0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (15)
  • R250 - R500 (92)
  • R500+ (1,401)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Information Security Practice and Experience - 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012,... Information Security Practice and Experience - 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Paperback, 2012)
Mark D. Ryan, Ben Smyth, Guilin Wang
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC 2012, held in Hangzhou, China, in April 2012. The 20 revised full papers presented together with 7 work-in-progress papers were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on digital signatures, public key cryptography, cryptanalysis, differential attacks, oblivious transfer, internet security, key management, applied cryptography, pins, fundamentals, fault attacks, and key recovery.

Transactions on Data Hiding and Multimedia Security VII (Paperback, 2012): Yun Qing Shi Transactions on Data Hiding and Multimedia Security VII (Paperback, 2012)
Yun Qing Shi
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. The 7 papers included in this issue deal with the following topics: protection of digital videos, secure watermarking, tamper detection, and steganography.

Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA,... Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012, Proceedings (Paperback, 2012)
Orr Dunkelman
R1,566 Discovery Miles 15 660 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2012, CT-RSA 2012, held in San Francisco, CA, USA, in February/March 2012. The 26 revised full papers presented were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and secure multiparty computation.

Information Security Applications - 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised... Information Security Applications - 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Paperback, 2012)
Souhwan Jung, Moti Yung
R1,889 Discovery Miles 18 890 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 12th International Workshop on Information Security Applications, WISA 2011, held in Jeju Island, Korea, in August 2011. The 21 revised full papers presented were carefully reviewed and selected from 74 submissions. The workshop serves as a forum for new results from the academic research community as well as from the industry; the papers are focusing on all technical and practical aspects of cryptographic and non-cryptographic security applications.

Financial Cryptography and Data Security - 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March... Financial Cryptography and Data Security - 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers (Paperback, 2012)
George Danezis
R1,535 Discovery Miles 15 350 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Financial Cryptography and Data Security, FC 2011, held in Gros Islet, St. Lucia, in February/March 2011. The 16 revised full papers and 10 revised short papers presented were carefully reviewed and selected from 65 initial submissions. The papers cover all aspects of securing transactions and systems and feature current research focusing on fundamental and applied real-world deployments on all aspects surrounding commerce security; as well as on systems security and inter-disciplinary efforts.

Distributed Computing and Internet Technology - 8th International Conference, ICDCIT 2012, Bhubaneswar, India, February 2-4,... Distributed Computing and Internet Technology - 8th International Conference, ICDCIT 2012, Bhubaneswar, India, February 2-4, 2012. Proceedings (Paperback, 2012)
Ram Ramanujam, Srini Ramaswamy
R1,891 Discovery Miles 18 910 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Distributed Computing and Internet Technology, ICDCIT 2012, held in Bhubaneswar, India, in February 2012. The 17 full papers presented together with 15 short papers in this volume were carefully reviewed and selected from 89 submissions. In addition the book contains the full versions of 6 invited talks. The papers range over a spectrum of issues related to the theme, covering theoretical foundations, computational tools, and societal applications. State of the art techniques like game theoretic ones are used by authors for analyzing conceptual problems.

Transactions on Data Hiding and Multimedia Security VI (Paperback, 2011): Yun Q. Shi Transactions on Data Hiding and Multimedia Security VI (Paperback, 2011)
Yun Q. Shi
R1,840 Discovery Miles 18 400 Ships in 10 - 15 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This issue consists mainly of a special section on content protection and forensics including four papers. The additional paper deals with histogram-based image hashing for searching content-preserving copies.

SSH, The Secure Shell (Paperback, 2nd Revised edition): Daniel J. Barrett SSH, The Secure Shell (Paperback, 2nd Revised edition)
Daniel J. Barrett
R1,110 R814 Discovery Miles 8 140 Save R296 (27%) Ships in 12 - 17 working days

Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.

Everything you want to know about SSH is in our second edition of "SSH, The Secure Shell: The Definitive Guide," This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution.

How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration.

Written for a wide, technical audience, "SSH, The Secure Shell: The Definitive Guide" covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, ourindispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks.

No matter where or how you're shipping information, "SSH, The Secure Shell: The Definitive Guide" will show you how to do it securely.

Public Key Cryptography -- PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography,... Public Key Cryptography -- PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011, Proceedings (Paperback, Edition.)
Dario Catalano, Nelly Fazio, Rosario Gennaro, Antonio Nicolosi
R1,585 Discovery Miles 15 850 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, PKC 2011, held in Taormina, Italy, in March 2011. The 28 papers presented were carefully reviewed and selected from 103 submissions. The book also contains one invited talk. The papers are grouped in topical sections on signatures, attribute based encryption, number theory, protocols, chosen-ciphertext security, encryption, zero-knowledge, and cryptanalysis.

Topics in Cryptology -- CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA,... Topics in Cryptology -- CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011, Proceedings (Paperback, Edition.)
Aggelos Kiayias
R1,561 Discovery Miles 15 610 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2011, CT-RSA 2011, held in San Francisco, CA, USA, in February 2011.
The 24 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on secure two-party computation, cryptographic primitives, side channel attacks, authenticated key agreement, proofs of security, block ciphers, security notions, public-key encryption, crypto tools and parameters, and digital signatures.

Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 13-15, 2010,... Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 13-15, 2010, Proceedings (Paperback, 2010 ed.)
Marc Joye, Atsuko Miyaji, Akira Otsuka
R1,577 Discovery Miles 15 770 Ships in 10 - 15 working days

The4thInternationalConferenceonPairing-BasedCryptography(Pairing2010) was held in Yamanaka Hot Spring, Japan, during December 13-15, 2010. It was jointly co-organized by the National Institute of Advanced Industrial Science and Technology (AIST), Japan, and the Japan Advanced Institute of Science and Technology (JAIST). The goal of Pairing 2010 was to bring together leading researchersand pr- titioners from academia and industry, all concerned with problems related to pairing-based cryptography. We hope that this conference enhanced com- nication among specialists from various research areas and promoted creative interdisciplinary collaboration. Theconferencereceived64submissionsfrom17countries,outofwhich25- pers from 13 countries were accepted for publication in these proceedings. At least three Program Committee (PC) members reviewed each submitted paper, while submissions co-authored by a PC member were submitted to the more stringent evaluation of ?ve PC members. In addition to the PC members, many externalreviewersjoinedthereviewprocessintheirparticularareasofexpertise. We were fortunate to have this energetic team of experts, and are deeply gra- ful to all of them for their hard work, which included a very active discussion phase. The paper submission, review and discussion processes were e?ectively and e?ciently made possible by the Web-based system iChair. Furthermore,theconferencefeaturedthreeinvitedspeakers:JensGrothfrom University College London, Joseph H. Silverman from Brown University, and Gene Tsudik from University of California at Irvine, whose lectures on cutti- edge research areas- "Pairing-Based Non-interactive Zero-Knowledge Proofs," "A Survey of Local and Global Pairings on Elliptic Curves and Abelian Va- eties," and "Some Security Topics with Possible Applications for Pairing-Based Cryptography," respectively- contributed in a signi?cant part to the richness of the program.

Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and DRBC 2010, Held as Part... Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings (Paperback, 2010 ed.)
Wai-Chi Fang, Muhammad Khurram Khan, Kirk P. Arnett, Heau-jo Kang, Dominik Slezak
R1,526 Discovery Miles 15 260 Ships in 10 - 15 working days

Welcome to the proceedings of the 2010 International Conferences on Security Te- nology (SecTech 2010), and Disaster Recovery and Business Continuity (DRBC 2010) - two of the partnering events of the Second International Mega-Conference on Future Generation Information Technology (FGIT 2010). SecTech and DRBC bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of security and disaster recovery methodologies, including their links to c- putational sciences, mathematics and information technology. In total, 1,630 papers were submitted to FGIT 2010 from 30 countries, which - cludes 250 papers submitted to SecTech/DRBC 2010. The submitted papers went through a rigorous reviewing process: 395 of the 1,630 papers were accepted for FGIT 2010, while 57 papers were accepted for SecTech/DRBC 2010. Of the 250 papers 10 were selected for the special FGIT 2010 volume published by Springer in the LNCS series. 34 papers are published in this volume, and 13 papers were wi- drawn due to technical reasons. We would like to acknowledge the great effort of the SecTech/DRBC 2010 Int- national Advisory Boards and members of the International Program Committees, as well as all the organizations and individuals who supported the idea of publishing this volume of proceedings, including SERSC and Springer. Also, the success of these two conferences would not have been possible without the huge support from our sponsors and the work of the Chairs and Organizing Committee.

Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009.... Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers (Paperback, Edition.)
Feng Bao, Moti Yung, Dongdai Lin, Jiwu Jing
R1,574 Discovery Miles 15 740 Ships in 10 - 15 working days

The5thChinaInternationalConferenceonInformationSecurityandCryptology (Inscrypt 2009) was co-organized by the State Key Laboratory of Information SecurityandbytheChineseAssociationforCryptologicResearchincooperation with the International Association for Cryptologic Research (IACR). The c- ference was held in Beijing, China, in the middle of December, and was further sponsored by the Institute of Software, the Graduate University of the Chinese Academy of Sciences and the National Natural Science Foundations of China. The conference is a leading annual international event in the area of cryptog- phy and information security taking place in China. The scienti?c program of the conference covered all areas of current research in the ?eld, with sessions on central areas of cryptographic research and on many important areas of - formation security. The conference continues to get the support of the entire international community, re?ecting on the fact that the research areas covered byInscryptareimportantto moderncomputing,whereincreasedsecurity,trust, safety and reliability are required. The international Program Committee of Inscrypt 2009 received a total of 147 submissions from more than 20 countries and regions, from which only 32 submissions were selected for presentation, 22 of which in the regular papers track and 10 submissions in the short papers track. All anonymous submissions were reviewed by experts in the relevant areas and based on their ranking, te- nical remarks and strict selection criteria the papers were chosen for the various tracks. The selection to both tracks was a highly competitive process.

The Ransomware Threat Landscape - Prepare For, Recognise and Survive Ransomware Attacks (Paperback): IT Governance The Ransomware Threat Landscape - Prepare For, Recognise and Survive Ransomware Attacks (Paperback)
IT Governance
R629 Discovery Miles 6 290 Ships in 10 - 15 working days

The fastest-growing malware in the world The core functionality of ransomware is two-fold: to encrypt data and deliver the ransom message. This encryption can be relatively basic or maddeningly complex, and it might affect only a single device or a whole network. Ransomware is the fastest-growing malware in the world. In 2015, it cost companies around the world $325 million, which rose to $5 billion by 2017 and is set to hit $20 billion in 2021. The threat of ransomware is not going to disappear, and while the number of ransomware attacks remains steady, the damage they cause is significantly increasing. It is the duty of all business leaders to protect their organisations and the data they rely on by doing whatever is reasonably possible to mitigate the risk posed by ransomware. To do that, though, they first need to understand the threats they are facing. The Ransomware Threat Landscape This book sets out clearly how ransomware works, to help business leaders better understand the strategic risks, and explores measures that can be put in place to protect the organisation. These measures are structured so that any organisation can approach them. Those with more resources and more complex environments can build them into a comprehensive system to minimise risks, while smaller organisations can secure their profiles with simpler, more straightforward implementation. Suitable for senior directors, compliance managers, privacy managers, privacy officers, IT staff, security analysts and admin staff - in fact, all staff who use their organisation's network/online systems to perform their role - The Ransomware Threat Landscape - Prepare for, recognise and survive ransomware attacks will help readers understand the ransomware threat they face. From basic cyber hygiene to more advanced controls, the book gives practical guidance on individual activities, introduces implementation steps organisations can take to increase their cyber resilience, and explores why cyber security is imperative. Topics covered include: Introduction About ransomware Basic measures An anti-ransomware The control framework Risk management Controls Maturity Basic controls Additional controls for larger organisations Advanced controls Don't delay - start protecting your organisation from ransomware and buy this book today!

Applied Cryptography and Network Security - 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010,... Applied Cryptography and Network Security - 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings (Paperback, 2010 ed.)
Jianying Zhou, Moti Yung
R2,972 Discovery Miles 29 720 Ships in 10 - 15 working days

ACNS 2010, the 8th International Conference on Applied Cryptography and Network Security, was held in Beijing, China, during June 22-25, 2010. ACNS 2010 brought together individuals from academia and industry involved in m- tiple research disciplines of cryptography and security to foster the exchange of ideas. ACNS was initiated in 2003, and there has been a steady improvement in the quality of its program over the past 8 years: ACNS 2003 (Kunming, China), ACNS 2004 (Yellow Mountain, China), ACNS 2005 (New York, USA), ACNS 2006 (Singapore), ACNS 2007 (Zhuhai, China), ACNS 2008 (New York, USA), ACNS2009(Paris,France). Theaverageacceptanceratehasbeenkeptataround 17%, and the average number of participants has been kept at around 100. The conference received a total of 178 submissions from all over the world. Each submission was assigned to at least three committee members. Subm- sions co-authored by members of the Program Committee were assigned to at least four committee members. Due to the large number of high-quality s- missions, the review process was challenging and we are deeply grateful to the committee members and the external reviewers for their outstanding work. - ter extensive discussions, the Program Committee selected 32 submissions for presentation in the academic track, and these are the articles that are included in this volume (LNCS 6123). Additionally, a few other submissionswereselected for presentation in the non-archival industrial track.

Post-Quantum Cryptography - Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings... Post-Quantum Cryptography - Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings (Paperback, 2010 ed.)
Nicolas Sendrier
R1,506 Discovery Miles 15 060 Ships in 10 - 15 working days

The recent development of quantum computing and quantum algorithmics has raised important questions in cryptography. With Shor's algorithm (Peter W. Shor, "Polynomial-TimeAlgorithms for Prime Factorization and Discrete Lo- rithmsonaQuantumComputer",SIAMJ.Sci.Statist.Comput.41(2):303-332, 1999)thecollapseofsomeofthemostwidelyusedtechniquesfor securingdigital communications has become a possibility. In consequence, the everlasting duty of the cryptographic research community to keep an eye on alternative te- niques has become an urgent necessity. Post-quantum cryptography was born. Its primary concern is the study of public-key cryptosystems that remain - cure in a world with quantum computers. Currently, four families of public-key cryptosystemsseemto havethis potential:code-based,hash-based,lattice-based and multivariate public-key cryptosystems. Other techniques may certainly join this rapidly growing research area. With the PQCrypto conference series, this emerging community has created a place to disseminate results, exchange new ideas and de?ne the state of the art. In May of 2006, the First International Workshop on Post-Quantum Cryptography was held at the Katholieke Univ- siteit Leuvenin Belgium with support fromthe EuropeanNetworkof Excellence ECRYPT.TheSecondInternationalWorkshoponPost-QuantumCryptography, PQCrypto2008,washeldattheUniversityofCincinnati,USA, inOctober2008.

Cryptographic Boolean Functions and Applications (Paperback, 2nd edition): Thomas W Cusick, Pantelimon Stanica Cryptographic Boolean Functions and Applications (Paperback, 2nd edition)
Thomas W Cusick, Pantelimon Stanica
R1,972 Discovery Miles 19 720 Ships in 12 - 17 working days

Cryptographic Boolean Functions and Applications, Second Edition is designed to be a comprehensive reference for the use of Boolean functions in modern cryptography. While the vast majority of research on cryptographic Boolean functions has been achieved since the 1970s, when cryptography began to be widely used in everyday transactions, in particular banking, relevant material is scattered over hundreds of journal articles, conference proceedings, books, reports and notes, some of them only available online. This book follows the previous edition in sifting through this compendium and gathering the most significant information in one concise reference book. The work therefore encompasses over 600 citations, covering every aspect of the applications of cryptographic Boolean functions. Since 2008, the subject has seen a very large number of new results, and in response, the authors have prepared a new chapter on special functions. The new edition brings 100 completely new references and an expansion of 50 new pages, along with heavy revision throughout the text.

Building a Practical Information Security Program (Paperback): Jason Andress, Mark Leary Building a Practical Information Security Program (Paperback)
Jason Andress, Mark Leary
R1,656 R1,406 Discovery Miles 14 060 Save R250 (15%) Ships in 12 - 17 working days

Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing security programs, but also to build new business-driven security programs. In addition, the subject matter supports aspiring security engineers to forge a career path to successfully manage a security program, thereby adding value and reducing risk to the business. Readers learn how to translate technical challenges into business requirements, understand when to "go big or go home," explore in-depth defense strategies, and review tactics on when to absorb risks. This book explains how to properly plan and implement an infosec program based on business strategy and results.

Cybersecurity - The Essential Body Of Knowledge (Paperback, New edition): Dan Shoemaker, Wm. Conklin Cybersecurity - The Essential Body Of Knowledge (Paperback, New edition)
Dan Shoemaker, Wm. Conklin
R1,440 R1,279 Discovery Miles 12 790 Save R161 (11%) Ships in 10 - 15 working days

CYBERSECURITY: THE ESSENTIAL BODY OF KNOWLEDGE provides a comprehensive, trustworthy framework of practices for assuring information security. This book is organized to help readers understand how the various roles and functions within cybersecurity practice can be combined and leveraged to produce a secure organization. In this unique book, concepts are not presented as stagnant theory; instead, the content is interwoven in a real world adventure story that runs throughout. In the story, a fictional company experiences numerous pitfalls of cyber security and the reader is immersed in the everyday practice of securing the company through various characters' efforts. This approach grabs learners' attention and assists them in visualizing the application of the content to real-world issues that they will face in their professional life. Derived from the Department of Homeland Security's Essential Body of Knowledge (EBK) for IT Security, this book is an indispensable resource dedicated to understanding the framework, roles, and competencies involved with information security.

Coding Theory and Cryptography - The Essentials (Hardcover, 2nd edition): C.A. Rodger, J.R. Wall, D.C. Hankerson, Gary Hoffman,... Coding Theory and Cryptography - The Essentials (Hardcover, 2nd edition)
C.A. Rodger, J.R. Wall, D.C. Hankerson, Gary Hoffman, D.A. Leonard, …
R3,041 Discovery Miles 30 410 Ships in 12 - 17 working days

Containing data on number theory, encryption schemes, and cyclic codes, this highly successful textbook, proven by the authors in a popular two-quarter course, presents coding theory, construction, encoding, and decoding of specific code families in an "easy-to-use" manner appropriate for students with only a basic background in mathematics offering revised and updated material on the Berlekamp-Massey decoding algorithm and convolutional codes. Introducing the mathematics as it is needed and providing exercises with solutions, this edition includes an extensive section on cryptography, designed for an introductory course on the subject.

Quantum Computing for High School Students (Paperback): Yuly Billig Quantum Computing for High School Students (Paperback)
Yuly Billig
R863 R691 Discovery Miles 6 910 Save R172 (20%) Ships in 10 - 15 working days
Blockchain - Ultimate guide to understanding blockchain, bitcoin, cryptocurrencies, smart contracts and the future of money.... Blockchain - Ultimate guide to understanding blockchain, bitcoin, cryptocurrencies, smart contracts and the future of money. (Paperback)
Mark Gates
R405 Discovery Miles 4 050 Ships in 10 - 15 working days
Cyber Security - Everything an Executive Needs to Know (Hardcover): Phillip Ferraro Cyber Security - Everything an Executive Needs to Know (Hardcover)
Phillip Ferraro
R717 R590 Discovery Miles 5 900 Save R127 (18%) Ships in 10 - 15 working days
Build Your Own Blockchain - A Practical Guide to Distributed Ledger Technology (Hardcover, 1st ed. 2020): Daniel Hellwig, Goran... Build Your Own Blockchain - A Practical Guide to Distributed Ledger Technology (Hardcover, 1st ed. 2020)
Daniel Hellwig, Goran Karlic, Arnd Huchzermeier
R1,594 Discovery Miles 15 940 Ships in 12 - 17 working days

This book provides a comprehensive introduction to blockchain and distributed ledger technology. Intended as an applied guide for hands-on practitioners, the book includes detailed examples and in-depth explanations of how to build and run a blockchain from scratch. Through its conceptual background and hands-on exercises, this book allows students, teachers and crypto enthusiasts to launch their first blockchain while assuming prior knowledge of the underlying technology. How do I build a blockchain? How do I mint a cryptocurrency? How do I write a smart contract? How do I launch an initial coin offering (ICO)? These are some of questions this book answers. Starting by outlining the beginnings and development of early cryptocurrencies, it provides the conceptual foundations required to engineer secure software that interacts with both public and private ledgers. The topics covered include consensus algorithms, mining and decentralization, and many more. "This is a one-of-a-kind book on Blockchain technology. The authors achieved the perfect balance between the breadth of topics and the depth of technical discussion. But the real gem is the set of carefully curated hands-on exercises that guide the reader through the process of building a Blockchain right from Chapter 1." Volodymyr Babich, Professor of Operations and Information Management, McDonough School of Business, Georgetown University "An excellent introduction of DLT technology for a non-technical audience. The book is replete with examples and exercises, which greatly facilitate the learning of the underlying processes of blockchain technology for all, from students to entrepreneurs." Serguei Netessine, Dhirubhai Ambani Professor of Innovation and Entrepreneurship, The Wharton School, University of Pennsylvania "Whether you want to start from scratch or deepen your blockchain knowledge about the latest developments, this book is an essential reference. Through clear explanations and practical code examples, the authors take you on a progressive journey to discover the technology foundations and build your own blockchain. From an operations perspective, you can learn the principles behind the distributed ledger technology relevant for transitioning towards blockchain-enabled supply chains. Reading this book, you'll get inspired, be able to assess the applicability of blockchain to supply chain operations, and learn from best practices recognized in real-world examples." Ralf W. Seifert, Professor of Technology and Operations Management at EPFL and Professor of Operations Management at IMD

Cryptography Made Simple (Hardcover, 1st ed. 2016): Nigel Smart Cryptography Made Simple (Hardcover, 1st ed. 2016)
Nigel Smart
R1,380 R1,310 Discovery Miles 13 100 Save R70 (5%) Ships in 9 - 15 working days

In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by "secure" is as important as creating something that achieves that goal, and security definitions are central to the discussion throughout. The author balances a largely non-rigorous style - many proofs are sketched only - with appropriate formality and depth. For example, he uses the terminology of groups and finite fields so that the reader can understand both the latest academic research and "real-world" documents such as application programming interface descriptions and cryptographic standards. The text employs colour to distinguish between public and private information, and all chapters include summaries and suggestions for further reading. This is a suitable textbook for advanced undergraduate and graduate students in computer science, mathematics and engineering, and for self-study by professionals in information security. While the appendix summarizes most of the basic algebra and notation required, it is assumed that the reader has a basic knowledge of discrete mathematics, probability, and elementary calculus.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Database Security
Melissa Zgola, Alfred Basta Paperback R1,158 R1,038 Discovery Miles 10 380
Cryptography - Theory and Practice
Douglas Robert Stinson, Maura Paterson Paperback R1,410 Discovery Miles 14 100
Official (ISC)2 (R) Guide to the CISSP…
Susan Hansche Hardcover R2,663 Discovery Miles 26 630
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,296 Discovery Miles 32 960
Tribe of Hackers Blue Team - Tribal…
M. J. Carey Paperback R456 Discovery Miles 4 560
Networks, Security and Complexity - The…
Sean P. Gorman Hardcover R2,846 Discovery Miles 28 460
Technology for Success - Computer…
Mark Ciampa, Jill West, … Paperback  (1)
R1,190 R1,070 Discovery Miles 10 700
The Security Culture Playbook - An…
P. Carpenter Hardcover R456 Discovery Miles 4 560
Tribe of Hackers Security Leaders…
M. J. Carey Paperback R448 Discovery Miles 4 480
Heterogeneous Cyber Physical Systems of…
Ioannis Papaefstathiou, Alkis Hatzopoulos Hardcover R2,842 Discovery Miles 28 420

 

Partners