0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (15)
  • R250 - R500 (92)
  • R500+ (1,401)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Kryptowahrungen fur Dummies 2e (German, Paperback): K Soeteman Kryptowahrungen fur Dummies 2e (German, Paperback)
K Soeteman
R423 Discovery Miles 4 230 Ships in 12 - 17 working days
Practical Cryptography (Hardcover): Jamie White Practical Cryptography (Hardcover)
Jamie White
R3,753 R3,239 Discovery Miles 32 390 Save R514 (14%) Ships in 10 - 15 working days
Crypto Currency Trading Tracker - Cryptocurrency Coin Tracker for Your Portofolio Investory Stock Trading Log Book (Paperback):... Crypto Currency Trading Tracker - Cryptocurrency Coin Tracker for Your Portofolio Investory Stock Trading Log Book (Paperback)
Sasha Apfel
R354 R290 Discovery Miles 2 900 Save R64 (18%) Ships in 10 - 15 working days
Disappearing Cryptography - Information Hiding: Steganography and Watermarking (Paperback, 3rd edition): Peter Wayner Disappearing Cryptography - Information Hiding: Steganography and Watermarking (Paperback, 3rd edition)
Peter Wayner
R1,423 Discovery Miles 14 230 Ships in 12 - 17 working days

Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactions that take place daily on programs like iTunes.
This new edition of our best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files. These methods include encryption, compression, data embedding and watermarking, data mimicry, and scrambling. During the last 5 years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this edition has amended and expanded outdated sections in accordance with new dangers, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the evolved forms of attack.
Each chapter is divided into sections, first providing an introduction and high-level summary for those who wish to understand theconcepts without wading through technical explanations, and then presenting concrete examples and greater detail for those who want to write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also consider probable future developments in their designs, thus fulfilling the need for preemptive caution that is becoming ever more explicit as the transference of digital media escalates.
* Includes 5 completely new chapters that delineate the most current and sophisticated cryptographic algorithms, allowing readers to protect their information against even the most evolved electronic attacks.
* Conceptual tutelage in conjunction with detailed mathematical directives allows the reader to not only understand encryption procedures, but also to write programs which anticipate future security developments in their design.
* Grants the reader access to online source code which can be used to directly implement proven cryptographic procedures such as data mimicry and reversible grammar generation into their own work.

The History of Information Security - A Comprehensive Handbook (Hardcover): Karl Maria Michael De Leeuw, Jan Bergstra The History of Information Security - A Comprehensive Handbook (Hardcover)
Karl Maria Michael De Leeuw, Jan Bergstra
R4,917 Discovery Miles 49 170 Ships in 12 - 17 working days

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.
The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas other aspects have remained largely uncovered.
There has never been any effort to write a comprehensive history. This is most unfortunate, because Information Security should be perceived as a set of communicating vessels, where technical innovations can make existing legal or organisational frame-works obsolete and a breakdown of political authority may cause an exclusive reliance on technical means.
This book is intended as a first field-survey. It consists of twenty-eight contributions, written by experts in such diverse fields as computer science, law, or history and political science, dealing with episodes, organisations and technical developments that may considered to be exemplary or have played a key role in the development of this field.
These include: the emergence of cryptology as a discipline during the Renaissance, the Black Chambers in 18th century Europe, the breaking of German military codes during World War II, the histories of the NSA and its Soviet counterparts and contemporary cryptology. Other subjects are: computer security standards, viruses and worms on the Internet, computer transparency and free software, computer crime, export regulations for encryption software and the privacy debate.
- Interdisciplinary coverage of the history Information Security
- Written by top experts in law, history, computer and information science
- First comprehensive work in Information Security

Chipless RFID based on RF Encoding Particle - Realization, Coding and Reading System (Hardcover): Arnaud Vena, Etienne Perret,... Chipless RFID based on RF Encoding Particle - Realization, Coding and Reading System (Hardcover)
Arnaud Vena, Etienne Perret, Smail Tedjini
R2,619 R2,391 Discovery Miles 23 910 Save R228 (9%) Ships in 12 - 17 working days

Chipless RFID based on RF Encoding Particle: Realization, Coding and Reading System explores the field of chipless identification based on the RF Encoding Particle (REP). The book covers the possibility of collecting information remotely with RF waves (RFID) with totally passive tags without wire, batteries, and chips, and even printed on paper. Despite the many benefits of RFID, deployment is still hindered by several economic and technological factors. Among these barriers are the high cost of tags, lack of reliability and security in the information contained in the RFID chip, and how tags are 'recycled.' This book focuses on the development of chipless RFID tags, representing a new family of low cost tags. With this technology information is extracted from the electromagnetic response of the tag, which depends only on its geometry. Various solutions have been developed by the authors to increase the amount of information, reduce the surface of the tag, or improve the robustness of detection. Considerations such as realization using paper substrate, the development of a low cost detection system, and measurements in a real environment have been addressed for practical implementation.

Eleventh Hour CISSP (R) - Study Guide (Paperback, 3rd edition): Eric Conrad, Seth Misenar, Joshua Feldman Eleventh Hour CISSP (R) - Study Guide (Paperback, 3rd edition)
Eric Conrad, Seth Misenar, Joshua Feldman
R752 R712 Discovery Miles 7 120 Save R40 (5%) Ships in 12 - 17 working days

Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. This new third edition is aligned to cover all of the material in the most current version of the exam's Common Body of Knowledge. All domains are covered as completely and concisely as possible, giving users the best possible chance of acing the exam.

Super Secreto - The Third Epoch of Cryptography - Multiple, exponential, quantum-secure and above all, simple and practical... Super Secreto - The Third Epoch of Cryptography - Multiple, exponential, quantum-secure and above all, simple and practical Encryption for Everyone (Paperback)
Theo Tenzer
R912 Discovery Miles 9 120 Ships in 10 - 15 working days
Cryptographic Protocol - Security Analysis Based on Trusted Freshness (Hardcover, 2011): Ling Dong, Kefei Chen Cryptographic Protocol - Security Analysis Based on Trusted Freshness (Hardcover, 2011)
Ling Dong, Kefei Chen
R4,089 R1,675 Discovery Miles 16 750 Save R2,414 (59%) Ships in 12 - 17 working days

"Cryptographic Protocol: Security Analysis Based on Trusted Freshness" mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the trusted freshness component. A novel freshness principle based on the trusted freshness component is presented; this principle is the basis for an efficient and easy method for analyzing the security of cryptographic protocols. The reasoning results of the new approach, when compared with the security conditions, can either establish the correctness of a cryptographic protocol when the protocol is in fact correct, or identify the absence of the security properties, which leads the structure to construct attacks directly. Furthermore, based on the freshness principle, a belief multiset formalism is presented. This formalism s efficiency, rigorousness, and the possibility of its automation are also presented.
The book is intended for researchers, engineers, and graduate students in the fields of communication, computer science and cryptography, and will be especially useful for engineers who need to analyze cryptographic protocols in the real world.
Dr. Ling Dong is a senior engineer in the network construction and information security field. Dr. Kefei Chen is a Professor at the Department of Computer Science and Engineering, Shanghai Jiao Tong University.

Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency... Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency + 10 Best Defi Projects and Strategies to Maximize Your Profits (Paperback)
Harper Fraley
R655 R529 Discovery Miles 5 290 Save R126 (19%) Ships in 10 - 15 working days
Cryptocurrency Trading - A Crypto Investing Guide for Beginners - BITCOIN, ETHEREUM, LITECOIN (Paperback): Megalodona Streamings Cryptocurrency Trading - A Crypto Investing Guide for Beginners - BITCOIN, ETHEREUM, LITECOIN (Paperback)
Megalodona Streamings
R391 R316 Discovery Miles 3 160 Save R75 (19%) Ships in 10 - 15 working days
The Era of NFTs - A Beginner's Guide To Understanding The Utility & Investment Opportunity Of Non-Fungible Tokens (NFTs)... The Era of NFTs - A Beginner's Guide To Understanding The Utility & Investment Opportunity Of Non-Fungible Tokens (NFTs) (Hardcover)
Alex Caine, Matthew Thrush
R767 Discovery Miles 7 670 Ships in 10 - 15 working days
Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency... Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency + 10 Best Defi Projects and Strategies to Maximize Your Profits (Paperback)
Harper Fraley
R701 R566 Discovery Miles 5 660 Save R135 (19%) Ships in 10 - 15 working days
Ethereum - Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency (Hardcover): Paul Paxton Ethereum - Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency (Hardcover)
Paul Paxton
R627 R512 Discovery Miles 5 120 Save R115 (18%) Ships in 10 - 15 working days
Myths Vs. Facts Of Cryptocurrency (Hardcover): Alex Caine Myths Vs. Facts Of Cryptocurrency (Hardcover)
Alex Caine; Edited by Matthew Thrush
R764 Discovery Miles 7 640 Ships in 10 - 15 working days
The Crypto Kid (Paperback): Jackson Shembekar The Crypto Kid (Paperback)
Jackson Shembekar
R370 R301 Discovery Miles 3 010 Save R69 (19%) Ships in 10 - 15 working days
A Comprehensive Guide to Investing in Cryptocurrency (Paperback): Lida Low A Comprehensive Guide to Investing in Cryptocurrency (Paperback)
Lida Low
R570 Discovery Miles 5 700 Ships in 10 - 15 working days
Metaverse Mastery - Understand and Profit from Virtual Worlds and Land, NFTs, Web3, Blockchain, VR, Gaming, A.I, Art &... Metaverse Mastery - Understand and Profit from Virtual Worlds and Land, NFTs, Web3, Blockchain, VR, Gaming, A.I, Art & Cryptocurrencies (Paperback)
Cameron Belford
R514 R424 Discovery Miles 4 240 Save R90 (18%) Ships in 10 - 15 working days
Password Log Book and Internet Addresses I Can't Remember (Paperback): Pick Me Read Me Press Password Log Book and Internet Addresses I Can't Remember (Paperback)
Pick Me Read Me Press
R320 R260 Discovery Miles 2 600 Save R60 (19%) Ships in 10 - 15 working days
Decrypting the Encryption Debate - A Framework for Decision Makers (Paperback): National Academies of Sciences, Engineering,... Decrypting the Encryption Debate - A Framework for Decision Makers (Paperback)
National Academies of Sciences, Engineering, and Medicine, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Law Enforcement and Intelligence Access to Plaintext Information
R1,161 Discovery Miles 11 610 Ships in 12 - 17 working days

Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by widely used computing devices and services - such as smartphones, laptops, and messaging applications - that are used by hundreds of millions of users. Individuals, organizations, and governments rely on encryption to counter threats from a wide range of actors, including unsophisticated and sophisticated criminals, foreign intelligence agencies, and repressive governments. Encryption on its own does not solve the challenge of providing effective security for data and systems, but it is an important tool. At the same time, encryption is relied on by criminals to avoid investigation and prosecution, including criminals who may unknowingly benefit from default settings as well as those who deliberately use encryption. Thus, encryption complicates law enforcement and intelligence investigations. When communications are encrypted "end-to-end," intercepted messages cannot be understood. When a smartphone is locked and encrypted, the contents cannot be read if the phone is seized by investigators. Decrypting the Encryption Debate reviews how encryption is used, including its applications to cybersecurity; its role in protecting privacy and civil liberties; the needs of law enforcement and the intelligence community for information; technical and policy options for accessing plaintext; and the international landscape. This book describes the context in which decisions about providing authorized government agencies access to the plaintext version of encrypted information would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information. Table of Contents Front Matter Summary 1 Introduction 2 Encryption and Its Applications 3 The Role of Encryption in Protecting Privacy and Civil Liberties 4 Information Needs of Law Enforcement and the Intelligence Community 5 Options for Accessing Plaintext 6 International Dimensions 7 A Framework for Evaluating Approaches to Access Plaintext Appendix A Biographies of Committee Members Appendix B Briefers to the Committee

Metaverse Investing & Marketing Book - Guide to Web 3.0, Non-Fungible Tokens (NFTs) Virtual Real Estate, Games, Development and... Metaverse Investing & Marketing Book - Guide to Web 3.0, Non-Fungible Tokens (NFTs) Virtual Real Estate, Games, Development and Future of the metaverse. (Paperback)
Doran Pauley
R594 Discovery Miles 5 940 Ships in 10 - 15 working days
Introduction to Cryptography (Hardcover): Joey Holland Introduction to Cryptography (Hardcover)
Joey Holland
R3,482 R3,008 Discovery Miles 30 080 Save R474 (14%) Ships in 10 - 15 working days
Arithmetic and Algebraic Circuits (Paperback, 1st ed. 2021): Antonio Lloris Ruiz, Encarnacion Castillo Morales, Luis Parrilla... Arithmetic and Algebraic Circuits (Paperback, 1st ed. 2021)
Antonio Lloris Ruiz, Encarnacion Castillo Morales, Luis Parrilla Roure, Antonio Garcia Rios, Maria Jose Lloris Meseguer
R5,247 Discovery Miles 52 470 Ships in 10 - 15 working days

This book presents a complete and accurate study of arithmetic and algebraic circuits. The first part offers a review of all important basic concepts: it describes simple circuits for the implementation of some basic arithmetic operations; it introduces theoretical basis for residue number systems; and describes some fundamental circuits for implementing the main modular operations that will be used in the text. Moreover, the book discusses floating-point representation of real numbers and the IEEE 754 standard. The second and core part of the book offers a deep study of arithmetic circuits and specific algorithms for their implementation. It covers the CORDIC algorithm, and optimized arithmetic circuits recently developed by the authors for adders and subtractors, as well as multipliers, dividers and special functions. It describes the implementation of basic algebraic circuits, such as LFSRs and cellular automata. Finally, it offers a complete study of Galois fields, showing some exemplary applications and discussing the advantages in comparison to other methods. This dense, self-contained text provides students, researchers and engineers, with extensive knowledge on and a deep understanding of arithmetic and algebraic circuits and their implementation.

NFT (Non-Fungible Token) For Beginners - THE QUICK & EASY GUIDE Explore The Top NFT Collections Across Multiple Protocols Like... NFT (Non-Fungible Token) For Beginners - THE QUICK & EASY GUIDE Explore The Top NFT Collections Across Multiple Protocols Like Ethereum, BSC, And Flow (Paperback)
Megalodona Streamings
R451 R368 Discovery Miles 3 680 Save R83 (18%) Ships in 10 - 15 working days
Ethereum - Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency (Paperback): Paul Paxton Ethereum - Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency (Paperback)
Paul Paxton
R363 R293 Discovery Miles 2 930 Save R70 (19%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Digital Watermarking and Steganography…
Frank Y. Shih Hardcover R3,034 Discovery Miles 30 340
Handbook of Elliptic and Hyperelliptic…
Henri Cohen, Gerhard Frey, … Hardcover R6,370 Discovery Miles 63 700
Cryptography - Theory and Practice
Douglas Robert Stinson, Maura Paterson Paperback R1,410 Discovery Miles 14 100
Database Security
Melissa Zgola, Alfred Basta Paperback R1,158 R1,038 Discovery Miles 10 380
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,296 Discovery Miles 32 960
Hacking Connected Cars - Tactics…
A. Knight Paperback R877 Discovery Miles 8 770
RSA and Public-Key Cryptography
Richard A. Mollin Paperback R1,863 Discovery Miles 18 630
The Official (ISC)2 CCSP CBK Reference…
a. Kraus Hardcover R1,390 Discovery Miles 13 900
Cybersecurity and Third-Party Risk
GC Rasner Paperback R759 Discovery Miles 7 590
Threat Hunting in the Cloud - Defending…
C Peiris Paperback R879 Discovery Miles 8 790

 

Partners