0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (13)
  • R250 - R500 (93)
  • R500+ (1,423)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

SSL/TLS Under Lock and Key - A Guide to Understanding SSL/TLS Cryptography (Paperback, Black and White ed.): Hollie Acres SSL/TLS Under Lock and Key - A Guide to Understanding SSL/TLS Cryptography (Paperback, Black and White ed.)
Hollie Acres; Paul Baka, Jeremy Schatten
R498 R410 Discovery Miles 4 100 Save R88 (18%) Ships in 10 - 15 working days
Nomenclatura - Encyclopedia of modern Cryptography and Internet Security - From AutoCrypt and Exponential Encryption to... Nomenclatura - Encyclopedia of modern Cryptography and Internet Security - From AutoCrypt and Exponential Encryption to Zero-Knowledge-Proof Keys [Paperback] (Paperback)
Linda A Bertram, Gunther Van Dooble
R884 Discovery Miles 8 840 Ships in 10 - 15 working days
Advanced Digital Image Steganography Using LSB, PVD, and EMD - Emerging Research and Opportunities (Hardcover): Gandharba Swain Advanced Digital Image Steganography Using LSB, PVD, and EMD - Emerging Research and Opportunities (Hardcover)
Gandharba Swain
R4,629 Discovery Miles 46 290 Ships in 10 - 15 working days

In the last few decades, the use of the Internet has grown tremendously, and the use of online communications has grown even more. The lack of security in private messages between individuals, however, allows hackers to collect loads of sensitive information. Modern security measures are required to prevent this attack on the world's communication technologies. Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities provides evolving research exploring the theoretical and practical aspects of data encryption techniques and applications within computer science. The book provides introductory knowledge on steganography and its importance, detailed analysis of how RS and PDH are performed, discussion on pixel value differencing principles, and hybrid approaches using substitution, PVD, and EMD principles. It is ideally designed for researchers and graduate and under graduate students seeking current research on the security of data during transit.

New Research on the Voynich Manuscript - Proceedings of a Seminar (Hardcover): National Security Agency New Research on the Voynich Manuscript - Proceedings of a Seminar (Hardcover)
National Security Agency
R611 Discovery Miles 6 110 Ships in 10 - 15 working days
Technical Articles about the Voynich Manuscript (Hardcover): National Security Agency Technical Articles about the Voynich Manuscript (Hardcover)
National Security Agency
R668 Discovery Miles 6 680 Ships in 10 - 15 working days
Handbook of Research on Intrusion Detection Systems (Hardcover): Brij B. Gupta, Srivathsan Srinivasagopalan Handbook of Research on Intrusion Detection Systems (Hardcover)
Brij B. Gupta, Srivathsan Srinivasagopalan
R8,200 Discovery Miles 82 000 Ships in 10 - 15 working days

Businesses in today's world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.

Gut gerustet gegen UEberwachung im Web - Wie Sie verschlusselt mailen, chatten   und surfen (German, Paperback): JC Czeschik Gut gerustet gegen UEberwachung im Web - Wie Sie verschlusselt mailen, chatten und surfen (German, Paperback)
JC Czeschik
R354 R310 Discovery Miles 3 100 Save R44 (12%) Out of stock

Schnelle und einfache Schutzmassnahmen gegen NSA , BN D, kriminelle Hacker und kommerzielle Datenkraken Sie mochten nicht, dass jemand Ihre E-Mails mitliest, Ihr Surfverhalten analysiert oder Ihre Kreditkartendaten ausspaht? Wie leicht es fur Angreifer ist, Ihre Daten im Internet abzufangen, aber auch mit welchen einfachen Massnahmen Sie sich dagegen schutzen konnen, erfahren Sie in diesem Buch. Zum Einsatz kommt dabei uberwiegend Open-Source-Software, die nicht nur kostenlos, sondern in der Regel sogar sicherer als kommerzielle Losungen ist. Neben leicht nachvollziehbaren Schritt-fur-Schritt-Anleitungen erhalten Sie viele praktische Tipps fur bessere Passworter und den Umgang mit sensiblen Daten. Die notwendigen technischen Grundlagen werden leicht verstandlich und mithilfe vieler Abbildungen erklart. Fangen Sie mit diesem Buch an, Ihre digitale Privatsphare zuruckzuerobern! Sie erfahren unter anderem, wie Sie Ihren Browser sicherer machen und anonym uber das Tor-Netzwerk surfen. welche Vor- und Nachteile die verschiedenen Mailprogramme haben. wie Sie Ihre E-Mails mit PGP oder S/MIME ganz einfach verschlusseln. welche Alternativen zu WhatsApp, Skype & Co. es gibt.

Data Security and Communication Networks (Hardcover): Malcolm Becker Data Security and Communication Networks (Hardcover)
Malcolm Becker
R3,608 R3,117 Discovery Miles 31 170 Save R491 (14%) Ships in 10 - 15 working days
Cryptocurrencies and Blockchain Technology - Cryptocurrencies and Blockchain: 4 Books in 1 (Paperback): Keizer Soeze Cryptocurrencies and Blockchain Technology - Cryptocurrencies and Blockchain: 4 Books in 1 (Paperback)
Keizer Soeze
R1,314 R1,044 Discovery Miles 10 440 Save R270 (21%) Ships in 10 - 15 working days
Cryptocurrencies and Blockchain Technology - Cryptocurrencies and Blockchain: 4 Books in 1 (Hardcover): Keizer Soeze Cryptocurrencies and Blockchain Technology - Cryptocurrencies and Blockchain: 4 Books in 1 (Hardcover)
Keizer Soeze
R1,585 R1,249 Discovery Miles 12 490 Save R336 (21%) Ships in 10 - 15 working days
Data Security and Cryptography (Hardcover): Gina Simpson Data Security and Cryptography (Hardcover)
Gina Simpson
R3,711 R3,205 Discovery Miles 32 050 Save R506 (14%) Ships in 10 - 15 working days
The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback): William Gamble The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback)
William Gamble
R440 Discovery Miles 4 400 Ships in 10 - 15 working days
Cybersecurity - Essential Guide for Beginners to Learn Basic Methods of Cybersecurity (Paperback): Henry George Cybersecurity - Essential Guide for Beginners to Learn Basic Methods of Cybersecurity (Paperback)
Henry George
R523 Discovery Miles 5 230 Ships in 10 - 15 working days
Blockchain, Cryptocurrencies & The Future (Paperback): Brian McNicol, Muthu Pannirselvam Blockchain, Cryptocurrencies & The Future (Paperback)
Brian McNicol, Muthu Pannirselvam
R898 R727 Discovery Miles 7 270 Save R171 (19%) Ships in 10 - 15 working days
Blockchain - An Essential Beginner's Guide to Understanding Blockchain Technology, Cryptocurrencies, Bitcoin and the... Blockchain - An Essential Beginner's Guide to Understanding Blockchain Technology, Cryptocurrencies, Bitcoin and the Future of Money (Hardcover)
Herbert Jones
R768 R627 Discovery Miles 6 270 Save R141 (18%) Ships in 10 - 15 working days
Digital Identity (Paperback): Phil Windley Digital Identity (Paperback)
Phil Windley
R855 R629 Discovery Miles 6 290 Save R226 (26%) Ships in 12 - 17 working days

The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce.

Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. "Digital Identity" explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers.

Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for [email protected] and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view ofthe concepts, issues, and technologies behind identity management architecture.

How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.

Cryptographic Hardware and Embedded Systems -- CHES 2011 - 13th International Workshop, Nara, Japan, September 28 -- October 1,... Cryptographic Hardware and Embedded Systems -- CHES 2011 - 13th International Workshop, Nara, Japan, September 28 -- October 1, 2011, Proceedings (Paperback)
Bart Preneel, Tsuyoshi Takagi
R1,632 Discovery Miles 16 320 Ships in 10 - 15 working days

This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections named: FPGA implementation; AES; elliptic curve cryptosystems; lattices; side channel attacks; fault attacks; lightweight symmetric algorithms, PUFs; public-key cryptosystems; and hash functions.

Computer Hacking - The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners (Paperback): Tim Warren Computer Hacking - The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners (Paperback)
Tim Warren
R370 R298 Discovery Miles 2 980 Save R72 (19%) Ships in 10 - 15 working days
Spot-On Encryption Suite - Democratization of Multiple & Exponential Encryption: - Handbook and User Manual as practical... Spot-On Encryption Suite - Democratization of Multiple & Exponential Encryption: - Handbook and User Manual as practical software guide with introductions into Cryptography, Cryptographic Calling and Cryptographic Discovery, P2P Networking, Graph-The (Paperback)
Scott Edwards, Spot-On Sf Net Project
R688 Discovery Miles 6 880 Ships in 10 - 15 working days
Deaver on Cybersecurity - An irreverent and honest expose of the online security problem, complete with a candid and thorough... Deaver on Cybersecurity - An irreverent and honest expose of the online security problem, complete with a candid and thorough reveal of its solution (Paperback)
Frederic Scott Deaver
R2,719 R2,118 Discovery Miles 21 180 Save R601 (22%) Ships in 10 - 15 working days
Advances in Cryptology -- CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011,... Advances in Cryptology -- CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011, Proceedings (Paperback)
Phillip Rogaway
R1,716 Discovery Miles 17 160 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011. The 42 revised full papers presented were carefully reviewed and selected from 230 submissions. The volume also contains the abstract of one invited talk. The papers are organized in topical sections on randomness and its use; computer-assisted cryptographic proofs; outsourcing and delegatin computation; symmetric cryptanalysis and constructions; secure computation: leakage and side channels; quantum cryptography; lattices and knapsacks; public-key encryption; symmetric schemes; signatures; obilvious transfer and secret sharing; and multivariate and coding-based schemes.

Cryptocurrencies - An Essential Beginner's Guide to Blockchain Technology, Cryptocurrency Investing, Mastering Bitcoin... Cryptocurrencies - An Essential Beginner's Guide to Blockchain Technology, Cryptocurrency Investing, Mastering Bitcoin Basics Including Mining, Ethereum Smart Contracts, Trading and Some Info on Programming (Hardcover)
Herbert Jones
R816 R678 Discovery Miles 6 780 Save R138 (17%) Ships in 10 - 15 working days
Digital Forensics with Kali Linux - Perform data acquisition, data recovery, network forensics, and malware analysis with Kali... Digital Forensics with Kali Linux - Perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x, 2nd Edition (Paperback, 2nd Revised edition)
Shiva V.N Parasram
R1,552 Discovery Miles 15 520 Ships in 10 - 15 working days

Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reporting Key Features Perform evidence acquisition, preservation, and analysis using a variety of Kali Linux tools Use PcapXray to perform timeline analysis of malware and network activity Implement the concept of cryptographic hashing and imaging using Kali Linux Book DescriptionKali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics. It has a wide range of tools to help for digital forensics investigations and incident response mechanisms. This updated second edition of Digital Forensics with Kali Linux covers the latest version of Kali Linux and The Sleuth Kit. You'll get to grips with modern techniques for analysis, extraction, and reporting using advanced tools such as FTK Imager, hex editor, and Axiom. Updated to cover digital forensics basics and advancements in the world of modern forensics, this book will also delve into the domain of operating systems. Progressing through the chapters, you'll explore various formats for file storage, including secret hiding places unseen by the end user or even the operating system. The book will also show you how to create forensic images of data and maintain integrity using hashing tools. Finally, you'll cover advanced topics such as autopsies and acquiring investigation data from networks, operating system memory, and quantum cryptography. By the end of this book, you'll have gained hands-on experience of implementing all the pillars of digital forensics: acquisition, extraction, analysis, and presentation, all using Kali Linux tools. What you will learn Get up and running with powerful Kali Linux tools for digital investigation and analysis Perform internet and memory forensics with Volatility and Xplico Understand filesystems, storage, and data fundamentals Become well-versed with incident response procedures and best practices Perform ransomware analysis using labs involving actual ransomware Carry out network forensics and analysis using NetworkMiner and other tools Who this book is forThis Kali Linux book is for forensics and digital investigators, security analysts, or anyone interested in learning digital forensics using Kali Linux. Basic knowledge of Kali Linux will be helpful to gain a better understanding of the concepts covered.

Big Seven Study (2016) - 7 open source Crypto-Messengers to be compared (English/Deutsch): or: Comprehensive Confidentiality... Big Seven Study (2016) - 7 open source Crypto-Messengers to be compared (English/Deutsch): or: Comprehensive Confidentiality Review & Audit of GoldBug, Encrypting E-Mail-Client & Secure Instant Messenger. (Paperback)
David Adams, Ann-Kathrin Maier
R712 Discovery Miles 7 120 Ships in 10 - 15 working days
Applied Approach to Privacy and Security for the Internet of Things (Paperback): Parag Chatterjee, Emmanuel Benoist, Asoke Nath Applied Approach to Privacy and Security for the Internet of Things (Paperback)
Parag Chatterjee, Emmanuel Benoist, Asoke Nath
R5,567 Discovery Miles 55 670 Ships in 10 - 15 working days

From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities. Applied Approach to Privacy and Security for the Internet of Things is a collection of innovative research on the methods and applied aspects of security in IoT-based systems by discussing core concepts and studying real-life scenarios. While highlighting topics including malware propagation, smart home vulnerabilities, and bio-sensor safety, this book is ideally designed for security analysts, software security engineers, researchers, computer engineers, data scientists, security professionals, practitioners, academicians, and students seeking current research on the various aspects of privacy and security within IoT.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cryptography - Theory and Practice
Douglas Robert Stinson, Maura Paterson Paperback R1,437 Discovery Miles 14 370
Tribe of Hackers Blue Team - Tribal…
M. J. Carey Paperback R466 Discovery Miles 4 660
Digital Watermarking and Steganography…
Frank Y. Shih Hardcover R3,093 Discovery Miles 30 930
Threat Hunting in the Cloud - Defending…
C Peiris Paperback R895 Discovery Miles 8 950
CSS in easy steps
Mike McGrath Paperback R420 R336 Discovery Miles 3 360
Cybersecurity and Third-Party Risk
GC Rasner Paperback R773 Discovery Miles 7 730
The Political Economy and Feasibility of…
Spencer J. Pack Hardcover R2,907 Discovery Miles 29 070
Handbook of Elliptic and Hyperelliptic…
Henri Cohen, Gerhard Frey, … Hardcover R6,496 Discovery Miles 64 960
Alice and Bob Learn Application Security
T Janca Paperback R901 Discovery Miles 9 010
Krypto-Mining fur Dummies
P. Kent Paperback R750 Discovery Miles 7 500

 

Partners