0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (86)
  • R500+ (1,286)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Codes and Ciphers - A History Of Cryptography (Hardcover): Alexander d'Agapeyeff Codes and Ciphers - A History Of Cryptography (Hardcover)
Alexander d'Agapeyeff
R952 Discovery Miles 9 520 Ships in 10 - 15 working days

A fascinating work on the history and development of cryptography, from the Egyptians to WWII. Many of the earliest books, particularly those dating back to the 1900s and before, are now extremely scarce and increasingly expensive. Hesperides Press are republishing these classic works in affordable, high quality, modern editions, using the original text and artwork Contents Include The Beginings of Cryptography From the Middle Ages Onwards Signals, Signs, And Secret Languages Commercial Codes Military Codes and Ciphers Types of Codes and Ciphers Methods of Deciphering Bibliography

Applied Cryptography for Cyber Security and Defense - Information Encryption and Cyphering (Hardcover, New): Hamid R. Nemati,... Applied Cryptography for Cyber Security and Defense - Information Encryption and Cyphering (Hardcover, New)
Hamid R. Nemati, Yang Li
R4,605 Discovery Miles 46 050 Ships in 18 - 22 working days

In today s information age, the security of digital communication and transactions is of critical importance. Cryptography is the traditional, yet effective, practice of concealing personal information in cyberspace. Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect businesses information and ensure privacy for their networks and databases. It delves into the specific security requirements within various emerging application areas and discusses procedures for engineering cryptography into system design and implementation.

Information Security Management-Global Challenges In The New Millennium (Paperback): Gurpreet Dhillon Information Security Management-Global Challenges In The New Millennium (Paperback)
Gurpreet Dhillon
R1,854 Discovery Miles 18 540 Ships in 18 - 22 working days

Information security is moving much higher up the agenda of corporate concerns. The pitfalls lying in wait of corporate information are legion. If information is our most important asset, then we must fortify ourselves for the task of protecting it properly. This book is a compilation of contributed chapters by researches and practitioners addressing issues, trends and challenges facing the management of information security in this new millennium. Information Security Management: Global Challenges in the New Millennium focuses on aspects of information security planning, evaluation, design and implementation.

How to Cheat at Windows System Administration Using Command Line Scripts (Paperback): Pawan K. Bhardwaj How to Cheat at Windows System Administration Using Command Line Scripts (Paperback)
Pawan K. Bhardwaj
R941 Discovery Miles 9 410 Ships in 10 - 15 working days

How to Cheat at Windows Systems Administrators using Command line scripts teaches system administrators hundreds of powerful, time-saving tips for automating daily system administration tasks using Windows command line scripts.
With every new version of Windows, Microsoft is trying to ease the administration jobs by adding more and more layers of graphical user interface (GUI) or configuration wizards (dialog boxes). While these wizards are interactive and make the administrator s job easier, they are not always the most convenient and efficient way to accomplish the everyday administration tasks. These wizards are time consuming and, at times, may seem a bit confusing. The purpose of the book is to teach administrators how to use command-line scripts to complete everyday administration jobs, solve recurring network problems and at the same time improve their efficiency.
*Provides system administrators with hundreds of tips, tricks, and scripts to complete administration tasks more quickly and efficiently.
*No direct competition for a core tool for Windows administrators.
*Builds on success of other books in the series including How to Cheat at Managing Windows Small Business Server 2003 and How to Cheat at Managing Microsoft Operations Manager 2005."

Advances in Enterprise Information Technology Security (Hardcover): Advances in Enterprise Information Technology Security (Hardcover)
R4,239 Discovery Miles 42 390 Ships in 18 - 22 working days

Advances in Enterprise Information Technology Security provides a broad working knowledge of all the major security issues affecting today's enterprise IT activities. The chapters in this Premier Reference Source are written by some of the world's leading researchers and practitioners in the filed of IT security. There are no simple and complete answers to the issues of security; therefore, multiple techniques, strategies, and applications are thoroughly examined. This reference work presents the tools to address opportunities in the field, and is an all-in-one reference for IT managers, network administrators, researchers, and students.

Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover): Michael... Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover)
Michael Khairallah
R1,400 Discovery Miles 14 000 Ships in 10 - 15 working days

A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book also provides recommended approaches for system/user implementation, giving checklists and examples for developing management controls using the installed systems. This book was developed after a careful examination of the approved reference material available from the American Society for Industrial Security (ASIS International) for the certification of Physical Security Professionals (PSP). It is intended to fill voids left by the currently approved reference material to perform implementation of systems suggested in the existing reference texts. This book is an excellent "How To" for the aspiring security professional who wishes to take on the responsibilities of security system implementation, or the security manager who wants to do a professional job of system acquisition without hiring a professional consultant.
* Offers a step-by-step approach to identifying the application, acquiring the product and implementing the recommended system.
* Builds upon well-known, widely adopted concepts prevalent among security professionals.
* Offers seasoned advice on the competitive biddingprocess as well as on legal issues involved in the selection of applied products.

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Paperback):... Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Paperback)
James C Foster
R1,135 Discovery Miles 11 350 Ships in 10 - 15 working days

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:
1. Coding The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL.
2. Sockets The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same communication over TCP and UDP, sockets are implemented differently in nearly ever language.
3. Shellcode Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access.
4. Porting Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not recreate the wheel.
5. Coding Tools The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications.
*Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits.
*Perform zero-day exploit forensics by reverse engineering malicious code.
*Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks."

Handbook of Research on Intrusion Detection Systems (Hardcover): Brij B. Gupta, Srivathsan Srinivasagopalan Handbook of Research on Intrusion Detection Systems (Hardcover)
Brij B. Gupta, Srivathsan Srinivasagopalan
R7,311 Discovery Miles 73 110 Ships in 18 - 22 working days

Businesses in today's world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.

Encyclopedia of Information Ethics and Security (Hardcover): Encyclopedia of Information Ethics and Security (Hardcover)
R8,189 Discovery Miles 81 890 Ships in 18 - 22 working days

The "Encyclopedia of Information Ethics and Security" is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. Covering a wide range of themes, this valuable reference tool covers such topics as computer crime, information warfare, privacy, surveillance, intellectual property, and education.

Blockchain Applications (Hardcover): Arshdeep Bagha Blockchain Applications (Hardcover)
Arshdeep Bagha
R1,870 R1,522 Discovery Miles 15 220 Save R348 (19%) Ships in 18 - 22 working days
Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New): Michael... Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New)
Michael Erbschloe
R1,191 Discovery Miles 11 910 Ships in 10 - 15 working days

Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements.
This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats - new and advanced variants of Trojans, as well as spyware (both hardware and software) and "bombs" - and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.
*Provides step-by-step instructions to follow in the event of an attack
*Case studies illustrate the "do's," "don'ts," and lessons learned from infamous attacks
*Illustrates to managers and their staffs the importance of having protocols and a response plan in place

Data Hiding Fundamentals and Applications - Content Security in Digital Multimedia (Hardcover): Husrev T. Sencar, Mahalingam... Data Hiding Fundamentals and Applications - Content Security in Digital Multimedia (Hardcover)
Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu
R1,644 Discovery Miles 16 440 Ships in 10 - 15 working days

Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce.
Data Hiding Fundamentals and Applications focuses on the theory and state-of-the-art applications of content security and data hiding in digital multimedia. One of the pillars of content security solutions is the imperceptible insertion of information into multimedia data for security purposes; the idea is that this inserted information will allow detection of unauthorized usage.
* Provides a theoretical framework for data hiding, in a signal processing context;
* Realistic applications in secure, multimedia delivery;
* Compression robust data hiding;
* Data hiding for proof of ownership--WATERMARKING;
* Data hiding algorithms for image and video watermarking.

Multimedia Security - Steganography and Digital Watermarking Techniques for Protection of Intellectual Property (Hardcover,... Multimedia Security - Steganography and Digital Watermarking Techniques for Protection of Intellectual Property (Hardcover, New)
R1,994 Discovery Miles 19 940 Ships in 18 - 22 working days

Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained studying towards an effective and practical system. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property explores the myriad of issues regarding multimedia security. This book covers various issues, including perceptual fidelity analysis, image, audio, and 3D mesh object watermarking, medical watermarking, error detection (authentication) and concealment, fingerprinting, digital signature and digital right management.

Current Issues and Trends in E-government Research (Hardcover): Current Issues and Trends in E-government Research (Hardcover)
R2,494 Discovery Miles 24 940 Ships in 18 - 22 working days

As emerging trends and research threads surface in the area of e-government, academicians, practitioners, and students face the challenge of keeping up-to-date with new and innovative practices. ""Current Issues and Trends in E-Government Research"" provides a complete synopsis of the latest technologies in information policy, security, privacy, and access, as well as the best practices in e-government applications and measurement. ""Current Issues and Trends in E-Government Research"" presents the most current issues in e-government hardware and software technology, adoption and diffusion, planning and management, and philosophy.

The Manager's Handbook for Corporate Security - Establishing and Managing a Successful Assets Protection Program... The Manager's Handbook for Corporate Security - Establishing and Managing a Successful Assets Protection Program (Hardcover)
Gerald L. Kovacich, Edward Halibozek
R1,663 Discovery Miles 16 630 Ships in 10 - 15 working days

Kovacich and Halibozek offer you the benefit of more than 55 years of combined experience in government and corporate security. Throughout the book, the authors use a fictional global corporation as a model to provide continual real-world challenges and solutions. New and experienced managers alike will find a wealth of information and practical advice to help you develop strategic and tactical plans and manage your daily operations.
* Contains real case examples to illustrate practical application of concepts
* Thoroughly covers the integration of physical, computer and information security goals for complete security awareness
* A handy reference for managers to quickly find and implement the security solutions they need

Multimedia Security Volume 1: Authentication and Data Hiding (Hardcover): W Puech Multimedia Security Volume 1: Authentication and Data Hiding (Hardcover)
W Puech
R3,771 Discovery Miles 37 710 Ships in 18 - 22 working days

Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today's "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis.

Web and Information Security (Hardcover): Web and Information Security (Hardcover)
R2,375 Discovery Miles 23 750 Ships in 18 - 22 working days

Web and Information Security consists of a collection of papers written by leading experts in the field that describe state-of-the-art topics pertaining to Web and information systems security. In particular, security for the semantic Web, privacy, security policy management and emerging topics such as secure semantic grids and secure multimedia systems are also discussed. As well as covering basic concepts of Web and information system security, this book provides new insights into the semantic Web field and its related security challenges. ""Web and Information Security"" is valuable as a reference book for senior undergraduate or graduate courses in information security which have special focuses on Web security. It is also useful for technologists, researchers, managers and developers who want to know more about emerging security technologies.

Economics of Information Security (Hardcover, 2004 ed.): L. Jean Camp, Stephen Lewis Economics of Information Security (Hardcover, 2004 ed.)
L. Jean Camp, Stephen Lewis
R4,177 Discovery Miles 41 770 Ships in 18 - 22 working days

Designed for managers struggling to understand the risks in organizations dependent on secure networks, this book applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security.

Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Hardcover): Rebecca Slayton Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Hardcover)
Rebecca Slayton
R2,816 Discovery Miles 28 160 Ships in 10 - 15 working days

In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more. While other books have documented the development of public key cryptography, this is the first to provide a comprehensive insiders' perspective on the full impacts of public key cryptography, including six original chapters by nine distinguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman. The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy.

Governance of Picture Archiving and Communications Systems - Data Security and Quality Management of Filmless Radiology... Governance of Picture Archiving and Communications Systems - Data Security and Quality Management of Filmless Radiology (Hardcover)
Carrison K.S. Tong, Eric T.T. Wong
R5,612 Discovery Miles 56 120 Ships in 18 - 22 working days

In the age of increasing reliance on data and the importance of sensitive information, applications and technologies have arisen to appropriately deal with assuring the security of medical informatics and healthcare administration functions. In order for technology to progress, new systems are being installed globally to address this issue. Governance of Picture Archiving and Communications Systems: Data Security and Quality Management of Filmless Radiology examines information security management systems for the facilitation of picture archiving and communication systems (PACS). This valuable contribution to data security and quality management literature provides a comprehensive guide for all aspects of the implementation of PACS for the enhancement of modern practices in radiology.

Information Security Policies and Actions in Modern Integrated Systems (Hardcover, New): Information Security Policies and Actions in Modern Integrated Systems (Hardcover, New)
R2,143 Discovery Miles 21 430 Ships in 18 - 22 working days

This book is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data, technology and use of smart cards, applications of cryptography, security of distributed applications and adherence to standards, model and security issues associated with the organization of components (architectures) of information systems, such as networked systems (Internet and WWW-based), client/server architectures, andlayered architectures. Contributions come both from the academic and the industrial field.

Implementing the ISO/IEC 27001 Information Security Management System Standard (Hardcover): Edward Humphreys Implementing the ISO/IEC 27001 Information Security Management System Standard (Hardcover)
Edward Humphreys
R2,217 Discovery Miles 22 170 Ships in 18 - 22 working days

The ISO/IEC 27000 is a critical series of information security technology standards, and ISO/IEC 27001 is the newest release of this series. Authored by a recognized expert in the field, this authoritative and clear guide explores the ISO/IEC 27000 security standards and their implementation, focusing on the recent ISO/IEC 27001.

Fault Tolerant Architectures for Cryptography and Hardware Security (Hardcover, 1st ed. 2018): Sikhar Patranabis, Debdeep... Fault Tolerant Architectures for Cryptography and Hardware Security (Hardcover, 1st ed. 2018)
Sikhar Patranabis, Debdeep Mukhopadhyay
R3,802 Discovery Miles 38 020 Ships in 18 - 22 working days

This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.

Cryptographic Boolean Functions and Applications (Paperback, 2nd edition): Thomas W Cusick, Pantelimon Stanica Cryptographic Boolean Functions and Applications (Paperback, 2nd edition)
Thomas W Cusick, Pantelimon Stanica
R1,920 Discovery Miles 19 200 Ships in 10 - 15 working days

Cryptographic Boolean Functions and Applications, Second Edition is designed to be a comprehensive reference for the use of Boolean functions in modern cryptography. While the vast majority of research on cryptographic Boolean functions has been achieved since the 1970s, when cryptography began to be widely used in everyday transactions, in particular banking, relevant material is scattered over hundreds of journal articles, conference proceedings, books, reports and notes, some of them only available online. This book follows the previous edition in sifting through this compendium and gathering the most significant information in one concise reference book. The work therefore encompasses over 600 citations, covering every aspect of the applications of cryptographic Boolean functions. Since 2008, the subject has seen a very large number of new results, and in response, the authors have prepared a new chapter on special functions. The new edition brings 100 completely new references and an expansion of 50 new pages, along with heavy revision throughout the text.

Innovative Solutions for Access Control Management (Hardcover): Ahmad Kamran Malik, Adeel Anjum, Basit Raza Innovative Solutions for Access Control Management (Hardcover)
Ahmad Kamran Malik, Adeel Anjum, Basit Raza
R4,892 Discovery Miles 48 920 Ships in 18 - 22 working days

Technological innovation and evolution continues to improve personal and professional lifestyles, as well as general organizational and business practices; however, these advancements also create potential issues in the security and privacy of the user's information. Innovative Solutions for Access Control Management features a comprehensive discussion on the trending topics and emergent research in IT security and governance. Highlighting theoretical frameworks and best practices, as well as challenges and solutions within the topic of access control and management, this publication is a pivotal reference source for researchers, practitioners, students, database vendors, and organizations within the information technology and computer science fields.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Emigreer Of Bly - Is Die Gras Werklik…
Stephan Joubert Paperback R220 R197 Discovery Miles 1 970
Light Through The Bars - Understanding…
Babychan Arackathara Paperback R30 R28 Discovery Miles 280
Armageddon Time
Anne Hathaway, Jeremy Strong, … DVD R260 Discovery Miles 2 600
Behind Prison Walls - Unlocking a Safer…
Edwin Cameron, Rebecca Gore, … Paperback R350 R312 Discovery Miles 3 120
No One To Blame? - In Pursuit Of Justice…
George Bizos Paperback  (2)
R261 Discovery Miles 2 610
Dead At First Sight
Peter James Paperback  (2)
R473 R391 Discovery Miles 3 910
Freestyle Cooking With Chef Ollie
Oliver Swart Hardcover R470 R419 Discovery Miles 4 190
Power And Loss In South African…
Glenda Daniels Paperback R350 R323 Discovery Miles 3 230
Now You Know How Mapetla Died - The…
Zikhona Valela Paperback R484 Discovery Miles 4 840
1 Recce: Volume 3 - Onsigbaarheid Is Ons…
Alexander Strachan Paperback R380 R339 Discovery Miles 3 390

 

Partners