant cryptographic protocols, secure hashing, certificate parsing, certificate generation, and more. Coverage includes: * Understanding Internet Security * Protecting against Eavesdroppers with Symmetric Cryptography * Secure Key Exchange over an Insecure Medium with Public Key Cryptography * Authenticating Communications Using Digital Signatures * Creating a Network of Trust Using X.509 Certificates * A Usable, Secure Communications Protocol: Client-Side TLS * Adding Server-Side TLS 1.0 Support * Advanced SSL Topics * Adding TLS 1.2 Support to Your TLS Library * Other Applications of SSL * A Binary Representation of Integers: A Primer * Installing TCPDump and OpenSSL * Understanding the Pitfalls of SSLv2 Set up and launch a working implementation of SSL with this practical guide.

Linguistisches Identity Matching - Paradigmenwechsel in der Suche und im Abgleich von Personendaten (German, Paperback, 2011... Linguistisches Identity Matching - Paradigmenwechsel in der Suche und im Abgleich von Personendaten (German, Paperback, 2011 ed.)
Bertrand Lisbach
R354 Discovery Miles 3 540 Ships in 10 - 15 working days

Identity Matching ist die Grundlage fur die Suche mit und nach Personendaten. Und die betreibt heutzutage die ganze Welt: Banken suchen Geldwascher in ihren Kundendateien, Polizeibehoerden uberprufen Verdachtige mit ihren Registern und Privatpersonen stoebern alte Bekannte im Web auf. Mittels Identity Matching besorgen sich Studenten Fachartikel, Journalisten Nachrichten, Vermieter Bonitatsauskunfte und Verkaufer ihre nachsten Marketing-Opfer. Das Problem bisher ist: Sobald wir den Namen nicht genau so schreiben, wie er in der Quelle reprasentiert ist, finden wir ihn nicht. Jetzt hebt die Linguistik das Identity Matching auf ein neues Niveau. Mit dem Wissen uber Sprachen, Schriften und globale Namenskonventionen ist eine zugleich prazise und zuverlassige Personensuche moeglich. Dieses Buch beschreibt, was linguistisches Identity Matching ist, und gibt Ihnen praktische Tipps, wie auch Sie davon profitieren koennen.

Hacking Exposed Cisco Networks (Paperback, Ed): Andrew Vladimirov, Konstantin Gavrilenko, Andrei Mikhailovsky Hacking Exposed Cisco Networks (Paperback, Ed)
Andrew Vladimirov, Konstantin Gavrilenko, Andrei Mikhailovsky
R1,614 R1,337 Discovery Miles 13 370 Save R277 (17%) Ships in 18 - 22 working days

Implement bulletproof Cisco security the battle-tested "Hacking Exposed" way. .

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. "Hacking Exposed Cisco Networks" shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised networks. All device-specific and network-centered security issues are covered alongside real-world examples, in-depth case studies, and detailed countermeasures. Its all here--from switch, router, firewall, wireless, and VPN vulnerabilities to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. Youll prevent tomorrows catastrophe by learning how new flaws in Cisco-centered networks are discovered and abused by cyber-criminals. Plus, youll get undocumented Cisco commands, security evaluation templates, and vital security tools from hackingexposedcisco.com.. . . Use the tried-and-true "Hacking Exposed" methodology to find, exploit, and plug security holes in Cisco devices and networks. Locate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning. Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels . Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities. Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers. Find out how IOS exploits are written and if a Cisco router can be used as an attack platform. Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR. Prevent secret keys cracking, sneakydata link attacks, routing protocol exploits, and malicious physical access. . . .

Applied Cryptanalysis - Breaking Ciphers in the Real World (Hardcover, New): M Stamp Applied Cryptanalysis - Breaking Ciphers in the Real World (Hardcover, New)
M Stamp
R2,967 Discovery Miles 29 670 Ships in 18 - 22 working days

A case-based approach to cryptanalysis that explains how and why attacks can happen

Applied Cryptanalysis focuses on practical attacks on real-world ciphers. Using detailed case studies, the authors demonstrate how modern cryptographic systems are broken, and they do so with a minimum of complex mathematics and technical jargon. All major classes of attacks are covered, providing IT professionals with the knowledge necessary for effective security implementation within their organizations. Each chapter concludes with a series of problems that enables the reader to practice and fine-tune their own cryptanalysis skills. Applied Cryptanalysis can serve as a textbook for a cryptanalysis course or for independent study.

The text is organized around four major themes:

Classic Crypto offers an overview of a few classical cryptosystems, introducing and illustrating the basic principles, concepts, and vocabulary. The authors then cover World War II cipher machines, specifically the German Enigma, Japanese Purple, and American Sigaba.

Symmetric Ciphers analyzes shift registers and correlation attacks, as well as attacks on three specific stream ciphers: ORYX, RC4 (as used in WEP), and PKZIP. In addition, block ciphers are studied: Hellman's Time-Memory Trade-Off attack is discussed and three specific block ciphers are analyzed in detail (CMEA, Akelarre, and FEAL).

Hash Functions presents hash function design, birthday attacks, and the "Nostradamus" attack. Then the MD4 attack is examined, which serves as a precursor for the authors' highly detailed analysis of the recent attack on MD5.

Public Key Crypto includes an overview of several public key cryptosystems including theknapsack, Diffie-Hellman, Arithmetica, RSA, Rabin cipher, NTRU, and ElGamal. Factoring and discrete log attacks are analyzed, and the recent timing attacks on RSA are discussed in detail.

Clear and concise, this practical case-based approach to cryptanalysis is a valuable and timely resource.

Spyware (Hardcover, Illustrated Ed): John S. Yang Spyware (Hardcover, Illustrated Ed)
John S. Yang
R2,067 R1,364 Discovery Miles 13 640 Save R703 (34%) Ships in 10 - 15 working days

The term 'spyware' is not well defined. Generally it is used to refer to any software that is downloaded onto a person's computer without their knowledge. Spyware may collect information about a computer user's activities and transmit that information to someone else. It may change computer settings, or cause 'pop-up' advertisements to appear (in that context, it is called 'adware'). Spyware may redirect a Web browser to a site different from what the user intended to visit, or change the user's home page. A type of spyware called 'keylogging' software records individual keystrokes, even if the author modifies or deletes what was written, or if the characters do not appear on the monitor. Thus, passwords, credit card numbers, and other personally identifiable information may be captured and relayed to unauthorised recipients. Some of these software programs have legitimate applications the computer user wants. They obtain the moniker 'spyware' when they are installed surreptitiously, or perform additional functions of which the user is unaware. Users typically do not realise that spyware is on their computer. They may have unknowingly downloaded it from the Internet by clicking within a website, or it might have been included in an attachment to an electronic mail message (e-mail) or embedded in other software. According to a survey and tests conducted by America Online and the National Cyber Security Alliance, 80% of computers in the test group were infected by spyware or adware, and 89% of the users of those computers were unaware of it. The Federal Trade Commission (FTC) issued a consumer alert on spyware in October 2004. It provided a list of warning signs that might indicate that a computer is infected with spyware, and advice on what to do if it is. This new book helps shed light on this insidious nightmare created by members of the human race to wreck havoc on the remainder.

Oracle9i RMAN Backup & Recovery (Paperback, Ed): Robert Freeman, Matthew Hart Oracle9i RMAN Backup & Recovery (Paperback, Ed)
Robert Freeman, Matthew Hart
R1,617 R1,339 Discovery Miles 13 390 Save R278 (17%) Ships in 18 - 22 working days

From the exclusive publishers of Oracle Press Books, here is the only book available offering complete coverage of RMAN (Recovery Manager), Oracle’s free backup and recovery technology. An indispensable resource for new Oracle users, database administrators, and system administrators.

None of Your Business - World Data Flows, Electronic Commerce, and the European Privacy Directive (Paperback): Peter P. Swire,... None of Your Business - World Data Flows, Electronic Commerce, and the European Privacy Directive (Paperback)
Peter P. Swire, Robert E Litan
R825 Discovery Miles 8 250 Ships in 18 - 22 working days

The historic European Union Directive on Data Protection will take effect in October 1998. A key provision will prohibit transfer of personal information from Europe to other countries if they lack "adequate" protection of privacy. If enforced as written, the Directive could create enormous obstacles to commerce between Europe and other countries, such as the United States, that do not have comprehensive privacy statutes. In this book, Peter Swire and Robert Litan provide the first detailed analysis of the sector-by-sector effects of the Directive. They examine such topics as the text of the Directive, the tension between privacy laws and modern information technologies, issues affecting a wide range of businesses and other organizations, effects on the financial services sector, and effects on other prominent sectors with large transborder data flows. In light of the many and significant effects of the Directive as written, the book concludes with detailed policy recommendations on how to avoid a coming trade war with Europe. The book will be of interest to the wide range of individuals and organizations affected by the important new European privacy laws. More generally, the privacy clash discussed in the book will prove a major precedent for how electronic commerce and world data flows will be governed in the Internet Age.

Security Analysis (Hardcover, 5th edition): Sidney Cottle, Roger Murray, Frank Block Security Analysis (Hardcover, 5th edition)
Sidney Cottle, Roger Murray, Frank Block
R2,126 R1,772 Discovery Miles 17 720 Save R354 (17%) Ships in 18 - 22 working days

Maintaining the high standards of prior editions, Security Analysis puts at your fingertips the authoritative guidance on analyzing securities that generations of investment bankers have come to rely on.

Modulation Theory (Hardcover): Marcelo Sampaio De Alencar Modulation Theory (Hardcover)
Marcelo Sampaio De Alencar
R979 Discovery Miles 9 790 Ships in 18 - 22 working days

In recent years, a considerable amount of effort has been devoted, both in industry and academia, towards the design, performance analysis and evaluation of modulation schemes to be used in wireless and optical networks, towards the development of the next and future generations of mobile cellular communication systems. Modulation Theory is intended to serve as a complementary textbook for courses dealing with Modulation Theory or Communication Systems, but also as a professional book, for engineers who need to update their knowledge in the communications area. The modulation aspects presented in the book use modern concepts of stochastic processes, such as autocorrelation and power spectrum density, which are novel for undergraduate texts or professional books, and provides a general approach for the theory, with real life results, applied to professional design. This text is suitable for the undergraduate as well as the initial graduate levels of Electrical Engineering courses, and is useful for the professional who wants to review or get acquainted with the a modern exposition of the modulation theory. The book covers signal representations for most known waveforms, Fourier analysis, and presents an introduction to Fourier transform and signal spectrum, including the concepts of convolution, autocorrelation and power spectral density, for deterministic signals. It introduces the concepts of probability, random variables and stochastic processes, including autocorrelation, cross-correlation, power spectral and cross-spectral densities, for random signals, and their applications to the analysis of linear systems. This chapter also includes the response of specific non-linear systems, such as power amplifiers. The book presents amplitude modulation with random signals, including analog and digital signals, and discusses performance evaluation methods, presents quadrature amplitude modulation using random signals. Several modulation schemes are discussed, including SSB, QAM, ISB, C-QUAM, QPSK and MSK. Their autocorrelation and power spectrum densities are computed. A thorough discussion on angle modulation with random modulating signals, along with frequency and phase modulation, and orthogonal frequency division multiplexing is provided. Their power spectrum densities are computed using the Wiener-Khintchin theorem.

The Business of Cybersecurity - Foundations and Ideologies (Paperback): Ashwini Sathnur The Business of Cybersecurity - Foundations and Ideologies (Paperback)
Ashwini Sathnur
R567 R511 Discovery Miles 5 110 Save R56 (10%) Ships in 18 - 22 working days

Cybersecurity could be defined as, beginning of the concept of trust and belief in cyber transactions. The era of computing began in the 20th century, with an enormous investment on computational research. Software programing languages were the foundational blocks of history of computing. Progressive research then led to networking, bringing about the formation of connectivity. Along with these creations, there was an accompanying factor of compromise on data privacy and hacking of data. This factor was the introduction to cyber security. This book is primarily created for the objective of knowledge sharing and knowledge-enabling on the conceptual ideologies of the cybersecurity. This book is aimed at students, early-career researchers, and also advanced researchers and professionals. The case studies described in the book create renewed knowledge on the innovations built on the applied theories of cybersecurity. These case studies focus on the financial markets and space technologies.

Software Security Technologies (Paperback, New edition): Richard Sinn Software Security Technologies (Paperback, New edition)
Richard Sinn
R1,756 R1,599 Discovery Miles 15 990 Save R157 (9%) Special order

Providing the perfect blend of basic security theory and practical software security programming, Software Security Technologies: A Programmatic Approach offers a valuable introduction to the field of software security. Divided into three parts, this comprehensive guide encourages readers to master their security skills by building on the basics. The first section of the book is devoted to fundamental security theories that govern common software security technical issues. Coverage then progresses to a focus on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. Using these theories and programming practices as a foundation, the book concludes with a section on security in practice, demonstrating how the conceptual and practical materials covered in the first two sections are applied in real-world scenarios. All of these topics are explained using a straightforward approach, so that readers can grasp the information quickly and easily, gaining the confidence they need to further develop their skills in software security technologies.

Management of Information Security (Paperback, 5th edition): Herbert Mattord, Michael Whitman Management of Information Security (Paperback, 5th edition)
Herbert Mattord, Michael Whitman
R1,380 R1,279 Discovery Miles 12 790 Save R101 (7%) Special order

Discover a managerially-focused overview of information security with a thorough presentation of how to most effectively administer it with MANAGEMENT OF INFORMATION SECURITY, 5E. Insightful, engaging content prepares you to become an information security management practitioner able to secure systems and networks in a world where continuously emerging threats, ever-present attacks, and the success of criminals illustrate the weaknesses in current information technologies. You'll develop both the information security skills and practical experience that organizations are looking for as they strive to ensure more secure computing environments. This edition offers a tightened focus on key executive and managerial aspects of information security while still emphasizing the foundational material to reinforce key concepts. Updated content reflects the most recent developments in the field, including NIST, ISO, and security governance.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Scrum - Mastery - The Essential Guide to…
Greg Caldwell Hardcover R667 R596 Discovery Miles 5 960
Perspectives on Web Services - Applying…
Olaf Zimmermann, Mark Tomlinson, … Hardcover R2,708 R1,713 Discovery Miles 17 130
Assembly Language Using the Raspberry Pi…
Robert Dunne Hardcover R1,376 R1,154 Discovery Miles 11 540
Introduction to Python Programming and…
B. Harwani Paperback  (2)
R935 Discovery Miles 9 350
Python For Beginners - Learn Python In 5…
James Tudor Hardcover R667 Discovery Miles 6 670
Computer Programming The Doctrine 2.0…
Adesh Silva Hardcover R698 R621 Discovery Miles 6 210
Underlying Standards that Support…
Laura Bright, Johanna Goderre Paperback R1,103 Discovery Miles 11 030
COBOL Basic Training Using VSAM, IMS…
Robert Wingate Hardcover R1,653 R1,381 Discovery Miles 13 810
XML in Data Management - Understanding…
Peter Aiken, M. David Allen Paperback R1,150 Discovery Miles 11 500
Rational Decisions in Organisations…
Frederic Adam, Dorota Kuchta, … Paperback R1,498 Discovery Miles 14 980

 

Partners