0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (16)
  • R250 - R500 (93)
  • R500+ (1,420)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Information Security and Cryptology - ICISC 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised... Information Security and Cryptology - ICISC 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers (Paperback, 2011)
Kyung-Hyune Rhee, DaeHun Nyang
R1,567 Discovery Miles 15 670 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2010. The 28 revised full papers presented were carefully selected from 99 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on cryptanalysis, cryptographic algorithms, implementation, network and mobile security, symmetric key cryptography, cryptographic protocols, and side channel attack.

Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December... Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010, Proceedings (Paperback, Edition.)
Guang Gong, Kishan Chand Gupta
R1,546 Discovery Miles 15 460 Ships in 10 - 15 working days

Strong Pseudorandompermutations or SPRPs,which were introduced byLuby andRacko? [4], formalize the well established cryptographic notion ofblock ciphers.They provided a construction of SPRP, well known as LRconstruction, which was motivated by the structure of DES[6].The basicbuildingblock is the so called 2n-bit Feistel permutation (or LR round permutation) LR based F K on an n-bitpseudorandomfunction (PRF) F : K n LR (x ,x)=(F (x )?x ,x ),x ,x?{0,1} . F 1 2 K 1 2 1 1 2 K Theirconstruction consists (see Fig 1) offour rounds of Feistel permutations (or three rounds, for PRP), each round involves an application ofanindependent PRF(i.e.with independentrandomkeys K ,K ,K , and K ). More precisely, 1 2 3 4 LR and LR are PRP and SPRP respectively where K ,K ,K K ,K ,K ,K 1 2 3 1 2 3 4 LR := LR := LR (...(LR (*))...). K ,...,K F ,...,F F F 1 r K K K K r r 1 1 After this work, many results are known improvingperformance (reducingthe number of invocations of F )[5] and reducingthekey-sizes (i.e. reusingthe K roundkeys [7,8,10,12,11] orgenerate more keysfromsinglekey by usinga PRF[2]). However there are some limitations.Forexample,wecannotuseas few as single-keyLR (unless wetweak the roundpermutation) orasfew as two-roundsince they are not secure. Distinguishing attacks forsome other LR constructionsarealso known [8]. We list some oftheknow related results (see Table 1). Here all keys K ,K ,...are independently chosen.

Kali linux - learn now how kali linux works, how hacking with kali linux with this step by step guide for beginners and which... Kali linux - learn now how kali linux works, how hacking with kali linux with this step by step guide for beginners and which tools you need to hack + practical exercises (Paperback)
Adam Harris
R448 Discovery Miles 4 480 Ships in 10 - 15 working days
Is the consumer willing to adopt the innovative cryptocurrency Bitcoin as a payment method? (Paperback): Liutauras Rokas Is the consumer willing to adopt the innovative cryptocurrency Bitcoin as a payment method? (Paperback)
Liutauras Rokas
R1,592 R1,496 Discovery Miles 14 960 Save R96 (6%) Ships in 10 - 15 working days
TLS Mastery (Paperback, Tux ed.): Michael W Lucas TLS Mastery (Paperback, Tux ed.)
Michael W Lucas
R757 R656 Discovery Miles 6 560 Save R101 (13%) Ships in 10 - 15 working days
The Design of Rijndael - The Advanced Encryption Standard (AES) (Paperback, 2nd ed. 2020): Joan Daemen, Vincent Rijmen The Design of Rijndael - The Advanced Encryption Standard (AES) (Paperback, 2nd ed. 2020)
Joan Daemen, Vincent Rijmen
R4,627 Discovery Miles 46 270 Ships in 10 - 15 working days

An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.

Time Override - Prophetic Images from the Future Decoded (Paperback): Dylan Clearfield Time Override - Prophetic Images from the Future Decoded (Paperback)
Dylan Clearfield
R527 R431 Discovery Miles 4 310 Save R96 (18%) Ships in 10 - 15 working days
Beginning Ethereum and Solidity with React (Paperback): Greg Lim Beginning Ethereum and Solidity with React (Paperback)
Greg Lim
R429 R351 Discovery Miles 3 510 Save R78 (18%) Ships in 10 - 15 working days
Puzzles on Cypercrime and God's Mathematics (Paperback): John Ting Puzzles on Cypercrime and God's Mathematics (Paperback)
John Ting
R309 Discovery Miles 3 090 Ships in 10 - 15 working days
TLS Mastery (Hardcover): Michael W Lucas TLS Mastery (Hardcover)
Michael W Lucas
R1,021 R867 Discovery Miles 8 670 Save R154 (15%) Ships in 10 - 15 working days
Smiling Security - The Cybersecurity Manager's Road to Success (Paperback): Mikko Niemela, Pasi Koistinen Smiling Security - The Cybersecurity Manager's Road to Success (Paperback)
Mikko Niemela, Pasi Koistinen
R784 R650 Discovery Miles 6 500 Save R134 (17%) Ships in 10 - 15 working days
Limitations and Future Applications of Quantum Cryptography (Paperback): Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia,... Limitations and Future Applications of Quantum Cryptography (Paperback)
Neeraj Kumar, Alka Agrawal, Brijesh K. Chaurasia, Raees Ahmad Khan
R5,173 Discovery Miles 51 730 Ships in 10 - 15 working days

The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country's sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography. Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing.

TLS Mastery (Paperback, Beastie ed.): Michael W Lucas TLS Mastery (Paperback, Beastie ed.)
Michael W Lucas
R757 R656 Discovery Miles 6 560 Save R101 (13%) Ships in 10 - 15 working days
Fintech - Hacking, Blockchain, Big Data, Cryptocurrency (Paperback): Eliot P Reznor Fintech - Hacking, Blockchain, Big Data, Cryptocurrency (Paperback)
Eliot P Reznor
R816 R676 Discovery Miles 6 760 Save R140 (17%) Ships in 10 - 15 working days
Caesura in Cryptography [Paperback] - My first Workshop about Encryption - An Introduction with Teaching and Learning Material... Caesura in Cryptography [Paperback] - My first Workshop about Encryption - An Introduction with Teaching and Learning Material for School, University and Leisure. (Paperback)
Evelyn Ackermann, Michael Klein
R554 Discovery Miles 5 540 Ships in 12 - 17 working days
Data Security in Cloud Computing, Volume I (Paperback): Giulio D'Agostino Data Security in Cloud Computing, Volume I (Paperback)
Giulio D'Agostino
R1,193 R932 Discovery Miles 9 320 Save R261 (22%) Ships in 10 - 15 working days
Data Security in Cloud Computing, Volume II (Paperback): Giulio D'Agostino Data Security in Cloud Computing, Volume II (Paperback)
Giulio D'Agostino
R1,189 R927 Discovery Miles 9 270 Save R262 (22%) Ships in 10 - 15 working days
SSL/TLS Under Lock and Key - A Guide to Understanding SSL/TLS Cryptography (Paperback, Colour ed.): Hollie Acres SSL/TLS Under Lock and Key - A Guide to Understanding SSL/TLS Cryptography (Paperback, Colour ed.)
Hollie Acres; Paul Baka, Jeremy Schatten
R640 R527 Discovery Miles 5 270 Save R113 (18%) Ships in 10 - 15 working days
The Ransomware Threat Landscape - Prepare For, Recognise and Survive Ransomware Attacks (Paperback): IT Governance The Ransomware Threat Landscape - Prepare For, Recognise and Survive Ransomware Attacks (Paperback)
IT Governance
R629 Discovery Miles 6 290 Ships in 10 - 15 working days

The fastest-growing malware in the world The core functionality of ransomware is two-fold: to encrypt data and deliver the ransom message. This encryption can be relatively basic or maddeningly complex, and it might affect only a single device or a whole network. Ransomware is the fastest-growing malware in the world. In 2015, it cost companies around the world $325 million, which rose to $5 billion by 2017 and is set to hit $20 billion in 2021. The threat of ransomware is not going to disappear, and while the number of ransomware attacks remains steady, the damage they cause is significantly increasing. It is the duty of all business leaders to protect their organisations and the data they rely on by doing whatever is reasonably possible to mitigate the risk posed by ransomware. To do that, though, they first need to understand the threats they are facing. The Ransomware Threat Landscape This book sets out clearly how ransomware works, to help business leaders better understand the strategic risks, and explores measures that can be put in place to protect the organisation. These measures are structured so that any organisation can approach them. Those with more resources and more complex environments can build them into a comprehensive system to minimise risks, while smaller organisations can secure their profiles with simpler, more straightforward implementation. Suitable for senior directors, compliance managers, privacy managers, privacy officers, IT staff, security analysts and admin staff - in fact, all staff who use their organisation's network/online systems to perform their role - The Ransomware Threat Landscape - Prepare for, recognise and survive ransomware attacks will help readers understand the ransomware threat they face. From basic cyber hygiene to more advanced controls, the book gives practical guidance on individual activities, introduces implementation steps organisations can take to increase their cyber resilience, and explores why cyber security is imperative. Topics covered include: Introduction About ransomware Basic measures An anti-ransomware The control framework Risk management Controls Maturity Basic controls Additional controls for larger organisations Advanced controls Don't delay - start protecting your organisation from ransomware and buy this book today!

Quantum Cryptography and Secret-Key Distillation (Hardcover): Gilles van Assche Quantum Cryptography and Secret-Key Distillation (Hardcover)
Gilles van Assche
R2,754 Discovery Miles 27 540 Ships in 12 - 17 working days

Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This self-contained text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secret-key distillation. The book starts with an overview chapter, progressing to classical cryptography, information theory (classical and quantum), and applications of quantum cryptography. The discussion moves to secret-key distillation, privacy amplification and reconciliation techniques, concluding with the security principles of quantum cryptography. The author explains the physical implementation and security of these systems, enabling engineers to gauge the suitability of quantum cryptography for securing transmission in their particular application. With its blend of fundamental theory, implementation techniques, and details of recent protocols, this book will be of interest to graduate students, researchers, and practitioners in electrical engineering, physics, and computer science.

Impact of Digital Transformation on Security Policies and Standards (Paperback): Gunasekaran Manogaran, Bharath Bhushan, Sam... Impact of Digital Transformation on Security Policies and Standards (Paperback)
Gunasekaran Manogaran, Bharath Bhushan, Sam Goundar, Vaishali Ravindra Thakare
R5,017 Discovery Miles 50 170 Ships in 10 - 15 working days

Digital transformation is a revolutionary technology that will play a vital role in major industries, including global governments. These administrations are taking the initiative to incorporate digital programs with their objective being to provide digital infrastructure as a basic utility for every citizen, provide on demand services with superior governance, and empower their citizens digitally. However, security and privacy are major barriers in adopting these mechanisms, as organizations and individuals are concerned about their private and financial data. Impact of Digital Transformation on Security Policies and Standards is an essential research book that examines the policies, standards, and mechanisms for security in all types of digital applications and focuses on blockchain and its imminent impact on financial services in supporting smart government, along with bitcoin and the future of digital payments. Highlighting topics such as cryptography, privacy management, and e-government, this book is ideal for security analysts, data scientists, academicians, policymakers, security professionals, IT professionals, government officials, finance professionals, researchers, and students.

Shue's, CompTIA Security+, Exam SY0-601, Study Supplement (Paperback): Mark Schumacher Shue's, CompTIA Security+, Exam SY0-601, Study Supplement (Paperback)
Mark Schumacher
R686 Discovery Miles 6 860 Ships in 10 - 15 working days
Bitcoin - Invest In Digital Gold (Hardcover): Szabolcs Juhasz Bitcoin - Invest In Digital Gold (Hardcover)
Szabolcs Juhasz
R826 Discovery Miles 8 260 Ships in 10 - 15 working days
Transformation of Cryptography - Fundamental concepts of Encryption, Milestones, Mega-Trends and sustainable Change in regard... Transformation of Cryptography - Fundamental concepts of Encryption, Milestones, Mega-Trends and sustainable Change in regard to Secret Communications and its Nomenclatura (Paperback)
Linda A Bertram, Gunther Van Dooble
R262 Discovery Miles 2 620 Ships in 10 - 15 working days
Hacking for Beginners - Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security (Paperback): Richard... Hacking for Beginners - Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security (Paperback)
Richard Dorsel
R552 Discovery Miles 5 520 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Threat Hunting in the Cloud - Defending…
C Peiris Paperback R879 Discovery Miles 8 790
Insider Computer Fraud - An In-depth…
Kenneth Brancik Paperback R1,788 Discovery Miles 17 880
Tribe of Hackers Security Leaders…
M. J. Carey Paperback R448 Discovery Miles 4 480
The Political Economy and Feasibility of…
Spencer J. Pack Hardcover R2,851 Discovery Miles 28 510
Cybersecurity and Third-Party Risk
GC Rasner Paperback R759 Discovery Miles 7 590
Alice and Bob Learn Application Security
T Janca Paperback R885 Discovery Miles 8 850
Krypto-Mining fur Dummies
P. Kent Paperback R758 Discovery Miles 7 580
Official (ISC)2 (R) Guide to the CISSP…
Susan Hansche Hardcover R2,663 Discovery Miles 26 630
Technology for Success - Computer…
Mark Ciampa, Jill West, … Paperback  (1)
R1,190 R1,070 Discovery Miles 10 700
Kryptowahrungen fur Dummies
K Soeteman Paperback R426 Discovery Miles 4 260

 

Partners