0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (78)
  • R250 - R500 (115)
  • R500+ (1,462)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Implementing Computational Intelligence Techniques for Security Systems Design (Paperback): Yousif Abdullatif Albastaki, Wasan... Implementing Computational Intelligence Techniques for Security Systems Design (Paperback)
Yousif Abdullatif Albastaki, Wasan Awad
R3,569 Discovery Miles 35 690 Ships in 7 - 11 working days

Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms that take advantage of approaches based on computational intelligence techniques, such as genetic algorithms, genetic programming, and so on, have been proposed to solve these issues. Implementing Computational Intelligence Techniques for Security Systems Design is an essential research book that explores the application of computational intelligence and other advanced techniques in information security, which will contribute to a better understanding of the factors that influence successful security systems design. Featuring a range of topics such as encryption, self-healing systems, and cyber fraud, this book is ideal for security analysts, IT specialists, computer engineers, software developers, technologists, academicians, researchers, practitioners, and students.

Blockchain for Non IT Professionals - An Example Driven, Metaphorical Approach (Paperback): Srinivas Mahankali Blockchain for Non IT Professionals - An Example Driven, Metaphorical Approach (Paperback)
Srinivas Mahankali
R283 Discovery Miles 2 830 Ships in 7 - 11 working days
New Trends in Cryptographic Systems (Hardcover): Nadia Nedjah, Luiza Macedo Mourelle New Trends in Cryptographic Systems (Hardcover)
Nadia Nedjah, Luiza Macedo Mourelle
R4,978 R4,720 Discovery Miles 47 200 Save R258 (5%) Ships in 10 - 15 working days

Cryptography is the study of methods to transform information from its original comprehensible form into a scrambled incomprehensible form, such that its content can only be disclosed to some qualified persons. In the past, cryptography helped ensure secrecy in important communications, such as those of spies, military leaders, and diplomats. In recent decades, it has expanded in two main ways: firstly, it provides mechanisms for more than just keeping secrets through schemes like digital signatures, digital cash, etc; secondly, cryptography is used by almost all computer users as it is embedded into the infrastructure for computing and telecommunications. Cryptography ensures secure communications through confidentiality, integrity, authenticity and non-repudiation. Cryptography has evolved over the years from Julius Cesar's cipher, which simply shifts the letters of the words a fixed number of times, to the sophisticated RSA algorithm, which was invented by Ronald L. Rivest, Adi Shamir and Leonard M. Adleman, and the elegant AES cipher (Advanced Encryption Standard), which was invented by Joan Daemen and Vincent Rijmen. The need for fast but secure cryptographic systems is growing bigger. Therefore, dedicated hardware for cryptography is becoming a key issue for designers. With the spread of reconfigurable hardware such as FPGAs, embedded cryptographic hardware became cost-effective. Nevertheless, it is worthy to note that nowadays, even hardwired cryptographic algorithms are not safe. Attacks based on power consumption and electromagnetic Analysis, such as SPA, DPA and EMA have been successfully used to retrieve secret information stored in cryptographic devices. Besides performance in terms of area and throughput, designer of embedded cryptographic hardware must worry about the leakage of their implementations. The content of this book is divided into three main parts, which are focused on new trends in cryptographic hardware, arithmetic and factoring.

Cybersecurity & Homeland Security (Paperback): Lin V. Choi Cybersecurity & Homeland Security (Paperback)
Lin V. Choi
R1,894 R1,477 Discovery Miles 14 770 Save R417 (22%) Ships in 10 - 15 working days

Even before the terrorist attacks of September 2001, concerns had been rising among security experts about the vulnerabilities to attack of computer systems and associated infrastructure. Yet, despite increasing attention from federal and state governments and international organisations, the defence against attacks on these systems has appeared to be generally fragmented and varying widely in effectiveness. Concerns have grown that what is needed is a national cybersecurity framework -- a co-ordinated, coherent set of public- and private-sector efforts required to ensure an acceptable level of cybersecurity for the nation. As commonly used, cybersecurity refers to three things: measures to protect information technology; the information it contains, processes, and transmits, and associated physical and virtual elements (which together comprise cyberspace); the degree of protection resulting from application of those measures; and the associated field of professional endeavour. Virtually any element of cyberspace can be at risk, and the degree of interconnection of those elements can make it difficult to determine the extent of the cybersecurity framework that is needed. Identifying the major weaknesses in U.S. cybersecurity is an area of some controversy. However, some components appear to be sources of potentially significant risk because either major vulnerabilities have been identified or substantial impacts could result from a successful attack -- in particular, components that play critical roles in elements of critical infrastructure, widely used commercial software, organisational governance, and the level of public knowledge and perception about cybersecurity. There are several options for broadly addressing weaknesses in cybersecurity. They include adopting standards and certification, promulgating best practices and guidelines, using benchmarks and checklists, use of auditing, improving training and education, building security into enterprise architecture, using risk management, and using metrics. These different approaches all have different strengths and weaknesses with respect to how they might contribute to the development of a national framework for cybersecurity. None of them are likely to be widely adopted in the absence of sufficient economic incentives for cybersecurity.

Is the consumer willing to adopt the innovative cryptocurrency Bitcoin as a payment method? (Paperback): Liutauras Rokas Is the consumer willing to adopt the innovative cryptocurrency Bitcoin as a payment method? (Paperback)
Liutauras Rokas
R1,269 R1,179 Discovery Miles 11 790 Save R90 (7%) Ships in 7 - 11 working days
Random Numbers and Computers (Hardcover, 1st ed. 2018): Ronald T. Kneusel Random Numbers and Computers (Hardcover, 1st ed. 2018)
Ronald T. Kneusel
R1,523 R1,348 Discovery Miles 13 480 Save R175 (11%) Ships in 10 - 15 working days

This book covers pseudorandom number generation algorithms, evaluation techniques, and offers practical advice and code examples. Random Numbers and Computers is an essential introduction or refresher on pseudorandom numbers in computer science. The first comprehensive book on the topic, readers are provided with a practical introduction to the techniques of pseudorandom number generation, including how the algorithms work and how to test the output to decide if it is suitable for a particular purpose. Practical applications are demonstrated with hands-on presentation and descriptions that readers can apply directly to their own work. Examples are in C and Python and given with an emphasis on understanding the algorithms to the point of practical application. The examples are meant to be implemented, experimented with and improved/adapted by the reader.

Real-Time System Security (Hardcover): Brett Tjaden, Lonnie R. Welch Real-Time System Security (Hardcover)
Brett Tjaden, Lonnie R. Welch
R1,906 R1,489 Discovery Miles 14 890 Save R417 (22%) Ships in 10 - 15 working days

Mission critical real-time systems often function in environments that cannot be modelled with static approaches. Because of their (externally-driven) wide dynamic range of system operation, the number of data elements to be processed in an arbitrary period is unknown at the time of system engineering (other than an extremely pessimistic worst case sense). While it may be possible to determine a theoretical upper bound on the number of data items, the construction and maintenance of system components to handle worst-case conditions can be prohibitively costly. To accommodate such dynamic mission critical real-time systems, it is useful to design computing systems that allow reconfiguration and reallocation of resources by sharing a pool of distributed computational resources. Unfortunately, the problem of continuously providing critical system functions in such dynamic real-time environments is exacerbated when one considers attack vulnerability. The Internet has made mission critical real-time computer systems subject to an ever-changing array of attacks for which current defence mechanisms are insufficient. In order to combat intruders in this new environment, new techniques must be developed that enable decision makers to detect unusual behaviour in their systems, correlate anomalies into higher-level attacker goals, plan appropriate response actions, and execute their plans. This special book presents current work in this general area of real-time system security.

Kali Linux - Advanced Methods and Strategies to Learn Kali Linux (Paperback): Ethan Thorpe Kali Linux - Advanced Methods and Strategies to Learn Kali Linux (Paperback)
Ethan Thorpe
R413 Discovery Miles 4 130 Ships in 7 - 11 working days
Engaging Privacy and Information Technology in a Digital Age (Hardcover): National Research Council, Division on Engineering... Engaging Privacy and Information Technology in a Digital Age (Hardcover)
National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Privacy in the Information Age; Edited by Lynette I. Millett, …
R1,307 Discovery Miles 13 070 Ships in 10 - 15 working days

Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Engaging Privacy and Information Technology in a Digital Age presents a comprehensive and multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolving, how can privacy be protected and how society can balance the interests of individuals, businesses and government in ways that promote privacy reasonably and effectively? This book seeks to raise awareness of the web of connectedness among the actions one takes and the privacy policies that are enacted, and provides a variety of tools and concepts with which debates over privacy can be more fruitfully engaged. Engaging Privacy and Information Technology in a Digital Age focuses on three major components affecting notions, perceptions, and expectations of privacy: technological change, societal shifts, and circumstantial discontinuities. This book will be of special interest to anyone interested in understanding why privacy issues are often so intractable.

Quantum Cryptography and the Future of Cyber Security (Paperback): Nirbhay Kumar Chaubey, Bhavesh B. Prajapati Quantum Cryptography and the Future of Cyber Security (Paperback)
Nirbhay Kumar Chaubey, Bhavesh B. Prajapati
R4,251 Discovery Miles 42 510 Ships in 7 - 11 working days

The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more robust security options. Quantum cryptography is sound, and its practical implementations are becoming more mature. Many applications can use quantum cryptography as a backbone, including key distribution, secure direct communications, large prime factorization, e-commerce, e-governance, quantum internet, and more. For this reason, quantum cryptography is gaining interest and importance among computer and security professionals. Quantum Cryptography and the Future of Cyber Security is an essential scholarly resource that provides the latest research and advancements in cryptography and cyber security through quantum applications. Highlighting a wide range of topics such as e-commerce, machine learning, and privacy, this book is ideal for security analysts, systems engineers, software security engineers, data scientists, vulnerability analysts, professionals, academicians, researchers, security professionals, policymakers, and students.

Cryptography - Breakthroughs in Research and Practice (Hardcover): Information Resources Management Association Cryptography - Breakthroughs in Research and Practice (Hardcover)
Information Resources Management Association
R8,642 Discovery Miles 86 420 Ships in 7 - 11 working days

Advances in technology have provided numerous innovations that make people's daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks also increase. The field of cryptography has become a solution to this ever-increasing problem. Applying strategic algorithms to cryptic issues can help save time and energy in solving the expanding problems within this field. Cryptography: Breakthroughs in Research and Practice examines novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data. Highlighting a range of topics such as cyber security, threat detection, and encryption, this publication is an ideal reference source for academicians, graduate students, engineers, IT specialists, software engineers, security analysts, industry professionals, and researchers interested in expanding their knowledge of current trends and techniques within the cryptology field.

Black-Box Models of Computation in Cryptology (Paperback, 2012): Tibor Jager Black-Box Models of Computation in Cryptology (Paperback, 2012)
Tibor Jager
R1,740 R1,451 Discovery Miles 14 510 Save R289 (17%) Ships in 10 - 15 working days

Generic group algorithms solve computational problems defined over algebraic groups without exploiting properties of a particular representation of group elements. This is modeled by treating the group as a black-box. The fact that a computational problem cannot be solved by a reasonably restricted class of algorithms may be seen as support towards the conjecture that the problem is also hard in the classical Turing machine model. Moreover, a lower complexity bound for certain algorithms is a helpful insight for the search for cryptanalytic algorithms. Tibor Jager addresses several fundamental questions concerning algebraic black-box models of computation: Are the generic group model and its variants a reasonable abstraction? What are the limitations of these models? Can we relax these models to bring them closer to the reality?

Cybersecurity - Essential Guide for Beginners to Learn Basic Methods of Cybersecurity (Paperback): Henry George Cybersecurity - Essential Guide for Beginners to Learn Basic Methods of Cybersecurity (Paperback)
Henry George
R418 Discovery Miles 4 180 Ships in 7 - 11 working days
Prime Numbers and Computer Methods for Factorization (Paperback, 2nd ed. 2012): Hans Riesel Prime Numbers and Computer Methods for Factorization (Paperback, 2nd ed. 2012)
Hans Riesel
R2,027 R1,795 Discovery Miles 17 950 Save R232 (11%) Ships in 10 - 15 working days

From the original hard cover edition:

In the modern age of almost universal computer usage, practically every individual in a technologically developed society has routine access to the most up-to-date cryptographic technology that exists, the so-called RSA public-key cryptosystem. A major component of this system is the factorization of large numbers into their primes. Thus an ancient number-theory concept now plays a crucial role in communication among millions of people who may have little or no knowledge of even elementary mathematics.

Hans Riesel's highly successful first edition of this book has now been enlarged and updated with the goal of satisfying the needs of researchers, students, practitioners of cryptography, and non-scientific readers with a mathematical inclination. It includes important advances in computational prime number theory and in factorization as well as re-computed and enlarged tables, accompanied by new tables reflecting current research by both the author and his coworkers and by independent researchers.

The book treats four fundamental problems: the number of primes below a given limit, the approximate number of primes, the recognition of primes and the factorization of large numbers. The author provides explicit algorithms and computer programs, and has attempted to discuss as many of the classically important results as possible, as well as the most recent discoveries. The programs include are written in PASCAL to allow readers to translate the programs into the language of their own computers.

The independent structure of each chapter of the book makes it highly readable for a wide variety of mathematicians, students of applied number theory, and others interested in both study and research in number theory and cryptography. "

Impact of Digital Transformation on Security Policies and Standards (Paperback): Gunasekaran Manogaran, Bharath Bhushan, Sam... Impact of Digital Transformation on Security Policies and Standards (Paperback)
Gunasekaran Manogaran, Bharath Bhushan, Sam Goundar, Vaishali Ravindra Thakare
R3,880 Discovery Miles 38 800 Ships in 7 - 11 working days

Digital transformation is a revolutionary technology that will play a vital role in major industries, including global governments. These administrations are taking the initiative to incorporate digital programs with their objective being to provide digital infrastructure as a basic utility for every citizen, provide on demand services with superior governance, and empower their citizens digitally. However, security and privacy are major barriers in adopting these mechanisms, as organizations and individuals are concerned about their private and financial data. Impact of Digital Transformation on Security Policies and Standards is an essential research book that examines the policies, standards, and mechanisms for security in all types of digital applications and focuses on blockchain and its imminent impact on financial services in supporting smart government, along with bitcoin and the future of digital payments. Highlighting topics such as cryptography, privacy management, and e-government, this book is ideal for security analysts, data scientists, academicians, policymakers, security professionals, IT professionals, government officials, finance professionals, researchers, and students.

Cybersecurity for Kids Puzzle Book - Fun Learning Cyber Security Basics Through Word Searches, Crosswords, Cryptograms, Logic... Cybersecurity for Kids Puzzle Book - Fun Learning Cyber Security Basics Through Word Searches, Crosswords, Cryptograms, Logic Puzzles, Coloring, and More (Paperback)
Puzzle Punk Books
R192 Discovery Miles 1 920 Ships in 7 - 11 working days
Serious Cryptography - A Practical Introduction to Modern Encryption (Paperback): Jean-Philippe Aumasson Serious Cryptography - A Practical Introduction to Modern Encryption (Paperback)
Jean-Philippe Aumasson
R1,161 R692 Discovery Miles 6 920 Save R469 (40%) Ships in 10 - 15 working days
Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December... Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010, Proceedings (Paperback, Edition.)
Guang Gong, Kishan Chand Gupta
R1,769 R1,488 Discovery Miles 14 880 Save R281 (16%) Ships in 10 - 15 working days

Strong Pseudorandompermutations or SPRPs,which were introduced byLuby andRacko? [4], formalize the well established cryptographic notion ofblock ciphers.They provided a construction of SPRP, well known as LRconstruction, which was motivated by the structure of DES[6].The basicbuildingblock is the so called 2n-bit Feistel permutation (or LR round permutation) LR based F K on an n-bitpseudorandomfunction (PRF) F : K n LR (x ,x)=(F (x )?x ,x ),x ,x?{0,1} . F 1 2 K 1 2 1 1 2 K Theirconstruction consists (see Fig 1) offour rounds of Feistel permutations (or three rounds, for PRP), each round involves an application ofanindependent PRF(i.e.with independentrandomkeys K ,K ,K , and K ). More precisely, 1 2 3 4 LR and LR are PRP and SPRP respectively where K ,K ,K K ,K ,K ,K 1 2 3 1 2 3 4 LR := LR := LR (...(LR (*))...). K ,...,K F ,...,F F F 1 r K K K K r r 1 1 After this work, many results are known improvingperformance (reducingthe number of invocations of F )[5] and reducingthekey-sizes (i.e. reusingthe K roundkeys [7,8,10,12,11] orgenerate more keysfromsinglekey by usinga PRF[2]). However there are some limitations.Forexample,wecannotuseas few as single-keyLR (unless wetweak the roundpermutation) orasfew as two-roundsince they are not secure. Distinguishing attacks forsome other LR constructionsarealso known [8]. We list some oftheknow related results (see Table 1). Here all keys K ,K ,...are independently chosen.

Kali linux - learn now how kali linux works, how hacking with kali linux with this step by step guide for beginners and which... Kali linux - learn now how kali linux works, how hacking with kali linux with this step by step guide for beginners and which tools you need to hack + practical exercises (Paperback)
Adam Harris
R370 Discovery Miles 3 700 Ships in 7 - 11 working days
Puzzles on Cypercrime and God's Mathematics (Paperback): John Ting Puzzles on Cypercrime and God's Mathematics (Paperback)
John Ting
R255 Discovery Miles 2 550 Ships in 7 - 11 working days
200 Classic Thanksgiving Hymns Cryptograms - Large Print: Great Fun Gifts For Parents, Grandparents, Friends, Puzzles Lovers... 200 Classic Thanksgiving Hymns Cryptograms - Large Print: Great Fun Gifts For Parents, Grandparents, Friends, Puzzles Lovers (Paperback)
Puzzle Galore
R220 Discovery Miles 2 200 Ships in 7 - 11 working days
Internet Address & Password Logbook - 6" x 9" Password Notebook with Alphabetical (Paperback): Dorothy J Hall Internet Address & Password Logbook - 6" x 9" Password Notebook with Alphabetical (Paperback)
Dorothy J Hall
R143 Discovery Miles 1 430 Ships in 7 - 11 working days
Internet Address & Password Logbook 6"X 9" - Keep your usernames, passwords, social info, web addresses and security questions... Internet Address & Password Logbook 6"X 9" - Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized (Paperback)
Dorothy J Hall
R143 Discovery Miles 1 430 Ships in 7 - 11 working days
Password Logbook - Alphabethic Password Tracker and Organizer (Large print, Paperback, Large type / large print edition):... Password Logbook - Alphabethic Password Tracker and Organizer (Large print, Paperback, Large type / large print edition)
Stansted Press Journals
R142 Discovery Miles 1 420 Ships in 7 - 11 working days
Encryption Makes Me Wannacry Notebook - Funny Computer Security College Ruled Notes (Paperback): Jimmie Meinke Encryption Makes Me Wannacry Notebook - Funny Computer Security College Ruled Notes (Paperback)
Jimmie Meinke
R163 Discovery Miles 1 630 Ships in 7 - 11 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Management of Information Security
Michael Whitman, Herbert Mattord Paperback R937 R803 Discovery Miles 8 030
Transforming Information Security…
Kathleen M. Moriarty Paperback R1,065 Discovery Miles 10 650
The Total CISSP Exam Prep Book…
Thomas R. Peltier, Patrick D. Howard, … Paperback R2,434 Discovery Miles 24 340
You CAN Stop Stupid - Stopping Losses…
Ira Winkler, Dr. Tracy Celaya Brown Paperback R778 R627 Discovery Miles 6 270
The Truth Machine - The Blockchain and…
Michael J. Casey, Paul Vigna Paperback  (1)
R399 R304 Discovery Miles 3 040
2019 Standard Catalog of…
Mateo Marin Hardcover R903 R638 Discovery Miles 6 380
Tribe of Hackers Blue Team - Tribal…
Marcus J. Carey, Jennifer Jin Paperback R565 R467 Discovery Miles 4 670
Kryptowahrungen fur Dummies
Krijn Soeteman Paperback R378 Discovery Miles 3 780
Mastering Blockchain - Unlocking the…
Lorne Lantz, Daniel Cawrey Paperback R1,422 R1,085 Discovery Miles 10 850
Networks, Security and Complexity - The…
Sean P. Gorman Hardcover R2,465 Discovery Miles 24 650

 

Partners