0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (12)
  • R250 - R500 (86)
  • R500+ (1,344)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Cryptography Made Simple (Hardcover, 1st ed. 2016): Nigel Smart Cryptography Made Simple (Hardcover, 1st ed. 2016)
Nigel Smart
R1,380 R955 Discovery Miles 9 550 Save R425 (31%) Ships in 12 - 19 working days

In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by "secure" is as important as creating something that achieves that goal, and security definitions are central to the discussion throughout. The author balances a largely non-rigorous style - many proofs are sketched only - with appropriate formality and depth. For example, he uses the terminology of groups and finite fields so that the reader can understand both the latest academic research and "real-world" documents such as application programming interface descriptions and cryptographic standards. The text employs colour to distinguish between public and private information, and all chapters include summaries and suggestions for further reading. This is a suitable textbook for advanced undergraduate and graduate students in computer science, mathematics and engineering, and for self-study by professionals in information security. While the appendix summarizes most of the basic algebra and notation required, it is assumed that the reader has a basic knowledge of discrete mathematics, probability, and elementary calculus.

Database Security X - Status and prospects (Hardcover, 1997 ed.): Pierangela Samarati, Ravi Sandhu Database Security X - Status and prospects (Hardcover, 1997 ed.)
Pierangela Samarati, Ravi Sandhu
R4,510 Discovery Miles 45 100 Ships in 10 - 15 working days

The purpose of this book is to discuss, in depth, the current state of research and practice in database security, to enable readers to expand their knowledge. The book brings together contributions from experts in the field throughout the world. Database security is still a key topic in mist businesses and in the public sector, having implications for the whole of society.

Information Systems Security - Facing the information society of the 21st century (Hardcover, 1996 ed.): Sokratis Katsikas Information Systems Security - Facing the information society of the 21st century (Hardcover, 1996 ed.)
Sokratis Katsikas
R5,877 Discovery Miles 58 770 Ships in 10 - 15 working days

This book presents a state-of-the-art review of current perspectives in information systems security in view of the information society of the 21st century. It will be essential reading for information technology security specialists, computer professionals, EDP managers, EDP auditors, managers, researchers and students working on the subject.

Database Security IX - Status and prospects (Hardcover, 1996 ed.): David L. Spooner, Steven Demurjian, John Dobson Database Security IX - Status and prospects (Hardcover, 1996 ed.)
David L. Spooner, Steven Demurjian, John Dobson
R5,818 Discovery Miles 58 180 Ships in 10 - 15 working days

This book documents progress and presents a broad perspective of recent developments in database security. It also discusses in depth the current state-of-the-art in research in the field. A number of topics are explored in detail including: current reseearch in database security and the state of security controls in present commercial database systems. Database Security IX will be essential reading for advanced students working in the area of database security research and development in for industrial researchers in this technical area.

Cryptography - Breakthroughs in Research and Practice (Hardcover): Information Resources Management Association Cryptography - Breakthroughs in Research and Practice (Hardcover)
Information Resources Management Association
R10,018 Discovery Miles 100 180 Ships in 9 - 17 working days

Advances in technology have provided numerous innovations that make people's daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks also increase. The field of cryptography has become a solution to this ever-increasing problem. Applying strategic algorithms to cryptic issues can help save time and energy in solving the expanding problems within this field. Cryptography: Breakthroughs in Research and Practice examines novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data. Highlighting a range of topics such as cyber security, threat detection, and encryption, this publication is an ideal reference source for academicians, graduate students, engineers, IT specialists, software engineers, security analysts, industry professionals, and researchers interested in expanding their knowledge of current trends and techniques within the cryptology field.

Information Security - the Next Decade (Hardcover, 1995 ed.): Jan H.P. Eloff, Sebastian Von Solms Information Security - the Next Decade (Hardcover, 1995 ed.)
Jan H.P. Eloff, Sebastian Von Solms
R5,948 Discovery Miles 59 480 Ships in 10 - 15 working days

These are the proceedings of the Eleventh International Information Security Conference which was held in Cape Town, South Africa, May 1995. This conference addressed the information security requirements of the next decade and papers were presented covering a wide range of subjects including current industry expectations and current research aspects. The evolutionary development of information security as a professional and research discipline was discussed along with security in open distributed systems and security in groupware.

Network Security Metrics (Hardcover, 1st ed. 2017): Lingyu Wang, Sushil Jajodia, Anoop Singhal Network Security Metrics (Hardcover, 1st ed. 2017)
Lingyu Wang, Sushil Jajodia, Anoop Singhal
R4,213 Discovery Miles 42 130 Ships in 12 - 19 working days

This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since "you cannot improve what you cannot measure", a network security metric is essential to evaluating the relative effectiveness of potential network security solutions. The authors start by examining the limitations of existing solutions and standards on security metrics, such as CVSS and attack surface, which typically focus on known vulnerabilities in individual software products or systems. The first few chapters of this book describe different approaches to fusing individual metric values obtained from CVSS scores into an overall measure of network security using attack graphs. Since CVSS scores are only available for previously known vulnerabilities, such approaches do not consider the threat of unknown attacks exploiting the so-called zero day vulnerabilities. Therefore, several chapters of this book are dedicated to develop network security metrics especially designed for dealing with zero day attacks where the challenge is that little or no prior knowledge is available about the exploited vulnerabilities, and thus most existing methodologies for designing security metrics are no longer effective. Finally, the authors examine several issues on the application of network security metrics at the enterprise level. Specifically, a chapter presents a suite of security metrics organized along several dimensions for measuring and visualizing different aspects of the enterprise cyber security risk, and the last chapter presents a novel metric for measuring the operational effectiveness of the cyber security operations center (CSOC). Security researchers who work on network security or security analytics related areas seeking new research topics, as well as security practitioners including network administrators and security architects who are looking for state of the art approaches to hardening their networks, will find this book helpful as a reference. Advanced-level students studying computer science and engineering will find this book useful as a secondary text.

Distributed Denial of Service Attacks - Concepts, Mathematical and Cryptographic Solutions (Hardcover): Rajeev Singh, Mangey Ram Distributed Denial of Service Attacks - Concepts, Mathematical and Cryptographic Solutions (Hardcover)
Rajeev Singh, Mangey Ram
R4,736 Discovery Miles 47 360 Ships in 12 - 19 working days

Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of mathematics and mathematical tools such as optimization techniques, finite element methods, differential equations, fluid dynamics, mathematical modelling, and simulation. Neither optimization in engineering, nor the performance of safety-critical system and system security; nor high assurance software architecture and design would be possible without the development of mathematical applications. De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences (AMEIS) focusses on the latest applications of engineering and information technology that are possible only with the use of mathematical methods. By identifying the gaps in knowledge of engineering applications the AMEIS series fosters the international interchange between the sciences and keeps the reader informed about the latest developments.

Data and Application Security - Developments and Directions (Hardcover, 2001 ed.): B. Thuraisingham, Reind van de Riet, Klaus... Data and Application Security - Developments and Directions (Hardcover, 2001 ed.)
B. Thuraisingham, Reind van de Riet, Klaus R. Dittrich, Zahir Tari
R5,803 Discovery Miles 58 030 Ships in 10 - 15 working days

New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the whole of society. Data and Applications Security covers issues related to security and privacy of information in a wide range of applications, including: Electronic Commerce, XML and Web Security; Workflow Security and Role-based Access Control; Distributed Objects and Component Security; Inference Problem, Data Mining and Intrusion Detection; Language and SQL Security; Security Architectures and Frameworks; Federated and Distributed Systems Security; Encryption, Authentication and Security Policies. This book contains papers and panel discussions from the Fourteenth Annual Working Conference on Database Security, which is part of the Database Security: Status and Prospects conference series sponsored by the International Federation for Information Processing (IFIP). The conference was held in Schoorl, The Netherlands in August 2000.

Advances in Digital Forensics - IFIP International Conference on Digital Forensics, National Center for Forensic Science,... Advances in Digital Forensics - IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, 2005 (Hardcover, 2005 ed.)
Mark Pollitt, Sujeet Shenoi
R3,065 Discovery Miles 30 650 Ships in 10 - 15 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance a" investigations of security breaches yield valuable information that can be used to design more secure systems.

Advances in Digital Forensics describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include:

  • Themes and Issues in Digital Forensics
  • Investigative Techniques
  • Network Forensics
  • Portable Electronic Device Forensics
  • Linux and File System Forensics
  • Applications and Techniques

This book is the first volume of a new series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-five edited papers from the First Annual IFIP WG11.9 Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in February 2005.

Advances in Digital Forensics is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

Mark Pollitt is President of Digital Evidence Professional Services, Inc., Ellicott City, Maryland, USA. Mr. Pollitt, who is retired from the Federal Bureau of Investigation (FBI), served as the Chief of the FBI's Computer Analysis Response Team, and Director of the Regional Computer Forensic Laboratory National Program.

Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.

For more information about the 300 other books in the IFIP series, please visit www.springeronline.com.

For more information about IFIP, please visit www.ifip.org.

Principles of Secure Network Systems Design (Hardcover, 2002 ed.): H. Lawson Principles of Secure Network Systems Design (Hardcover, 2002 ed.)
H. Lawson; Sumit Ghosh
R1,536 Discovery Miles 15 360 Ships in 10 - 15 working days

This new book establishes a comprehensive framework for network security design, unifying the many concepts and aspects of network security and enabling all users to employ a common security foundation. It is presented from the perspective of fundamental principles underlying networking, network control algorithms and security. Using an accessible style and careful explanations, the principles and methodology address design concepts for current and future security concerns for networks. "Principles of Secure Network Systems Design" presents the topic in three basic parts. Part one covers the basic background of network security and the current scope for security in all types of networks and organizations. Part two focuses on the essential nature of network security and a scientific methodology for secure network design. Lastly, part three discusses concrete applications of the design concepts with real world networks, using three comprehensive case studies oriented around ATM networks. Topics and Features: * Holistic view of network security design, going beyond cryptographic issues * Comprehensive framework for a scientific basis of network security design * Integrated view of network security with networks¿ operational and management processes * Extensive case study through modeling & large-scale distributed simulation of ATM network * New approach to both security attack detection and strengthening networks against security attacks and vulnerabilities The book is an essential and practical resource for all professionals, policy makers, practitioners, and advanced students in networking, information systems, computer engineering & science, communications engineering, network design, and security consultants seeking a comprehensive framework for secure network systems design. It is also suitable for self-study purposes by professionals, as well as for advanced course use in network security.

Information Security for Global Information Infrastructures - IFIP TC11 Sixteenth Annual Working Conference on Information... Information Security for Global Information Infrastructures - IFIP TC11 Sixteenth Annual Working Conference on Information Security August 22-24, 2000, Beijing, China (Hardcover, 2000 ed.)
Sihan Qing, Jan H.P. Eloff
R5,883 Discovery Miles 58 830 Ships in 10 - 15 working days

IFIP/SEC2000, being part of the 16th IFIP World Computer Congress (WCC2000), is being held in Beijing, China from August 21 to 25, 2000. SEC2000 is the annual conference of TCll (Information Security) of the International Federation of Information Processing. The conference focuses on the seamless integration of information security services as an integral part of the Global Information Infrastructure in the new millenniUm. SEC2000 is sponsored by the China Computer Federation (CCF), IFIP/TCll, and Engineering Research Centre for Information Security Technology, Chinese Academy of Sciences (ERCIST, CAS). There were 180 papers submitted for inclusion, 50 papers among them have been accepted as long papers and included in this proceeding, 81 papers have been accepted as short papers and published in another proceeding. All papers presented in this conference were reviewed blindly by a minimum of two international reviewers. The authors' affiliations of the 180 submissions and the accepted 131 papers range over 26 and 25 countries or regions, respectively. We would like to appreciate all who have submitted papers to IFIP/SEC2000, and the authors of accepted papers for their on-time preparation of camera-ready fmal versions. Without their contribution there would be no conference. We wish to express our gratitude to all program committee members and other reviewers for their hard work in reviewing the papers in a short time and for contributing to the conference in different ways. We would like to thank Rein Venter for his time and expertise in compiling the fmal version of the proceedings.

Blockchain-based New Financial Infrastructures - Theory, Practice and Regulation (Hardcover, 1st ed. 2022): Qian YAO Blockchain-based New Financial Infrastructures - Theory, Practice and Regulation (Hardcover, 1st ed. 2022)
Qian YAO
R2,879 Discovery Miles 28 790 Ships in 10 - 15 working days

This book focuses on development of blockchain-based new-generation financial infrastructures, in which a systematic, complete theoretical framework is proposed to explore blockchain-based securities trading platform, central securities depository (CSD), securities settlement system (SSS), central counterparty (CCP), payment system (PS) and trade repository (TR). The blockchain-based new FMI has attracted much attention in the securities industry. At present, the cross-border depository receipt (DR) business faces a dilemma between efficiency and security. In this book, the author proposes a blockchain-based new DR solution, manifesting the potential for using blockchain technology in the FMI field. In addition, using Hashed Timelock Contract (HTLC) as the underlying technology in the DR scenario, specific process and operations are proposed for delivery versus payment (DvP), delivery versus delivery (DvD) or payment versus payment (PvP) and other exchange-of-value methods. This book further studies how to carry out opening positions, end-of-day settlement of margin, forced liquidation and settlement at maturity, for exchange-traded derivatives, such as futures and options, under the blockchain-based technological framework. Blockchain technology not only naturally fits into the decentralized or non-centralized characteristic of the OTC market but also can effectively address the pain points and difficulties of the OTC market. This book provides an in-depth analysis of existing specific issues in China's bond market, regional equity markets and asset management market, among other OTC markets, and proposes relevant blockchain-based solutions. Blockchain technology does not change the public policy objectives for FMI. The blockchain-based new FMIs are still subject to compliance, safety and efficiency requirements. This book provides a comprehensive assessment of the applicability of the Principles for Financial Market Infrastructures (PFMI) to them, in particular, analyzes their legal basis, off-chain governance and system security.

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security (Hardcover): Brij Gupta, Dharma P.... Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security (Hardcover)
Brij Gupta, Dharma P. Agrawal, Shingo Yamaguchi
R8,360 Discovery Miles 83 600 Ships in 10 - 15 working days

Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments. The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.

Predictive Analytics in Cloud, Fog, and Edge Computing - Perspectives and Practices of Blockchain, IoT, and 5G (Hardcover, 1st... Predictive Analytics in Cloud, Fog, and Edge Computing - Perspectives and Practices of Blockchain, IoT, and 5G (Hardcover, 1st ed. 2023)
Hiren Kumar Thakkar, Chinmaya Kumar Dehury, Prasan Kumar Sahoo, Bharadwaj Veeravalli
R4,927 Discovery Miles 49 270 Ships in 12 - 19 working days

This book covers the relationship of recent technologies (such as Blockchain, IoT, and 5G) with the cloud computing as well as fog computing, and mobile edge computing. The relationship will not be limited to only architecture proposal, trends, and technical advancements. However, the book also explores the possibility of predictive analytics in cloud computing with respect to Blockchain, IoT, and 5G. The recent advancements in the internet-supported distributed computing i.e. cloud computing, has made it possible to process the bulk amount of data in a parallel and distributed. This has made it a lucrative technology to process the data generated from technologies such as Blockchain, IoT, and 5G. However, there are several issues a Cloud Service Provider (CSP) encounters, such as Blockchain security in cloud, IoT elasticity and scalability management in cloud, Service Level Agreement (SLA) compliances for 5G, Resource management, Load balancing, and Fault-tolerance. This edited book will discuss the aforementioned issues in connection with Blockchain, IoT, and 5G. Moreover, the book discusses how the cloud computing is not sufficient and one needs to use fog computing, and edge computing to efficiently process the data generated from IoT, and 5G. Moreover, the book shows how smart city, smart healthcare system, and smart communities are few of the most relevant IoT applications where fog computing plays a significant role. The book discusses the limitation of fog computing and the need for the edge computing to further reduce the network latency to process streaming data from IoT devices. The book also explores power of predictive analytics of Blockchain, IoT, and 5G data in cloud computing with its sister technologies. Since, the amount of resources increases day-by day, artificial intelligence (AI) tools are becoming more popular due to their capability which can be used in solving wide variety of issues, such as minimize the energy consumption of physical servers, optimize the service cost, improve the quality of experience, increase the service availability, efficiently handle the huge data flow, manages the large number of IoT devices, etc.

Technology for Success - Computer Concepts (Paperback, New edition): Mark Ciampa, Jill West, Steven Freund, Jennifer Campbell,... Technology for Success - Computer Concepts (Paperback, New edition)
Mark Ciampa, Jill West, Steven Freund, Jennifer Campbell, Mark Frydenberg, … 1
R1,305 R1,213 Discovery Miles 12 130 Save R92 (7%) Ships in 10 - 15 working days

Gain a thorough understanding of today's sometimes daunting, ever-changing world of technology as you learn how to apply the latest technology to your academic, professional and personal life with TECHNOLOGY FOR SUCCESS: COMPUTER CONCEPTS. Written by a team of best-selling technology authors and based on extensive research and feedback from students like you, this edition breaks each topic into brief, inviting lessons that address the "what, why and how" behind digital advancements to ensure deep understanding and application to today's real world. Optional online MindTap and SAM (Skills Assessment Manager) learning tools offer hands-on and step-by-step training, videos that cover the more difficult concepts and simulations that challenge you to solve problems in the actual world. You leave this course able to read the latest technology news and understand its impact on your daily life, the economy and society.

Providing Sound Foundations for Cryptography - On the work of Shafi Goldwasser and Silvio Micali (Hardcover): Oded Goldreich Providing Sound Foundations for Cryptography - On the work of Shafi Goldwasser and Silvio Micali (Hardcover)
Oded Goldreich
R3,999 R3,047 Discovery Miles 30 470 Save R952 (24%) Ships in 12 - 19 working days

Cryptography is concerned with the construction of schemes that withstand any abuse. A cryptographic scheme is constructed so as to maintain a desired functionality, even under malicious attempts aimed at making it deviate from its prescribed behavior. The design of cryptographic systems must be based on firm foundations, whereas ad hoc approaches and heuristics are a very dangerous way to go. These foundations were developed mostly in the 1980s, in works that are all co-authored by Shafi Goldwasser and/or Silvio Micali. These works have transformed cryptography from an engineering discipline, lacking sound theoretical foundations, into a scientific field possessing a well-founded theory, which influences practice as well as contributes to other areas of theoretical computer science. This book celebrates these works, which were the basis for bestowing the 2012 A.M. Turing Award upon Shafi Goldwasser and Silvio Micali. A significant portion of this book reproduces some of these works, and another portion consists of scientific perspectives by some of their former students. The highlight of the book is provided by a few chapters that allow the readers to meet Shafi and Silvio in person. These include interviews with them, their biographies and their Turing Award lectures.

Domain Specific High-Level Synthesis for Cryptographic Workloads (Hardcover, 1st ed. 2019): Ayesha Khalid, Goutam Paul, Anupam... Domain Specific High-Level Synthesis for Cryptographic Workloads (Hardcover, 1st ed. 2019)
Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
R2,894 Discovery Miles 28 940 Ships in 10 - 15 working days

This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs). These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations.

Introduction to Coding Theory (Paperback, 2nd edition): Jurgen Bierbrauer Introduction to Coding Theory (Paperback, 2nd edition)
Jurgen Bierbrauer
R1,569 Discovery Miles 15 690 Ships in 12 - 19 working days

This book is designed to be usable as a textbook for an undergraduate course or for an advanced graduate course in coding theory as well as a reference for researchers in discrete mathematics, engineering and theoretical computer science. This second edition has three parts: an elementary introduction to coding, theory and applications of codes, and algebraic curves. The latter part presents a brief introduction to the theory of algebraic curves and its most important applications to coding theory.

Cybersecurity in Smart Homes - Architectures, Solutions and Technologies (Hardcover): Khatoun Cybersecurity in Smart Homes - Architectures, Solutions and Technologies (Hardcover)
Khatoun
R3,869 R3,601 Discovery Miles 36 010 Save R268 (7%) Ships in 12 - 19 working days

Smart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A smart home is programmed to act autonomously to improve comfort levels, save energy and potentially ensure safety; the result is a better way of life. Innovative solutions continue to be developed by researchers and engineers and thus smart home technologies are constantly evolving. By the same token, cybercrime is also becoming more prevalent. Indeed, a smart home system is made up of connected devices that cybercriminals can infiltrate to access private information, commit cyber vandalism or infect devices using botnets. This book addresses cyber attacks such as sniffing, port scanning, address spoofing, session hijacking, ransomware and denial of service. It presents, analyzes and discusses the various aspects of cybersecurity as well as solutions proposed by the research community to counter the risks. Cybersecurity in Smart Homes is intended for people who wish to understand the architectures, protocols and different technologies used in smart homes.

Hands-On Ethical Hacking and Network Defense (Paperback, 4th edition): Rob Wilson Hands-On Ethical Hacking and Network Defense (Paperback, 4th edition)
Rob Wilson
R1,445 R1,333 Discovery Miles 13 330 Save R112 (8%) Ships in 10 - 15 working days

Wilson/Simpson/Antill's HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE, 4th edition, equips you with the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors explore the concept of ethical hacking and its practitioners -- explaining their importance in protecting corporate and government data -- and then deliver an in-depth guide to performing security testing. Thoroughly updated, the text covers new security resources, emerging vulnerabilities and innovative methods to protect networks, mobile security considerations, computer crime laws and penalties for illegal computer hacking. A final project brings concepts together in a penetration testing exercise and report, while virtual machine labs, auto-graded quizzes and interactive activities in the online learning platform help further prepare you for your role as a network security professional.

Advanced Communications and Multimedia Security - IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and... Advanced Communications and Multimedia Security - IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26-27, 2002, Portoroz, Slovenia (Hardcover, 2002 ed.)
Borka Jerman-Blazic, Tomaz Klobucar
R2,912 Discovery Miles 29 120 Ships in 10 - 15 working days

Security, trust and confidence can certainly be considered as the most important parts of the Information Society. Being protected when working, learning, shopping or doing any kind of e-commerce is of great value to citizens, students, business people, employees and employers. Commercial companies and their clients want to do business over the Internet in a secure way; business managers when having meetings by videoconferencing tools require the exchanged information to be protected; the publishing industry is concerned with the protection of copyright; hospital patients have a right to privacy; etc. There is no area in the Information Society that can proliferate without extensive use of services that provide satisfactory protection and privacy of data or personality.
Advanced Communications and Multimedia Security presents a state-of-the-art review of current perspectives as well as the latest developments in the area of communications and multimedia security. It examines requirements, issues and solutions pertinent to securing information networks, and identifies future security-related research challenges. A wide spectrum of topics is discussed, including:
-Applied cryptography;
-Biometry;
-Communication systems security;
-Applications security; Mobile security;
-Distributed systems security;
-Digital watermarking and digital signatures.
This volume comprises the proceedings of the sixth Joint Working Conference on Communications and Multimedia Security (CMS'02), which was sponsored by the International Federation for Information Processing (IFIP) and held in September 2002 in Portoroz, Slovenia. It constitutes essential reading for information security specialists, researchers and professionals working in the area of computer science and communication systems.

Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Hardcover): Rebecca Slayton Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Hardcover)
Rebecca Slayton
R3,967 R2,456 Discovery Miles 24 560 Save R1,511 (38%) Ships in 12 - 19 working days

In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more. While other books have documented the development of public key cryptography, this is the first to provide a comprehensive insiders' perspective on the full impacts of public key cryptography, including six original chapters by nine distinguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman. The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy.

Advances in Information Security Management & Small Systems Security - IFIP TC11 WG11.1/WG11.2 Eighth Annual Working Conference... Advances in Information Security Management & Small Systems Security - IFIP TC11 WG11.1/WG11.2 Eighth Annual Working Conference on Information Security Management & Small Systems Security September 27-28, 2001, Las Vegas, Nevada, USA (Hardcover, 2001 ed.)
Jan H.P. Eloff, Les Labuschagne, Rossouw von Solms, Gurpreet Dhillon
R4,359 Discovery Miles 43 590 Ships in 10 - 15 working days

The Eighth Annual Working Conference of Information Security Management and Small Systems Security, jointly presented by WG11.1 and WG11.2 of the International Federation for Information Processing (IFIP), focuses on various state-of-art concepts in the two relevant fields. The conference focuses on technical, functional as well as managerial issues. This working conference brings together researchers and practitioners of different disciplines, organisations, and countries, to discuss the latest developments in (amongst others) information security methods, methodologies and techniques, information security management issues, risk analysis, managing information security within electronic commerce, computer crime and intrusion detection. We are fortunate to have attracted two highly acclaimed international speakers to present invited lectures, which will set the platform for the reviewed papers. Invited speakers will talk on a broad spectrum of issues, all related to information security management and small system security issues. These talks cover new perspectives on electronic commerce, security strategies, documentation and many more. All papers presented at this conference were reviewed by a minimum of two international reviewers. We wish to express our gratitude to all authors of papers and the international referee board. We would also like to express our appreciation to the organising committee, chaired by Gurpreet Dhillon, for all their inputs and arrangements. Finally, we would like to thank Les Labuschagne and Hein Venter for their contributions in compiling this proceeding for WG11.1 and WG 11.2.

The Encrypted Book of Passwords (Hardcover): Raef Meeuwisse The Encrypted Book of Passwords (Hardcover)
Raef Meeuwisse
R648 Discovery Miles 6 480 Ships in 12 - 19 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,692 Discovery Miles 66 920
Cryptocurrencies and Blockchain…
Keizer Soeze Hardcover R1,469 R1,221 Discovery Miles 12 210
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R539 Discovery Miles 5 390
Multimedia Security - Steganography and…
Hardcover R2,158 Discovery Miles 21 580
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R819 Discovery Miles 8 190
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R673 Discovery Miles 6 730
TLS Mastery
Michael W Lucas Hardcover R970 R875 Discovery Miles 8 750
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R834 Discovery Miles 8 340
Protecting Privacy through Homomorphic…
Kristin Lauter, Wei Dai, … Hardcover R3,121 Discovery Miles 31 210
Technical Articles about the Voynich…
National Security Agency Hardcover R630 Discovery Miles 6 300

 

Partners