0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (12)
  • R250 - R500 (86)
  • R500+ (1,344)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

IT Security Interviews Exposed - Secrets to Landing Your Next Information Security Job (Paperback): C. Butler IT Security Interviews Exposed - Secrets to Landing Your Next Information Security Job (Paperback)
C. Butler
R653 R561 Discovery Miles 5 610 Save R92 (14%) Ships in 12 - 19 working days

* Technology professionals seeking higher-paying security jobs need to know security fundamentals to land the job-and this book will help * Divided into two parts: how to get the job and a security crash course to prepare for the job interview * Security is one of today's fastest growing IT specialties, and this book will appeal to technology professionals looking to segue to a security-focused position * Discusses creating a resume, dealing with headhunters, interviewing, making a data stream flow, classifying security threats, building a lab, building a hacker's toolkit, and documenting work * The number of information security jobs is growing at an estimated rate of 14 percent a year, and is expected to reach 2.1 million jobs by 2008

Information Security Management Metrics - A Definitive Guide to Effective Security Monitoring and Measurement (Hardcover):... Information Security Management Metrics - A Definitive Guide to Effective Security Monitoring and Measurement (Hardcover)
CISM, W. Krag Brotby
R2,593 Discovery Miles 25 930 Ships in 12 - 19 working days

Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations. The 20/20 hindsight of audits is no longer an effective solution to security weaknesses, and the necessity for real-time strategic metrics has never been more critical. Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement offers a radical new approach for developing and implementing security metrics essential for supporting business activities and managing information risk. This work provides anyone with security and risk management responsibilities insight into these critical security questions:How secure is my organization? How much security is enough? What are the most cost-effective security solutions? How secure is my organization? You can't manage what you can't measure This volume shows readers how to develop metrics that can be used across an organization to assure its information systems are functioning, secure, and supportive of the organization's business objectives. It provides a comprehensive overview of security metrics, discusses the current state of metrics in use today, and looks at promising new developments. Later chapters explore ways to develop effective strategic and management metrics for information security governance, risk management, program implementation and management, and incident management and response. The book ensures that every facet of security required by an organization is linked to business objectives, and provides metrics to measure it. Case studies effectively demonstrate specific ways that metrics can be implemented across an enterprise to maximize business benefit. With three decades of enterprise information security experience, author Krag Brotby presents a workable approach to developing and managing cost-effective enterprise information security.

Security without Obscurity - A Guide to Cryptographic Architectures (Paperback): Jeff Stapleton Security without Obscurity - A Guide to Cryptographic Architectures (Paperback)
Jeff Stapleton
R1,455 Discovery Miles 14 550 Ships in 12 - 19 working days

Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use.

Disappearing Cryptography - Information Hiding: Steganography and Watermarking (Paperback, 3rd edition): Peter Wayner Disappearing Cryptography - Information Hiding: Steganography and Watermarking (Paperback, 3rd edition)
Peter Wayner
R1,474 Discovery Miles 14 740 Ships in 12 - 19 working days

Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactions that take place daily on programs like iTunes.
This new edition of our best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files. These methods include encryption, compression, data embedding and watermarking, data mimicry, and scrambling. During the last 5 years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this edition has amended and expanded outdated sections in accordance with new dangers, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the evolved forms of attack.
Each chapter is divided into sections, first providing an introduction and high-level summary for those who wish to understand theconcepts without wading through technical explanations, and then presenting concrete examples and greater detail for those who want to write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also consider probable future developments in their designs, thus fulfilling the need for preemptive caution that is becoming ever more explicit as the transference of digital media escalates.
* Includes 5 completely new chapters that delineate the most current and sophisticated cryptographic algorithms, allowing readers to protect their information against even the most evolved electronic attacks.
* Conceptual tutelage in conjunction with detailed mathematical directives allows the reader to not only understand encryption procedures, but also to write programs which anticipate future security developments in their design.
* Grants the reader access to online source code which can be used to directly implement proven cryptographic procedures such as data mimicry and reversible grammar generation into their own work.

Information Assurance Architecture (Hardcover): Keith D. Willett Information Assurance Architecture (Hardcover)
Keith D. Willett
R4,085 Discovery Miles 40 850 Ships in 12 - 19 working days

"Safeguard Your Organization's Information!"

Now that information has become the lifeblood of your organization, you must be especially vigilant about assuring it. The hacker, spy, or cyber-thief of today can breach any barrier if it remains unchanged long enough or has even the tiniest leak. In Information Assurance Architecture, Keith D. Willett draws on his over 25 years of technical, security, and business experience to provide a framework for organizations to align information assurance with the enterprise and their overall mission.

"The Tools to Protect Your Secrets from Exposure"

This work provides the security industry with the know-how to create a formal information assurance architecture that complements an enterprise architecture, systems engineering, and the enterprise life cycle management (ELCM). Information Assurance Architecture consists of a framework, a process, and many supporting tools, templates and methodologies. The framework provides a reference model for the consideration of security in many contexts and from various perspectives; the process provides direction on how to apply that framework. Mr. Willett teaches readers how to identify and use the right tools for the right job. Furthermore, he demonstrates a disciplined approach in thinking about, planning, implementing and managing security, emphasizing that solid solutions can be made impenetrable when they are seamlessly integrated with the whole of an enterprise.

"Understand the Enterprise Context"

This book covers many information assurance subjects, including disaster recovery and firewalls. The objective is to present security services and security mechanisms in the context of informationassurance architecture, and in an enterprise context of managing business risk. Anyone who utilizes the concepts taught in these pages will find them to be a valuable weapon in the arsenal of information protection.

Power and Security in the Information Age - Investigating the Role of the State in Cyberspace (Hardcover, New Ed): Myriam Dunn... Power and Security in the Information Age - Investigating the Role of the State in Cyberspace (Hardcover, New Ed)
Myriam Dunn Cavelty, Victor Mauer
R4,473 Discovery Miles 44 730 Ships in 12 - 19 working days

The marriage of computers and telecommunications, the integration of these technologies into a multimedia system of communication that has global reach, and the fact that they are available worldwide at low cost seems to be bringing about a fundamental transformation in the way humans communicate and interact. But however much consensus there may be on the growing importance of information technology today, agreement is far more elusive when it comes to pinning down the impact of this development on security issues.This volume focuses on the role of the state in defending against cyber-threats and in securing the information age. The notion that is most uncritically accepted within the overall information security debate is that state power is eroding due to the effects of information and communication technology and that the state is unable to provide security in the information age. This volume challenges the unidimensionality of this statement. Without denying that new challenges for the state have arisen, authors in this volume argue that too much credence is often given to the spectre of an erosion of sovereignty.Written by scholars in international relations, the manuscript is captivating with the significance and actuality of the issues discussed, and the logical, knowledgeable, and engaged manner of presenting the issues. The essays intrigue and provoke with a number of fresh hypotheses, observations, and suggestions and contribute to mapping the diverse layers, actors, approaches, and policies of the cybersecurity realm.

Guide to Pairing-Based Cryptography (Paperback): Nadia El Mrabet, Marc Joye Guide to Pairing-Based Cryptography (Paperback)
Nadia El Mrabet, Marc Joye
R1,612 Discovery Miles 16 120 Ships in 12 - 19 working days

This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to Pairing-Based Cryptography offers an overview of the most recent developments in optimizations for pairing implementation. Each chapter includes a presentation of the problem it discusses, the mathematical formulation, a discussion of implementation issues, solutions accompanied by code or pseudocode, several numerical results, and references to further reading and notes. Intended as a self-contained handbook, this book is an invaluable resource for computer scientists, applied mathematicians and security professionals interested in cryptography.

The History of Information Security - A Comprehensive Handbook (Hardcover): Karl Maria Michael De Leeuw, Jan Bergstra The History of Information Security - A Comprehensive Handbook (Hardcover)
Karl Maria Michael De Leeuw, Jan Bergstra
R5,050 Discovery Miles 50 500 Ships in 12 - 19 working days

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.
The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas other aspects have remained largely uncovered.
There has never been any effort to write a comprehensive history. This is most unfortunate, because Information Security should be perceived as a set of communicating vessels, where technical innovations can make existing legal or organisational frame-works obsolete and a breakdown of political authority may cause an exclusive reliance on technical means.
This book is intended as a first field-survey. It consists of twenty-eight contributions, written by experts in such diverse fields as computer science, law, or history and political science, dealing with episodes, organisations and technical developments that may considered to be exemplary or have played a key role in the development of this field.
These include: the emergence of cryptology as a discipline during the Renaissance, the Black Chambers in 18th century Europe, the breaking of German military codes during World War II, the histories of the NSA and its Soviet counterparts and contemporary cryptology. Other subjects are: computer security standards, viruses and worms on the Internet, computer transparency and free software, computer crime, export regulations for encryption software and the privacy debate.
- Interdisciplinary coverage of the history Information Security
- Written by top experts in law, history, computer and information science
- First comprehensive work in Information Security

Security in Distributed, Grid, Mobile, and Pervasive Computing (Hardcover): Yang Xiao Security in Distributed, Grid, Mobile, and Pervasive Computing (Hardcover)
Yang Xiao
R2,864 R2,648 Discovery Miles 26 480 Save R216 (8%) Ships in 12 - 19 working days

Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. A rich and useful presentation of strategies for security issues, the book covers each computing area in separate sections. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks, covering wireless authentication methods, secure data aggregation, and anonymous routing protocol. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security. With more and more vital information stored on computers, security professionals need to know how to combat threats and complications. Offering strategies to tackle these issues, this book provides essential security information for researchers, practitioners, educators, and graduate students in the field.

Computer Forensics - Evidence Collection and Management (Hardcover, illustrated edition): Robert C. Newman Computer Forensics - Evidence Collection and Management (Hardcover, illustrated edition)
Robert C. Newman
R3,007 Discovery Miles 30 070 Ships in 12 - 19 working days

Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and networking environments and presents techniques and suggestions for corporate security personnel, investigators, and forensic examiners to successfully identify, retrieve, and protect valuable forensic evidence for litigation and prosecution. The book is divided into two major parts for easy reference. The first part explores various crimes, laws, policies, forensic tools, and the information needed to understand the underlying concepts of computer forensic investigations. The second part presents information relating to crime scene investigations and management, disk and file structure, laboratory construction and functions, and legal testimony. Separate chapters focus on investigations involving computer systems, e-mail, and wireless devices. Presenting information patterned after technical, legal, and managerial classes held by computer forensic professionals from Cyber Crime Summits held at Kennesaw State University in 2005 and 2006, this book is an invaluable resource for those who want to be both efficient and effective when conducting an investigation.

Eleventh Hour CISSP (R) - Study Guide (Paperback, 3rd edition): Eric Conrad, Seth Misenar, Joshua Feldman Eleventh Hour CISSP (R) - Study Guide (Paperback, 3rd edition)
Eric Conrad, Seth Misenar, Joshua Feldman
R747 Discovery Miles 7 470 Ships in 12 - 19 working days

Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. This new third edition is aligned to cover all of the material in the most current version of the exam's Common Body of Knowledge. All domains are covered as completely and concisely as possible, giving users the best possible chance of acing the exam.

Complete Guide to CISM Certification (Hardcover): Thomas R. Peltier, Justin Peltier Complete Guide to CISM Certification (Hardcover)
Thomas R. Peltier, Justin Peltier
R3,104 Discovery Miles 31 040 Ships in 12 - 19 working days

The Certified Information Security Manager(R)(CISM(R)) certification program was developed by the Information Systems Audit and Controls Association (ISACA(R)). It has been designed specifically for experienced information security managers and those who have information security management responsibilities. The Complete Guide to CISM(R) Certification examines five functional areas-security governance, risk management, information security program management, information security management, and response management.

Presenting definitions of roles and responsibilities throughout the organization, this practical guide identifies information security risks. It deals with processes and technical solutions that implement the information security governance framework, focuses on the tasks necessary for the information security manager to effectively manage information security within an organization, and provides a description of various techniques the information security manager can use. The book also covers steps and solutions for responding to an incident. At the end of each key area, a quiz is offered on the materials just presented. Also included is a workbook to a thirty-question final exam.

Complete Guide to CISM(R) Certification describes the tasks performed by information security managers and contains the necessary knowledge to manage, design, and oversee an information security program. With definitions and practical examples, this text is ideal for information security managers, IT auditors, and network and system administrators.

Practical Hacking Techniques and Countermeasures (Paperback): Mark D Spivey Practical Hacking Techniques and Countermeasures (Paperback)
Mark D Spivey
R3,131 Discovery Miles 31 310 Ships in 12 - 19 working days

Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws. Written in a lab manual style, the book begins with the installation of the VMware(R) Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks. Learn how to secure your computers with this comprehensive guide on hacking techniques and countermeasures By understanding how an attack occurs the reader can better understand how to defend against it. This book shows how an attack is conceptualized, formulated, and performed. It offers valuable information for constructing a system to defend against attacks and provides a better understanding of securing your own computer or corporate network.

Digital Rights Management - Protecting and Monetizing Content (Paperback): Joan Van Tassel Digital Rights Management - Protecting and Monetizing Content (Paperback)
Joan Van Tassel
R1,622 Discovery Miles 16 220 Ships in 12 - 19 working days

Digital rights management (DRM) is a type of server software developed to enable secure distribution - and perhaps more importantly, to disable illegal distribution - of paid content over the Web. DRM technologies are being developed as a means of protection against the online piracy of commercially marketed material, which has proliferated through the widespread use of Napster and other peer-to-peer file exchange programs.
With the flourish of these file exchange programs, content owners, creators and producers need to have a plan to distribute their content digitally and protect it at the same time-a seemingly impossible task. There are numerous books dealing with copyright, eBusiness, the Internet, privacy, security, content management, and related technical subjects. Additionally, there are several research papers, and almost daily newspaper and magazine articles dealing with digital piracy. However, there are only a few books and documents that bring these together as a basis for profitable exchange of digital content. Digital Rights Management can help content providers make money by unifying the confusing array of concepts that swirl around current presentations of DRM in newspapers and business publications.
* Learn from an award winning author and Emmy nominee
* Perfect for the non-technical decision maker, content owner or DRM implementation manager
* Details all the options from legal to technical

Protecting Critical Infrastructures Against Cyber-Attack (Paperback): Stephen Lukasik Protecting Critical Infrastructures Against Cyber-Attack (Paperback)
Stephen Lukasik
R876 Discovery Miles 8 760 Ships in 12 - 19 working days

The threat that is posed by 'cyber warriors' is illustrated by recent incidents such as the Year 2000 'Millennium bug'. Strategies to reduce the risk that cyber attack poses, at both individual and national level, are described and compared with the actions being taken by a number of Western governments.

Investigator's Guide to Steganography (Hardcover): Gregory Kipper Investigator's Guide to Steganography (Hardcover)
Gregory Kipper
R3,069 Discovery Miles 30 690 Ships in 12 - 19 working days

Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable reference source for the tools and techniques of steganography.

The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future.

It is an informative and entertaining resource that effectively communicates a general understanding of this complex field.

Critical Incident Management (Hardcover, New): Alan B. Sterneckert Critical Incident Management (Hardcover, New)
Alan B. Sterneckert
R3,925 Discovery Miles 39 250 Ships in 12 - 19 working days

Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they have taken to secure people, information and infrastructure from outside attacks are inefficient or incomplete. Responding to security threats and incidents requires a competent mixture of risk management, security policies and procedures, security auditing, incident response, legal and law enforcement issues, and privacy.

Critical Incident Management presents an expert overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations. Written in a concise, practical style that emphasizes key points, this guide focuses on the establishment of policies and actions that prevent the loss of critical information or damage to infrastructure.

CTOs, CFOs, Chief Legal Officers, and senior IT managers can rely on this book to develop plans that thwart critical security incidents. And if such incidents do occur, these executives will have a reference to help put the people and procedures in place to contain the damage and get back to business.

IAPP CIPM Certified Information Privacy Manager St udy Guide (Paperback): Chapple IAPP CIPM Certified Information Privacy Manager St udy Guide (Paperback)
Chapple
R1,191 R1,089 Discovery Miles 10 890 Save R102 (9%) Ships in 12 - 19 working days

An essential resource for anyone preparing for the CIPM certification exam and a career in information privacy As cybersecurity and privacy become ever more important to the long-term viability and sustainability of enterprises in all sectors, employers and professionals are increasingly turning to IAPP's trusted and recognized Certified Information Privacy Manager qualification as a tried-and-tested indicator of information privacy management expertise. In IAPP CIPM Certified Information Privacy Manager Study Guide, a team of dedicated IT and privacy management professionals delivers an intuitive roadmap to preparing for the CIPM certification exam and for a new career in the field of information privacy. Make use of pre-assessments, the Exam Essentials feature, and chapter review questions with detailed explanations to gauge your progress and determine where you're proficient and where you need more practice. In the book, you'll find coverage of every domain tested on the CIPM exam and those required to succeed in your first--or your next--role in a privacy-related position. You'll learn to develop a privacy program and framework, as well as manage the full privacy program operational lifecycle, from assessing your organization's needs to responding to threats and queries. The book also includes: A head-start to obtaining an in-demand certification used across the information privacy industry Access to essential information required to qualify for exciting new career opportunities for those with a CIPM credential Access to the online Sybex learning environment, complete with two additional practice tests, chapter review questions, an online glossary, and hundreds of electronic flashcards for efficient studying An essential blueprint for success on the CIPM certification exam, IAPP CIPM Certified Information Privacy Manager Study Guide will also ensure you hit the ground running on your first day at a new information privacy-related job.

Multimedia Data Hiding (Hardcover, 2003 ed.): Min Wu, Bede Liu Multimedia Data Hiding (Hardcover, 2003 ed.)
Min Wu, Bede Liu
R2,889 Discovery Miles 28 890 Ships in 10 - 15 working days

With the advances of the digital information revolution and the societal changes they have prompted, it has become critical to facilitate secure management of content usage and delivery across communication networks. Data hiding and digital watermarking are promising new technologies for multimedia information protection and rights management. Multimedia Data Hiding addresses the theory, methods, and design of multimedia data hiding and its application to multimedia rights management, information security, and communication. It offers theoretical and practical aspects, and both design and attack problems. Applications discussed include: annotation, tamper detection, copy/access control, fingerprinting, and ownership protection. Countermeasures for attacks on data hiding are discussed, and a chapter assesses attack problems on digital music protection under a unique competitive environment. Topics and features: * Comprehensive and practical coverage of data hiding for various media types, including binary image, grayscale and color images and video, and audio * Provides unique analysis of problems and solutions, such as data hiding in binary signature and generic binary documents, block concealment attacks, and attacks on audio watermarking * Authoritative discussion and analysis of data hiding and effective countermeasures, supported by concrete application examples * Accessible, well-organized progression from the fundamentals to specific approaches to various data-hiding problems This work offers a state-of-the-art presentation covering theoretical, algorithmic, and design topics for digital content/data security protection, and rights management. It is an essential resource for multimedia security researchers and professionals in electrical engineering, computer science, IT, and digital rights management.

Practical Cryptography (Hardcover): Jamie White Practical Cryptography (Hardcover)
Jamie White
R3,565 R3,219 Discovery Miles 32 190 Save R346 (10%) Ships in 10 - 15 working days
Information Security Policies, Procedures and Standards - Guidelines for Effective Information Security Management (Paperback):... Information Security Policies, Procedures and Standards - Guidelines for Effective Information Security Management (Paperback)
Thomas R. Peltier
R2,985 Discovery Miles 29 850 Ships in 12 - 19 working days

By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management provides the tools you need to select, develop, and apply a security program that will be seen not as a nuisance but as a means to meeting your organization's goals.

Divided into three major sections, the book covers: writing policies, writing procedures, and writing standards. Each section begins with a definition of terminology and concepts and a presentation of document structures. You can apply each section separately as needed, or you can use the entire text as a whole to form a comprehensive set of documents. The book contains checklists, sample policies, procedures, standards, guidelines, and a synopsis of British Standard 7799 and ISO 17799.

Peltier provides you with the tools you need to develop policies, procedures, and standards. He demonstrates the importance of a clear, concise, and well-written security program. His examination of recommended industry best practices illustrates how they can be customized to fit any organization's needs. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management helps you create and implement information security procedures that will improve every aspect of your enterprise's activities.

Fully Homomorphic Encryption in Real World Applications (Hardcover, 1st ed. 2019): Ayantika Chatterjee, Khin Mi Mi Aung Fully Homomorphic Encryption in Real World Applications (Hardcover, 1st ed. 2019)
Ayantika Chatterjee, Khin Mi Mi Aung
R4,233 Discovery Miles 42 330 Ships in 12 - 19 working days

This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the 'cloud'. The book begins by addressing perennial problems like sorting and searching through FHE data, followed by a detailed discussion of the basic components of any algorithm and adapting them to handle FHE data. In turn, the book focuses on algorithms in both non-recursive and recursive versions and discusses their realizations and challenges while operating in the FHE domain on existing unencrypted processors. It highlights potential complications and proposes solutions for encrypted database design with complex queries, including the basic design details of an encrypted processor architecture to support FHE operations in real-world applications.

Cryptography In The Information Society (Hardcover): Boris Ryabko, Andrey Fionov Cryptography In The Information Society (Hardcover)
Boris Ryabko, Andrey Fionov
R2,330 Discovery Miles 23 300 Ships in 10 - 15 working days

This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians. The topics addressed include block ciphers, stream ciphers, public key encryption, digital signatures, cryptographic protocols, elliptic curve cryptography, theoretical security, blockchain and cryptocurrencies, issues concerning random numbers, and steganography. The key results discussed in each chapter are mathematically proven, and the methods are described in sufficient detail to enable their computational implementation. Exercises are provided.

The International Handbook of Computer Security (Hardcover): Jae Shim, Anique A. Qureshi, Joel G Siegel The International Handbook of Computer Security (Hardcover)
Jae Shim, Anique A. Qureshi, Joel G Siegel
R4,785 Discovery Miles 47 850 Ships in 12 - 19 working days

"The International Handbook of Computer Security" is designed to help information systems/computer professionals as well as business executives protect computer systems and data from a myriad of internal and external threats. The book addresses a wide range of computer security issues. It is intended to provide practical and thorough guidance in what often seems a quagmire of computers, technology, networks, and software.
Major topics discussed are: security policies; physical security procedures; data preservation and protection; hardware and software protection and security; personnel management and security; network security, internal and external systems; contingency planning; legal and auditing planning and control.

Random Numbers and Computers (Hardcover, 1st ed. 2018): Ronald T. Kneusel Random Numbers and Computers (Hardcover, 1st ed. 2018)
Ronald T. Kneusel
R2,161 Discovery Miles 21 610 Ships in 10 - 15 working days

This book covers pseudorandom number generation algorithms, evaluation techniques, and offers practical advice and code examples. Random Numbers and Computers is an essential introduction or refresher on pseudorandom numbers in computer science. The first comprehensive book on the topic, readers are provided with a practical introduction to the techniques of pseudorandom number generation, including how the algorithms work and how to test the output to decide if it is suitable for a particular purpose. Practical applications are demonstrated with hands-on presentation and descriptions that readers can apply directly to their own work. Examples are in C and Python and given with an emphasis on understanding the algorithms to the point of practical application. The examples are meant to be implemented, experimented with and improved/adapted by the reader.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Computational Electrodynamics - The…
Allen Taflove Hardcover R4,959 Discovery Miles 49 590
Signal Processing in Medicine and…
Iyad Obeid, Ivan Selesnick, … Hardcover R3,558 Discovery Miles 35 580
Artificial Intelligence for .NET…
Nishith Pathak Paperback R2,642 Discovery Miles 26 420
Object-Oriented Game Development
Julian Gold Paperback R2,247 R1,778 Discovery Miles 17 780
Set Theory for Computing - From Decision…
Domenico Cantone Hardcover R4,426 Discovery Miles 44 260
A Proof Theory for General Unification
W Snyder Hardcover R1,627 Discovery Miles 16 270
Applied Scientific Computing - With…
Peter R. Turner, Thomas Arildsen, … Hardcover R1,549 Discovery Miles 15 490
Programming Logic & Design…
Joyce Farrell Paperback R1,336 R1,239 Discovery Miles 12 390
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,045 Discovery Miles 10 450
Data Structures and Algorithms in Java…
Peter Drake Paperback R2,543 Discovery Miles 25 430

 

Partners