0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (100)
  • R500+ (1,350)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Secure Electronic Voting (Hardcover, 2003 ed.): Dimitris A. Gritzalis Secure Electronic Voting (Hardcover, 2003 ed.)
Dimitris A. Gritzalis
R2,923 Discovery Miles 29 230 Ships in 10 - 15 working days

Secure Electronic Voting is an edited volume, which includes chapters authored by leading experts in the field of security and voting systems. The chapters identify and describe the given capabilities and the strong limitations, as well as the current trends and future perspectives of electronic voting technologies, with emphasis in security and privacy. Secure Electronic Voting includes state-of-the-art material on existing and emerging electronic and Internet voting technologies, which may eventually lead to the development of adequately secure e-voting systems. This book also includes an overview of the legal framework with respect to voting, a description of the user requirements for the development of a secure e-voting system, and a discussion on the relevant technical and social concerns. Secure Electronic Voting includes, also, three case studies on the use and evaluation of e-voting systems in three different real world environments.

Adaptive Cryptographic Access Control (Hardcover, 2010 ed.): Anne V. D. M. Kayem, Selim G Akl, Patrick Martin Adaptive Cryptographic Access Control (Hardcover, 2010 ed.)
Anne V. D. M. Kayem, Selim G Akl, Patrick Martin
R2,872 Discovery Miles 28 720 Ships in 10 - 15 working days

Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Applications of cryptographic access control will benefit companies, governments and the military where structured access to information is essential.

The purpose of this book is to highlight the need for adaptability in cryptographic access control schemes that are geared for dynamic environments, such as the Internet. Adaptive Cryptographic Access Control presents the challenges of designing hierarchical cryptographic key management algorithms to implement Adaptive Access Control in dynamic environments and suggest solutions that will overcome these challenges.

Adaptive Cryptographic Access Control is a cutting-edge book focusing specifically on this topic in relation to security and cryptographic access control. Both the theoretical and practical aspects and approaches of cryptographic access control are introduced in this book. Case studies and examples are provided throughout this book.

Student Plagiarism in an Online World - Problems and Solutions (Hardcover): Tim S. Roberts Student Plagiarism in an Online World - Problems and Solutions (Hardcover)
Tim S. Roberts
R4,752 Discovery Miles 47 520 Ships in 12 - 17 working days

Twenty years ago, plagiarism was seen as an isolated misdemeanor, restricted to a small group of students. Today it is widely recognized as a ubiquitous, systemic issue, compounded by the accessibility of content in the virtual environment. Student Plagiarism in an Online World: Problems & Solutions describes the legal and ethical issues surrounding plagiarism, the tools and techniques available to combat the spreading of this problem, and real-life situational examples to further the understanding of the scholars, practitioners, educators, and instructional designers who will find this book an invaluable resource.

Cryptography Made Simple (Hardcover, 1st ed. 2016): Nigel Smart Cryptography Made Simple (Hardcover, 1st ed. 2016)
Nigel Smart
R1,352 R881 Discovery Miles 8 810 Save R471 (35%) Ships in 12 - 17 working days

In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by "secure" is as important as creating something that achieves that goal, and security definitions are central to the discussion throughout. The author balances a largely non-rigorous style - many proofs are sketched only - with appropriate formality and depth. For example, he uses the terminology of groups and finite fields so that the reader can understand both the latest academic research and "real-world" documents such as application programming interface descriptions and cryptographic standards. The text employs colour to distinguish between public and private information, and all chapters include summaries and suggestions for further reading. This is a suitable textbook for advanced undergraduate and graduate students in computer science, mathematics and engineering, and for self-study by professionals in information security. While the appendix summarizes most of the basic algebra and notation required, it is assumed that the reader has a basic knowledge of discrete mathematics, probability, and elementary calculus.

Security without Obscurity - A Guide to Cryptographic Architectures (Hardcover): Jeff Stapleton Security without Obscurity - A Guide to Cryptographic Architectures (Hardcover)
Jeff Stapleton
R1,922 Discovery Miles 19 220 Ships in 12 - 17 working days

Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use.

Integrity and Internal Control in Information Systems VI - IFIP TC11 / WG11.5 Sixth Working Conference on Integrity and... Integrity and Internal Control in Information Systems VI - IFIP TC11 / WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13-14 November 2003, Lausanne, Switzerland (Hardcover, 2004 ed.)
Sushil Jajodia, Leon Strous
R2,941 Discovery Miles 29 410 Ships in 10 - 15 working days

This sixth volume in the series "Integrity and Internal Control in Information Systems" is a state-of-the-art collection of papers in the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support corporate governance codes.
Integrity and Internal Control in Information Systems VI represents a continuation of the dialogue between information security specialists, internal control specialists and the business community. The objectives of this dialogue are: To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; To present the results of research that may in future be used to increase the level of integrity or help management maintain the desired level of integrity; To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general. The book contains a collection of papers from the Sixth International Working Conference on Integrity and Internal Control in Information Systems (IICIS), sponsored by the International Federation for Information Processing (IFIP) and held in Lausanne, Switzerland in November 2003. It will be essential reading for academics and practitioners in computer science, information technology, business informatics, accountancy and IT-auditing.

Noiseless Steganography - The Key to Covert Communications (Paperback): Abdelrahman Desoky Noiseless Steganography - The Key to Covert Communications (Paperback)
Abdelrahman Desoky
R1,588 Discovery Miles 15 880 Ships in 12 - 17 working days

Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These approaches often fail because they camouflage data as a detectable noise by altering digital images, audio files, text, etc. However, such alteration raises suspicion and makes the message discernible by detecting its noise. Addressing such shortcomings, Noiseless Steganography: The Key to Covert Communications introduces a novel Noiseless Steganography Paradigm (Nostega). Rather than hiding data in noise or producing noise, Nostega camouflages messages as well as their transmission in the form of unquestionable data in the generated steganographic cover. The book explains how to use Nostega to determine suitable domains capable of generating unsuspicious steganographic cover in which messages are embedded in the form of innocent data that is compatible with the chosen domain. It presents a number of Nostega-based methodologies, including but not limited to: A novel cover type that enables data to be hidden in plotted graphs A novel methodology that pursues popular games such as chess, checkers, crosswords, and dominoes to conceal messages Comprehensive coverage of linguistic steganography Several novel linguistic steganography methodologies based on Natural Language Processing and Computational Linguistic techniques such as: Education-Centric-Based, Summarization-Based, Natural Language Generation Based, Random-Series-Based, Email Headers Based, Automatic Joke Generation Based, List-Based, and Automatic Notes Generation Based The first book to provide comprehensive coverage of Linguistic Steganography, Graph Steganography, and Game Steganography, it discusses the implementation and steganalysis validation of ten Nostega-based methodologies. It describes how to establish covert channels by employing the selected domain to serve as justification for the interaction and delivery of the cover among the communicating parties. Instead of using contemporary steganography approaches to camouflage your data as noise that is assumed to look innocent, the text provides you with the tools to prevent your adversaries from suspecting the existence of covert communications altogether.

Designing Security Architecture Solutions (Paperback): J. Ramachandran Designing Security Architecture Solutions (Paperback)
J. Ramachandran
R1,898 R1,314 Discovery Miles 13 140 Save R584 (31%) Out of stock

The first guide to tackle security architecture at the software engineering level
Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with AT&T Business's renowned Network Services organization explores system security architecture from a software engineering perspective. He explains why strong security must be a guiding principle of the development process and identifies a common set of features found in most security products, explaining how they can and should impact the development cycle. The book also offers in-depth discussions of security technologies, cryptography, database security, application and operating system security, and more.

Elsevier's Dictionary of Information Security (Hardcover, New): G. Manoilov, B. Radichkova Elsevier's Dictionary of Information Security (Hardcover, New)
G. Manoilov, B. Radichkova
R7,286 Discovery Miles 72 860 Ships in 10 - 15 working days

The dictionary will contain terms currently used in the broad fields of electronics data protection and data management in today's interconnected world - the Global Village. The terminology will cover all aspects of the modern technology's best practices in multiple subfields, namely: physical (hardware and perimeter) security, wired and wireless telecommunication infrastructure security, internet (e-commerce and business-to-business) security, anti-virus and anti-spyware applications, virtual private networking, theory and practices of cryptography, corporate security policies'methodology, design, implementation and enforcement.
5000 terms in English, German, French and Russian
* a valuable reference tool for both the general public and the industry experts
* can be used as knowledge support in theoretical projects
* could also serve as a handy desktop reference book in day-to-day operations in a multilingual environment

Digital Rights Management - Protecting and Monetizing Content (Hardcover): Joan Van Tassel Digital Rights Management - Protecting and Monetizing Content (Hardcover)
Joan Van Tassel
R3,894 Discovery Miles 38 940 Ships in 12 - 17 working days

Digital rights management (DRM) is a type of server software developed to enable secure distribution - and perhaps more importantly, to disable illegal distribution - of paid content over the Web. DRM technologies are being developed as a means of protection against the online piracy of commercially marketed material, which has proliferated through the widespread use of Napster and other peer-to-peer file exchange programs. With the flourish of these file exchange programs, content owners, creators and producers need to have a plan to distribute their content digitally and protect it at the same time-a seemingly impossible task. There are numerous books dealing with copyright, eBusiness, the Internet, privacy, security, content management, and related technical subjects. Additionally, there are several research papers, and almost daily newspaper and magazine articles dealing with digital piracy. However, there are only a few books and documents that bring these together as a basis for profitable exchange of digital content. Digital Rights Management can help content providers make money by unifying the confusing array of concepts that swirl around current presentations of DRM in newspapers and business publications.

Integrity and Internal Control in Information Systems - Volume 1: Increasing the confidence in information systems (Hardcover,... Integrity and Internal Control in Information Systems - Volume 1: Increasing the confidence in information systems (Hardcover, 1997 ed.)
Sushil Jajodia, Graeme W. McGregor, William List, Leon A. M. Strous
R4,341 Discovery Miles 43 410 Ships in 12 - 17 working days

Dear readers, Although it is well-known that confidentiality, integrity and availability are high level objectives of information security, much of the attention in the security arena has been devoted to the confidentiality and availability aspects of security. IFIP TC-ll Working Group 11. 5 has been charged with exploring the area of the integrity objective within information security and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support the corporate governance codes. In this collection you will not only find the papers that have been presented during the first working conference dedicated to the subject (section A) but also some of the papers that have formed the basis for the current activities of this working group (section B). Finally some information about IFIP TC-ll and its working groups is included (section C). This first working conference is the start for an ongoing dialog between the information security specialists and the internal control specialists so that both may work more effectively together to assist in creating effective business systems in the future."

Radiation Effects on Embedded Systems (Hardcover, 2007 ed.): Raoul Velazco, Pascal Fouillat, Ricardo Reis Radiation Effects on Embedded Systems (Hardcover, 2007 ed.)
Raoul Velazco, Pascal Fouillat, Ricardo Reis
R4,604 R4,318 Discovery Miles 43 180 Save R286 (6%) Ships in 12 - 17 working days

'Radiation Effects on Embedded Systems' provides the reader with the major guidelines for coping with radiation effects on components supposed to be included in today's application devoted to operate in space, but also in atmosphere at high altitude or at ground level. It contains a set of chapters based on the tutorials presented at the International School on Effects of Radiation on Embedded Systems for Space Applications (SERESSA) that was held in Manaus, Brazil, from 20 to 25 November 2005.

Mathematical Foundations of Public Key Cryptography (Hardcover): Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng Mathematical Foundations of Public Key Cryptography (Hardcover)
Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng
R2,198 Discovery Miles 21 980 Ships in 12 - 17 working days

In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more than 20 years of research and teaching experience to help students bridge the gap between math theory and crypto practice. The book provides a theoretical structure of fundamental number theory and algebra knowledge supporting public-key cryptography. Rather than simply combining number theory and modern algebra, this textbook features the interdisciplinary characteristics of cryptography-revealing the integrations of mathematical theories and public-key cryptographic applications. Incorporating the complexity theory of algorithms throughout, it introduces the basic number theoretic and algebraic algorithms and their complexities to provide a preliminary understanding of the applications of mathematical theories in cryptographic algorithms. Supplying a seamless integration of cryptography and mathematics, the book includes coverage of elementary number theory; algebraic structure and attributes of group, ring, and field; cryptography-related computing complexity and basic algorithms, as well as lattice and fundamental methods of lattice cryptanalysis. The text consists of 11 chapters. Basic theory and tools of elementary number theory, such as congruences, primitive roots, residue classes, and continued fractions, are covered in Chapters 1-6. The basic concepts of abstract algebra are introduced in Chapters 7-9, where three basic algebraic structures of groups, rings, and fields and their properties are explained. Chapter 10 is about computational complexities of several related mathematical algorithms, and hard problems such as integer factorization and discrete logarithm. Chapter 11 presents the basics of lattice theory and the lattice basis reduction algorithm-the LLL algorithm and its application in the cryptanalysis of the RSA algorithm. Containing a number of exercises on key algorithms, the book is suitable for use as a textbook for undergraduate students and first-year graduate students in information security programs. It is also an ideal reference book for cryptography professionals looking to master public-key cryptography.

Secure Information Networks - Communications and Multimedia Security IFIP TC6/TC11 Joint Working Conference on Communications... Secure Information Networks - Communications and Multimedia Security IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS'99) September 20-21, 1999, Leuven, Belgium (Hardcover, 1999 ed.)
Bart Preneel
R5,621 Discovery Miles 56 210 Ships in 10 - 15 working days

This volume contains papers presented at the fourth working conference on Communications and Multimedia Security (CMS'99), held in Leuven, Belgium from September 20-21, 1999. The Conference, arrangedjointly by Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP), was organized by the Department of Electrical Engineering of the Katholieke Universiteit Leuven. The name "Communications and Multimedia Security" was used for the first time in 1995, when Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the previously national (Austrian) IT Sicherheit conferences held in Klagenfurt (1993) and Vienna (1994). In 1996, CMS took place in Essen, Germany; in 1997 the conference moved to Athens, Greece. The Conference aims to provide an international forum for presentations and discussions on protocols and techniques for providing secure information networks. The contributions in this volume review the state-of the-art in communications and multimedia security, and discuss practical of topics experiences and new developments. They cover a wide spectrum inc1uding network security, web security, protocols for entity authentication and key agreement, protocols for mobile environments, applied cryptology, watermarking, smart cards, and legal aspects of digital signatures."

Luck Follows the Brave - From Refugee Camps, Abuse, and Suicide Loss to Living the Dream (Hardcover, Hardback ed.): Aida S?ibic? Luck Follows the Brave - From Refugee Camps, Abuse, and Suicide Loss to Living the Dream (Hardcover, Hardback ed.)
Aida Šibić; Edited by Laura L Bush
R654 Discovery Miles 6 540 Ships in 12 - 17 working days
Deep Learning Approaches for Security Threats in IoT Environments (Hardcover): M Abdel-Basset Deep Learning Approaches for Security Threats in IoT Environments (Hardcover)
M Abdel-Basset
R3,071 Discovery Miles 30 710 Ships in 12 - 17 working days

Deep Learning Approaches for Security Threats in IoT Environments An expert discussion of the application of deep learning methods in the IoT security environment In Deep Learning Approaches for Security Threats in IoT Environments, a team of distinguished cybersecurity educators deliver an insightful and robust exploration of how to approach and measure the security of Internet-of-Things (IoT) systems and networks. In this book, readers will examine critical concepts in artificial intelligence (AI) and IoT, and apply effective strategies to help secure and protect IoT networks. The authors discuss supervised, semi-supervised, and unsupervised deep learning techniques, as well as reinforcement and federated learning methods for privacy preservation. This book applies deep learning approaches to IoT networks and solves the security problems that professionals frequently encounter when working in the field of IoT, as well as providing ways in which smart devices can solve cybersecurity issues. Readers will also get access to a companion website with PowerPoint presentations, links to supporting videos, and additional resources. They'll also find: A thorough introduction to artificial intelligence and the Internet of Things, including key concepts like deep learning, security, and privacy Comprehensive discussions of the architectures, protocols, and standards that form the foundation of deep learning for securing modern IoT systems and networks In-depth examinations of the architectural design of cloud, fog, and edge computing networks Fulsome presentations of the security requirements, threats, and countermeasures relevant to IoT networks Perfect for professionals working in the AI, cybersecurity, and IoT industries, Deep Learning Approaches for Security Threats in IoT Environments will also earn a place in the libraries of undergraduate and graduate students studying deep learning, cybersecurity, privacy preservation, and the security of IoT networks.

PRAGMATIC Security Metrics - Applying Metametrics to Information Security (Hardcover): W. Krag Brotby, Gary Hinson PRAGMATIC Security Metrics - Applying Metametrics to Information Security (Hardcover)
W. Krag Brotby, Gary Hinson
R3,507 Discovery Miles 35 070 Ships in 12 - 17 working days

Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate how-to-do-it guide for security metrics.
Packed with time-saving tips, the book offers easy-to-follow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system" "(a comprehensive suite of metrics) to help:

  • Security professionals systematically improve information security, demonstrate the value they are adding, and gain management support for the things that need to be done
  • Management address previously unsolvable problems rationally, making critical decisions such as resource allocation and prioritization of security relative to other business activities
  • Stakeholders, both within and outside the organization, be assured that information security is being competently managed

The PRAGMATIC approach lets you hone in on your problem areas and identify the few metrics that will generate real business value. The book:

  • Helps you figure out exactly "what" needs to be measured, "how" to measure it, and most importantly, "why" it needs to be measured
  • Scores and ranks more than 150 candidate security metrics to demonstrate the value of the PRAGMATIC method
  • Highlights security metrics that are widely used and recommended, yet turn out to be rather poor in practice
  • Describes innovative and flexible measurement approaches such as capability maturity metrics with continuous scales
  • Explains how to minimize both measurement and security risks using complementary metrics for greater assurance in critical areas such as governance and compliance

In addition to its obvious utility in the information security realm, the PRAGMATIC approach, introduced for the first time in this book, has broader application across diverse fields of management including finance, human resources, engineering, and production in fact any area that suffers a surplus of data but a deficit of useful information.

Visit Security Metametrics. Security Metametrics supports the global community of professionals adopting the innovative techniques laid out in "PRAGMATIC Security Metrics." If you, too, are struggling to make much sense of security metrics, or searching for better metrics to manage and improve information security, Security Metametrics is the place. http: //securitymetametrics.com/

Introduction to Cryptography (Paperback): Sahadeo Padhye, Rajeev A. Sahu, Vishal Saraswat Introduction to Cryptography (Paperback)
Sahadeo Padhye, Rajeev A. Sahu, Vishal Saraswat
R1,387 Discovery Miles 13 870 Ships in 12 - 17 working days

Electronic communication and financial transactions have assumed massive proportions today. But they come with high risks. Achieving cyber security has become a top priority, and has become one of the most crucial areas of study and research in IT. This book introduces readers to perhaps the most effective tool in achieving a secure environment, i.e. cryptography. This book offers more solved examples than most books on the subject, it includes state of the art topics and discusses the scope of future research.

RC4 Stream Cipher and Its Variants (Hardcover, New): Goutam Paul, Subhamoy Maitra RC4 Stream Cipher and Its Variants (Hardcover, New)
Goutam Paul, Subhamoy Maitra
R5,006 Discovery Miles 50 060 Ships in 12 - 17 working days

RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. They also explore variants of RC4 and the eSTREAM finalist HC-128. After an introduction to the vast field of cryptology, the book reviews hardware and software stream ciphers and describes RC4. It presents a theoretical analysis of RC4 KSA, discussing biases of the permutation bytes toward secret key bytes and absolute values. The text explains how to reconstruct the secret key from known state information and analyzes the RC4 PRGA in detail, including a sketch of state recovery attacks. The book then describes three popular attacks on RC4: distinguishing attacks, Wired Equivalent Privacy (WEP) protocol attacks, and fault attacks. The authors also compare the advantages and disadvantages of several variants of RC4 and examine stream cipher HC-128, which is the next level of evolution after RC4 in the software stream cipher paradigm. The final chapter emphasizes the safe use of RC4. With open research problems in each chapter, this book offers a complete account of the most current research on RC4.

Visual Cryptography and Secret Image Sharing (Hardcover): Stelvio Cimato, Ching-Nung Yang Visual Cryptography and Secret Image Sharing (Hardcover)
Stelvio Cimato, Ching-Nung Yang
R5,612 Discovery Miles 56 120 Ships in 12 - 17 working days

With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information.

Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive data-such as medical records, financial transactions, and electronic voting systems-the methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files.

An exploration of the most prominent topics in digital imaging security, this book discusses:

  • Potential for sharing multiple secrets
  • Visual cryptography schemes-based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared images
  • Inclusion of pictures in the distributed shares
  • Contrast enhancement techniques
  • Color-image visual cryptography
  • Cheating prevention
  • Alignment problems for image shares
  • Steganography and authentication

In the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field.

Implementing SSL/TLS Using Cryptography and PKI (Paperback): J. Davies Implementing SSL/TLS Using Cryptography and PKI (Paperback)
J. Davies
R1,434 R1,096 Discovery Miles 10 960 Save R338 (24%) Ships in 12 - 17 working days

Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this practical book is for you. Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you have a working knowledge of cryptography. The book covers SSLv2, TLS 1.0, and TLS 1.2, including implementations of the relevant cryptographic protocols, secure hashing, certificate parsing, certificate generation, and more. Coverage includes: * Understanding Internet Security * Protecting against Eavesdroppers with Symmetric Cryptography * Secure Key Exchange over an Insecure Medium with Public Key Cryptography * Authenticating Communications Using Digital Signatures * Creating a Network of Trust Using X.509 Certificates * A Usable, Secure Communications Protocol: Client-Side TLS * Adding Server-Side TLS 1.0 Support * Advanced SSL Topics * Adding TLS 1.2 Support to Your TLS Library * Other Applications of SSL * A Binary Representation of Integers: A Primer * Installing TCPDump and OpenSSL * Understanding the Pitfalls of SSLv2 Set up and launch a working implementation of SSL with this practical guide.

Guide to Pairing-Based Cryptography (Paperback): Nadia El Mrabet, Marc Joye Guide to Pairing-Based Cryptography (Paperback)
Nadia El Mrabet, Marc Joye
R1,409 Discovery Miles 14 090 Ships in 12 - 17 working days

This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to Pairing-Based Cryptography offers an overview of the most recent developments in optimizations for pairing implementation. Each chapter includes a presentation of the problem it discusses, the mathematical formulation, a discussion of implementation issues, solutions accompanied by code or pseudocode, several numerical results, and references to further reading and notes. Intended as a self-contained handbook, this book is an invaluable resource for computer scientists, applied mathematicians and security professionals interested in cryptography.

Information Security Management Metrics - A Definitive Guide to Effective Security Monitoring and Measurement (Hardcover):... Information Security Management Metrics - A Definitive Guide to Effective Security Monitoring and Measurement (Hardcover)
CISM, W. Krag Brotby
R2,322 Discovery Miles 23 220 Ships in 12 - 17 working days

Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations. The 20/20 hindsight of audits is no longer an effective solution to security weaknesses, and the necessity for real-time strategic metrics has never been more critical. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement offers a radical new approach for developing and implementing security metrics essential for supporting business activities and managing information risk. This work provides anyone with security and risk management responsibilities insight into these critical security questions:How secure is my organization? How much security is enough? What are the most cost-effective security solutions? How secure is my organization? You can't manage what you can't measure This volume shows readers how to develop metrics that can be used across an organization to assure its information systems are functioning, secure, and supportive of the organization's business objectives. It provides a comprehensive overview of security metrics, discusses the current state of metrics in use today, and looks at promising new developments. Later chapters explore ways to develop effective strategic and management metrics for information security governance, risk management, program implementation and management, and incident management and response. The book ensures that every facet of security required by an organization is linked to business objectives, and provides metrics to measure it. Case studies effectively demonstrate specific ways that metrics can be implemented across an enterprise to maximize business benefit. With three decades of enterprise information security experience, author Krag Brotby presents a workable approach to developing and managing cost-effective enterprise information security.

Information Assurance Architecture (Hardcover): Keith D. Willett Information Assurance Architecture (Hardcover)
Keith D. Willett
R3,522 Discovery Miles 35 220 Ships in 12 - 17 working days

"Safeguard Your Organization's Information!"

Now that information has become the lifeblood of your organization, you must be especially vigilant about assuring it. The hacker, spy, or cyber-thief of today can breach any barrier if it remains unchanged long enough or has even the tiniest leak. In Information Assurance Architecture, Keith D. Willett draws on his over 25 years of technical, security, and business experience to provide a framework for organizations to align information assurance with the enterprise and their overall mission.

"The Tools to Protect Your Secrets from Exposure"

This work provides the security industry with the know-how to create a formal information assurance architecture that complements an enterprise architecture, systems engineering, and the enterprise life cycle management (ELCM). Information Assurance Architecture consists of a framework, a process, and many supporting tools, templates and methodologies. The framework provides a reference model for the consideration of security in many contexts and from various perspectives; the process provides direction on how to apply that framework. Mr. Willett teaches readers how to identify and use the right tools for the right job. Furthermore, he demonstrates a disciplined approach in thinking about, planning, implementing and managing security, emphasizing that solid solutions can be made impenetrable when they are seamlessly integrated with the whole of an enterprise.

"Understand the Enterprise Context"

This book covers many information assurance subjects, including disaster recovery and firewalls. The objective is to present security services and security mechanisms in the context of informationassurance architecture, and in an enterprise context of managing business risk. Anyone who utilizes the concepts taught in these pages will find them to be a valuable weapon in the arsenal of information protection.

Power and Security in the Information Age - Investigating the Role of the State in Cyberspace (Hardcover, New Ed): Myriam Dunn... Power and Security in the Information Age - Investigating the Role of the State in Cyberspace (Hardcover, New Ed)
Myriam Dunn Cavelty, Victor Mauer
R3,881 Discovery Miles 38 810 Ships in 12 - 17 working days

The marriage of computers and telecommunications, the integration of these technologies into a multimedia system of communication that has global reach, and the fact that they are available worldwide at low cost seems to be bringing about a fundamental transformation in the way humans communicate and interact. But however much consensus there may be on the growing importance of information technology today, agreement is far more elusive when it comes to pinning down the impact of this development on security issues.This volume focuses on the role of the state in defending against cyber-threats and in securing the information age. The notion that is most uncritically accepted within the overall information security debate is that state power is eroding due to the effects of information and communication technology and that the state is unable to provide security in the information age. This volume challenges the unidimensionality of this statement. Without denying that new challenges for the state have arisen, authors in this volume argue that too much credence is often given to the spectre of an erosion of sovereignty.Written by scholars in international relations, the manuscript is captivating with the significance and actuality of the issues discussed, and the logical, knowledgeable, and engaged manner of presenting the issues. The essays intrigue and provoke with a number of fresh hypotheses, observations, and suggestions and contribute to mapping the diverse layers, actors, approaches, and policies of the cybersecurity realm.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Information Security Management-Global…
Gurpreet Dhillon Paperback R1,895 Discovery Miles 18 950
TLS Mastery
Michael W Lucas Hardcover R970 R838 Discovery Miles 8 380
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,512 Discovery Miles 65 120
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,154 Discovery Miles 31 540
The Political Economy and Feasibility of…
Spencer J. Pack Hardcover R2,728 Discovery Miles 27 280
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R844 R699 Discovery Miles 6 990
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R494 Discovery Miles 4 940
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,321 R1,183 Discovery Miles 11 830
New Research on the Voynich Manuscript…
National Security Agency Hardcover R503 Discovery Miles 5 030
Implementing the ISO/IEC 27001…
Edward Humphreys Hardcover R2,327 Discovery Miles 23 270

 

Partners