0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (13)
  • R250 - R500 (88)
  • R500+ (1,342)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Mathematical Foundations of Public Key Cryptography (Paperback): Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng Mathematical Foundations of Public Key Cryptography (Paperback)
Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng
R1,466 Discovery Miles 14 660 Ships in 12 - 19 working days

In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more than 20 years of research and teaching experience to help students bridge the gap between math theory and crypto practice. The book provides a theoretical structure of fundamental number theory and algebra knowledge supporting public-key cryptography. Rather than simply combining number theory and modern algebra, this textbook features the interdisciplinary characteristics of cryptography-revealing the integrations of mathematical theories and public-key cryptographic applications. Incorporating the complexity theory of algorithms throughout, it introduces the basic number theoretic and algebraic algorithms and their complexities to provide a preliminary understanding of the applications of mathematical theories in cryptographic algorithms. Supplying a seamless integration of cryptography and mathematics, the book includes coverage of elementary number theory; algebraic structure and attributes of group, ring, and field; cryptography-related computing complexity and basic algorithms, as well as lattice and fundamental methods of lattice cryptanalysis. The text consists of 11 chapters. Basic theory and tools of elementary number theory, such as congruences, primitive roots, residue classes, and continued fractions, are covered in Chapters 1-6. The basic concepts of abstract algebra are introduced in Chapters 7-9, where three basic algebraic structures of groups, rings, and fields and their properties are explained. Chapter 10 is about computational complexities of several related mathematical algorithms, and hard problems such as integer factorization and discrete logarithm. Chapter 11 presents the basics of lattice theory and the lattice basis reduction algorithm-the LLL algorithm and its application in the cryptanalysis of the RSA algorithm. Containing a number of exercises on key algorithms, the book is suitable for use as a textbook for undergraduate students and first-year graduate students in information security programs. It is also an ideal reference book for cryptography professionals looking to master public-key cryptography.

Introduction to Certificateless Cryptography (Paperback): Hu Xiong, Zhen Qin, Athanasios V Vasilakos Introduction to Certificateless Cryptography (Paperback)
Hu Xiong, Zhen Qin, Athanasios V Vasilakos
R1,480 Discovery Miles 14 800 Ships in 12 - 19 working days

As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC. Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.

Privacy Preserving Data Mining (Hardcover, 2006 ed.): Jaideep Vaidya, Christopher W Clifton, Yu Michael Zhu Privacy Preserving Data Mining (Hardcover, 2006 ed.)
Jaideep Vaidya, Christopher W Clifton, Yu Michael Zhu
R2,943 Discovery Miles 29 430 Ships in 10 - 15 working days

Privacy preserving data mining implies the "mining" of knowledge from distributed data without violating the privacy of the individual/corporations involved in contributing the data. This volume provides a comprehensive overview of available approaches, techniques and open problems in privacy preserving data mining. Crystallizing much of the underlying foundation, the book aims to inspire further research in this new and growing area.

Privacy Preserving Data Mining is intended to be accessible to industry practitioners and policy makers, to help inform future decision making and legislation, and to serve as a useful technical reference.

Steganography Techniques for Digital Images (Hardcover, 1st ed. 2019): Abid Yahya Steganography Techniques for Digital Images (Hardcover, 1st ed. 2019)
Abid Yahya
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding. Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption; Provides a variety of methods to achieve characteristic region Steganography synchronization; Shows how Steganography improves upon cryptography by using obscurity features.

Digital Media Steganography - Principles, Algorithms, and Advances (Paperback): Mahmoud Hassaballah Digital Media Steganography - Principles, Algorithms, and Advances (Paperback)
Mahmoud Hassaballah
R2,705 Discovery Miles 27 050 Ships in 12 - 19 working days

The common use of the Internet and cloud services in transmission of large amounts of data over open networks and insecure channels, exposes that private and secret data to serious situations. Ensuring the information transmission over the Internet is safe and secure has become crucial, consequently information security has become one of the most important issues of human communities because of increased data transmission over social networks. Digital Media Steganography: Principles, Algorithms, and Advances covers fundamental theories and algorithms for practical design, while providing a comprehensive overview of the most advanced methodologies and modern techniques in the field of steganography. The topics covered present a collection of high-quality research works written in a simple manner by world-renowned leaders in the field dealing with specific research problems. It presents the state-of-the-art as well as the most recent trends in digital media steganography.

Towards a Quarter-Century of Public Key Cryptography - A Special Issue of DESIGNS, CODES AND CRYPTOGRAPHY An International... Towards a Quarter-Century of Public Key Cryptography - A Special Issue of DESIGNS, CODES AND CRYPTOGRAPHY An International Journal. Volume 19, No. 2/3 (2000) (Hardcover, Reprinted from DESIGNS, CODES AND CRYPTOGRAPHY, 19:2/3, 2000)
Neal Koblitz
R2,973 Discovery Miles 29 730 Ships in 10 - 15 working days

Towards a Quarter-Century of Public Key Cryptography brings together in one place important contributions and up-to-date research results in this fast moving area. Towards a Quarter-Century of Public Key Cryptography serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

Providing Sound Foundations for Cryptography - On the work of Shafi Goldwasser and Silvio Micali (Paperback): Oded Goldreich Providing Sound Foundations for Cryptography - On the work of Shafi Goldwasser and Silvio Micali (Paperback)
Oded Goldreich
R2,953 R2,570 Discovery Miles 25 700 Save R383 (13%) Ships in 12 - 19 working days

Cryptography is concerned with the construction of schemes that withstand any abuse. A cryptographic scheme is constructed so as to maintain a desired functionality, even under malicious attempts aimed at making it deviate from its prescribed behavior. The design of cryptographic systems must be based on firm foundations, whereas ad hoc approaches and heuristics are a very dangerous way to go. These foundations were developed mostly in the 1980s, in works that are all co-authored by Shafi Goldwasser and/or Silvio Micali. These works have transformed cryptography from an engineering discipline, lacking sound theoretical foundations, into a scientific field possessing a well-founded theory, which influences practice as well as contributes to other areas of theoretical computer science. This book celebrates these works, which were the basis for bestowing the 2012 A.M. Turing Award upon Shafi Goldwasser and Silvio Micali. A significant portion of this book reproduces some of these works, and another portion consists of scientific perspectives by some of their former students. The highlight of the book is provided by a few chapters that allow the readers to meet Shafi and Silvio in person. These include interviews with them, their biographies and their Turing Award lectures.

Snort Intrusion Detection and Prevention Toolkit (Paperback): Brian Caswell, Jay Beale, Andrew Baker Snort Intrusion Detection and Prevention Toolkit (Paperback)
Brian Caswell, Jay Beale, Andrew Baker
R1,147 R953 Discovery Miles 9 530 Save R194 (17%) Ships in 12 - 19 working days

This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.
This fully integrated book and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and most congested enterprise networks. Leading Snort experts Brian Caswell, Andrew Baker, and Jay Beale analyze traffic from real attacks to demonstrate the best practices for implementing the most powerful Snort features.
Thecompanion materialcontains examples from real attacks allowing readers test their new skills. The book will begin with a discussion of packet inspection and the progression from intrusion detection to intrusion prevention. The authors provide examples of packet inspection methods including: protocol standards compliance, protocol anomaly detection, application control, and signature matching. In addition, application-level vulnerabilities including Binary Code in HTTP headers, HTTP/HTTPS Tunneling, URL Directory Traversal, Cross-Site Scripting, and SQL Injection will also be analyzed. Next, a brief chapter on installing and configuring Snort will highlight various methods for fine tuning your installation to optimize Snort performance including hardware/OS selection, finding and eliminating bottlenecks, and benchmarking and testing your deployment. A special chapter also details how to use Barnyard to improve the overall performance of Snort. Next, best practices will be presented allowing readers to enhance the performance of Snort for even the largest and most complex networks. The next chapter reveals the inner workings of Snort by analyzing the source code. The next several chapters will detail how to write, modify, and fine-tune basic to advanced rules and pre-processors. Detailed analysis of real packet captures will be provided both in the book and the companion material. Several examples for optimizing output plugins will then be discussed including a comparison of MySQL and PostrgreSQL. Best practices for monitoring Snort sensors and analyzing intrusion data follow with examples of real world attacks using: ACID, BASE, SGUIL, SnortSnarf, Snort_stat.pl, Swatch, and more.
The last part of the book contains several chapters on active response, intrusion prevention, and using Snort s most advanced capabilities for everything from forensics and incident handling to building and analyzing honey pots. Data from real world attacks will be presented throughout this part as well as on the companion website, http: //booksite.elsevier.com/9781597490993/
This fully integrated book and Web toolkit covers everything all in one convenient package It is authored by members of the Snort team and it is packed full of their experience and expertiseIncludes full coverage of the brand new Snort version 2.6, packed full of all the latest informationCompanion website at http: //booksite.elsevier.com/9781597490993/contains all companion material"

Information Assurance Architecture (Paperback): Keith D. Willett Information Assurance Architecture (Paperback)
Keith D. Willett
R1,941 Discovery Miles 19 410 Ships in 12 - 19 working days

Now that information has become the lifeblood of your organization, you must be especially vigilant about assuring it. The hacker, spy, or cyber-thief of today can breach any barrier if it remains unchanged long enough or has even the tiniest leak. In Information Assurance Architecture, Keith D. Willett draws on his over 25 years of technical, security, and business experience to provide a framework for organizations to align information assurance with the enterprise and their overall mission. The Tools to Protect Your Secrets from Exposure This work provides the security industry with the know-how to create a formal information assurance architecture that complements an enterprise architecture, systems engineering, and the enterprise life cycle management (ELCM). Information Assurance Architecture consists of a framework, a process, and many supporting tools, templates and methodologies. The framework provides a reference model for the consideration of security in many contexts and from various perspectives; the process provides direction on how to apply that framework. Mr. Willett teaches readers how to identify and use the right tools for the right job. Furthermore, he demonstrates a disciplined approach in thinking about, planning, implementing and managing security, emphasizing that solid solutions can be made impenetrable when they are seamlessly integrated with the whole of an enterprise. Understand the Enterprise Context This book covers many information assurance subjects, including disaster recovery and firewalls. The objective is to present security services and security mechanisms in the context of information assurance architecture, and in an enterprise context of managing business risk. Anyone who utilizes the concepts taught in these pages will find them to be a valuable weapon in the arsenal of information protection.

Data-driven Block Ciphers for Fast Telecommunication Systems (Paperback): Nikolai Moldovyan, Alexander A. Moldovyan Data-driven Block Ciphers for Fast Telecommunication Systems (Paperback)
Nikolai Moldovyan, Alexander A. Moldovyan
R1,882 Discovery Miles 18 820 Ships in 12 - 19 working days

The Most Progressive and Complete Guide to DDO-Based Ciphers Developers have long recognized that ciphers based on Permutation Networks (PNs) and Controlled Substitution-Permutation Networks (CSPNs) allow for the implementation of a variety of Data Driven Operations (DDOs). These DDOs can provide fast encryption without incurring excessive hardware costs in modern telecommunication networks. However, until now, with a few exceptions, most DDO-based ciphers have been poorly represented in available literature and have continued to remain known to only a small number of encryption experts. In Data-Driven Block Ciphers for Fast Telecommunication Systems, Nikolai Moldovyan and Alexander Moldovyan, major innovators and holders of several dozen international patents in encryption technology, provide the background and detail the applications needed to investigate new properties of PNs especially relevant to the improvement of modern wireless systems.Furthermore, they propose a universal architecture involving controlled bit permutation instruction that will permit the performance of both data-driven permutations and an arbitrary prescribed fixed permutation in a single cycle. Immediately improved efficiency for current and future fast telecommunication systems and mobile networksBecause of its simplicity and efficient use of current hardware, the embedding of this architecture is a highly attractive option for CPU manufacturers.By detailing all the relevant information into a single volume for the first time, the authors of this book make that option more feasible than ever before.

Computer Forensics - Evidence Collection and Management (Paperback): Robert C. Newman Computer Forensics - Evidence Collection and Management (Paperback)
Robert C. Newman
R1,944 Discovery Miles 19 440 Ships in 12 - 19 working days

Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and networking environments and presents techniques and suggestions for corporate security personnel, investigators, and forensic examiners to successfully identify, retrieve, and protect valuable forensic evidence for litigation and prosecution. The book is divided into two major parts for easy reference. The first part explores various crimes, laws, policies, forensic tools, and the information needed to understand the underlying concepts of computer forensic investigations. The second part presents information relating to crime scene investigations and management, disk and file structure, laboratory construction and functions, and legal testimony. Separate chapters focus on investigations involving computer systems, e-mail, and wireless devices. Presenting information patterned after technical, legal, and managerial classes held by computer forensic professionals from Cyber Crime Summits held at Kennesaw State University in 2005 and 2006, this book is an invaluable resource for those who want to be both efficient and effective when conducting an investigation.

A Practical Guide to Security Assessments (Paperback): Sudhanshu Kairab A Practical Guide to Security Assessments (Paperback)
Sudhanshu Kairab
R1,926 Discovery Miles 19 260 Ships in 12 - 19 working days

The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mission critical data, and supporting IT environment. Combine this with a slowdown in IT spending resulting in justifications of every purchase, and security professionals are forced to scramble to find comprehensive and effective ways to assess their environment in order to discover and prioritize vulnerabilities, and to develop cost-effective solutions that show benefit to the business. A Practical Guide to Security Assessments is a process-focused approach that presents a structured methodology for conducting assessments. The key element of the methodology is an understanding of business goals and processes, and how security measures are aligned with business risks. The guide also emphasizes that resulting security recommendations should be cost-effective and commensurate with the security risk. The methodology described serves as a foundation for building and maintaining an information security program. In addition to the methodology, the book includes an Appendix that contains questionnaires that can be modified and used to conduct security assessments. This guide is for security professionals who can immediately apply the methodology on the job, and also benefits management who can use the methodology to better understand information security and identify areas for improvement.

A Practical Guide to Security Engineering and Information Assurance (Paperback): Debra S. Herrmann A Practical Guide to Security Engineering and Information Assurance (Paperback)
Debra S. Herrmann
R1,910 Discovery Miles 19 100 Ships in 12 - 19 working days

Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged safely, reliably, and securely. In a time when information is considered the latest commodity, information security should be top priority. A Practical Guide to Security Engineering and Information Assurance gives you an engineering approach to information security and information assurance (IA). The book examines the impact of accidental and malicious intentional action and inaction on information security and IA. Innovative long-term vendor, technology, and application-independent strategies show you how to protect your critical systems and data from accidental and intentional action and inaction that could lead to system failure or compromise. The author presents step-by-step, in-depth processes for defining information security and assurance goals, performing vulnerability and threat analysis, implementing and verifying the effectiveness of threat control measures, and conducting accident and incident investigations. She explores real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system. The information revolution has brought its share of risks. Exploring the synergy between security, safety, and reliability engineering, A Practical Guide to Security Engineering and Information Assurance consolidates and organizes current thinking about information security/IA techniques, approaches, and best practices. As this book will show you, there is considerably more to information security/IA than firewalls, encryption, and virus protection.

RSA and Public-Key Cryptography (Paperback): Richard A. Mollin RSA and Public-Key Cryptography (Paperback)
Richard A. Mollin
R2,046 Discovery Miles 20 460 Ships in 12 - 19 working days

Although much literature exists on the subject of RSA and public-key cryptography, until now there has been no single source that reveals recent developments in the area at an accessible level. Acclaimed author Richard A. Mollin brings together all of the relevant information available on public-key cryptography (PKC), from RSA to the latest applications of PKC, including electronic cash, secret broadcasting, secret balloting systems, various banking and payment protocols, high security logins, smart cards, and biometrics. Moreover, he covers public-key infrastructure (PKI) and its various security applications. Throughout the book, Mollin gives a human face to cryptography by including nearly 40 biographies of the individuals who helped develop cryptographic concepts. He includes a number of illustrative and motivating examples, as well as optional topics that go beyond the basics, such as Lenstra's elliptic curve method and the number field sieve. From history and basic concepts to future trends and emerging applications, this book provides a rigorous and detailed treatment of public-key cryptography. Accessible to anyone from the senior undergraduate to the research scientist, RSA and Public-Key Cryptography offers challenging and inspirational material for all readers.

Insider Computer Fraud - An In-depth Framework for Detecting and Defending against Insider IT Attacks (Paperback): Kenneth... Insider Computer Fraud - An In-depth Framework for Detecting and Defending against Insider IT Attacks (Paperback)
Kenneth Brancik
R1,908 Discovery Miles 19 080 Ships in 12 - 19 working days

An organization's employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks presents the methods, safeguards, and techniques that help protect an organization from insider computer fraud. Drawing from the author's vast experience assessing the adequacy of IT security for the banking and securities industries, the book presents a practical framework for identifying, measuring, monitoring, and controlling the risks associated with insider threats. It not only provides an analysis of application or system-related risks, it demonstrates the interrelationships that exist between an application and the IT infrastructure components it uses to transmit, process, and store sensitive data. The author also examines the symbiotic relationship between the risks, controls, threats, and action plans that should be deployed to enhance the overall information security governance processes. Increasing the awareness and understanding necessary to effectively manage the risks and controls associated with an insider threat, this book is an invaluable resource for those interested in attaining sound and best practices over the risk management process.

Security Education, Awareness and Training - SEAT from Theory to Practice (Paperback, New): Carl Roper, Dr Lynn Fischer, Joseph... Security Education, Awareness and Training - SEAT from Theory to Practice (Paperback, New)
Carl Roper, Dr Lynn Fischer, Joseph A. Grau
R1,404 Discovery Miles 14 040 Ships in 12 - 19 working days

This book is the only one available on security training for all level of personnel. Chief Security Officers (CSOs), security managers, and heads of security forces often have to design training programs themselves from scratch or rely on outside vendors and outside training companies to provide training which is often dry, stilted, and not always applicable to a specific corporate or government setting. This title addresses the theories of sound security training and awareness, then shows the reader how to put the theories into practice when developing or presenting any form of security education, training, motivation or awareness.
* Shows how to establish and integrate a structured, internally consistent and coherent program from the ground up
* Illustrates how to assess and analyze security program needs and audience and customize training accordingly
* Numerous Appendices to help the security manager justify security spending on training initiatives

Strategic Information Security (Paperback): John Wylder Strategic Information Security (Paperback)
John Wylder
R1,886 Discovery Miles 18 860 Ships in 12 - 19 working days

The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies. Until now, however, most books about strategy and planning have focused on the production side of the business, rather than operations. Strategic Information Security integrates the importance of sound security policy with the strategic goals of an organization. It provides IT professionals and management with insight into the issues surrounding the goals of protecting valuable information assets. This text reiterates that an effective information security program relies on more than policies or hardware and software, instead it hinges on having a mindset that security is a core part of the business and not just an afterthought. Armed with the content contained in this book, security specialists can redirect the discussion of security towards the terms and concepts that management understands. This increases the likelihood of obtaining the funding and managerial support that is needed to build and maintain airtight security programs.

Enhancing Computer Security with Smart Technology (Paperback): V. Rao Vemuri Enhancing Computer Security with Smart Technology (Paperback)
V. Rao Vemuri
R1,893 Discovery Miles 18 930 Ships in 12 - 19 working days

Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals. Realizing the massive scope of these subjects, the author concentrates on problems related to the detection of intrusions through the application of machine learning methods and on the practical algorithmic aspects of machine learning and its role in security. A collection of tutorials that draw from a broad spectrum of viewpoints and experience, this volume is made up of chapters written by specialists in each subject field. It is accessible to any professional with a basic background in computer science. Following an introduction to the issue of cyber-security and cyber-trust, the book offers a broad survey of the state-of-the-art in firewall technology and of the importance of Web application security. The remainder of the book focuses on the use of machine learning methods and tools and their performance.

Critical Incident Management (Paperback): Alan B. Sterneckert Critical Incident Management (Paperback)
Alan B. Sterneckert
R1,931 Discovery Miles 19 310 Ships in 12 - 19 working days

Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they have taken to secure people, information and infrastructure from outside attacks are inefficient or incomplete. Responding to security threats and incidents requires a competent mixture of risk management, security policies and procedures, security auditing, incident response, legal and law enforcement issues, and privacy. Critical Incident Management presents an expert overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations. Written in a concise, practical style that emphasizes key points, this guide focuses on the establishment of policies and actions that prevent the loss of critical information or damage to infrastructure. CTOs, CFOs, Chief Legal Officers, and senior IT managers can rely on this book to develop plans that thwart critical security incidents. And if such incidents do occur, these executives will have a reference to help put the people and procedures in place to contain the damage and get back to business.

Fundamentals of Computer Security (Hardcover, 2003 ed.): Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry Fundamentals of Computer Security (Hardcover, 2003 ed.)
Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
R2,747 Discovery Miles 27 470 Ships in 12 - 19 working days

This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material.

Everyday Cryptography - Fundamental Principles and Applications (Hardcover, 2nd Revised edition): Keith Martin Everyday Cryptography - Fundamental Principles and Applications (Hardcover, 2nd Revised edition)
Keith Martin
R3,584 Discovery Miles 35 840 Ships in 12 - 19 working days

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the Internet, mobile phones, Wi-Fi networks, payment cards, Tor, and Bitcoin. This book is intended to be introductory, self-contained, and widely accessible. It is suitable as a first read on cryptography. Almost no prior knowledge of mathematics is required since the book deliberately avoids the details of the mathematics techniques underpinning cryptographic mechanisms. Instead our focus will be on what a normal user or practitioner of information security needs to know about cryptography in order to understand the design and use of everyday cryptographic applications. By focusing on the fundamental principles of modern cryptography rather than the technical details of current cryptographic technology, the main part this book is relatively timeless, and illustrates the application of these principles by considering a number of contemporary applications of cryptography. Following the revelations of former NSA contractor Edward Snowden, the book considers the wider societal impact of use of cryptography and strategies for addressing this. A reader of this book will not only be able to understand the everyday use of cryptography, but also be able to interpret future developments in this fascinating and crucially important area of technology.

Secure Electronic Voting (Hardcover, 2003 ed.): Dimitris A. Gritzalis Secure Electronic Voting (Hardcover, 2003 ed.)
Dimitris A. Gritzalis
R3,008 Discovery Miles 30 080 Ships in 10 - 15 working days

Secure Electronic Voting is an edited volume, which includes chapters authored by leading experts in the field of security and voting systems. The chapters identify and describe the given capabilities and the strong limitations, as well as the current trends and future perspectives of electronic voting technologies, with emphasis in security and privacy. Secure Electronic Voting includes state-of-the-art material on existing and emerging electronic and Internet voting technologies, which may eventually lead to the development of adequately secure e-voting systems. This book also includes an overview of the legal framework with respect to voting, a description of the user requirements for the development of a secure e-voting system, and a discussion on the relevant technical and social concerns. Secure Electronic Voting includes, also, three case studies on the use and evaluation of e-voting systems in three different real world environments.

Adaptive Cryptographic Access Control (Hardcover, 2010 ed.): Anne V. D. M. Kayem, Selim G Akl, Patrick Martin Adaptive Cryptographic Access Control (Hardcover, 2010 ed.)
Anne V. D. M. Kayem, Selim G Akl, Patrick Martin
R2,957 Discovery Miles 29 570 Ships in 10 - 15 working days

Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Applications of cryptographic access control will benefit companies, governments and the military where structured access to information is essential.

The purpose of this book is to highlight the need for adaptability in cryptographic access control schemes that are geared for dynamic environments, such as the Internet. Adaptive Cryptographic Access Control presents the challenges of designing hierarchical cryptographic key management algorithms to implement Adaptive Access Control in dynamic environments and suggest solutions that will overcome these challenges.

Adaptive Cryptographic Access Control is a cutting-edge book focusing specifically on this topic in relation to security and cryptographic access control. Both the theoretical and practical aspects and approaches of cryptographic access control are introduced in this book. Case studies and examples are provided throughout this book.

The Official (ISC)2 CCSP CBK Reference, 4th Edition (Hardcover): a. Kraus The Official (ISC)2 CCSP CBK Reference, 4th Edition (Hardcover)
a. Kraus
R1,580 R1,441 Discovery Miles 14 410 Save R139 (9%) Ships in 12 - 19 working days

The only official body of knowledge for CCSP--the most popular cloud security credential--fully revised and updated. Certified Cloud Security Professional (CCSP) certification validates the advanced technical skills needed to design, manage, and secure data, applications, and infrastructure in the cloud. This highly sought-after global credential has been updated with revised objectives. The new third edition of The Official (ISC)2 Guide to the CCSP CBK is the authoritative, vendor-neutral common body of knowledge for cloud security professionals. This comprehensive resource provides cloud security professionals with an indispensable working reference to each of the six CCSP domains: Cloud Concepts, Architecture and Design; Cloud Data Security; Cloud Platform and Infrastructure Security; Cloud Application Security; Cloud Security Operations; and Legal, Risk and Compliance. Detailed, in-depth chapters contain the accurate information required to prepare for and achieve CCSP certification. Every essential area of cloud security is covered, including implementation, architecture, operations, controls, and immediate and long-term responses. Developed by (ISC)2, the world leader in professional cybersecurity certification and training, this indispensable guide: Covers the six CCSP domains and over 150 detailed objectives Provides guidance on real-world best practices and techniques Includes illustrated examples, tables, and diagrams The Official (ISC)2 Guide to the CCSP CBK is a vital ongoing resource for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration.

Student Plagiarism in an Online World - Problems and Solutions (Hardcover): Tim S. Roberts Student Plagiarism in an Online World - Problems and Solutions (Hardcover)
Tim S. Roberts
R4,960 Discovery Miles 49 600 Ships in 10 - 15 working days

Twenty years ago, plagiarism was seen as an isolated misdemeanor, restricted to a small group of students. Today it is widely recognized as a ubiquitous, systemic issue, compounded by the accessibility of content in the virtual environment. Student Plagiarism in an Online World: Problems & Solutions describes the legal and ethical issues surrounding plagiarism, the tools and techniques available to combat the spreading of this problem, and real-life situational examples to further the understanding of the scholars, practitioners, educators, and instructional designers who will find this book an invaluable resource.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,406 R1,302 Discovery Miles 13 020
TLS Mastery
Michael W Lucas Hardcover R970 R875 Discovery Miles 8 750
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R834 Discovery Miles 8 340
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,692 Discovery Miles 66 920
Cryptocurrencies and Blockchain…
Keizer Soeze Hardcover R1,469 R1,221 Discovery Miles 12 210
Blockchain - An Essential Beginner's…
Herbert Jones Hardcover R712 R628 Discovery Miles 6 280
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R844 R733 Discovery Miles 7 330
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R819 Discovery Miles 8 190
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,692 Discovery Miles 66 920
Blockchain Applications
Arshdeep Bagha Hardcover R2,030 R1,645 Discovery Miles 16 450

 

Partners