0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (16)
  • R250 - R500 (92)
  • R500+ (1,401)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency... Metaverse - A Beginner's Guide to Investing and Making Passive Income in Virtual Lands, Nft, Blockchain and Cryptocurrency + 10 Best Defi Projects and Strategies to Maximize Your Profits (Hardcover)
Harper Fraley
R889 R723 Discovery Miles 7 230 Save R166 (19%) Ships in 10 - 15 working days
Kali Linux - Advanced Methods and Strategies to Learn Kali Linux (Paperback): Ethan Thorpe Kali Linux - Advanced Methods and Strategies to Learn Kali Linux (Paperback)
Ethan Thorpe
R504 Discovery Miles 5 040 Ships in 10 - 15 working days
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Paperback, 1st ed. 2021): Matthew Ryan Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Paperback, 1st ed. 2021)
Matthew Ryan
R5,085 Discovery Miles 50 850 Ships in 10 - 15 working days

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the 'ransomware revolution' after a series of major attacks beginning in 2013, and how the advent of cryptocurrencies provided the catalyst for the development and increased profitability of ransomware, sparking a phenomenal rise in the number and complexity of ransomware attacks. This book analyzes why the speed of technology adoption has been a fundamental factor in the continued success of financially motivated cybercrime, and how the ease of public access to advanced encryption techniques has allowed malicious actors to continue to operate with increased anonymity across the internet. This anonymity has enabled increased collaboration between attackers, which has aided the development of new ransomware attacks, and led to an increasing level of technical complexity in ransomware attacks. This book highlights that the continuous expansion and early adoption of emerging technologies may be beyond the capacity of conventional risk managers and risk management frameworks. Researchers and advanced level students studying or working in computer science, business or criminology will find this book useful as a reference or secondary text. Professionals working in cybersecurity, cryptography, information technology, financial crime (and other related topics) will also welcome this book as a reference.

Understanding Cryptography (Hardcover): Ethan Scott Understanding Cryptography (Hardcover)
Ethan Scott
R3,647 R3,147 Discovery Miles 31 470 Save R500 (14%) Ships in 10 - 15 working days
Cryptocurrency for Beginners - How to Master Blockchain, Defi and start Investing in Bitcoin and Altcoins (Hardcover): Zeph... Cryptocurrency for Beginners - How to Master Blockchain, Defi and start Investing in Bitcoin and Altcoins (Hardcover)
Zeph Pascall
R2,917 R2,694 Discovery Miles 26 940 Save R223 (8%) Ships in 10 - 15 working days
Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Hardcover): Rebecca Slayton Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Hardcover)
Rebecca Slayton
R3,205 Discovery Miles 32 050 Ships in 10 - 15 working days

In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more. While other books have documented the development of public key cryptography, this is the first to provide a comprehensive insiders' perspective on the full impacts of public key cryptography, including six original chapters by nine distinguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman. The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy.

Decentralized Applications (Paperback): Siraj Raval Decentralized Applications (Paperback)
Siraj Raval
R1,038 R661 Discovery Miles 6 610 Save R377 (36%) Ships in 12 - 17 working days

Take advantage of Bitcoin's underlying technology, the blockchain, to build massively scalable, decentralized applications known as dapps. In this practical guide, author Siraj Raval explains why dapps will become more widely used-and profitable-than today's most popular web apps. You'll learn how the blockchain's cryptographically stored ledger, scarce-asset model, and peer-to-peer (P2P) technology provide a more flexible, better-incentivized structure than current software models. Once you understand the theory behind dapps and what a thriving dapp ecosystem looks like, Raval shows you how to use existing tools to create a working dapp. You'll then take a deep dive into the OpenBazaar decentralized market, and examine two case studies of successful dapps currently in use. Learn advances in distributed-system technology that make distributed data, wealth, identity, computing, and bandwidth possible Build a Twitter clone with the Go language, distributed architecture, decentralized messaging app, and peer-to-peer data store Learn about OpenBazaar's decentralized market and its structure for supporting transactions Explore Lighthouse, a decentralized crowdfunding project that rivals sites such as Kickstarter and IndieGogo Take an in-depth look at La'Zooz, a P2P ridesharing app that transmits data directly between riders and drivers

Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Paperback): Rebecca Slayton Democratizing Cryptography - The Work of Whitfield Diffie and Martin Hellman (Paperback)
Rebecca Slayton
R2,212 Discovery Miles 22 120 Ships in 10 - 15 working days

In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more. While other books have documented the development of public key cryptography, this is the first to provide a comprehensive insiders' perspective on the full impacts of public key cryptography, including six original chapters by nine distinguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels and intersections, and contextualizing their work. Subsequent chapters show how public key cryptography helped establish an open cryptography community and made lasting impacts on computer and network security, theoretical computer science, mathematics, public policy, and society. The volume includes particularly influential articles by Diffie and Hellman, as well as newly transcribed interviews and Turing Award Lectures by both Diffie and Hellman. The contributed chapters provide new insights that are accessible to a wide range of readers, from computer science students and computer security professionals, to historians of technology and members of the general public. The chapters can be readily integrated into undergraduate and graduate courses on a range of topics, including computer security, theoretical computer science and mathematics, the history of computing, and science and technology policy.

Secret Colors (Hardcover): Martin Kleppmann Secret Colors (Hardcover)
Martin Kleppmann; Illustrated by Mitch Seymour
R615 Discovery Miles 6 150 Ships in 10 - 15 working days
NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, NC-Pro, WCNS, and SUNSET 2011, Held at NETWORKING 2011,... NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, NC-Pro, WCNS, and SUNSET 2011, Held at NETWORKING 2011, Valencia, Spain, May 13, 2011, Revised Selected Papers (Paperback)
Vicente Casares-Giner, Pietro Manzoni, Ana Pont
R1,528 Discovery Miles 15 280 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of four workshops colocated with NETWORKING 2011, held in Valencia, Spain, in May 2011: the Workshop on Performance Evaluation of Cognitive Radio Networks: From Theory to Reality, PE-CRN 2011, the Network Coding Applications and Protocols Workshop, NC-Pro 2011, the Workshop on Wireless Cooperative Network Security, WCNS 2011, and the Workshop on Sustainable Networking, SUNSET 2011. The 28 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers cover a wide range of topics addressing the main research efforts in the fields of network coding, sustainable networking, security in wireless cooperative networks, and performance evaluation of cognitive radio networks.

Learn How to Earn With Cryptocurrency Trading (Paperback): Donald Keyn Learn How to Earn With Cryptocurrency Trading (Paperback)
Donald Keyn
R718 R577 Discovery Miles 5 770 Save R141 (20%) Ships in 10 - 15 working days
Essential PHP Security (Paperback): Chris Shiflett Essential PHP Security (Paperback)
Chris Shiflett
R707 R517 Discovery Miles 5 170 Save R190 (27%) Ships in 12 - 17 working days

Being highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web development tools in use today. It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks. Security is an issue that demands attention, given the growing frequency of attacks on web sites. Essential PHP Security explains the most common types of attacks and how to write code that isn't susceptible to them. By examining specific attacks and the techniques used to protect against them, you will have a deeper understanding and appreciation of the safeguards you are about to learn in this book. In the much-needed (and highly-requested) Essential PHP Security, each chapter covers an aspect of a web application (such as form processing, database programming, session management, and authentication). Chapters describe potential attacks with examples and then explain techniques to help you prevent those attacks. Topics covered include: * Preventing cross-site scripting (XSS) vulnerabilities * Protecting against SQL injection attacks * Complicating session hijacking attempts You are in good hands with author Chris Shiflett, an internationally-recognized expert in the field of PHP security. Shiflett is also the founder and President of Brain Bulb, a PHP consultancy that offers a variety of services to clients around the world.

Essential Cryptography for JavaScript Developers - A practical guide to leveraging common cryptographic operations in Node.js... Essential Cryptography for JavaScript Developers - A practical guide to leveraging common cryptographic operations in Node.js and the browser (Paperback)
Alessandro Segala
R963 Discovery Miles 9 630 Ships in 10 - 15 working days

Discover how to take advantage of common cryptographic operations to build safer apps that respect users' privacy with the help of examples in JavaScript for Node.js and browsers Key Features Understand how to implement common cryptographic operations in your code with practical examples Learn about picking modern safe algorithms, which libraries you should rely on, and how to use them correctly Build modern and secure applications that respect your users' privacy with cryptography Book DescriptionIf you're a software developer, this book will give you an introduction to cryptography, helping you understand how to make the most of it for your applications. The book contains extensive code samples in JavaScript, both for Node.js and for frontend apps running in a web browser, although the core concepts can be used by developers working with any programming language and framework. With a purely hands-on approach that is focused on sharing actionable knowledge, you'll learn about the common categories of cryptographic operations that you can leverage in all apps you're developing, including hashing, encryption with symmetric, asymmetric and hybrid ciphers, and digital signatures. You'll learn when to use these operations and how to choose and implement the most popular algorithms to perform them, including SHA-2, Argon2, AES, ChaCha20-Poly1305, RSA, and Elliptic Curve Cryptography. Later, you'll learn how to deal with password and key management. All code in this book is written in JavaScript and designed to run in Node.js or as part of frontend apps for web browsers. By the end of this book, you'll be able to build solutions that leverage cryptography to protect user privacy, offer better security against an expanding and more complex threat landscape, help meet data protection requirements, and unlock new opportunities. What you will learn Write JavaScript code that uses cryptography running within a Node.js environment for the server-side or in frontend applications for web browsers Use modern, safe hashing functions for calculating digests and key derivation, including SHA-2 and Argon2 Practice encrypting messages and files with a symmetric key using AES and ChaCha20-Poly1305 Use asymmetric and hybrid encryption, leveraging RSA and Elliptic Curve Cryptography with ECDH and ECIES Calculate and verify digital signatures using RSA and ECDSA/EdDSA Manage passwords and encryption keys safely Who this book is forThis cryptography book is an introductory guide for software developers who don't necessarily have a background in cryptography but are interested in learning how to integrate it in their solutions, correctly and safely. You'll need to have at least intermediate-level knowledge of building apps with JavaScript and familiarity with Node.js to make the most of this book.

Limitations and Future Applications of Quantum Cryptography (Hardcover): Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia,... Limitations and Future Applications of Quantum Cryptography (Hardcover)
Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia, Raees Ahmad Khan
R6,746 Discovery Miles 67 460 Ships in 10 - 15 working days

The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country's sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography. Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing.

CYBERSECURITY and HACKING for Beginners - The Essential Guide to Mastering Computer Network Security and Learning all the... CYBERSECURITY and HACKING for Beginners - The Essential Guide to Mastering Computer Network Security and Learning all the Defensive Actions to Protect Yourself from Network Dangers, Including the Basics of Kali Linux (Paperback)
Robert M Huss
R495 R403 Discovery Miles 4 030 Save R92 (19%) Ships in 10 - 15 working days
Computer & Internet Security - A Hands-on Approach (Paperback, 3rd ed.): Wenliang Du Computer & Internet Security - A Hands-on Approach (Paperback, 3rd ed.)
Wenliang Du
R1,770 Discovery Miles 17 700 Ships in 10 - 15 working days
Cryptocurrency - A Beginner's Guide To Understanding And Winning With Fintech (Paperback): Eliot P Reznor Cryptocurrency - A Beginner's Guide To Understanding And Winning With Fintech (Paperback)
Eliot P Reznor
R421 R343 Discovery Miles 3 430 Save R78 (19%) Ships in 10 - 15 working days
Cryptocurrency for Beginners - How to Master Blockchain, Defi and start Investing in Bitcoin and Altcoins (Paperback): Zeph... Cryptocurrency for Beginners - How to Master Blockchain, Defi and start Investing in Bitcoin and Altcoins (Paperback)
Zeph Pascall
R674 Discovery Miles 6 740 Ships in 10 - 15 working days
Blockchain Technology - From Theory to Practice (Hardcover, 1st ed. 2022): Sudeep Tanwar Blockchain Technology - From Theory to Practice (Hardcover, 1st ed. 2022)
Sudeep Tanwar
R2,845 Discovery Miles 28 450 Ships in 12 - 17 working days

Blockchain is an emerging technology platform for developing decentralized applications and data storage, over and beyond its role as the technology underlying the cryptocurrencies. The basic tenet of this platform is that it allows one to create a distributed and replicated ledger of events, transactions, and data generated through various IT processes with strong cryptographic guarantees of tamper resistance, immutability, and verifiability. Public blockchain platforms allow us to guarantee these properties with overwhelming probabilities even when untrusted users are participants of distributed applications with the ability to transact on the platform. Even though, blockchain technology has become popularly known because of its use in the implementation of cryptocurrencies such as BitCoin, Ethereum, etc.; the technology itself holds much more promise in various areas such as time stamping, logging of critical events in a system, recording of transactions, trustworthy e-governance, etc. It introduces theoretical and practical aspects of blockchain technology. The book includes an in-depth insight into the need for decentralization, smart contracts, consensus both permissioned and permissionless, and various blockchain development frameworks, tools, and platforms. It can be used as a learning resource for various examinations and certifications related to cryptocurrency and blockchain technology. This book explained the nuts and bolts of blockchain technology in lucid language to make students more familiar with the implementation perspective of this much-needed technology.

Bitcoin Trading for Beginners, Dummies & Idiots (Paperback): Giovanni Rigters Bitcoin Trading for Beginners, Dummies & Idiots (Paperback)
Giovanni Rigters
R482 R396 Discovery Miles 3 960 Save R86 (18%) Ships in 10 - 15 working days
Computer Security - A Hands-on Approach (Paperback, 3rd ed.): Wenliang Du Computer Security - A Hands-on Approach (Paperback, 3rd ed.)
Wenliang Du
R1,266 Discovery Miles 12 660 Ships in 10 - 15 working days
Cryptocurrency in a Nutshell - The Basics of Blockchain and Cryptocurrency Part 1 (Paperback): Greg Somlok Cryptocurrency in a Nutshell - The Basics of Blockchain and Cryptocurrency Part 1 (Paperback)
Greg Somlok
R200 Discovery Miles 2 000 Ships in 10 - 15 working days
Python Tools For Scientists - An Introduction to Using Anaconda, JupyterLab, and Python's Scientific Libraries... Python Tools For Scientists - An Introduction to Using Anaconda, JupyterLab, and Python's Scientific Libraries (Paperback)
Lee Vaughan
R1,172 R958 Discovery Miles 9 580 Save R214 (18%) Ships in 12 - 17 working days

Doing Science With Python introduces readers to the most popular coding tools for scientific research, such as Anaconda, Spyder, Jupyter Notebooks, and JupyterLab, as well as dozens of important Python libraries for working with data, including NumPy, matplotlib, and pandas. No prior programming experience is required! You'll be guided through setting up a professional coding environment, then get a crash course on programming with Python, and explore the many tools and libraries ideal for working with data, designing visualisations, simulating natural events, and more.

Programming Hyperledger Fabric - Creating Enterprise Blockchain Applications (Paperback): Siddharth Jain Programming Hyperledger Fabric - Creating Enterprise Blockchain Applications (Paperback)
Siddharth Jain
R1,528 R1,267 Discovery Miles 12 670 Save R261 (17%) Ships in 10 - 15 working days
NetScaler Hacks - 10 Hacks for the Citrix NetScaler ADC/MPX/SDX - Extend the life of this hardware with amazing ideas for... NetScaler Hacks - 10 Hacks for the Citrix NetScaler ADC/MPX/SDX - Extend the life of this hardware with amazing ideas for legacy Citrix NetScaler ADC/MPX/SDX hardware. (Paperback)
Joseph Moses
R450 Discovery Miles 4 500 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,296 Discovery Miles 32 960
Cybersecurity and Third-Party Risk
GC Rasner Paperback R759 Discovery Miles 7 590
Technology for Success - Computer…
Mark Ciampa, Jill West, … Paperback  (1)
R1,190 R1,070 Discovery Miles 10 700
Official (ISC)2 (R) Guide to the CISSP…
Susan Hansche Hardcover R2,663 Discovery Miles 26 630
Handbook of Elliptic and Hyperelliptic…
Henri Cohen, Gerhard Frey, … Hardcover R6,370 Discovery Miles 63 700
Tribe of Hackers Blue Team - Tribal…
M. J. Carey Paperback R456 Discovery Miles 4 560
Cryptography - Theory and Practice
Douglas Robert Stinson, Maura Paterson Paperback R1,410 Discovery Miles 14 100
Database Security
Melissa Zgola, Alfred Basta Paperback R1,158 R1,038 Discovery Miles 10 380
The Political Economy and Feasibility of…
Spencer J. Pack Hardcover R2,851 Discovery Miles 28 510
Tribe of Hackers Security Leaders…
M. J. Carey Paperback R448 Discovery Miles 4 480

 

Partners