0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (100)
  • R500+ (1,348)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Das MMIX-Buch - Ein Praxisnaher Zugang Zur Informatik (German, Hardcover, 2002 ed.): Heidi Anlauff, Axel Boettcher, Martin... Das MMIX-Buch - Ein Praxisnaher Zugang Zur Informatik (German, Hardcover, 2002 ed.)
Heidi Anlauff, Axel Boettcher, Martin Ruckert
R1,075 Discovery Miles 10 750 Ships in 10 - 15 working days

Dieses Lehrbuch gibt eine praxisnahe Einfuhrung in die Informatik.
Zunachst werden die Grundlagen der Kodierung und der Informationsdarstellung abgehandelt und Kontroll- und Datenstrukturen vorgestellt. Anschliessend werden Architekturmerkmale von Prozessoren (RISC und CISC) sowie Mechanismen der Systemsteuerung wie Pipelining und Interrupts erlautert. Es folgt eine Beschreibung der wichtigsten Funktionen eines Betriebssystems wie die Organisation von Prozessen und die Speicherverwaltung.
Die Darstellung erfolgt mittels des Modellprozessors MMIX, der von Donald E. Knuth in seinem Standardwerk "The Art of Computer Programming" entwickelt wurde. Die Funktionsweise dieses Prozessors wird in einem eigenen Kapitel ausfuhrlich beschrieben. Ferner werden die Programmierumgebung des MMIX und seine Assemblersprache MMIXAL in erganzenden Anhangen zusammengestellt."

Steganography & Watermarking (Hardcover): Ching-Nung Yang, Chia-Chen Lin, Chin-Chen Chang Steganography & Watermarking (Hardcover)
Ching-Nung Yang, Chia-Chen Lin, Chin-Chen Chang
R4,687 Discovery Miles 46 870 Ships in 12 - 17 working days

Privacy and Copyright protection is a very important issue in our digital society, where a very large amount of multimedia data are generated and distributed daily using different kinds of consumer electronic devices and very popular communication channels, such as the Web and social networks. This book introduces state-of-the-art technology on data hiding and copyright protection of digital images, and offers a solid basis for future study and research. Steganographic technique overcomes the traditional cryptographic approach, providing new solutions for secure data transmission without raising users' malicious intention. In steganography, some secret information can be inserted into the original data in imperceptible and efficient ways to avoid distortion of the image, and enhance the embedding capacity, respectively. Digital watermarking also adopts data hiding techniques for copyright protection and tampering verification of multimedia data. In watermarking, an illegitimate copy can be recognised by testing the presence of a valid watermark and a dispute on the ownership of the image resolved. Different kinds of steganographic and watermarking techniques, providing different features and diverse characteristics, have been presented in this book. This book provides a reference for theoretical problems as well as practical solutions and applications for steganography and watermarking techniques. In particular, both the academic community (graduate student, post-doc and faculty) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staff and managers, security managers) will find this book interesting.

Quantum Blockchain: An Emerging Cryptographic Para digm (Hardcover): Dhana Raj Quantum Blockchain: An Emerging Cryptographic Para digm (Hardcover)
Dhana Raj
R4,717 Discovery Miles 47 170 Ships in 9 - 15 working days

QUANTUM BLOCKCHAIN While addressing the security challenges and threats in blockchain, this book is also an introduction to quantum cryptography for engineering researchers and students in the realm of information security. Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. By utilizing unique quantum features of nature, quantum cryptography methods offer everlasting security. The applicability of quantum cryptography is explored in this book. It describes the state-of-the-art of quantum blockchain techniques and sketches how they can be implemented in standard communication infrastructure. Highlighting a wide range of topics such as quantum cryptography, quantum blockchain, post-quantum blockchain, and quantum blockchain in Industry 4.0, this book also provides the future research directions of quantum blockchain in terms of quantum resilience, data management, privacy issues, sustainability, scalability, and quantum blockchain interoperability. Above all, it explains the mathematical ideas that underpin the methods of post-quantum cryptography security. Readers will find in this book a comprehensiveness of the subject including: The key principles of quantum computation that solve the factoring issue. A discussion of a variety of potential post-quantum public-key encryption and digital signature techniques. Explanations of quantum blockchain in cybersecurity, healthcare, and Industry 4.0. Audience The book is for security analysts, data scientists, vulnerability analysts, professionals, academicians, researchers, industrialists, and students working in the fields of (quantum) blockchain, cybersecurity, cryptography, and artificial intelligence with regard to smart cities and Internet of Things.

Cybersecurity & Homeland Security (Paperback): Lin V. Choi Cybersecurity & Homeland Security (Paperback)
Lin V. Choi
R2,158 R1,338 Discovery Miles 13 380 Save R820 (38%) Ships in 12 - 17 working days

Even before the terrorist attacks of September 2001, concerns had been rising among security experts about the vulnerabilities to attack of computer systems and associated infrastructure. Yet, despite increasing attention from federal and state governments and international organisations, the defence against attacks on these systems has appeared to be generally fragmented and varying widely in effectiveness. Concerns have grown that what is needed is a national cybersecurity framework -- a co-ordinated, coherent set of public- and private-sector efforts required to ensure an acceptable level of cybersecurity for the nation. As commonly used, cybersecurity refers to three things: measures to protect information technology; the information it contains, processes, and transmits, and associated physical and virtual elements (which together comprise cyberspace); the degree of protection resulting from application of those measures; and the associated field of professional endeavour. Virtually any element of cyberspace can be at risk, and the degree of interconnection of those elements can make it difficult to determine the extent of the cybersecurity framework that is needed. Identifying the major weaknesses in U.S. cybersecurity is an area of some controversy. However, some components appear to be sources of potentially significant risk because either major vulnerabilities have been identified or substantial impacts could result from a successful attack -- in particular, components that play critical roles in elements of critical infrastructure, widely used commercial software, organisational governance, and the level of public knowledge and perception about cybersecurity. There are several options for broadly addressing weaknesses in cybersecurity. They include adopting standards and certification, promulgating best practices and guidelines, using benchmarks and checklists, use of auditing, improving training and education, building security into enterprise architecture, using risk management, and using metrics. These different approaches all have different strengths and weaknesses with respect to how they might contribute to the development of a national framework for cybersecurity. None of them are likely to be widely adopted in the absence of sufficient economic incentives for cybersecurity.

Spyware (Hardcover, Illustrated Ed): John S. Yang Spyware (Hardcover, Illustrated Ed)
John S. Yang
R2,155 R1,335 Discovery Miles 13 350 Save R820 (38%) Ships in 12 - 17 working days

The term 'spyware' is not well defined. Generally it is used to refer to any software that is downloaded onto a person's computer without their knowledge. Spyware may collect information about a computer user's activities and transmit that information to someone else. It may change computer settings, or cause 'pop-up' advertisements to appear (in that context, it is called 'adware'). Spyware may redirect a Web browser to a site different from what the user intended to visit, or change the user's home page. A type of spyware called 'keylogging' software records individual keystrokes, even if the author modifies or deletes what was written, or if the characters do not appear on the monitor. Thus, passwords, credit card numbers, and other personally identifiable information may be captured and relayed to unauthorised recipients. Some of these software programs have legitimate applications the computer user wants. They obtain the moniker 'spyware' when they are installed surreptitiously, or perform additional functions of which the user is unaware. Users typically do not realise that spyware is on their computer. They may have unknowingly downloaded it from the Internet by clicking within a website, or it might have been included in an attachment to an electronic mail message (e-mail) or embedded in other software. According to a survey and tests conducted by America Online and the National Cyber Security Alliance, 80% of computers in the test group were infected by spyware or adware, and 89% of the users of those computers were unaware of it. The Federal Trade Commission (FTC) issued a consumer alert on spyware in October 2004. It provided a list of warning signs that might indicate that a computer is infected with spyware, and advice on what to do if it is. This new book helps shed light on this insidious nightmare created by members of the human race to wreck havoc on the remainder.

Writing Security - United States Foreign Policy and the Politics of Identity (Paperback, Revised): David Campbell Writing Security - United States Foreign Policy and the Politics of Identity (Paperback, Revised)
David Campbell
R651 R606 Discovery Miles 6 060 Save R45 (7%) Ships in 12 - 17 working days

Since the collapse of the Soviet Union, the United States has faced the challenge of reorienting its foreign policy to address post-Cold War conditions. In this new edition of a groundbreaking work -- one of the first to bring critical theory into dialogue with more traditional approaches to international relations -- David Campbell provides a fundamental reappraisal of American foreign policy, with a new epilogue to address current world affairs and the burgeoning focus on culture and identity in the study of international relations.

Extending recent debates in international relations, Campbell shows how perceptions of danger and difference work to establish the identity of the United States. He demonstrates how foreign policy, far from being an expression of a given society, constitutes state identity through the interpretation of danger posed by others.

Security Issues and Privacy Concerns in Industry 4.0 Applications (Hardcover): S. David Security Issues and Privacy Concerns in Industry 4.0 Applications (Hardcover)
S. David
R4,338 Discovery Miles 43 380 Ships in 12 - 17 working days

SECURITY ISSUES AND PRIVACY CONCERNS IN INDUSTRY 4.0 APPLICATIONS Written and edited by a team of international experts, this is the most comprehensive and up-to-date coverage of the security and privacy issues surrounding Industry 4.0 applications, a must-have for any library. The scope of Security Issues and Privacy Concerns in Industry 4.0 Applications is to envision the need for security in Industry 4.0 applications and the research opportunities for the future. This book discusses the security issues in Industry 4.0 applications for research development. It will also enable the reader to develop solutions for the security threats and attacks that prevail in the industry. The chapters will be framed on par with advancements in the industry in the area of Industry 4.0 with its applications in additive manufacturing, cloud computing, IoT (Internet of Things), and many others. This book helps a researcher and an industrial specialist to reflect on the latest trends and the need for technological change in Industry 4.0. Smart water management using IoT, cloud security issues with network forensics, regional language recognition for industry 4.0, IoT-based health care management systems, artificial intelligence for fake profile detection, and packet drop detection in agriculture-based IoT are covered in this outstanding new volume. Leading innovations such as smart drone for railway track cleaning, everyday life-supporting blockchain and big data, effective prediction using machine learning, classification of dog breed based on CNN, load balancing using the SPE approach and cyber culture impact on media consumers are also addressed. Whether a reference for the veteran engineer or an introduction to the technologies covered in the book for the student, this is a must-have for any library.

Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December... Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010, Proceedings (Paperback, Edition.)
Guang Gong, Kishan Chand Gupta
R1,494 Discovery Miles 14 940 Ships in 10 - 15 working days

Strong Pseudorandompermutations or SPRPs,which were introduced byLuby andRacko? [4], formalize the well established cryptographic notion ofblock ciphers.They provided a construction of SPRP, well known as LRconstruction, which was motivated by the structure of DES[6].The basicbuildingblock is the so called 2n-bit Feistel permutation (or LR round permutation) LR based F K on an n-bitpseudorandomfunction (PRF) F : K n LR (x ,x)=(F (x )?x ,x ),x ,x?{0,1} . F 1 2 K 1 2 1 1 2 K Theirconstruction consists (see Fig 1) offour rounds of Feistel permutations (or three rounds, for PRP), each round involves an application ofanindependent PRF(i.e.with independentrandomkeys K ,K ,K , and K ). More precisely, 1 2 3 4 LR and LR are PRP and SPRP respectively where K ,K ,K K ,K ,K ,K 1 2 3 1 2 3 4 LR := LR := LR (...(LR (*))...). K ,...,K F ,...,F F F 1 r K K K K r r 1 1 After this work, many results are known improvingperformance (reducingthe number of invocations of F )[5] and reducingthekey-sizes (i.e. reusingthe K roundkeys [7,8,10,12,11] orgenerate more keysfromsinglekey by usinga PRF[2]). However there are some limitations.Forexample,wecannotuseas few as single-keyLR (unless wetweak the roundpermutation) orasfew as two-roundsince they are not secure. Distinguishing attacks forsome other LR constructionsarealso known [8]. We list some oftheknow related results (see Table 1). Here all keys K ,K ,...are independently chosen.

Security of Block Ciphers - From Algorithm Design to Hardware Implementation (Hardcover): K Sakiyama Security of Block Ciphers - From Algorithm Design to Hardware Implementation (Hardcover)
K Sakiyama
R2,844 Discovery Miles 28 440 Ships in 10 - 15 working days

A comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel analysis * Written by authors known within the academic cryptography community, this book presents the latest developments in current research * Unique in its combination of both algorithmic-level design and hardware-level implementation; this all-round approach - algorithm to implementation covers security from start to completion * Deals with AES (Advanced Encryption standard), one of the most used symmetric-key ciphers, which helps the reader to learn the fundamental theory of cryptanalysis and practical applications of side-channel analysis

Super Secreto - Verschlusselung fur alle - Abhoersicher in die Dritte Epoche der Kryptographie. (Tutorial- &... Super Secreto - Verschlusselung fur alle - Abhoersicher in die Dritte Epoche der Kryptographie. (Tutorial- & Taschenbuch-Ausgabe zur Einfuhrung in die streng-geheime Kommunikation und Derivative Kryptographie.) (German, Paperback)
Theo Tenzer
R812 Discovery Miles 8 120 Ships in 10 - 15 working days
Computational Number Theory and Modern Cryptograph y (Hardcover): S.Y. Yan Computational Number Theory and Modern Cryptograph y (Hardcover)
S.Y. Yan
R2,727 Discovery Miles 27 270 Ships in 10 - 15 working days

The only book to provide a unified view of the interplay between computational number theory and cryptography Computational number theory and modern cryptography are two of the most important and fundamental research fields in information security. In this book, Song Y. Yang combines knowledge of these two critical fields, providing a unified view of the relationships between computational number theory and cryptography. The author takes an innovative approach, presenting mathematical ideas first, thereupon treating cryptography as an immediate application of the mathematical concepts. The book also presents topics from number theory, which are relevant for applications in public-key cryptography, as well as modern topics, such as coding and lattice based cryptography for post-quantum cryptography. The author further covers the current research and applications for common cryptographic algorithms, describing the mathematical problems behind these applications in a manner accessible to computer scientists and engineers. * Makes mathematical problems accessible to computer scientists and engineers by showing their immediate application * Presents topics from number theory relevant for public-key cryptography applications * Covers modern topics such as coding and lattice based cryptography for post-quantum cryptography * Starts with the basics, then goes into applications and areas of active research * Geared at a global audience; classroom tested in North America, Europe, and Asia * Incudes exercises in every chapter * Instructor resources available on the book s Companion Website Computational Number Theory and Modern Cryptography is ideal for graduate and advanced undergraduate students in computer science, communications engineering, cryptography and mathematics. Computer scientists, practicing cryptographers, and other professionals involved in various security schemes will also find this book to be a helpful reference.

Serious Cryptography - A Practical Introduction to Modern Encryption (Paperback): Jean-Philippe Aumasson Serious Cryptography - A Practical Introduction to Modern Encryption (Paperback)
Jean-Philippe Aumasson
R1,323 R874 Discovery Miles 8 740 Save R449 (34%) Ships in 12 - 17 working days

Serious Cryptography is the much anticipated review of modern cryptography by cryptographer JP Aumasson. This is a book for readers who want to understand how cryptography works in today's world. The book is suitable for a wide audience, yet is filled with mathematical concepts and meaty discussions of how the various cryptographic mechanisms work. Chapters cover the notion of secure encryption, randomness, block ciphers and ciphers, hash functions and message authentication codes, public-key crypto including RSA, Diffie-Hellman, and elliptic curves, as well as TLS and post-quantum cryptography. Numerous code examples and real use cases throughout will help practitioners to understand the core concepts behind modern cryptography, as well as how to choose the best algorithm or protocol and ask the right questions of vendors. Aumasson discusses core concepts like computational security and forward secrecy, as well as strengths and limitations of cryptographic functionalities related to

Einfuhrung in Die Quanteninformatik - Quantenkryptografie, Teleportation Und Quantencomputing (German, Paperback, 2011 ed.):... Einfuhrung in Die Quanteninformatik - Quantenkryptografie, Teleportation Und Quantencomputing (German, Paperback, 2011 ed.)
Gilbert Brands
R1,362 Discovery Miles 13 620 Ships in 10 - 15 working days

Ausgehend von der Theorie und den Protokollen der Quantenkryptografie werden in dem Band die Servicequalitaten vorgestellt, die angesichts der aktuellen technischen Moeglichkeiten erreichbar sind. Unter Berucksichtigung wenig beachteter Gesichtspunkte der Kryptoanalyse diskutiert der Autor die erreichbare Sicherheit und untersucht die Moeglichkeiten des Quantencomputing. Anhand praxisnaher Aufgaben koennen Leser ihr Wissen vertiefen und lernen, die Techniken kritisch zu bewerten. Mit Programmieranleitung fur Simulationsversuche auf dem eigenen Rechner.

Digitalization and Control of Industrial Cyber-Physical Systems: Concepts, Technologies and Applications (Hardcover): Cardin Digitalization and Control of Industrial Cyber-Physical Systems: Concepts, Technologies and Applications (Hardcover)
Cardin
R3,697 Discovery Miles 36 970 Ships in 10 - 15 working days

Industrial cyber-physical systems operate simultaneously in the physical and digital worlds of business and are now a cornerstone of the fourth industrial revolution. Increasingly, these systems are becoming the way forward for academics and industrialists alike. The very essence of these systems, however, is often misunderstood or misinterpreted. This book thus sheds light on the problem areas surrounding cyber-physical systems and provides the reader with the key principles for understanding and illustrating them. Presented using a pedagogical approach, with numerous examples of applications, this book is the culmination of more than ten years of study by the Intelligent Manufacturing and Services Systems (IMS2) French research group, part of the MACS (Modeling, Analysis and Control of Dynamic Systems) research group at the CNRS. It is intended both for engineers who are interested in emerging industrial developments and for master's level students wishing to learn about the industrial systems of the future.

NFT per Programmatori - Mini corso per programmatori e startup (Italian, Paperback): Gian Angelo Geminiani NFT per Programmatori - Mini corso per programmatori e startup (Italian, Paperback)
Gian Angelo Geminiani
R703 Discovery Miles 7 030 Ships in 10 - 15 working days
Criptomonedas - Comercio e inversion en bitcoin litecoin y otras mas (Metodos de comercio e inversion en bitcoin) (Spanish,... Criptomonedas - Comercio e inversion en bitcoin litecoin y otras mas (Metodos de comercio e inversion en bitcoin) (Spanish, Paperback)
Pablo Mora
R478 R397 Discovery Miles 3 970 Save R81 (17%) Ships in 10 - 15 working days
Criptomoneda - Un curso completo de intercambio e inversiones digitales (Aprendizaje sistematico acerca de invertir y comerciar... Criptomoneda - Un curso completo de intercambio e inversiones digitales (Aprendizaje sistematico acerca de invertir y comerciar en criptomoneda) (Spanish, Paperback)
Elido Baez
R478 R397 Discovery Miles 3 970 Save R81 (17%) Ships in 10 - 15 working days
Criptomoneda - Consejos exitosos sobre el comercio en criptomoneda (Un libro lleno de conocimientos desde principiantes hasta... Criptomoneda - Consejos exitosos sobre el comercio en criptomoneda (Un libro lleno de conocimientos desde principiantes hasta avanzados) (Spanish, Paperback)
Yoel Pagan
R482 R401 Discovery Miles 4 010 Save R81 (17%) Ships in 10 - 15 working days
Criptomoneda - La guia definitiva para el comercio en criptomonedas (Haga una gran cantidad de dinero con criptomonedas)... Criptomoneda - La guia definitiva para el comercio en criptomonedas (Haga una gran cantidad de dinero con criptomonedas) (Spanish, Paperback)
Jair Luna
R472 R391 Discovery Miles 3 910 Save R81 (17%) Ships in 10 - 15 working days
Codebreaking - A Practical Guide (Paperback): Elonka Dunin, Klaus Schmeh Codebreaking - A Practical Guide (Paperback)
Elonka Dunin, Klaus Schmeh 1
R526 R434 Discovery Miles 4 340 Save R92 (17%) Ships in 9 - 15 working days

'The best book on codebreaking I have read', SIR DERMOT TURING 'Brings back the joy I felt when I first read about these things as a kid', PHIL ZIMMERMANN 'This is at last the single book on codebreaking that you must have. If you are not yet addicted to cryptography, this book will get you addicted. Read, enjoy, and test yourself on history's great still-unbroken messages!' JARED DIAMOND is the Pulitzer Prize-winning author of Guns, Germs, and Steel; Collapse; and other international bestsellers 'This is THE book about codebreaking. Very concise, very inclusive and easy to read', ED SCHEIDT 'Riveting', MIKE GODWIN 'Approachable and compelling', GLEN MIRANKER This practical guide to breaking codes and solving cryptograms by two world experts, Elonka Dunin and Klaus Schmeh, describes the most common encryption techniques along with methods to detect and break them. It fills a gap left by outdated or very basic-level books. This guide also covers many unsolved messages. The Zodiac Killer sent four encrypted messages to the police. One was solved; the other three were not. Beatrix Potter's diary and the Voynich Manuscript were both encrypted - to date, only one of the two has been deciphered. The breaking of the so-called Zimmerman Telegram during the First World War changed the course of history. Several encrypted wartime military messages remain unsolved to this day. Tens of thousands of other encrypted messages, ranging from simple notes created by children to encrypted postcards and diaries in people's attics, are known to exist. Breaking these cryptograms fascinates people all over the world, and often gives people insight into the lives of their ancestors. Geocachers, computer gamers and puzzle fans also require codebreaking skills. This is a book both for the growing number of enthusiasts obsessed with real-world mysteries, and also fans of more challenging puzzle books. Many people are obsessed with trying to solve famous crypto mysteries, including members of the Kryptos community (led by Elonka Dunin) trying to solve a decades-old cryptogram on a sculpture at the centre of CIA Headquarters; readers of the novels of Dan Brown as well as Elonka Dunin's The Mammoth Book of Secret Code Puzzles (UK)/The Mammoth Book of Secret Codes and Cryptograms (US); historians who regularly encounter encrypted documents; perplexed family members who discover an encrypted postcard or diary in an ancestor's effects; law-enforcement agents who are confronted by encrypted messages, which also happens more often than might be supposed; members of the American Cryptogram Association (ACA); geocachers (many caches involve a crypto puzzle); puzzle fans; and computer gamers (many games feature encryption puzzles). The book's focus is very much on breaking pencil-and-paper, or manual, encryption methods. Its focus is also largely on historical encryption. Although manual encryption has lost much of its importance due to computer technology, many people are still interested in deciphering messages of this kind.

Hacking - 2 Livres En 1: Le Guide Complet Du Debutant Pour Apprendre Le Hacking Ethique Avec Python Avec Des Exemples Pratiques... Hacking - 2 Livres En 1: Le Guide Complet Du Debutant Pour Apprendre Le Hacking Ethique Avec Python Avec Des Exemples Pratiques & Le Guide Complet du Debutant aordinateur Hacking et Tests Penetration (French, Paperback)
Miles Price
R600 Discovery Miles 6 000 Ships in 10 - 15 working days
Hacking - 2 B cher in 1: Der Vollst ndige Anf ngerleitfaden Zum Erlernen Ethischen Hackens Mit Python Und Praktischen... Hacking - 2 B cher in 1: Der Vollst ndige Anf ngerleitfaden Zum Erlernen Ethischen Hackens Mit Python Und Praktischen Beispielen & Der Anf nger Leitfaden F r Computer Hacking Und Penetration Testen (German, Paperback)
Miles Price
R599 Discovery Miles 5 990 Ships in 10 - 15 working days
Bitcoin begreifen (German, Paperback): Volker Herminghaus Bitcoin begreifen (German, Paperback)
Volker Herminghaus; Kalle Rosenbaum
R731 Discovery Miles 7 310 Ships in 10 - 15 working days
21 oppituntia - Mita olen oppinut pudottuani Bitcoinin kaninkoloon (Finnish, Paperback): Thomas Brand, Laura Oinonen, Jussi... 21 oppituntia - Mita olen oppinut pudottuani Bitcoinin kaninkoloon (Finnish, Paperback)
Thomas Brand, Laura Oinonen, Jussi Makipelto
R273 Discovery Miles 2 730 Ships in 10 - 15 working days
Criptomonedas - Una guia completa para invertir en bitcoin, altcoin, litecoin y mas (Guia para entender el litecoin, bitcoin y... Criptomonedas - Una guia completa para invertir en bitcoin, altcoin, litecoin y mas (Guia para entender el litecoin, bitcoin y mas.) (Spanish, Paperback)
Eryk Marin
R497 R418 Discovery Miles 4 180 Save R79 (16%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cryptographic Solutions for Secure…
Kannan Balasubramanian, K. Mala, … Hardcover R5,274 Discovery Miles 52 740
Alice and Bob Learn Application Security
T Janca Paperback R849 Discovery Miles 8 490
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,512 Discovery Miles 65 120
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,154 Discovery Miles 31 540
TLS Mastery
Michael W Lucas Hardcover R970 R838 Discovery Miles 8 380
Cryptocurrencies and Blockchain…
Keizer Soeze Hardcover R1,469 R1,178 Discovery Miles 11 780
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R494 Discovery Miles 4 940
Blockchain Applications
Arshdeep Bagha Hardcover R2,030 R1,592 Discovery Miles 15 920
New Research on the Voynich Manuscript…
National Security Agency Hardcover R503 Discovery Miles 5 030
Information Security Management-Global…
Gurpreet Dhillon Paperback R1,895 Discovery Miles 18 950

 

Partners