0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (12)
  • R250 - R500 (86)
  • R500+ (1,344)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Einfuhrung in Die Quanteninformatik - Quantenkryptografie, Teleportation Und Quantencomputing (German, Paperback, 2011 ed.):... Einfuhrung in Die Quanteninformatik - Quantenkryptografie, Teleportation Und Quantencomputing (German, Paperback, 2011 ed.)
Gilbert Brands
R1,412 Discovery Miles 14 120 Ships in 10 - 15 working days

Ausgehend von der Theorie und den Protokollen der Quantenkryptografie werden in dem Band die Servicequalitaten vorgestellt, die angesichts der aktuellen technischen Moeglichkeiten erreichbar sind. Unter Berucksichtigung wenig beachteter Gesichtspunkte der Kryptoanalyse diskutiert der Autor die erreichbare Sicherheit und untersucht die Moeglichkeiten des Quantencomputing. Anhand praxisnaher Aufgaben koennen Leser ihr Wissen vertiefen und lernen, die Techniken kritisch zu bewerten. Mit Programmieranleitung fur Simulationsversuche auf dem eigenen Rechner.

Cryptanalysis (Paperback): Helen Fouche Gaines Cryptanalysis (Paperback)
Helen Fouche Gaines
R373 Discovery Miles 3 730 Ships in 12 - 19 working days

Thorough, systematic introduction to serious cryptography, especially strong in modern forms of cipher solution used by experts. Nihilist, grille, U. S. Army, key-phrase, multiple-alphabet, Gronsfeld, Porta, Beaufort, periodic ciphers and more. Simple and advanced methods. 166 specimens to solve-with solutions.

IT-Sicherheit fur Dummies (German, Paperback): Rw Gerling IT-Sicherheit fur Dummies (German, Paperback)
Rw Gerling
R681 Discovery Miles 6 810 Ships in 12 - 19 working days
Criptomoneda - La guia definitiva para el comercio en criptomonedas (Haga una gran cantidad de dinero con criptomonedas)... Criptomoneda - La guia definitiva para el comercio en criptomonedas (Haga una gran cantidad de dinero con criptomonedas) (Spanish, Paperback)
Jair Luna
R472 R436 Discovery Miles 4 360 Save R36 (8%) Ships in 10 - 15 working days
Modulation Theory (Hardcover): Marcelo Sampaio De Alencar Modulation Theory (Hardcover)
Marcelo Sampaio De Alencar
R1,056 Discovery Miles 10 560 Ships in 10 - 15 working days

In recent years, a considerable amount of effort has been devoted, both in industry and academia, towards the design, performance analysis and evaluation of modulation schemes to be used in wireless and optical networks, towards the development of the next and future generations of mobile cellular communication systems. Modulation Theory is intended to serve as a complementary textbook for courses dealing with Modulation Theory or Communication Systems, but also as a professional book, for engineers who need to update their knowledge in the communications area. The modulation aspects presented in the book use modern concepts of stochastic processes, such as autocorrelation and power spectrum density, which are novel for undergraduate texts or professional books, and provides a general approach for the theory, with real life results, applied to professional design. This text is suitable for the undergraduate as well as the initial graduate levels of Electrical Engineering courses, and is useful for the professional who wants to review or get acquainted with the a modern exposition of the modulation theory. The book covers signal representations for most known waveforms, Fourier analysis, and presents an introduction to Fourier transform and signal spectrum, including the concepts of convolution, autocorrelation and power spectral density, for deterministic signals. It introduces the concepts of probability, random variables and stochastic processes, including autocorrelation, cross-correlation, power spectral and cross-spectral densities, for random signals, and their applications to the analysis of linear systems. This chapter also includes the response of specific non-linear systems, such as power amplifiers. The book presents amplitude modulation with random signals, including analog and digital signals, and discusses performance evaluation methods, presents quadrature amplitude modulation using random signals. Several modulation schemes are discussed, including SSB, QAM, ISB, C-QUAM, QPSK and MSK. Their autocorrelation and power spectrum densities are computed. A thorough discussion on angle modulation with random modulating signals, along with frequency and phase modulation, and orthogonal frequency division multiplexing is provided. Their power spectrum densities are computed using the Wiener-Khintchin theorem.

Hacking - 2 B cher in 1: Der Vollst ndige Anf ngerleitfaden Zum Erlernen Ethischen Hackens Mit Python Und Praktischen... Hacking - 2 B cher in 1: Der Vollst ndige Anf ngerleitfaden Zum Erlernen Ethischen Hackens Mit Python Und Praktischen Beispielen & Der Anf nger Leitfaden F r Computer Hacking Und Penetration Testen (German, Paperback)
Miles Price
R637 Discovery Miles 6 370 Ships in 10 - 15 working days
21 oppituntia - Mita olen oppinut pudottuani Bitcoinin kaninkoloon (Finnish, Paperback): Thomas Brand, Laura Oinonen, Jussi... 21 oppituntia - Mita olen oppinut pudottuani Bitcoinin kaninkoloon (Finnish, Paperback)
Thomas Brand, Laura Oinonen, Jussi Makipelto
R305 Discovery Miles 3 050 Ships in 10 - 15 working days
Bitcoin begreifen (German, Paperback): Volker Herminghaus Bitcoin begreifen (German, Paperback)
Volker Herminghaus; Kalle Rosenbaum
R763 Discovery Miles 7 630 Ships in 10 - 15 working days
Cryptomonedas - Como lucrar del bitcoin, ethereum para aprendices (Como invertir y comerciar en criptomoneda?) (Spanish,... Cryptomonedas - Como lucrar del bitcoin, ethereum para aprendices (Como invertir y comerciar en criptomoneda?) (Spanish, Paperback)
Ione Diaz
R471 R434 Discovery Miles 4 340 Save R37 (8%) Ships in 10 - 15 working days
Criptomonedas - Una guia completa para invertir en bitcoin, altcoin, litecoin y mas (Guia para entender el litecoin, bitcoin y... Criptomonedas - Una guia completa para invertir en bitcoin, altcoin, litecoin y mas (Guia para entender el litecoin, bitcoin y mas.) (Spanish, Paperback)
Eryk Marin
R497 R466 Discovery Miles 4 660 Save R31 (6%) Ships in 10 - 15 working days
Criptomoneda - Consejos exitosos sobre el comercio en criptomoneda (Una guia completa para invertir e intercambiar en... Criptomoneda - Consejos exitosos sobre el comercio en criptomoneda (Una guia completa para invertir e intercambiar en blockchains) (Spanish, Paperback)
Bart Soliz
R400 R369 Discovery Miles 3 690 Save R31 (8%) Ships in 10 - 15 working days
Bitcoins F r Anf nger - Alles Was Sie Zum Thema Bitcoin Wissen M ssen. Eine Einf hrung in Die Welt Der Kryptow hrung. (German,... Bitcoins F r Anf nger - Alles Was Sie Zum Thema Bitcoin Wissen M ssen. Eine Einf hrung in Die Welt Der Kryptow hrung. (German, Paperback)
Philip Sander
R348 Discovery Miles 3 480 Ships in 10 - 15 working days
Kali Linux - Guia completa para principiantes aprende Kali Linux paso a paso (Libro En Espanol/Kali Linux Spanish Book Version)... Kali Linux - Guia completa para principiantes aprende Kali Linux paso a paso (Libro En Espanol/Kali Linux Spanish Book Version) (Spanish, Paperback)
Ethan Thorpe
R538 Discovery Miles 5 380 Ships in 10 - 15 working days
Criptomoneda - La guia definitiva para el comercio en criptomonedas (Aprendizaje sistematico acerca de invertir y comerciar en... Criptomoneda - La guia definitiva para el comercio en criptomonedas (Aprendizaje sistematico acerca de invertir y comerciar en criptomoneda) (Spanish, Paperback)
Ade Rael
R477 R441 Discovery Miles 4 410 Save R36 (8%) Ships in 10 - 15 working days
Blockchain - Die revolution re Technologie erkl rt. Das System, ihre Anwendungen und Gefahren. (German, Paperback): Peter... Blockchain - Die revolution re Technologie erkl rt. Das System, ihre Anwendungen und Gefahren. (German, Paperback)
Peter Steger Steger
R370 Discovery Miles 3 700 Ships in 10 - 15 working days
Ethereum fur Anfanger - Alles was Sie zum Thema Ethereum wissen mussen. Eine Einfuhrung in die Welt der Kryptowahrungen.... Ethereum fur Anfanger - Alles was Sie zum Thema Ethereum wissen mussen. Eine Einfuhrung in die Welt der Kryptowahrungen. (German, Paperback)
Dustin James
R322 Discovery Miles 3 220 Ships in 10 - 15 working days
Blockchain fur Anfanger - Die Technologie, die unsere Zukunft fur immer verandern wird. Ein Anfangerguide fur die revolutionare... Blockchain fur Anfanger - Die Technologie, die unsere Zukunft fur immer verandern wird. Ein Anfangerguide fur die revolutionare Technologie der Zukunft. (German, Paperback)
Tom Richmund
R323 Discovery Miles 3 230 Ships in 10 - 15 working days
Journal of Cyber Security and Mobility (6-2) (Paperback): Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad Journal of Cyber Security and Mobility (6-2) (Paperback)
Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad
R1,073 Discovery Miles 10 730 Ships in 10 - 15 working days
Ketogene Di t - ISS Was Du Willst (German, Paperback): Julia Maier Ketogene Di t - ISS Was Du Willst (German, Paperback)
Julia Maier
R191 Discovery Miles 1 910 Ships in 10 - 15 working days
Kompendium Der Kryptologie - Die Welt Der Elektronischen Sicherheit in Theorie Und Praxis (German, Paperback): Gilbert Brands Kompendium Der Kryptologie - Die Welt Der Elektronischen Sicherheit in Theorie Und Praxis (German, Paperback)
Gilbert Brands
R668 Discovery Miles 6 680 Ships in 10 - 15 working days
Quantum Cryptography and Secret-Key Distillation (Hardcover): Gilles van Assche Quantum Cryptography and Secret-Key Distillation (Hardcover)
Gilles van Assche
R3,096 Discovery Miles 30 960 Ships in 12 - 19 working days

Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This self-contained text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secret-key distillation. The book starts with an overview chapter, progressing to classical cryptography, information theory (classical and quantum), and applications of quantum cryptography. The discussion moves to secret-key distillation, privacy amplification and reconciliation techniques, concluding with the security principles of quantum cryptography. The author explains the physical implementation and security of these systems, enabling engineers to gauge the suitability of quantum cryptography for securing transmission in their particular application. With its blend of fundamental theory, implementation techniques, and details of recent protocols, this book will be of interest to graduate students, researchers, and practitioners in electrical engineering, physics, and computer science.

Data Security Breaches - Context & Incident Summaries (Paperback): Rita Tehan Data Security Breaches - Context & Incident Summaries (Paperback)
Rita Tehan
R1,595 R1,078 Discovery Miles 10 780 Save R517 (32%) Ships in 12 - 19 working days

Personal data security breaches are being reported with increasing regularity. Within the past few years, numerous examples of data such as Social Security, bank account, credit card, and driver's license numbers, as well as medical and student records have been compromised. A major reason for the increased awareness of these security breaches is a California law that requires notice of security breaches to the affected individuals. This law, implemented in July 2003, was the first of its kind in the nation. State data security breach notification laws require companies and other entities that have lost data to notify affected consumers. As of January 2007, 35 states have enacted legislation requiring companies or state agencies to disclose security breaches involving personal information. Congress is considering legislation to address personal data security breaches, following a series of high-profile data security breaches at major financial services firms, data brokers (including ChoicePoint and LexisNexis), and universities. In the past three years, multiple measures have been introduced, but to date, none have been enacted.

Hacking Exposed Cisco Networks (Paperback, Ed): Andrew Vladimirov, Konstantin Gavrilenko, Andrei Mikhailovsky Hacking Exposed Cisco Networks (Paperback, Ed)
Andrew Vladimirov, Konstantin Gavrilenko, Andrei Mikhailovsky
R1,753 R1,445 Discovery Miles 14 450 Save R308 (18%) Ships in 10 - 15 working days

Implement bulletproof Cisco security the battle-tested "Hacking Exposed" way. .

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. "Hacking Exposed Cisco Networks" shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised networks. All device-specific and network-centered security issues are covered alongside real-world examples, in-depth case studies, and detailed countermeasures. Its all here--from switch, router, firewall, wireless, and VPN vulnerabilities to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. Youll prevent tomorrows catastrophe by learning how new flaws in Cisco-centered networks are discovered and abused by cyber-criminals. Plus, youll get undocumented Cisco commands, security evaluation templates, and vital security tools from hackingexposedcisco.com.. . . Use the tried-and-true "Hacking Exposed" methodology to find, exploit, and plug security holes in Cisco devices and networks. Locate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning. Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels . Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities. Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers. Find out how IOS exploits are written and if a Cisco router can be used as an attack platform. Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR. Prevent secret keys cracking, sneakydata link attacks, routing protocol exploits, and malicious physical access. . . .

Oracle9i RMAN Backup & Recovery (Paperback, Ed): Robert Freeman, Matthew Hart Oracle9i RMAN Backup & Recovery (Paperback, Ed)
Robert Freeman, Matthew Hart
R1,755 R1,447 Discovery Miles 14 470 Save R308 (18%) Ships in 10 - 15 working days

From the exclusive publishers of Oracle Press Books, here is the only book available offering complete coverage of RMAN (Recovery Manager), Oracle’s free backup and recovery technology. An indispensable resource for new Oracle users, database administrators, and system administrators.

Real-Time System Security (Hardcover): Brett Tjaden, Lonnie R. Welch Real-Time System Security (Hardcover)
Brett Tjaden, Lonnie R. Welch
R2,216 R1,762 Discovery Miles 17 620 Save R454 (20%) Ships in 12 - 19 working days

Mission critical real-time systems often function in environments that cannot be modelled with static approaches. Because of their (externally-driven) wide dynamic range of system operation, the number of data elements to be processed in an arbitrary period is unknown at the time of system engineering (other than an extremely pessimistic worst case sense). While it may be possible to determine a theoretical upper bound on the number of data items, the construction and maintenance of system components to handle worst-case conditions can be prohibitively costly. To accommodate such dynamic mission critical real-time systems, it is useful to design computing systems that allow reconfiguration and reallocation of resources by sharing a pool of distributed computational resources. Unfortunately, the problem of continuously providing critical system functions in such dynamic real-time environments is exacerbated when one considers attack vulnerability. The Internet has made mission critical real-time computer systems subject to an ever-changing array of attacks for which current defence mechanisms are insufficient. In order to combat intruders in this new environment, new techniques must be developed that enable decision makers to detect unusual behaviour in their systems, correlate anomalies into higher-level attacker goals, plan appropriate response actions, and execute their plans. This special book presents current work in this general area of real-time system security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Python Programming Crash Course - A…
Robert Campbell Hardcover R1,165 R989 Discovery Miles 9 890
Computer Programming The Doctrine - An…
Adesh Silva Hardcover R692 R614 Discovery Miles 6 140
Advances in Inductive Logic Programming
Luc de Raedt Hardcover R2,978 Discovery Miles 29 780
Advances in Design and Specification…
Sorin Alexander Huss Hardcover R4,562 Discovery Miles 45 620
Identity and Collaboration in World of…
Phillip Michael Alexander Hardcover R1,552 Discovery Miles 15 520
Mastering Machine Code on Your Commodore…
Mark Greenshields Hardcover R722 Discovery Miles 7 220
Unified low-power design flow for…
Francky Catthoor Hardcover R4,466 Discovery Miles 44 660
Missile Commander - A Journey to the Top…
Tony Temple Hardcover R987 Discovery Miles 9 870
Set Theory for Computing - From Decision…
Domenico Cantone Hardcover R4,426 Discovery Miles 44 260
The Overwatch Short Story Collection
Alyssa Wong, Michael Chu, … Hardcover R404 Discovery Miles 4 040

 

Partners