0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (87)
  • R500+ (1,274)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Advanced Communications and Multimedia Security - IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and... Advanced Communications and Multimedia Security - IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia (Hardcover, 2002 ed.)
Borka Jerman-Blazic, Tomaz Klobucar
R2,689 Discovery Miles 26 890 Ships in 18 - 22 working days

Security, trust and confidence can certainly be considered as the most important parts of the Information Society. Being protected when working, learning, shopping or doing any kind of e-commerce is of great value to citizens, students, business people, employees and employers. Commercial companies and their clients want to do business over the Internet in a secure way; business managers when having meetings by videoconferencing tools require the exchanged information to be protected; the publishing industry is concerned with the protection of copyright; hospital patients have a right to privacy; etc. There is no area in the Information Society that can proliferate without extensive use of services that provide satisfactory protection and privacy of data or personality.
Advanced Communications and Multimedia Security presents a state-of-the-art review of current perspectives as well as the latest developments in the area of communications and multimedia security. It examines requirements, issues and solutions pertinent to securing information networks, and identifies future security-related research challenges. A wide spectrum of topics is discussed, including:
-Applied cryptography;
-Biometry;
-Communication systems security;
-Applications security; Mobile security;
-Distributed systems security;
-Digital watermarking and digital signatures.
This volume comprises the proceedings of the sixth Joint Working Conference on Communications and Multimedia Security (CMS'02), which was sponsored by the International Federation for Information Processing (IFIP) and held in September 2002 in Portoroz, Slovenia. It constitutes essential reading for information security specialists, researchers and professionals working in the area of computer science and communication systems.

Advances in Information Security Management & Small Systems Security - IFIP TC11 WG11.1/WG11.2 Eighth Annual Working Conference... Advances in Information Security Management & Small Systems Security - IFIP TC11 WG11.1/WG11.2 Eighth Annual Working Conference on Information Security Management & Small Systems Security September 27-28, 2001, Las Vegas, Nevada, USA (Hardcover, 2001 ed.)
Jan H.P. Eloff, Les Labuschagne, Rossouw von Solms, Gurpreet Dhillon
R4,022 Discovery Miles 40 220 Ships in 18 - 22 working days

The Eighth Annual Working Conference of Information Security Management and Small Systems Security, jointly presented by WG11.1 and WG11.2 of the International Federation for Information Processing (IFIP), focuses on various state-of-art concepts in the two relevant fields. The conference focuses on technical, functional as well as managerial issues. This working conference brings together researchers and practitioners of different disciplines, organisations, and countries, to discuss the latest developments in (amongst others) information security methods, methodologies and techniques, information security management issues, risk analysis, managing information security within electronic commerce, computer crime and intrusion detection. We are fortunate to have attracted two highly acclaimed international speakers to present invited lectures, which will set the platform for the reviewed papers. Invited speakers will talk on a broad spectrum of issues, all related to information security management and small system security issues. These talks cover new perspectives on electronic commerce, security strategies, documentation and many more. All papers presented at this conference were reviewed by a minimum of two international reviewers. We wish to express our gratitude to all authors of papers and the international referee board. We would also like to express our appreciation to the organising committee, chaired by Gurpreet Dhillon, for all their inputs and arrangements. Finally, we would like to thank Les Labuschagne and Hein Venter for their contributions in compiling this proceeding for WG11.1 and WG 11.2.

Computer Security in the 21st Century (Hardcover, 2005): D. T. Lee, S. P Shieh, J. Doug Tygar Computer Security in the 21st Century (Hardcover, 2005)
D. T. Lee, S. P Shieh, J. Doug Tygar
R2,678 Discovery Miles 26 780 Ships in 18 - 22 working days

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include presentations of:

- Fundamental new security

- Cryptographic protocols and design,

- A new way of measuring network vulnerability: attack surfaces,

- Network vulnerability and building impenetrable systems,

- Multimedia content protection including a new standard for photographic images, JPEG2000.

Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.

Security and Privacy in Dynamic Environments - Proceedings of the IFIP TC-11 21st International Information Security Conference... Security and Privacy in Dynamic Environments - Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden (Hardcover, 2006 ed.)
Simone Fischer-Hubner, Kai Rannenberg, Louise Yngstroem, Stefan Lindskog
R4,284 Discovery Miles 42 840 Ships in 18 - 22 working days

This book contains the Proceedings of the 21st IFIP TC-11 International Information Security Conference (IFIP/SEC 2006) on "Security and Privacy in Dynamic Environments." The papers presented here place a special emphasis on Privacy and Privacy Enhancing Technologies. Further topics addressed include security in mobile and ad hoc networks, access control for dynamic environments, new forms of attacks, security awareness, intrusion detection, and network forensics.

Building a Practical Information Security Program (Paperback): Jason Andress, Mark Leary Building a Practical Information Security Program (Paperback)
Jason Andress, Mark Leary
R1,557 R1,375 Discovery Miles 13 750 Save R182 (12%) Ships in 10 - 15 working days

Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing security programs, but also to build new business-driven security programs. In addition, the subject matter supports aspiring security engineers to forge a career path to successfully manage a security program, thereby adding value and reducing risk to the business. Readers learn how to translate technical challenges into business requirements, understand when to "go big or go home," explore in-depth defense strategies, and review tactics on when to absorb risks. This book explains how to properly plan and implement an infosec program based on business strategy and results.

The Encrypted Book of Passwords (Hardcover): Raef Meeuwisse The Encrypted Book of Passwords (Hardcover)
Raef Meeuwisse
R614 Discovery Miles 6 140 Ships in 10 - 15 working days
Enterprise Level Security 2 - Advanced Techniques for Information Technology in an Uncertain World (Paperback): Kevin E. Foltz,... Enterprise Level Security 2 - Advanced Techniques for Information Technology in an Uncertain World (Paperback)
Kevin E. Foltz, William R. Simpson, Institute for Defense Analyses
R1,371 Discovery Miles 13 710 Ships in 9 - 17 working days

Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors' first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions, derived from 16 years of research, pilots, and operational trials in putting an enterprise system together. The chapters cover specific advanced topics derived from painful mistakes and numerous revisions of processes. This book covers many of the topics omitted from the first book including multi-factor authentication, cloud key management, enterprise change management, entity veracity, homomorphic computing, device management, mobile ad hoc, big data, mediation, and several other topics. The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. This is a unique approach to end-to-end security and fills a niche in the market.

Disseminating Security Updates at Internet Scale (Hardcover, 2003 ed.): Jun Li, Peter Reiher, Gerald J. Popek Disseminating Security Updates at Internet Scale (Hardcover, 2003 ed.)
Jun Li, Peter Reiher, Gerald J. Popek
R2,741 Discovery Miles 27 410 Ships in 18 - 22 working days

In 1775, Paul Revere, the folk hero of the American Revolution, galloped wildly on horseback through small towns to warn American colonists that the British were coming. In today's Internet age, how do we warn vast numbers of computers about impending cyber attacks?

Rapid and widespread dissemination of security updates throughout the Internet would be invaluable for many purposes, including sending early-warning signals, distributing new virus signatures, updating certificate revocation lists, dispatching event information for intrusion detection systems, etc. However, notifying a large number of machines securely, quickly, and with high assurance is very challenging. Such a system must compete with the propagation of threats, handle complexities in large-scale environments, address interruption attacks toward dissemination, and also secure itself.

Disseminating Security Updates at Internet Scale describes a new system, "Revere," that addresses these problems. "Revere" builds large-scale, self-organizing and resilient overlay networks on top of the Internet to push security updates from dissemination centers to individual nodes. "Revere" also sets up repository servers for individual nodes to pull missed security updates. This book further discusses how to protect this push-and-pull dissemination procedure and how to secure "Revere" overlay networks, considering possible attacks and countermeasures. Disseminating Security Updates at Internet Scale presents experimental measurements of a prototype implementation of "Revere" gathered using a large-scale oriented approach. These measurements suggest that "Revere" can deliver security updates at the required scale, speed and resiliency for a reasonable cost.

Disseminating Security Updates at Internet Scale is designed to meet the needs of researchers and practitioners in industry and graduate students in computer science. This book will also be helpful to those trying to design peer systems at large scale when security is a concern, since many of the issues faced by these designs are also faced by "Revere." The "Revere" solutions may not always be appropriate for other peer systems with very different goals, but the analysis of the problems and possible solutions discussed here will be helpful in designing a customized approach for such systems.

Integrity, Internal Control and Security in Information Systems - Connecting Governance and Technology (Hardcover, 2002 ed.):... Integrity, Internal Control and Security in Information Systems - Connecting Governance and Technology (Hardcover, 2002 ed.)
Michael Gertz, Erik Guldentops, Leon A. M. Strous
R2,766 Discovery Miles 27 660 Ships in 18 - 22 working days

IT Governance is finally getting the Board's and top management's attention. The value that IT needs to return and the associated risks that need to be managed, have become so important in many industries that enterprise survival depends on it. Information integrity is a significant part of the IT Governance challenge. Among other things, this conference will explore how Information Integrity contributes to the overall control and governance frameworks that enterprises need to put in place for IT to deliver business value and for corporate officers to be comfortable about the IT risks the enterprise faces. The goals for this international working conference are to find answers to the following questions: * what precisely do business managers need in order to have confidence in the integrity of their information systems and their data; * what is the status quo of research and development in this area; * where are the gaps between business needs on the one hand and research I development on the other; what needs to be done to bridge these gaps. The contributions have been divided in the following sections: * Refereed papers. These are papers that have been selected through a blind refereeing process by an international programme committee. * Invited papers. Well known experts present practice and research papers upon invitation by the programme committee. * Tutorial. Two papers describe the background, status quo and future development of CobiT as well as a case of an implementation of Co biT.

Eleventh Hour CISSP (R) - Study Guide (Paperback, 3rd edition): Eric Conrad, Seth Misenar, Joshua Feldman Eleventh Hour CISSP (R) - Study Guide (Paperback, 3rd edition)
Eric Conrad, Seth Misenar, Joshua Feldman
R707 Discovery Miles 7 070 Ships in 10 - 15 working days

Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. This new third edition is aligned to cover all of the material in the most current version of the exam's Common Body of Knowledge. All domains are covered as completely and concisely as possible, giving users the best possible chance of acing the exam.

Introduction to Coding Theory (Paperback, 2nd edition): Jurgen Bierbrauer Introduction to Coding Theory (Paperback, 2nd edition)
Jurgen Bierbrauer
R1,564 Discovery Miles 15 640 Ships in 10 - 15 working days

This book is designed to be usable as a textbook for an undergraduate course or for an advanced graduate course in coding theory as well as a reference for researchers in discrete mathematics, engineering and theoretical computer science. This second edition has three parts: an elementary introduction to coding, theory and applications of codes, and algebraic curves. The latter part presents a brief introduction to the theory of algebraic curves and its most important applications to coding theory.

Proceedings of the 2nd Workshop on Communication Security - Cryptography and Physical Layer Security (Hardcover, 1st ed. 2018):... Proceedings of the 2nd Workshop on Communication Security - Cryptography and Physical Layer Security (Hardcover, 1st ed. 2018)
Marco Baldi, Stefano Tomasin, Elizabeth A. Quaglia
R4,858 R4,537 Discovery Miles 45 370 Save R321 (7%) Ships in 10 - 15 working days

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-edge research and innovative findings from leading researchers. The characteristic feature of all the contributions in this book is their relevance for the practical application of security principles to a variety of widely used communication techniques, including: multiantenna systems, ultra-wide-band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, building a bridge between two usually distinct worlds. The book gathers extended versions of contributions delivered at the Second Workshop on Communication Security, held in Paris, France, in April 2017 and affiliated with the conference EUROCRYPT 2017.

Modern Cryptography Primer - Theoretical Foundations and Practical Applications (Hardcover, 2013 ed.): Czeslaw Koscielny,... Modern Cryptography Primer - Theoretical Foundations and Practical Applications (Hardcover, 2013 ed.)
Czeslaw Koscielny, Miroslaw Kurkowski, Marian Srebrny
R2,544 Discovery Miles 25 440 Ships in 10 - 15 working days

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these areas, offering an understanding of the essential, most important, and most interesting ideas, based on the authors' teaching and research experience.

After introducing the basic mathematical and computational complexity concepts, and some historical context, including the story of Enigma, the authors explain symmetric and asymmetric cryptography, electronic signatures and hash functions, PGP systems, public key infrastructures, cryptographic protocols, and applications in network security. In each case the text presents the key technologies, algorithms, and protocols, along with methods of design and analysis, while the content is characterized by a visual style and all algorithms are presented in readable pseudocode or using simple graphics and diagrams.

The book is suitable for undergraduate and graduate courses in computer science and engineering, particularly in the area of networking, and it is also a suitable reference text for self-study by practitioners and researchers. The authors assume only basic elementary mathematical experience, the text covers the foundational mathematics and computational complexity theory.

Introduction to Cryptography - Principles and Applications (Hardcover, 3rd ed. 2015): Hans Delfs, Helmut Knebl Introduction to Cryptography - Principles and Applications (Hardcover, 3rd ed. 2015)
Hans Delfs, Helmut Knebl
R2,680 Discovery Miles 26 800 Ships in 10 - 15 working days

The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. In the second edition the authors added a complete description of the AES, an extended section on cryptographic hash functions, and new sections on random oracle proofs and public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks. The third edition is a further substantive extension, with new topics added, including: elliptic curve cryptography; Paillier encryption; quantum cryptography; the new SHA-3 standard for cryptographic hash functions; a considerably extended section on electronic elections and Internet voting; mix nets; and zero-knowledge proofs of shuffles. The book is appropriate for undergraduate and graduate students in computer science, mathematics, and engineering.

Managing Information Systems Security and Privacy (Hardcover, 2006 ed.): Denis Trcek Managing Information Systems Security and Privacy (Hardcover, 2006 ed.)
Denis Trcek
R2,782 Discovery Miles 27 820 Ships in 18 - 22 working days

The book deals with the management of information systems security and privacy, based on a model that covers technological, organizational and legal views. This is the basis for a focused and methodologically structured approach that presents "the big picture" of information systems security and privacy, while targeting managers and technical profiles. The book addresses principles in the background, regardless of a particular technology or organization. It enables a reader to suit these principles to an organization's needs and to implement them accordingly by using explicit procedures from the book. Additionally, the content is aligned with relevant standards and the latest trends. Scientists from social and technical sciences are supposed to find a framework for further research in this broad area, characterized by a complex interplay between human factors and technical issues.

Cybersecurity, Privacy and Freedom Protection in the Connected World - Proceedings of the 13th International Conference on... Cybersecurity, Privacy and Freedom Protection in the Connected World - Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 (Hardcover, 1st ed. 2021)
Hamid Jahankhani, Arshad Jamal, Shaun Lawson
R1,486 Discovery Miles 14 860 Ships in 18 - 22 working days

This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. Drawing on 12 years of successful events on information security, digital forensics and cyber-crime, the 13th ICGS3-20 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. As an increasing number of large organizations and individuals use the Internet and its satellite mobile technologies, they are increasingly vulnerable to cyber-crime threats. It is therefore paramount that the security industry raises its game to combat these threats. Whilst there is a huge adoption of technology and smart home devices, comparably, there is a rise of threat vector in the abuse of the technology in domestic violence inflicted through IoT too. All these are an issue of global importance as law enforcement agencies all over the world are struggling to cope.

Computer Security, Privacy and Politics - Current Issues, Challenges and Solutions (Hardcover): Ramesh Subramanian Computer Security, Privacy and Politics - Current Issues, Challenges and Solutions (Hardcover)
Ramesh Subramanian
R2,621 Discovery Miles 26 210 Ships in 18 - 22 working days

The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spyware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism - all of these have a profound effect on our daily computing operations and habits, with major political and social implications.""Computer Security, Privacy and Politics"" connects privacy and politics, offering a point-in-time review of recent developments of computer security, with a special focus on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations. An estimable addition to any library collection, this Premier Reference Source compiles high quality, timely content on such cutting-edge topics as reverse engineering of software, understanding emerging computer exploits, emerging lawsuits and cases, global and societal implications, and protection from attacks on privacy.

Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback): Jeff Stapleton Security without Obscurity - Frequently Asked Questions (FAQ) (Paperback)
Jeff Stapleton
R1,244 Discovery Miles 12 440 Ships in 10 - 15 working days

Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton's three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.

Partially Homomorphic Encryption (Hardcover, 1st ed. 2021): Cetin Kaya Koc, Funda OEzdemir, Zeynep OEdemis OEzger Partially Homomorphic Encryption (Hardcover, 1st ed. 2021)
Cetin Kaya Koc, Funda OEzdemir, Zeynep OEdemis OEzger
R3,324 Discovery Miles 33 240 Ships in 18 - 22 working days

This monograph describes and implements partially homomorphic encryption functions using a unified notation. After introducing the appropriate mathematical background, the authors offer a systematic examination of the following known algorithms: Rivest-Shamir-Adleman; Goldwasser-Micali; ElGamal; Benaloh; Naccache-Stern; Okamoto-Uchiyama; Paillier; Damgaard-Jurik; Boneh-Goh-Nissim; and Sander-Young-Yung. Over recent years partially and fully homomorphic encryption algorithms have been proposed and researchers have addressed issues related to their formulation, arithmetic, efficiency and security. Formidable efficiency barriers remain, but we now have a variety of algorithms that can be applied to various private computation problems in healthcare, finance and national security, and studying these functions may help us to understand the difficulties ahead. The book is valuable for researchers and graduate students in Computer Science, Engineering, and Mathematics who are engaged with Cryptology.

Information Hiding: Steganography and Watermarking-Attacks and Countermeasures - Steganography and Watermarking - Attacks and... Information Hiding: Steganography and Watermarking-Attacks and Countermeasures - Steganography and Watermarking - Attacks and Countermeasures (Hardcover, 2001 ed.)
Neil F. Johnson, Zoran Duric, Sushil Jajodia
R2,735 Discovery Miles 27 350 Ships in 18 - 22 working days

Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking). Steganography (literally, covered writing) explores methods to hide the existence of hidden messages. These methods include invisible ink, microdot, digital signature, covert channel, and spread spectrum communication. Digital watermarks represent a commercial application of steganography. Watermarks can be used to track the copyright and ownership of electronic media. In this volume, the authors focus on techniques for hiding information in digital media. They analyze the hiding techniques to uncover their limitations. These limitations are employed to devise attacks against hidden information. The goal of these attacks is to expose the existence of a secret message or render a digital watermark unusable. In assessing these attacks, countermeasures are developed to assist in protecting digital watermarking systems. Understanding the limitations of the current methods will lead us to build more robust methods that can survive various manipulation and attacks. The more information that is placed in the public's reach on the Internet, the more owners of such information need to protect themselves from theft and false representation. Systems to analyze techniques for uncovering hidden information and recover seemingly destroyed information will be useful to law enforcement authorities in computer forensics and digital traffic analysis. Information Hiding: Steganography and Watermarking - Attacks and Countermeasures presents the authors' research contributions in three fundamental areas with respect to image-based steganography and watermarking: analysis of data hiding techniques, attacks against hidden information, and countermeasures to attacks against digital watermarks. Information Hiding: Steganography and Watermarking &endash; Attacks and Countermeasures is suitable for a secondary text in a graduate level course, and as a reference for researchers and practitioners in industry.

Boolean Functions and Their Applications in Cryptography (Hardcover, 1st ed. 2016): Chuankun Wu, Dengguo Feng Boolean Functions and Their Applications in Cryptography (Hardcover, 1st ed. 2016)
Chuankun Wu, Dengguo Feng
R4,017 Discovery Miles 40 170 Ships in 10 - 15 working days

This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties. More specifically, Walsh spectrum description of the traditional cryptographic properties of Boolean functions, including linear structure, propagation criterion, nonlinearity, and correlation immunity are presented. Constructions of symmetric Boolean functions and of Boolean permutations with good cryptographic properties are specifically studied. This book is not meant to be comprehensive, but with its own focus on some original research of the authors in the past. To be self content, some basic concepts and properties are introduced. This book can serve as a reference for cryptographic algorithm designers, particularly the designers of stream ciphers and of block ciphers, and for academics with interest in the cryptographic properties of Boolean functions.

Advanced Techniques in Multimedia Watermarking - Image, Video and Audio Applications (Hardcover): Advanced Techniques in Multimedia Watermarking - Image, Video and Audio Applications (Hardcover)
R4,670 Discovery Miles 46 700 Ships in 18 - 22 working days

In recent years, the tremendous advancement of digital technology has increased the ease with which digital multimedia files are stored, transmitted, and reproduced. Because traditional copyright methods are unsuitable for establishing ownership, digital watermarking is considered one of the best solutions to prevent illegal and malicious copying and distribution of digital media. Advanced Techniques in Multimedia Watermarking: Image, Video and Audio Applications introduces readers to state-of-the-art research in multimedia watermarking. Covering new advancements in digital image watermarking and techniques for implementation and optimization across different media, this book is a valuable companion for professionals and researchers working in areas such as document watermarking, multimedia fingerprinting, information hiding, secured e-commerce, copyright protection, and hardware implementation of real-time multimedia watermarking.

Understanding Social Engineering Based Scams (Hardcover, 1st ed. 2016): Markus Jakobsson Understanding Social Engineering Based Scams (Hardcover, 1st ed. 2016)
Markus Jakobsson
R3,204 Discovery Miles 32 040 Ships in 18 - 22 working days

This book describes trends in email scams and offers tools and techniques to identify such trends. It also describes automated countermeasures based on an understanding of the type of persuasive methods used by scammers. It reviews both consumer-facing scams and enterprise scams, describing in-depth case studies relating to Craigslist scams and Business Email Compromise Scams. This book provides a good starting point for practitioners, decision makers and researchers in that it includes alternatives and complementary tools to the currently deployed email security tools, with a focus on understanding the metrics of scams. Both professionals working in security and advanced-level students interested in privacy or applications of computer science will find this book a useful reference.

Privacy-Preserving Data Mining - Models and Algorithms (Hardcover, 2008 ed.): Charu C. Aggarwal, Philip S. Yu Privacy-Preserving Data Mining - Models and Algorithms (Hardcover, 2008 ed.)
Charu C. Aggarwal, Philip S. Yu
R5,861 Discovery Miles 58 610 Ships in 18 - 22 working days

Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals. This has caused concerns that personal data may be used for a variety of intrusive or malicious purposes. Privacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in a privacy-preserving way. These techniques generally fall into the following categories: data modification techniques, cryptographic methods and protocols for data sharing, statistical techniques for disclosure and inference control, query auditing methods, randomization and perturbation-based techniques. This edited volume contains surveys by distinguished researchers in the privacy field. Each survey includes the key research content as well as future research directions of a particular topic in privacy. Privacy Preserving Data Mining: Models and Algorithms is designed for researchers, professors, and advanced-level students in computer science. This book is also suitable for practitioners in industry.

Decrypted Secrets - Methods and Maxims of Cryptology (Hardcover, 4th ed. 2007): Friedrich L. Bauer Decrypted Secrets - Methods and Maxims of Cryptology (Hardcover, 4th ed. 2007)
Friedrich L. Bauer
R5,241 Discovery Miles 52 410 Ships in 18 - 22 working days

In today's unsafe and increasingly wired world cryptology plays a vital role in protecting communication channels, databases, and software from unwanted intruders. This revised and extended third edition of the classic reference work on cryptology now contains many new technical and biographical details. The first part treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis, where particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
UML-B Specification for Proven Embedded…
Jean Mermet Hardcover R4,055 Discovery Miles 40 550
Formal Methods for Open Object-based…
Howard Bowman, John Derrick Hardcover R5,403 Discovery Miles 54 030
Data-Oriented Programming
Yehonathan Sharvit Paperback R1,373 Discovery Miles 13 730
Validated Designs for Object-oriented…
John Fitzgerald, Peter Gorm Larsen, … Hardcover R2,137 Discovery Miles 21 370
Learning C# by Programming Games
Arjan Egges, Jeroen D. Fokker, … Hardcover R2,131 Discovery Miles 21 310
Data Clustering in C++ - An…
Guojun Gan Hardcover R4,537 Discovery Miles 45 370
Guide to Applying the UML
Sinan Si Alhir Hardcover R1,701 Discovery Miles 17 010
Harnessing Hibernate
James Elliott Paperback R915 R794 Discovery Miles 7 940
C# From Beginner to Pro - With…
Rick Phillips Hardcover R1,244 Discovery Miles 12 440
UML 2 Certification Guide - Fundamental…
Tim Weilkiens, Bernd Oestereich Paperback R1,260 Discovery Miles 12 600

 

Partners