0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (12)
  • R250 - R500 (85)
  • R500+ (1,344)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Cryptomonedas - Como lucrar del bitcoin, ethereum para aprendices (Como invertir y comerciar en criptomoneda?) (Spanish,... Cryptomonedas - Como lucrar del bitcoin, ethereum para aprendices (Como invertir y comerciar en criptomoneda?) (Spanish, Paperback)
Ione Diaz
R471 R434 Discovery Miles 4 340 Save R37 (8%) Ships in 10 - 15 working days
Criptomonedas - Una guia completa para invertir en bitcoin, altcoin, litecoin y mas (Guia para entender el litecoin, bitcoin y... Criptomonedas - Una guia completa para invertir en bitcoin, altcoin, litecoin y mas (Guia para entender el litecoin, bitcoin y mas.) (Spanish, Paperback)
Eryk Marin
R497 R466 Discovery Miles 4 660 Save R31 (6%) Ships in 10 - 15 working days
Criptomoneda - Consejos exitosos sobre el comercio en criptomoneda (Una guia completa para invertir e intercambiar en... Criptomoneda - Consejos exitosos sobre el comercio en criptomoneda (Una guia completa para invertir e intercambiar en blockchains) (Spanish, Paperback)
Bart Soliz
R400 R369 Discovery Miles 3 690 Save R31 (8%) Ships in 10 - 15 working days
Bitcoins F r Anf nger - Alles Was Sie Zum Thema Bitcoin Wissen M ssen. Eine Einf hrung in Die Welt Der Kryptow hrung. (German,... Bitcoins F r Anf nger - Alles Was Sie Zum Thema Bitcoin Wissen M ssen. Eine Einf hrung in Die Welt Der Kryptow hrung. (German, Paperback)
Philip Sander
R348 Discovery Miles 3 480 Ships in 10 - 15 working days
Kali Linux - Guia completa para principiantes aprende Kali Linux paso a paso (Libro En Espanol/Kali Linux Spanish Book Version)... Kali Linux - Guia completa para principiantes aprende Kali Linux paso a paso (Libro En Espanol/Kali Linux Spanish Book Version) (Spanish, Paperback)
Ethan Thorpe
R538 Discovery Miles 5 380 Ships in 10 - 15 working days
Criptomonedas - Como lucrar del bitcoin, ethereum para aprendices (Guia para entender el litecoin, bitcoin y mas.) (Spanish,... Criptomonedas - Como lucrar del bitcoin, ethereum para aprendices (Guia para entender el litecoin, bitcoin y mas.) (Spanish, Paperback)
Peer Mota
R378 R348 Discovery Miles 3 480 Save R30 (8%) Ships in 10 - 15 working days
Criptomonedas - Comercio e inversion en bitcoin litecoin y otras mas (Metodos de comercio e inversion en bitcoin) (Spanish,... Criptomonedas - Comercio e inversion en bitcoin litecoin y otras mas (Metodos de comercio e inversion en bitcoin) (Spanish, Paperback)
Pablo Mora
R478 R443 Discovery Miles 4 430 Save R35 (7%) Ships in 10 - 15 working days
Criptomoneda - La guia definitiva para el comercio en criptomonedas (Aprendizaje sistematico acerca de invertir y comerciar en... Criptomoneda - La guia definitiva para el comercio en criptomonedas (Aprendizaje sistematico acerca de invertir y comerciar en criptomoneda) (Spanish, Paperback)
Ade Rael
R477 R441 Discovery Miles 4 410 Save R36 (8%) Ships in 10 - 15 working days
Criptomoneda - Consejos exitosos sobre el comercio en criptomoneda (Un libro lleno de conocimientos desde principiantes hasta... Criptomoneda - Consejos exitosos sobre el comercio en criptomoneda (Un libro lleno de conocimientos desde principiantes hasta avanzados) (Spanish, Paperback)
Yoel Pagan
R482 R447 Discovery Miles 4 470 Save R35 (7%) Ships in 10 - 15 working days
Blockchain - Die revolution re Technologie erkl rt. Das System, ihre Anwendungen und Gefahren. (German, Paperback): Peter... Blockchain - Die revolution re Technologie erkl rt. Das System, ihre Anwendungen und Gefahren. (German, Paperback)
Peter Steger Steger
R370 Discovery Miles 3 700 Ships in 10 - 15 working days
Ethereum fur Anfanger - Alles was Sie zum Thema Ethereum wissen mussen. Eine Einfuhrung in die Welt der Kryptowahrungen.... Ethereum fur Anfanger - Alles was Sie zum Thema Ethereum wissen mussen. Eine Einfuhrung in die Welt der Kryptowahrungen. (German, Paperback)
Dustin James
R322 Discovery Miles 3 220 Ships in 10 - 15 working days
Blockchain fur Anfanger - Die Technologie, die unsere Zukunft fur immer verandern wird. Ein Anfangerguide fur die revolutionare... Blockchain fur Anfanger - Die Technologie, die unsere Zukunft fur immer verandern wird. Ein Anfangerguide fur die revolutionare Technologie der Zukunft. (German, Paperback)
Tom Richmund
R323 Discovery Miles 3 230 Ships in 10 - 15 working days
Hacking - 2 Livres En 1: Le Guide Complet Du Debutant Pour Apprendre Le Hacking Ethique Avec Python Avec Des Exemples Pratiques... Hacking - 2 Livres En 1: Le Guide Complet Du Debutant Pour Apprendre Le Hacking Ethique Avec Python Avec Des Exemples Pratiques & Le Guide Complet du Debutant aordinateur Hacking et Tests Penetration (French, Paperback)
Miles Price
R638 Discovery Miles 6 380 Ships in 10 - 15 working days
Hacking - 2 Libros En 1: La Guia Completa Para Principiantes De Aprendizaje De Hacking Etico Con Python Junto Con Ejemplos... Hacking - 2 Libros En 1: La Guia Completa Para Principiantes De Aprendizaje De Hacking Etico Con Python Junto Con Ejemplos Practicos & Guia Completa Del Principiante a la Pirateria Informatica y Pruebas De Penetracion (Spanish, Paperback)
Miles Price
R636 Discovery Miles 6 360 Ships in 10 - 15 working days
Journal of Cyber Security and Mobility (6-2) (Paperback): Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad Journal of Cyber Security and Mobility (6-2) (Paperback)
Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad
R1,073 Discovery Miles 10 730 Ships in 10 - 15 working days
Ketogene Di t - ISS Was Du Willst (German, Paperback): Julia Maier Ketogene Di t - ISS Was Du Willst (German, Paperback)
Julia Maier
R191 Discovery Miles 1 910 Ships in 10 - 15 working days
Kompendium Der Kryptologie - Die Welt Der Elektronischen Sicherheit in Theorie Und Praxis (German, Paperback): Gilbert Brands Kompendium Der Kryptologie - Die Welt Der Elektronischen Sicherheit in Theorie Und Praxis (German, Paperback)
Gilbert Brands
R668 Discovery Miles 6 680 Ships in 10 - 15 working days
Quantum Cryptography and Secret-Key Distillation (Hardcover): Gilles van Assche Quantum Cryptography and Secret-Key Distillation (Hardcover)
Gilles van Assche
R3,096 Discovery Miles 30 960 Ships in 12 - 19 working days

Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This self-contained text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secret-key distillation. The book starts with an overview chapter, progressing to classical cryptography, information theory (classical and quantum), and applications of quantum cryptography. The discussion moves to secret-key distillation, privacy amplification and reconciliation techniques, concluding with the security principles of quantum cryptography. The author explains the physical implementation and security of these systems, enabling engineers to gauge the suitability of quantum cryptography for securing transmission in their particular application. With its blend of fundamental theory, implementation techniques, and details of recent protocols, this book will be of interest to graduate students, researchers, and practitioners in electrical engineering, physics, and computer science.

Data Security Breaches - Context & Incident Summaries (Paperback): Rita Tehan Data Security Breaches - Context & Incident Summaries (Paperback)
Rita Tehan
R1,595 R1,078 Discovery Miles 10 780 Save R517 (32%) Ships in 12 - 19 working days

Personal data security breaches are being reported with increasing regularity. Within the past few years, numerous examples of data such as Social Security, bank account, credit card, and driver's license numbers, as well as medical and student records have been compromised. A major reason for the increased awareness of these security breaches is a California law that requires notice of security breaches to the affected individuals. This law, implemented in July 2003, was the first of its kind in the nation. State data security breach notification laws require companies and other entities that have lost data to notify affected consumers. As of January 2007, 35 states have enacted legislation requiring companies or state agencies to disclose security breaches involving personal information. Congress is considering legislation to address personal data security breaches, following a series of high-profile data security breaches at major financial services firms, data brokers (including ChoicePoint and LexisNexis), and universities. In the past three years, multiple measures have been introduced, but to date, none have been enacted.

Hacking Exposed Cisco Networks (Paperback, Ed): Andrew Vladimirov, Konstantin Gavrilenko, Andrei Mikhailovsky Hacking Exposed Cisco Networks (Paperback, Ed)
Andrew Vladimirov, Konstantin Gavrilenko, Andrei Mikhailovsky
R1,753 R1,445 Discovery Miles 14 450 Save R308 (18%) Ships in 10 - 15 working days

Implement bulletproof Cisco security the battle-tested "Hacking Exposed" way. .

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. "Hacking Exposed Cisco Networks" shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised networks. All device-specific and network-centered security issues are covered alongside real-world examples, in-depth case studies, and detailed countermeasures. Its all here--from switch, router, firewall, wireless, and VPN vulnerabilities to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. Youll prevent tomorrows catastrophe by learning how new flaws in Cisco-centered networks are discovered and abused by cyber-criminals. Plus, youll get undocumented Cisco commands, security evaluation templates, and vital security tools from hackingexposedcisco.com.. . . Use the tried-and-true "Hacking Exposed" methodology to find, exploit, and plug security holes in Cisco devices and networks. Locate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning. Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels . Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities. Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers. Find out how IOS exploits are written and if a Cisco router can be used as an attack platform. Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR. Prevent secret keys cracking, sneakydata link attacks, routing protocol exploits, and malicious physical access. . . .

Oracle9i RMAN Backup & Recovery (Paperback, Ed): Robert Freeman, Matthew Hart Oracle9i RMAN Backup & Recovery (Paperback, Ed)
Robert Freeman, Matthew Hart
R1,755 R1,447 Discovery Miles 14 470 Save R308 (18%) Ships in 10 - 15 working days

From the exclusive publishers of Oracle Press Books, here is the only book available offering complete coverage of RMAN (Recovery Manager), Oracle’s free backup and recovery technology. An indispensable resource for new Oracle users, database administrators, and system administrators.

Real-Time System Security (Hardcover): Brett Tjaden, Lonnie R. Welch Real-Time System Security (Hardcover)
Brett Tjaden, Lonnie R. Welch
R2,216 R1,762 Discovery Miles 17 620 Save R454 (20%) Ships in 12 - 19 working days

Mission critical real-time systems often function in environments that cannot be modelled with static approaches. Because of their (externally-driven) wide dynamic range of system operation, the number of data elements to be processed in an arbitrary period is unknown at the time of system engineering (other than an extremely pessimistic worst case sense). While it may be possible to determine a theoretical upper bound on the number of data items, the construction and maintenance of system components to handle worst-case conditions can be prohibitively costly. To accommodate such dynamic mission critical real-time systems, it is useful to design computing systems that allow reconfiguration and reallocation of resources by sharing a pool of distributed computational resources. Unfortunately, the problem of continuously providing critical system functions in such dynamic real-time environments is exacerbated when one considers attack vulnerability. The Internet has made mission critical real-time computer systems subject to an ever-changing array of attacks for which current defence mechanisms are insufficient. In order to combat intruders in this new environment, new techniques must be developed that enable decision makers to detect unusual behaviour in their systems, correlate anomalies into higher-level attacker goals, plan appropriate response actions, and execute their plans. This special book presents current work in this general area of real-time system security.

Computer Security - A Bibliography with Indexes (Hardcover): John S. Potts Computer Security - A Bibliography with Indexes (Hardcover)
John S. Potts
R2,224 R1,770 Discovery Miles 17 700 Save R454 (20%) Ships in 12 - 19 working days

We live in a wired society, with computers containing and passing around vital information on both personal and public matters. Keeping this data safe is of paramount concern to all. Yet, not a day seems able to pass without some new threat to our computers. Unfortunately, the march of technology has given us the benefits of computers and electronic tools, while also opening us to unforeseen dangers. Identity theft, electronic spying, and the like are now standard worries. In the effort to defend both personal privacy and crucial databases, computer security has become a key industry. A vast array of companies devoted to defending computers from hackers and viruses have cropped up. Research and academic institutions devote a considerable amount of time and effort to the study of information systems and computer security. Anyone with access to a computer needs to be aware of the developing trends and growth of computer security. To that end, this book presents a comprehensive and carefully selected bibliography of the literature most relevant to understanding computer security. Following the bibliography section, continued access is provided via author, title, and subject indexes. With such a format, this book serves as an important guide and reference tool in the defence of our computerised culture.

Rethinking Public Key Infrastructures and Digital Certificates - Building in Privacy (Paperback): Stefan Brands Rethinking Public Key Infrastructures and Digital Certificates - Building in Privacy (Paperback)
Stefan Brands
R1,271 Discovery Miles 12 710 Ships in 10 - 15 working days

Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are already widely used for authenticating and encrypting email and software, and eventually will be built into any device or piece of software that must be able to communicate securely. There is a serious problem, however, with this unavoidable trend: unless drastic measures are taken, everyone will be forced to communicate via what will be the most pervasive electronic surveillance tool ever built. There will also be abundant opportunity for misuse of digital certificates by hackers, unscrupulous employees, government agencies, financial institutions, insurance companies, and so on.In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that. Furthermore, different actions by the same person cannot be linked. Certificate holders have control over what information is disclosed, and to whom. Subsets of the proposed cryptographic building blocks can be used in combination, allowing a cookbook approach to the design of public key infrastructures. Potential applications include electronic cash, electronic postage, digital rights management, pseudonyms for online chat rooms, health care information storage, electronic voting, and even electronic gambling.

Writing Security - United States Foreign Policy and the Politics of Identity (Paperback, Revised): David Campbell Writing Security - United States Foreign Policy and the Politics of Identity (Paperback, Revised)
David Campbell
R643 Discovery Miles 6 430 Ships in 12 - 19 working days

Since the collapse of the Soviet Union, the United States has faced the challenge of reorienting its foreign policy to address post-Cold War conditions. In this new edition of a groundbreaking work -- one of the first to bring critical theory into dialogue with more traditional approaches to international relations -- David Campbell provides a fundamental reappraisal of American foreign policy, with a new epilogue to address current world affairs and the burgeoning focus on culture and identity in the study of international relations.

Extending recent debates in international relations, Campbell shows how perceptions of danger and difference work to establish the identity of the United States. He demonstrates how foreign policy, far from being an expression of a given society, constitutes state identity through the interpretation of danger posed by others.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Practical Guide to Usability Testing
Joseph S. Dumas, Janice C. Redish Paperback R1,042 Discovery Miles 10 420
Object-Oriented Programming in C++
NM Josuttis Paperback R1,813 Discovery Miles 18 130
Exergy Analysis of Heating…
Ibrahim Dincer, Marc A. Rosen Hardcover R5,255 R3,613 Discovery Miles 36 130
Maximum Dissipation Non-Equilibrium…
Henry W. Haslach Jr. Hardcover R6,493 Discovery Miles 64 930
Recent Advances in Computational…
Michael Schafer, Marek Behr, … Hardcover R2,882 Discovery Miles 28 820
Matrix Calculus And Kronecker Product…
Willi-Hans Steeb Hardcover R1,679 Discovery Miles 16 790
Computational Materials System Design
Dongwon Shin, James Saal Hardcover R4,236 Discovery Miles 42 360
The Oxford Handbook of Music and…
Sheila Whiteley, Shara Rambarran Hardcover R5,008 Discovery Miles 50 080
Molecular Physical Chemistry for…
Florin Emilian Danes, Silvia Danes, … Hardcover R2,693 Discovery Miles 26 930
CMOS Cookbook
Don Lancaster, Howard M. Berlin Paperback R1,072 Discovery Miles 10 720

 

Partners