0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (13)
  • R250 - R500 (89)
  • R500+ (1,400)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

NetScaler Hacks - 10 Hacks for the Citrix NetScaler ADC/MPX/SDX - Extend the life of this hardware with amazing ideas for... NetScaler Hacks - 10 Hacks for the Citrix NetScaler ADC/MPX/SDX - Extend the life of this hardware with amazing ideas for legacy Citrix NetScaler ADC/MPX/SDX hardware. (Paperback)
Joseph Moses
R462 Discovery Miles 4 620 Ships in 10 - 15 working days
Managing Information Technology (Hardcover): Liam Lewis Managing Information Technology (Hardcover)
Liam Lewis
R3,698 R3,192 Discovery Miles 31 920 Save R506 (14%) Ships in 10 - 15 working days
Cryptographic Methods (Hardcover): Abdul Razaque, Fathi Amsaad, Abrar Alajlan Cryptographic Methods (Hardcover)
Abdul Razaque, Fathi Amsaad, Abrar Alajlan
R1,479 Discovery Miles 14 790 Ships in 10 - 15 working days
How to Keep Your Bitcoin Safe - Tools And Tips For Protecting Cryptocurrency Assets (Paperback): Rooney Edwards How to Keep Your Bitcoin Safe - Tools And Tips For Protecting Cryptocurrency Assets (Paperback)
Rooney Edwards
R181 Discovery Miles 1 810 Ships in 10 - 15 working days
Cryptographic Methods (Paperback): Abdul Razaque, Fathi Amsaad, Abrar Alajlan Cryptographic Methods (Paperback)
Abdul Razaque, Fathi Amsaad, Abrar Alajlan
R1,252 Discovery Miles 12 520 Ships in 10 - 15 working days
B Coin - The Architects (Paperback): Kaiser Hugan B Coin - The Architects (Paperback)
Kaiser Hugan
R798 Discovery Miles 7 980 Ships in 10 - 15 working days
Utilizing Blockchain Technologies in Manufacturing and Logistics Management (Paperback): S. B. Goyal, Nijalingappa Pradeep,... Utilizing Blockchain Technologies in Manufacturing and Logistics Management (Paperback)
S. B. Goyal, Nijalingappa Pradeep, Piyush Kumar Shukla, Mangesh M. Ghonge, Renjith V. Ravi
R5,301 Discovery Miles 53 010 Ships in 10 - 15 working days

Blockchain technology has the potential to utterly transform supply chains, streamline processes, and improve the whole of security. Manufacturers across the globe face challenges with forecasting demand, controlling inventory, and accelerating digital transformation to cater to the challenges of changing market dynamics and evolving customer expectations. Hence, blockchain should be seen as an investment in future-readiness and customer-centricity, not as an experimental technology. Utilizing Blockchain Technologies in Manufacturing and Logistics Management explores the strengths of blockchain adaptation in manufacturing industries and logistics management, which include product traceability, supply chain transparency, compliance monitoring, and auditability, and also examines the current open issues and future research trends of blockchain. Leveraging blockchain technology into a manufacturing enterprise can enhance its security and reduce the rates of systematic failures. Covering topics such as fraud detection, Industry 4.0, and security threats, this book is a ready premier reference for graduate and post-graduate students, academicians, researchers, industrialists, consultants, and entrepreneurs, as well as micro, small, and medium enterprises.

Protecting Privacy through Homomorphic Encryption (Hardcover, 1st ed. 2021): Kristin Lauter, Wei Dai, Kim Laine Protecting Privacy through Homomorphic Encryption (Hardcover, 1st ed. 2021)
Kristin Lauter, Wei Dai, Kim Laine
R3,214 Discovery Miles 32 140 Ships in 10 - 15 working days

This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on Homomorphic Encryption. In the past 3 years, a global community consisting of researchers in academia, industry, and government, has been working closely to standardize homomorphic encryption. This is the first publication of whitepapers created by these experts that comprehensively describes the scientific inventions, presents a concrete security analysis, and broadly discusses applicable use scenarios and markets. This book also features a collection of privacy-preserving machine learning applications powered by homomorphic encryption designed by groups of top graduate students worldwide at the Private AI Bootcamp hosted by Microsoft Research. The volume aims to connect non-expert readers with this important new cryptographic technology in an accessible and actionable way. Readers who have heard good things about homomorphic encryption but are not familiar with the details will find this book full of inspiration. Readers who have preconceived biases based on out-of-date knowledge will see the recent progress made by industrial and academic pioneers on optimizing and standardizing this technology. A clear picture of how homomorphic encryption works, how to use it to solve real-world problems, and how to efficiently strengthen privacy protection, will naturally become clear.

Bitcoin Basics - A Beginner's Guide to Bitcoin and Blockchain (Paperback): Marc Gordon Bitcoin Basics - A Beginner's Guide to Bitcoin and Blockchain (Paperback)
Marc Gordon
R218 Discovery Miles 2 180 Ships in 10 - 15 working days
Cybersecurity, Privacy and Freedom Protection in the Connected World - Proceedings of the 13th International Conference on... Cybersecurity, Privacy and Freedom Protection in the Connected World - Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 (Hardcover, 1st ed. 2021)
Hamid Jahankhani, Arshad Jamal, Shaun Lawson
R1,649 Discovery Miles 16 490 Ships in 10 - 15 working days

This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. Drawing on 12 years of successful events on information security, digital forensics and cyber-crime, the 13th ICGS3-20 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. As an increasing number of large organizations and individuals use the Internet and its satellite mobile technologies, they are increasingly vulnerable to cyber-crime threats. It is therefore paramount that the security industry raises its game to combat these threats. Whilst there is a huge adoption of technology and smart home devices, comparably, there is a rise of threat vector in the abuse of the technology in domestic violence inflicted through IoT too. All these are an issue of global importance as law enforcement agencies all over the world are struggling to cope.

Blockchain for Non IT Professionals - An Example Driven, Metaphorical Approach (Paperback): Srinivas Mahankali Blockchain for Non IT Professionals - An Example Driven, Metaphorical Approach (Paperback)
Srinivas Mahankali
R404 Discovery Miles 4 040 Ships in 10 - 15 working days
Cryptology For Engineers: An Application-oriented Mathematical Introduction (Hardcover): Robert Schmied Cryptology For Engineers: An Application-oriented Mathematical Introduction (Hardcover)
Robert Schmied
R2,705 Discovery Miles 27 050 Ships in 10 - 15 working days

Cryptology is increasingly becoming one of the most essential topics of interest in everyday life. Digital communication happens by transferring data between at least two participants - But do we want to disclose private information while executing a sensitive bank transfer? How about allowing third-party entities to eavesdrop on private calls while performing an important secret business discussion? Do we want to allow ambient communication concerning us to be manipulated while control software is driving our autonomous car along a steep slope? Questions like these make it clear why issues of security are a great concern in our increasingly augmented world.Cryptology for Engineers is a study of digital security in communications systems. The book covers the cryptographical functionalities of ciphering, hash generation, digital signature generation, key management and random number generation, with a clear sense of the mathematical background on the one hand and engineers' requirements on the other. Numerous examples computable by hand or with a small additional cost in most cases are provided inside.

Arithmetic and Algebraic Circuits (Hardcover, 1st ed. 2021): Antonio Lloris Ruiz, Encarnacion Castillo Morales, Luis Parrilla... Arithmetic and Algebraic Circuits (Hardcover, 1st ed. 2021)
Antonio Lloris Ruiz, Encarnacion Castillo Morales, Luis Parrilla Roure, Antonio Garcia Rios, Maria Jose Lloris Meseguer
R5,409 Discovery Miles 54 090 Ships in 10 - 15 working days

This book presents a complete and accurate study of arithmetic and algebraic circuits. The first part offers a review of all important basic concepts: it describes simple circuits for the implementation of some basic arithmetic operations; it introduces theoretical basis for residue number systems; and describes some fundamental circuits for implementing the main modular operations that will be used in the text. Moreover, the book discusses floating-point representation of real numbers and the IEEE 754 standard. The second and core part of the book offers a deep study of arithmetic circuits and specific algorithms for their implementation. It covers the CORDIC algorithm, and optimized arithmetic circuits recently developed by the authors for adders and subtractors, as well as multipliers, dividers and special functions. It describes the implementation of basic algebraic circuits, such as LFSRs and cellular automata. Finally, it offers a complete study of Galois fields, showing some exemplary applications and discussing the advantages in comparison to other methods. This dense, self-contained text provides students, researchers and engineers, with extensive knowledge on and a deep understanding of arithmetic and algebraic circuits and their implementation.

Non-Fungible Token (NFT) Investing Mastery - Cryptocurrency History, Market Analysis, Create, Market, Buy, Sell and Trade - NFT... Non-Fungible Token (NFT) Investing Mastery - Cryptocurrency History, Market Analysis, Create, Market, Buy, Sell and Trade - NFT Crypto Investing Guide for Beginners to Expert: Art, Tokens, Music, Film (Paperback)
Cameron Belford
R457 R373 Discovery Miles 3 730 Save R84 (18%) Ships in 10 - 15 working days
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Hardcover, 1st ed. 2021): Matthew Ryan Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Hardcover, 1st ed. 2021)
Matthew Ryan
R5,249 Discovery Miles 52 490 Ships in 10 - 15 working days

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the 'ransomware revolution' after a series of major attacks beginning in 2013, and how the advent of cryptocurrencies provided the catalyst for the development and increased profitability of ransomware, sparking a phenomenal rise in the number and complexity of ransomware attacks. This book analyzes why the speed of technology adoption has been a fundamental factor in the continued success of financially motivated cybercrime, and how the ease of public access to advanced encryption techniques has allowed malicious actors to continue to operate with increased anonymity across the internet. This anonymity has enabled increased collaboration between attackers, which has aided the development of new ransomware attacks, and led to an increasing level of technical complexity in ransomware attacks. This book highlights that the continuous expansion and early adoption of emerging technologies may be beyond the capacity of conventional risk managers and risk management frameworks. Researchers and advanced level students studying or working in computer science, business or criminology will find this book useful as a reference or secondary text. Professionals working in cybersecurity, cryptography, information technology, financial crime (and other related topics) will also welcome this book as a reference.

Partially Homomorphic Encryption (Hardcover, 1st ed. 2021): Cetin Kaya Koc, Funda OEzdemir, Zeynep OEdemis OEzger Partially Homomorphic Encryption (Hardcover, 1st ed. 2021)
Cetin Kaya Koc, Funda OEzdemir, Zeynep OEdemis OEzger
R3,711 Discovery Miles 37 110 Ships in 10 - 15 working days

This monograph describes and implements partially homomorphic encryption functions using a unified notation. After introducing the appropriate mathematical background, the authors offer a systematic examination of the following known algorithms: Rivest-Shamir-Adleman; Goldwasser-Micali; ElGamal; Benaloh; Naccache-Stern; Okamoto-Uchiyama; Paillier; Damgaard-Jurik; Boneh-Goh-Nissim; and Sander-Young-Yung. Over recent years partially and fully homomorphic encryption algorithms have been proposed and researchers have addressed issues related to their formulation, arithmetic, efficiency and security. Formidable efficiency barriers remain, but we now have a variety of algorithms that can be applied to various private computation problems in healthcare, finance and national security, and studying these functions may help us to understand the difficulties ahead. The book is valuable for researchers and graduate students in Computer Science, Engineering, and Mathematics who are engaged with Cryptology.

Open Problems in Network Security - IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011,... Open Problems in Network Security - IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers (Paperback, 2012)
Jan Camenisch, Dogan Kesdogan
R1,518 Discovery Miles 15 180 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Security, iNetSec 2011, held in Lucerne, Switzerland, in June 2011, co-located and under the auspices of IFIP SEC 2011, the 26th IFIP TC-11 International Information Security Conference. The 12 revised full papers were carefully reviewed and selected from 28 initial submissions; they are fully revised to incorporate reviewers' comments and discussions at the workshop. The volume is organized in topical sections on assisting users, malware detection, saving energy, policies, and problems in the cloud.

Tor Anonymity Network 101 - An Introduction to The Most Private Part of The Internet (Paperback): Steven Gates Tor Anonymity Network 101 - An Introduction to The Most Private Part of The Internet (Paperback)
Steven Gates
R637 Discovery Miles 6 370 Ships in 10 - 15 working days
Information Security and Cryptology - ICISC 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised... Information Security and Cryptology - ICISC 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers (Paperback, 2011)
Kyung-Hyune Rhee, DaeHun Nyang
R1,605 Discovery Miles 16 050 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2010. The 28 revised full papers presented were carefully selected from 99 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on cryptanalysis, cryptographic algorithms, implementation, network and mobile security, symmetric key cryptography, cryptographic protocols, and side channel attack.

Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December... Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010, Proceedings (Paperback, Edition.)
Guang Gong, Kishan Chand Gupta
R1,584 Discovery Miles 15 840 Ships in 10 - 15 working days

Strong Pseudorandompermutations or SPRPs,which were introduced byLuby andRacko? [4], formalize the well established cryptographic notion ofblock ciphers.They provided a construction of SPRP, well known as LRconstruction, which was motivated by the structure of DES[6].The basicbuildingblock is the so called 2n-bit Feistel permutation (or LR round permutation) LR based F K on an n-bitpseudorandomfunction (PRF) F : K n LR (x ,x)=(F (x )?x ,x ),x ,x?{0,1} . F 1 2 K 1 2 1 1 2 K Theirconstruction consists (see Fig 1) offour rounds of Feistel permutations (or three rounds, for PRP), each round involves an application ofanindependent PRF(i.e.with independentrandomkeys K ,K ,K , and K ). More precisely, 1 2 3 4 LR and LR are PRP and SPRP respectively where K ,K ,K K ,K ,K ,K 1 2 3 1 2 3 4 LR := LR := LR (...(LR (*))...). K ,...,K F ,...,F F F 1 r K K K K r r 1 1 After this work, many results are known improvingperformance (reducingthe number of invocations of F )[5] and reducingthekey-sizes (i.e. reusingthe K roundkeys [7,8,10,12,11] orgenerate more keysfromsinglekey by usinga PRF[2]). However there are some limitations.Forexample,wecannotuseas few as single-keyLR (unless wetweak the roundpermutation) orasfew as two-roundsince they are not secure. Distinguishing attacks forsome other LR constructionsarealso known [8]. We list some oftheknow related results (see Table 1). Here all keys K ,K ,...are independently chosen.

Kali linux - learn now how kali linux works, how hacking with kali linux with this step by step guide for beginners and which... Kali linux - learn now how kali linux works, how hacking with kali linux with this step by step guide for beginners and which tools you need to hack + practical exercises (Paperback)
Adam Harris
R459 Discovery Miles 4 590 Ships in 10 - 15 working days
Is the consumer willing to adopt the innovative cryptocurrency Bitcoin as a payment method? (Paperback): Liutauras Rokas Is the consumer willing to adopt the innovative cryptocurrency Bitcoin as a payment method? (Paperback)
Liutauras Rokas
R1,632 R1,532 Discovery Miles 15 320 Save R100 (6%) Ships in 10 - 15 working days
TLS Mastery (Paperback, Tux ed.): Michael W Lucas TLS Mastery (Paperback, Tux ed.)
Michael W Lucas
R776 R672 Discovery Miles 6 720 Save R104 (13%) Ships in 10 - 15 working days
The Design of Rijndael - The Advanced Encryption Standard (AES) (Paperback, 2nd ed. 2020): Joan Daemen, Vincent Rijmen The Design of Rijndael - The Advanced Encryption Standard (AES) (Paperback, 2nd ed. 2020)
Joan Daemen, Vincent Rijmen
R4,741 Discovery Miles 47 410 Ships in 10 - 15 working days

An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.

Time Override - Prophetic Images from the Future Decoded (Paperback): Dylan Clearfield Time Override - Prophetic Images from the Future Decoded (Paperback)
Dylan Clearfield
R540 R442 Discovery Miles 4 420 Save R98 (18%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CASP+ Advanced Security Practitioner…
J. T. Parker Paperback R775 Discovery Miles 7 750
Tribe of Hackers Security Leaders…
M. J. Carey Paperback R457 Discovery Miles 4 570
The Political Economy and Feasibility of…
Spencer J. Pack Hardcover R2,907 Discovery Miles 29 070
Cybersecurity and Third-Party Risk
GC Rasner Paperback R773 Discovery Miles 7 730
Hacking Connected Cars - Tactics…
A. Knight Paperback R893 Discovery Miles 8 930
Digital Watermarking and Steganography…
Frank Y. Shih Hardcover R3,093 Discovery Miles 30 930
Threat Hunting in the Cloud - Defending…
C Peiris Paperback R895 Discovery Miles 8 950
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,361 Discovery Miles 33 610
CSS in easy steps
Mike McGrath Paperback R420 R336 Discovery Miles 3 360
The Art of Deception - Controlling the…
KD Mitnick Paperback R378 R259 Discovery Miles 2 590

 

Partners