0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (16)
  • R250 - R500 (90)
  • R500+ (1,349)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Hacking - 2 Livres En 1: Le Guide Complet Du Debutant Pour Apprendre Le Hacking Ethique Avec Python Avec Des Exemples Pratiques... Hacking - 2 Livres En 1: Le Guide Complet Du Debutant Pour Apprendre Le Hacking Ethique Avec Python Avec Des Exemples Pratiques & Le Guide Complet du Debutant aordinateur Hacking et Tests Penetration (French, Paperback)
Miles Price
R630 Discovery Miles 6 300 Ships in 10 - 15 working days
Blockchain - Die revolution re Technologie erkl rt. Das System, ihre Anwendungen und Gefahren. (German, Paperback): Peter... Blockchain - Die revolution re Technologie erkl rt. Das System, ihre Anwendungen und Gefahren. (German, Paperback)
Peter Steger Steger
R348 Discovery Miles 3 480 Ships in 10 - 15 working days
Ethereum fur Anfanger - Alles was Sie zum Thema Ethereum wissen mussen. Eine Einfuhrung in die Welt der Kryptowahrungen.... Ethereum fur Anfanger - Alles was Sie zum Thema Ethereum wissen mussen. Eine Einfuhrung in die Welt der Kryptowahrungen. (German, Paperback)
Dustin James
R303 Discovery Miles 3 030 Ships in 10 - 15 working days
Blockchain fur Anfanger - Die Technologie, die unsere Zukunft fur immer verandern wird. Ein Anfangerguide fur die revolutionare... Blockchain fur Anfanger - Die Technologie, die unsere Zukunft fur immer verandern wird. Ein Anfangerguide fur die revolutionare Technologie der Zukunft. (German, Paperback)
Tom Richmund
R304 Discovery Miles 3 040 Ships in 10 - 15 working days
Ketogene Di t - ISS Was Du Willst (German, Paperback): Julia Maier Ketogene Di t - ISS Was Du Willst (German, Paperback)
Julia Maier
R179 Discovery Miles 1 790 Ships in 10 - 15 working days
Journal of Cyber Security and Mobility (6-2) (Paperback): Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad Journal of Cyber Security and Mobility (6-2) (Paperback)
Ashutosh Dutta, Wojciech Mazurczyk, Neeli R. Prasad
R1,079 Discovery Miles 10 790 Ships in 10 - 15 working days
Kompendium Der Kryptologie - Die Welt Der Elektronischen Sicherheit in Theorie Und Praxis (German, Paperback): Gilbert Brands Kompendium Der Kryptologie - Die Welt Der Elektronischen Sicherheit in Theorie Und Praxis (German, Paperback)
Gilbert Brands
R664 Discovery Miles 6 640 Ships in 10 - 15 working days
Designing Bsd Rootkits (Paperback): Joseph Kong Designing Bsd Rootkits (Paperback)
Joseph Kong
R916 Discovery Miles 9 160 Ships in 10 - 15 working days

Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process. Organized as a tutorial, Designing BSD Rootkits will teach you the fundamentals of programming and developing rootkits under the FreeBSD operating system. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD. Kongs liberal use of examples assumes no prior kernel-hacking experience but doesn't water down the information. All code is thoroughly described and analyzed, and each chapter contains at least one real-world application.Included: The fundamentals of FreeBSD kernel module programming Using call hooking to subvert the FreeBSD kernel Directly manipulating the objects the kernel depends upon for its internal record-keeping Patching kernel code resident in main memory; in other words, altering the kernel's logic while it's still running How to defend against the attacks described Hack the FreeBSD kernel for yourself

Hacking Exposed Cisco Networks (Paperback, Ed): Andrew Vladimirov, Konstantin Gavrilenko, Andrei Mikhailovsky Hacking Exposed Cisco Networks (Paperback, Ed)
Andrew Vladimirov, Konstantin Gavrilenko, Andrei Mikhailovsky
R1,799 R1,461 Discovery Miles 14 610 Save R338 (19%) Ships in 10 - 15 working days

Implement bulletproof Cisco security the battle-tested "Hacking Exposed" way. .

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. "Hacking Exposed Cisco Networks" shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised networks. All device-specific and network-centered security issues are covered alongside real-world examples, in-depth case studies, and detailed countermeasures. Its all here--from switch, router, firewall, wireless, and VPN vulnerabilities to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. Youll prevent tomorrows catastrophe by learning how new flaws in Cisco-centered networks are discovered and abused by cyber-criminals. Plus, youll get undocumented Cisco commands, security evaluation templates, and vital security tools from hackingexposedcisco.com.. . . Use the tried-and-true "Hacking Exposed" methodology to find, exploit, and plug security holes in Cisco devices and networks. Locate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning. Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels . Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities. Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers. Find out how IOS exploits are written and if a Cisco router can be used as an attack platform. Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR. Prevent secret keys cracking, sneakydata link attacks, routing protocol exploits, and malicious physical access. . . .

Oracle9i RMAN Backup & Recovery (Paperback, Ed): Robert Freeman, Matthew Hart Oracle9i RMAN Backup & Recovery (Paperback, Ed)
Robert Freeman, Matthew Hart
R1,802 R1,463 Discovery Miles 14 630 Save R339 (19%) Ships in 10 - 15 working days

From the exclusive publishers of Oracle Press Books, here is the only book available offering complete coverage of RMAN (Recovery Manager), Oracle’s free backup and recovery technology. An indispensable resource for new Oracle users, database administrators, and system administrators.

Maximum Windows 2000 Security (Paperback): Anonymous, Mark Burnett, L Locher, Chris Doyle, Chris Amaris, Rand Morimoto Maximum Windows 2000 Security (Paperback)
Anonymous, Mark Burnett, L Locher, Chris Doyle, Chris Amaris, …
R1,436 R1,188 Discovery Miles 11 880 Save R248 (17%) Ships in 10 - 15 working days

Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.

Topics include:

  • Physical & File System Security,
  • Password Security,
  • Malicious Code,
  • Windows 2000 Network Security Architecture and Professional Protocols,
  • Web Server Security,
  • Denial of Service Attacks,
  • Intrusion Detection,
  • Hacking Secure Code in Windows 2000.
  • Rethinking Public Key Infrastructures and Digital Certificates - Building in Privacy (Paperback): Stefan Brands Rethinking Public Key Infrastructures and Digital Certificates - Building in Privacy (Paperback)
    Stefan Brands
    R1,282 Discovery Miles 12 820 Ships in 10 - 15 working days

    Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are already widely used for authenticating and encrypting email and software, and eventually will be built into any device or piece of software that must be able to communicate securely. There is a serious problem, however, with this unavoidable trend: unless drastic measures are taken, everyone will be forced to communicate via what will be the most pervasive electronic surveillance tool ever built. There will also be abundant opportunity for misuse of digital certificates by hackers, unscrupulous employees, government agencies, financial institutions, insurance companies, and so on.In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens: anyone can establish their validity and the data they specify, but no more than that. Furthermore, different actions by the same person cannot be linked. Certificate holders have control over what information is disclosed, and to whom. Subsets of the proposed cryptographic building blocks can be used in combination, allowing a cookbook approach to the design of public key infrastructures. Potential applications include electronic cash, electronic postage, digital rights management, pseudonyms for online chat rooms, health care information storage, electronic voting, and even electronic gambling.

    Protecting Yourself Online - The Definitive Resource on Safety, Freedom, and Privacy in Cyberspace (Paperback, New): Robert B... Protecting Yourself Online - The Definitive Resource on Safety, Freedom, and Privacy in Cyberspace (Paperback, New)
    Robert B Gelman, Stanton McCandlish
    R410 R371 Discovery Miles 3 710 Save R39 (10%) Ships in 10 - 15 working days

    Like any new frontier, cyberspace offers both exhilarating possibilities and unforeseen hazards. As personal information about us travels the globe on high-speed networks, often with neither our knowledge nor our consent, a solid understanding of privacy and security issues is vital to the preservation of our rights and civil liberties. In reaping the benefits of the information age while safeguarding ourselves from its perils, the choices we make and the precedents we establish today will be central in defining the future of the electronic frontier.

    Since 1991, the non-profit Electronic Frontier Foundation (EFF) has worked to protect freedoms and advocate responsibility in new media and the online world. In Protecting Yourself Online,  Robert Gelman has drawn on the collective insight and experience of EFF to present a comprehensive guide to self-protection in the electronic frontier. In accessible, clear-headed language, Protecting Yourself Online  addresses such issues as:

    • avoiding spam [junk mail]
    • spotting online scams and hoaxes
    • protecting yourself from identity theft and fraud
    • guarding your email privacy [and knowing when you can't]
    • assessing the danger of viruses
    • keeping the net free of censorship and safe for your children
    • protecting your intellectual property

    Produced by the leading civil libertarians of the digital age, and including a foreword by one of the most respected leaders in global business and the cyberworld, Esther Dyson, Protecting Yourself Online is an essential resource for new media newcomers and old Internet hands alike.

    Security Analysis (Hardcover, 5th edition): Sidney Cottle, Roger Murray, Frank Block Security Analysis (Hardcover, 5th edition)
    Sidney Cottle, Roger Murray, Frank Block
    R2,369 R1,945 Discovery Miles 19 450 Save R424 (18%) Ships in 10 - 15 working days

    Maintaining the high standards of prior editions, Security Analysis puts at your fingertips the authoritative guidance on analyzing securities that generations of investment bankers have come to rely on.

    Modulation Theory (Hardcover): Marcelo Sampaio De Alencar Modulation Theory (Hardcover)
    Marcelo Sampaio De Alencar
    R1,062 Discovery Miles 10 620 Ships in 10 - 15 working days

    In recent years, a considerable amount of effort has been devoted, both in industry and academia, towards the design, performance analysis and evaluation of modulation schemes to be used in wireless and optical networks, towards the development of the next and future generations of mobile cellular communication systems. Modulation Theory is intended to serve as a complementary textbook for courses dealing with Modulation Theory or Communication Systems, but also as a professional book, for engineers who need to update their knowledge in the communications area. The modulation aspects presented in the book use modern concepts of stochastic processes, such as autocorrelation and power spectrum density, which are novel for undergraduate texts or professional books, and provides a general approach for the theory, with real life results, applied to professional design. This text is suitable for the undergraduate as well as the initial graduate levels of Electrical Engineering courses, and is useful for the professional who wants to review or get acquainted with the a modern exposition of the modulation theory. The book covers signal representations for most known waveforms, Fourier analysis, and presents an introduction to Fourier transform and signal spectrum, including the concepts of convolution, autocorrelation and power spectral density, for deterministic signals. It introduces the concepts of probability, random variables and stochastic processes, including autocorrelation, cross-correlation, power spectral and cross-spectral densities, for random signals, and their applications to the analysis of linear systems. This chapter also includes the response of specific non-linear systems, such as power amplifiers. The book presents amplitude modulation with random signals, including analog and digital signals, and discusses performance evaluation methods, presents quadrature amplitude modulation using random signals. Several modulation schemes are discussed, including SSB, QAM, ISB, C-QUAM, QPSK and MSK. Their autocorrelation and power spectrum densities are computed. A thorough discussion on angle modulation with random modulating signals, along with frequency and phase modulation, and orthogonal frequency division multiplexing is provided. Their power spectrum densities are computed using the Wiener-Khintchin theorem.

    The Business of Cybersecurity - Foundations and Ideologies (Paperback): Ashwini Sathnur The Business of Cybersecurity - Foundations and Ideologies (Paperback)
    Ashwini Sathnur
    R631 R528 Discovery Miles 5 280 Save R103 (16%) Ships in 10 - 15 working days

    Cybersecurity could be defined as, beginning of the concept of trust and belief in cyber transactions. The era of computing began in the 20th century, with an enormous investment on computational research. Software programing languages were the foundational blocks of history of computing. Progressive research then led to networking, bringing about the formation of connectivity. Along with these creations, there was an accompanying factor of compromise on data privacy and hacking of data. This factor was the introduction to cyber security. This book is primarily created for the objective of knowledge sharing and knowledge-enabling on the conceptual ideologies of the cybersecurity. This book is aimed at students, early-career researchers, and also advanced researchers and professionals. The case studies described in the book create renewed knowledge on the innovations built on the applied theories of cybersecurity. These case studies focus on the financial markets and space technologies.

    Introduction to Certificateless Cryptography (Hardcover): Hu Xiong, Zhen Qin, Athanasios V Vasilakos Introduction to Certificateless Cryptography (Hardcover)
    Hu Xiong, Zhen Qin, Athanasios V Vasilakos
    R2,521 Discovery Miles 25 210 Ships in 12 - 17 working days

    As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC. Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.

    Foundations of Coding - Compression, Encryption, Error Correction (Hardcover): JG Dumas Foundations of Coding - Compression, Encryption, Error Correction (Hardcover)
    JG Dumas
    R2,608 R2,103 Discovery Miles 21 030 Save R505 (19%) Out of stock

    Offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations This book offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations. This text focuses on the ways to structure information so that its transmission will be in the safest, quickest, and most efficient and error-free manner possible. All coding operations are covered in a single framework, with initial chapters addressing early mathematical models and algorithmic developments which led to the structure of code. After discussing the general foundations of code, chapters proceed to cover individual topics such as notions of compression, cryptography, detection, and correction codes. Both classical coding theories and the most cutting-edge models are addressed, along with helpful exercises of varying complexities to enhance comprehension. * Explains how to structure coding information so that its transmission is safe, error-free, efficient, and fast * Includes a pseudo-code that readers may implement in their preferential programming language * Features descriptive diagrams and illustrations, and almost 150 exercises, with corrections, of varying complexity to enhance comprehension Foundations of Coding: Compression, Encryption, Error-Correction is an invaluable resource for understanding the various ways information is structured for its secure and reliable transmission in the 21st-century world.

    Multimedia Content Encryption - Techniques and Applications (Hardcover): Shiguo Lian Multimedia Content Encryption - Techniques and Applications (Hardcover)
    Shiguo Lian
    R3,633 Discovery Miles 36 330 Ships in 12 - 17 working days

    "How to Design a Secure Multimedia Encryption Scheme"


    The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or unauthorized use, it must be secured through encryption prior to its transmission or distribution. Multimedia Content Encryption: "Techniques and Applications" presents the latest research results in this dynamic field.

    Examines the Latest Encryption Techniques

    The book begins with the history of multimedia encryption and then examines general performance requirements of encryption and fundamental encrypting techniques. It discusses common techniques of complete, partial, and compression-combined encryption; as well as the more specialized forms, including perception, scalable, and commutative encryption. In addition, the author reviews watermarking and joint fingerprint embedding and decryption. Later chapters discuss typical attacks on multimedia encryption, as well as the principles for designing secure algorithms and various applications. An exploration of open issues, up-and-coming topics, and areas for further research rounds out the coverage.

    Shiguo Lian is the author or co-author of more than fifty peer-reviewed journal and conference articles covering topics of network security and multimedia content protection, including cryptography, secure P2P content sharing, digital rights management (DRM), encryption, watermarking, digital fingerprinting, and authentication. By following the techniques outlined in this book, users will be better able to protect theintegrity of their multimedia data and develop greater confidence that their data will not be misappropriated.

    Testing Code Security (Hardcover): Maura A. van der Linden Testing Code Security (Hardcover)
    Maura A. van der Linden
    R2,960 Discovery Miles 29 600 Ships in 12 - 17 working days

    The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and terminology, and can take a colossal amount of time and data mining to find. Written in simple, common terms, Testing Code Security is a consolidated resource designed to teach beginning and intermediate testers the software security concepts needed to conduct relevant and effective tests. Answering the questions pertinent to all testing procedures, the book considers the differences in process between security testing and functional testing, the creation of a security test plan, the benefits and pitfalls of threat-modeling, and the identification of root vulnerability problems and how to test for them. The book begins with coverage of foundation concepts, the process of security test planning, and the test pass. Offering real life examples, it presents various vulnerabilities and attacks and explains the testing techniques appropriate for each. It concludes with a collection of background overviews on related topics to fill common knowledge gaps. Filled with cases illustrating the most common classes of security vulnerabilities, the book is written for all testers working in any environment, and it gives extra insight to threats particular to Microsoft Windows (R) platforms. Providing a practical guide on how to carry out the task of security software testing, Testing Code Security gives the reader the knowledge needed to begin testing software security for any project and become an integral part in the drive to produce better software security and safety.

    Securing Windows NT/2000 - From Policies to Firewalls (Paperback): Michael A. Simonyi Securing Windows NT/2000 - From Policies to Firewalls (Paperback)
    Michael A. Simonyi
    R2,959 Discovery Miles 29 590 Ships in 12 - 17 working days

    In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations require a massive dose of security to protect themselves and their digital assets from unwanted intruders. A managerial guide and practical technical tutorial, Securing Windows NT/2000: From Policies to Firewalls provides viable security solutions for your organization.

    The author presents in-depth knowledge on how, why, and where these operating systems must be tuned in order to use them securely to connect to the Internet. The book includes the steps required to define a corporate security policy, how to implement that policy, and how to structure the project plan. Tables, charts, and work templates provide a starting point to begin assessing and implementing a solution that will fit the unique needs of your organization. Part two provides the reader with practical hands-on applications for the preparation, installation, and tuning of Windows NT/2000 operating systems.

    Securing Windows NT/2000 provides step-by-step instructions that guide you through performing a secure installation and in preparing the system for secure operation on the Internet. Although a multitude of firewall application software can be used in conjunction with the sections detailing the securing of the operating system, Check Point FireWall-1/VPN-1 is used as it best demonstrates the effectiveness of translating the corporate security policy into a practical reality.

    About the Author:

    Michael Simonyi (www.stonewallem.com) is an IT professional working for private sector enterprise organizations. He has over 12 years of practical and theoretical experience, from mainframe systems to PC client/server networks. His areas of expertise center on practical systems management, networking, databases, and application architecture, with emphasis on quality.

    Multimedia Watermarking Techniques and Applications (Hardcover): Darko Kirovski Multimedia Watermarking Techniques and Applications (Hardcover)
    Darko Kirovski
    R3,650 Discovery Miles 36 500 Ships in 12 - 17 working days

    Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies.
    Multimedia Watermarking Techniques and Applications covers all current and future trends in the design of modern systems that use watermarking to protect multimedia content. Containing the works of contributing authors who are worldwide experts in the field, this volume is intended for researchers and practitioners, as well as for those who want a broad understanding of multimedia security. In the wake of the explosive growth of digital entertainment and Internet applications, this book is the definitive resource on the subject for scientists, researchers, programmers, engineers, business managers, entrepreneurs, and investors.

    Atomic Transactions - In Concurrent and Distributed Systems (Paperback): Nancy A. Lynch, Michael Merritt, William E. Weihl,... Atomic Transactions - In Concurrent and Distributed Systems (Paperback)
    Nancy A. Lynch, Michael Merritt, William E. Weihl, Alan Fekete
    R2,979 Discovery Miles 29 790 Out of stock

    This book develops a theory for transactions that provides practical solutions for system developers, focusing on the interface between the user and the database that executes transactions. Atomic transactions are a useful abstraction for programming concurrent and distributed data processing systems. Presents many important algorithms which provide maximum concurrency for transaction processing without sacrificing data integrity. The authors include a well-developed data processing case study to help readers understand transaction processing algorithms more clearly. The book offers conceptual tools for the design of new algorithms, and for devising variations on the familiar algorithms presented in the discussions. Whether your background is in the development of practical systems or formal methods, this book will offer you a new way to view distributed systems.

    Cryptography for Developers 2016 (Paperback): Jose Estevez Cryptography for Developers 2016 (Paperback)
    Jose Estevez
    R877 R829 Discovery Miles 8 290 Save R48 (5%) Out of stock

    Cryptography for Developers gives developers the practical cryptographic tools they need in their daily work. It also provides them the contextual knowledge to understand how these 21st-century cryptographic tools have been fashioned in response to theoretical and technological advances in mathematics and computers that rendered the paradigms of classic and late 20th-century cryptography obsolete. The book focuses on the recipes for algorithms most commonly deployed by developers in practical applications, without delving into the details of the mathematical theory underlying them. The technical presentation of each algorithm in code is accompanied by a narrative account of the algorithm's applications and historical development. Depending on the reader's interest level, Cryptography for Developers may be read in its entirety or in its thematic parts, either as a technical manual of algorithms or as an introductory survey of modern cryptography. The technical heart of Cryptography for Developers describes cryptographic algorithms in current use, explains how they work and how to use them, and provides abundant practical examples from the libraries of popular programming languages, including Ruby, Java, C, PHP, JavaScript, Python, and Perl. Software architect Jose Maria Estevez proceeds to demonstrate with plentiful examples the protocols for combining algorithms and the methods for solving cryptographic problems commonly encountered by developers. The narrative portion of the book surveys the development of classical cryptography from ancient Athens through World War II, the computerization of cryptography in the second half of the 20th century, the explosive growth and proliferation of modern cryptography since the turn of the 21st century, and the forecast for future cryptographic developments driven by quantum computing and other technological and social trends.

    Encyclopedia of Cryptography and Security (Hardcover): Henk C.A. van Tilborg Encyclopedia of Cryptography and Security (Hardcover)
    Henk C.A. van Tilborg
    R11,355 Discovery Miles 113 550 Out of stock

    This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A--Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providing more than 2500 references in total. Topics for the encyclopedia were selected by a distinguished advisory board consisting of 18 of the world's leading scholars and practitioners. Main subject areas include: Authentication and identification Block ciphers and stream ciphers Computational issues Copy protection Cryptanalysis and security Cryptographic protocols Electronic payment and digital certificates Elliptic curve cryptography Factorization algorithms and primality tests Hash functions and MACs Historical systems Identity-based cryptography Implementation aspects for smart cards and standards Key management Multiparty computations like voting schemes Public key cryptography Quantum cryptography Secret sharing schemes Sequences Web security The style of the entries in the Encyclopedia of Cryptography and Security is expository and tutorial rather than detailed and technical, making the book a practical resource for information security experts as well as professionals in other fields who need to access this vital information but who may not have time to work their way through an entire text on their topic of interest. The underlying concepts in information security can be difficult to understand and may even be counter-intuitive. The Encyclopedia of Cryptography and Security will become the premier reference work on this complex subject.

    Free Delivery
    Pinterest Twitter Facebook Google+
    You may like...
    Cybersecurity in Smart Homes…
    Khatoun Hardcover R3,773 Discovery Miles 37 730
    Utilizing Blockchain Technologies in…
    S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,834 Discovery Miles 68 340
    Ethereum - Understanding Blockchain…
    Paul Paxton Hardcover R611 R518 Discovery Miles 5 180
    Cryptocurrencies and Blockchain…
    Keizer Soeze Hardcover R1,508 R1,231 Discovery Miles 12 310
    Cryptocurrency for Beginners - How to…
    Zeph Pascall Hardcover R819 Discovery Miles 8 190
    Technical Articles about the Voynich…
    National Security Agency Hardcover R593 Discovery Miles 5 930
    Limitations and Future Applications of…
    Neeraj Kumar, Alka Agrawal, … Hardcover R6,834 Discovery Miles 68 340
    Information Hiding in Speech Signals for…
    Zhijun Wu Paperback R1,324 Discovery Miles 13 240
    TLS Mastery
    Michael W Lucas Hardcover R995 R876 Discovery Miles 8 760
    Physical Security Systems Handbook - The…
    Michael Khairallah Hardcover R1,437 Discovery Miles 14 370

     

    Partners