0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (14)
  • R250 - R500 (92)
  • R500+ (1,354)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Codes and Ciphers - A History Of Cryptography (Hardcover): Alexander d'Agapeyeff Codes and Ciphers - A History Of Cryptography (Hardcover)
Alexander d'Agapeyeff
R970 Discovery Miles 9 700 Ships in 12 - 17 working days

A fascinating work on the history and development of cryptography, from the Egyptians to WWII. Many of the earliest books, particularly those dating back to the 1900s and before, are now extremely scarce and increasingly expensive. Hesperides Press are republishing these classic works in affordable, high quality, modern editions, using the original text and artwork Contents Include The Beginings of Cryptography From the Middle Ages Onwards Signals, Signs, And Secret Languages Commercial Codes Military Codes and Ciphers Types of Codes and Ciphers Methods of Deciphering Bibliography

Handbook of Research on Intrusion Detection Systems (Hardcover): Brij B. Gupta, Srivathsan Srinivasagopalan Handbook of Research on Intrusion Detection Systems (Hardcover)
Brij B. Gupta, Srivathsan Srinivasagopalan
R7,928 Discovery Miles 79 280 Ships in 12 - 17 working days

Businesses in today's world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.

Information Security Management-Global Challenges In The New Millennium (Paperback): Gurpreet Dhillon Information Security Management-Global Challenges In The New Millennium (Paperback)
Gurpreet Dhillon
R1,966 Discovery Miles 19 660 Ships in 12 - 17 working days

Information security is moving much higher up the agenda of corporate concerns. The pitfalls lying in wait of corporate information are legion. If information is our most important asset, then we must fortify ourselves for the task of protecting it properly. This book is a compilation of contributed chapters by researches and practitioners addressing issues, trends and challenges facing the management of information security in this new millennium. Information Security Management: Global Challenges in the New Millennium focuses on aspects of information security planning, evaluation, design and implementation.

Applied Cryptography for Cyber Security and Defense - Information Encryption and Cyphering (Hardcover, New): Hamid R. Nemati,... Applied Cryptography for Cyber Security and Defense - Information Encryption and Cyphering (Hardcover, New)
Hamid R. Nemati, Yang Li
R4,916 Discovery Miles 49 160 Ships in 12 - 17 working days

In today s information age, the security of digital communication and transactions is of critical importance. Cryptography is the traditional, yet effective, practice of concealing personal information in cyberspace. Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect businesses information and ensure privacy for their networks and databases. It delves into the specific security requirements within various emerging application areas and discusses procedures for engineering cryptography into system design and implementation.

Advances in Enterprise Information Technology Security (Hardcover): Advances in Enterprise Information Technology Security (Hardcover)
R4,896 R4,517 Discovery Miles 45 170 Save R379 (8%) Ships in 12 - 17 working days

Advances in Enterprise Information Technology Security provides a broad working knowledge of all the major security issues affecting today's enterprise IT activities. The chapters in this Premier Reference Source are written by some of the world's leading researchers and practitioners in the filed of IT security. There are no simple and complete answers to the issues of security; therefore, multiple techniques, strategies, and applications are thoroughly examined. This reference work presents the tools to address opportunities in the field, and is an all-in-one reference for IT managers, network administrators, researchers, and students.

Arithmetic and Algebraic Circuits (Hardcover, 1st ed. 2021): Antonio Lloris Ruiz, Encarnacion Castillo Morales, Luis Parrilla... Arithmetic and Algebraic Circuits (Hardcover, 1st ed. 2021)
Antonio Lloris Ruiz, Encarnacion Castillo Morales, Luis Parrilla Roure, Antonio Garcia Rios, Maria Jose Lloris Meseguer
R5,111 Discovery Miles 51 110 Ships in 12 - 17 working days

This book presents a complete and accurate study of arithmetic and algebraic circuits. The first part offers a review of all important basic concepts: it describes simple circuits for the implementation of some basic arithmetic operations; it introduces theoretical basis for residue number systems; and describes some fundamental circuits for implementing the main modular operations that will be used in the text. Moreover, the book discusses floating-point representation of real numbers and the IEEE 754 standard. The second and core part of the book offers a deep study of arithmetic circuits and specific algorithms for their implementation. It covers the CORDIC algorithm, and optimized arithmetic circuits recently developed by the authors for adders and subtractors, as well as multipliers, dividers and special functions. It describes the implementation of basic algebraic circuits, such as LFSRs and cellular automata. Finally, it offers a complete study of Galois fields, showing some exemplary applications and discussing the advantages in comparison to other methods. This dense, self-contained text provides students, researchers and engineers, with extensive knowledge on and a deep understanding of arithmetic and algebraic circuits and their implementation.

Blockchain Applications (Hardcover): Arshdeep Bagha Blockchain Applications (Hardcover)
Arshdeep Bagha
R2,030 R1,645 Discovery Miles 16 450 Save R385 (19%) Ships in 10 - 15 working days
Encyclopedia of Information Ethics and Security (Hardcover): Encyclopedia of Information Ethics and Security (Hardcover)
R8,786 Discovery Miles 87 860 Ships in 12 - 17 working days

The "Encyclopedia of Information Ethics and Security" is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. Covering a wide range of themes, this valuable reference tool covers such topics as computer crime, information warfare, privacy, surveillance, intellectual property, and education.

Multimedia Security - Steganography and Digital Watermarking Techniques for Protection of Intellectual Property (Hardcover,... Multimedia Security - Steganography and Digital Watermarking Techniques for Protection of Intellectual Property (Hardcover, New)
R2,106 Discovery Miles 21 060 Ships in 12 - 17 working days

Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained studying towards an effective and practical system. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property explores the myriad of issues regarding multimedia security. This book covers various issues, including perceptual fidelity analysis, image, audio, and 3D mesh object watermarking, medical watermarking, error detection (authentication) and concealment, fingerprinting, digital signature and digital right management.

Web and Information Security (Hardcover): Web and Information Security (Hardcover)
R2,510 Discovery Miles 25 100 Ships in 12 - 17 working days

Web and Information Security consists of a collection of papers written by leading experts in the field that describe state-of-the-art topics pertaining to Web and information systems security. In particular, security for the semantic Web, privacy, security policy management and emerging topics such as secure semantic grids and secure multimedia systems are also discussed. As well as covering basic concepts of Web and information system security, this book provides new insights into the semantic Web field and its related security challenges. ""Web and Information Security"" is valuable as a reference book for senior undergraduate or graduate courses in information security which have special focuses on Web security. It is also useful for technologists, researchers, managers and developers who want to know more about emerging security technologies.

Current Issues and Trends in E-government Research (Hardcover): Current Issues and Trends in E-government Research (Hardcover)
R2,642 Discovery Miles 26 420 Ships in 12 - 17 working days

As emerging trends and research threads surface in the area of e-government, academicians, practitioners, and students face the challenge of keeping up-to-date with new and innovative practices. ""Current Issues and Trends in E-Government Research"" provides a complete synopsis of the latest technologies in information policy, security, privacy, and access, as well as the best practices in e-government applications and measurement. ""Current Issues and Trends in E-Government Research"" presents the most current issues in e-government hardware and software technology, adoption and diffusion, planning and management, and philosophy.

Economics of Information Security (Hardcover, 2004 ed.): L. Jean Camp, Stephen Lewis Economics of Information Security (Hardcover, 2004 ed.)
L. Jean Camp, Stephen Lewis
R4,465 Discovery Miles 44 650 Ships in 12 - 17 working days

Designed for managers struggling to understand the risks in organizations dependent on secure networks, this book applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security.

The Manager's Handbook for Corporate Security - Establishing and Managing a Successful Assets Protection Program... The Manager's Handbook for Corporate Security - Establishing and Managing a Successful Assets Protection Program (Hardcover)
Gerald L. Kovacich, Edward Halibozek
R2,437 Discovery Miles 24 370 Ships in 12 - 17 working days

Kovacich and Halibozek offer you the benefit of more than 55 years of combined experience in government and corporate security. Throughout the book, the authors use a fictional global corporation as a model to provide continual real-world challenges and solutions. New and experienced managers alike will find a wealth of information and practical advice to help you develop strategic and tactical plans and manage your daily operations.
* Contains real case examples to illustrate practical application of concepts
* Thoroughly covers the integration of physical, computer and information security goals for complete security awareness
* A handy reference for managers to quickly find and implement the security solutions they need

Information Security Policies and Actions in Modern Integrated Systems (Hardcover, New): Information Security Policies and Actions in Modern Integrated Systems (Hardcover, New)
R2,250 Discovery Miles 22 500 Ships in 12 - 17 working days

This book is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data, technology and use of smart cards, applications of cryptography, security of distributed applications and adherence to standards, model and security issues associated with the organization of components (architectures) of information systems, such as networked systems (Internet and WWW-based), client/server architectures, andlayered architectures. Contributions come both from the academic and the industrial field.

Governance of Picture Archiving and Communications Systems - Data Security and Quality Management of Filmless Radiology... Governance of Picture Archiving and Communications Systems - Data Security and Quality Management of Filmless Radiology (Hardcover)
Carrison K.S. Tong, Eric T.T. Wong
R6,074 Discovery Miles 60 740 Ships in 12 - 17 working days

In the age of increasing reliance on data and the importance of sensitive information, applications and technologies have arisen to appropriately deal with assuring the security of medical informatics and healthcare administration functions. In order for technology to progress, new systems are being installed globally to address this issue. Governance of Picture Archiving and Communications Systems: Data Security and Quality Management of Filmless Radiology examines information security management systems for the facilitation of picture archiving and communication systems (PACS). This valuable contribution to data security and quality management literature provides a comprehensive guide for all aspects of the implementation of PACS for the enhancement of modern practices in radiology.

Kryptowahrungen fur Dummies (German, Paperback): K Soeteman Kryptowahrungen fur Dummies (German, Paperback)
K Soeteman
R433 Discovery Miles 4 330 Out of stock

Sie haben viel A1/4ber Bitcoins und Co gelesen und wollen wissen, was dahintersteckt? Dann ist dieser knappe Einstieg in die Kryptowahrungen genau das Richtige fA1/4r Sie. Sie erfahren zu Beginn einiges A1/4ber Geld im Allgemeinen, dann erklart Ihnen der Autor, wie sich Kryptowahrungen vom Geld, so wie Sie es kennen, abheben. Im Folgenden geht er kurz auf die technischen Aspekte dieser Wahrungen ein und erklart, wie damit Geld verdient wird. So hilft Ihnen dieses Buch, wenn Sie zuverlassige und etwas tiefergehende Informationen suchen, aber keinen dicken Walzer drehen wollen.

Black Hat Physical Device Security: Exploiting Hardware and Software (Hardcover): Drew Miller Black Hat Physical Device Security: Exploiting Hardware and Software (Hardcover)
Drew Miller
R1,537 Discovery Miles 15 370 Ships in 12 - 17 working days

Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In this book the Black Hat experts show readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication systems, thumbprint and voice print devices, retina scans, and more.
The Black Hat Briefings held every year in Las Vegas, Washington DC, Amsterdam, and Singapore continually expose the greatest threats to cyber security and provide IT mind leaders with ground breaking defensive techniques. There are no books that show security and networking professionals how to protect physical security devices. This unique book provides step-by-step instructions for assessing the vulnerability of a security device such as a retina scanner, seeing how it might be compromised, and taking protective measures. The book covers the actual device as well as the software that runs it. By way of example, a thumbprint scanner that allows the thumbprint to remain on the glass from the last person could be bypassed by pressing a "gummy bear" piece of candy against the glass so that the scan works against the last thumbprint that was used on the device. This is a simple example of an attack against a physical authentication system.
* First book by world-renowned Black Hat, Inc. security consultants and trainers
* First book that details methods for attacking and defending physical security devices
* Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences

Fault Tolerant Architectures for Cryptography and Hardware Security (Hardcover, 1st ed. 2018): Sikhar Patranabis, Debdeep... Fault Tolerant Architectures for Cryptography and Hardware Security (Hardcover, 1st ed. 2018)
Sikhar Patranabis, Debdeep Mukhopadhyay
R4,074 Discovery Miles 40 740 Ships in 12 - 17 working days

This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.

Quantum Computing for High School Students (Hardcover): Yuly Billig Quantum Computing for High School Students (Hardcover)
Yuly Billig
R714 Discovery Miles 7 140 Ships in 12 - 17 working days
Innovative Solutions for Access Control Management (Hardcover): Ahmad Kamran Malik, Adeel Anjum, Basit Raza Innovative Solutions for Access Control Management (Hardcover)
Ahmad Kamran Malik, Adeel Anjum, Basit Raza
R5,281 Discovery Miles 52 810 Ships in 12 - 17 working days

Technological innovation and evolution continues to improve personal and professional lifestyles, as well as general organizational and business practices; however, these advancements also create potential issues in the security and privacy of the user's information. Innovative Solutions for Access Control Management features a comprehensive discussion on the trending topics and emergent research in IT security and governance. Highlighting theoretical frameworks and best practices, as well as challenges and solutions within the topic of access control and management, this publication is a pivotal reference source for researchers, practitioners, students, database vendors, and organizations within the information technology and computer science fields.

Multimedia Security Technologies for Digital Rights Management (Hardcover): Wenjun Zeng, Heather Yu, Ching-Yung Lin Multimedia Security Technologies for Digital Rights Management (Hardcover)
Wenjun Zeng, Heather Yu, Ching-Yung Lin
R3,022 Discovery Miles 30 220 Ships in 12 - 17 working days

Security is a major concern in an increasingly multimedia-defined universe where the Internet serves as an indispensable resource for information and entertainment. Digital Rights Management (DRM) is the technology by which network systems protect and provide access to critical and time-sensitive copyrighted material and/or personal information. This book equips savvy technology professionals and their aspiring collegiate proteges with the latest technologies, strategies and methodologies needed to successfully thwart off those who thrive on security holes and weaknesses.
Filled with sample application scenarios and algorithms, this book provides an in-depth examination of present and future field technologies including encryption, authentication, copy control, tagging, tracing, conditional access and media identification. The authors present a diversified blend of theory and practice and focus on the constantly changing developments in multimedia applications thus providing an admirably comprehensive book.
* Discusses state-of-the-art multimedia authentication and fingerprinting techniques
* Presents several practical methodologies from industry, including broadcast encryption, digital media forensics and 3D mesh watermarking
* Focuses on the need for security in multimedia applications found on computer networks, cell phones and emerging mobile computing devices

Implementing the ISO/IEC 27001 Information Security Management System Standard (Hardcover): Edward Humphreys Implementing the ISO/IEC 27001 Information Security Management System Standard (Hardcover)
Edward Humphreys
R2,400 Discovery Miles 24 000 Ships in 10 - 15 working days

The ISO/IEC 27000 is a critical series of information security technology standards, and ISO/IEC 27001 is the newest release of this series. Authored by a recognized expert in the field, this authoritative and clear guide explores the ISO/IEC 27000 security standards and their implementation, focusing on the recent ISO/IEC 27001.

Multimedia Forensics and Security (Hardcover, New): Chang-Tsun Li Multimedia Forensics and Security (Hardcover, New)
Chang-Tsun Li
R4,917 Discovery Miles 49 170 Ships in 12 - 17 working days

As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research and development agendas for researchers, organizations, and governments worldwide. ""Multimedia Forensics and Security"" provides an in-depth treatment of advancements in the emerging field of multimedia forensics and security by tackling challenging issues such as digital watermarking for copyright protection, digital fingerprinting for transaction tracking, and digital camera source identification.

Cyber Deception - Building the Scientific Foundation (Hardcover, 1st ed. 2016): Sushil Jajodia, V.S. Subrahmanian, Vipin... Cyber Deception - Building the Scientific Foundation (Hardcover, 1st ed. 2016)
Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang
R5,475 Discovery Miles 54 750 Ships in 12 - 17 working days

This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems. This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computer science research relating to cyber-security, or as a supplemental text for a regular graduate-level course on cyber-security.

Lai-Massey Cipher Designs - History, Design Criteria and Cryptanalysis (Hardcover, 1st ed. 2018): Jorge Nakahara Jr. Lai-Massey Cipher Designs - History, Design Criteria and Cryptanalysis (Hardcover, 1st ed. 2018)
Jorge Nakahara Jr.
R4,457 Discovery Miles 44 570 Ships in 12 - 17 working days

This book provides the first extensive survey of block ciphers following the Lai-Massey design paradigm. After the introduction, with historical remarks, the author structures the book into a chapter on the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysis of these ciphers, and another chapter on new cipher designs. The appendices include surveys of cryptographic substitution boxes and of MDS codes. This comprehensive treatment can serve as a reference source for researchers, students and practitioners.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Special Interest Tourism in Southeast…
Bintang Handayani, Hugues Seraphin, … Hardcover R4,476 Discovery Miles 44 760
Marketing Tourism in South Africa
Richard George Paperback R587 Discovery Miles 5 870
Margo's Got Money Troubles
Rufi Thorpe Paperback R395 R353 Discovery Miles 3 530
Optical Properties of Solids
Mark Fox Hardcover R4,423 Discovery Miles 44 230
Sun, Sea, and Sound - Music and Tourism…
Timothy Rommen, Daniel T. Neely Hardcover R3,926 Discovery Miles 39 260
Tell Tale
Jeffrey Archer Paperback  (3)
R468 R356 Discovery Miles 3 560
Problems of Condensed Matter Physics…
Alexei L. Ivanov, Sergei G. Tikhodeev Hardcover R4,768 Discovery Miles 47 680
Einstein Studies in Russia
Y. Balashov, V.P. Vizgin Hardcover R2,500 Discovery Miles 25 000
Molecular Architectonics - The Third…
Takuji Ogawa Hardcover R11,655 Discovery Miles 116 550
Elements of Phase Transitions and…
Hidetoshi Nishimori, Gerardo Ortiz Hardcover R3,372 Discovery Miles 33 720

 

Partners