0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (78)
  • R250 - R500 (115)
  • R500+ (1,463)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Cryptograms - 200 LARGE PRINT Motivational, Inspirational and Funny Cryptogram Puzzles from the early 20th century (Large... Cryptograms - 200 LARGE PRINT Motivational, Inspirational and Funny Cryptogram Puzzles from the early 20th century (Large print, Paperback, Large type / large print edition)
Grant Puzzle Books
R269 Discovery Miles 2 690 Ships in 7 - 11 working days
Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011, Toulouse, France, August 29 -... Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011, Proceedings (Paperback)
Steven Furnell, Costas Lambrinoudakis, Gunther Pernul
R1,261 R1,075 Discovery Miles 10 750 Save R186 (15%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2011, held in Toulouse, France, in August/September 2011 in conjunction with DEXA 2011. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: identity and trust management; security and privacy models for pervasive information systems; reliability and security of content and data; authentication and authorization in digital business; intrusion detection and information filtering; management of privacy and confidentiality; and cryptographic protocols/usability of security.

Password Logbook - A Logbook to Keep track of usernames, passwords, web addresses, password hint in one easy & organized... Password Logbook - A Logbook to Keep track of usernames, passwords, web addresses, password hint in one easy & organized location (Paperback)
Idream Design Co
R142 Discovery Miles 1 420 Ships in 7 - 11 working days
Information Security Policies and Actions in Modern Integrated Systems (Hardcover, New): Information Security Policies and Actions in Modern Integrated Systems (Hardcover, New)
R1,661 R1,344 Discovery Miles 13 440 Save R317 (19%) Ships in 7 - 11 working days

This book is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data, technology and use of smart cards, applications of cryptography, security of distributed applications and adherence to standards, model and security issues associated with the organization of components (architectures) of information systems, such as networked systems (Internet and WWW-based), client/server architectures, andlayered architectures. Contributions come both from the academic and the industrial field.

Top Secret - Password Logbook Store Easily Forgotten Data Compact Size Hacker Proof (Paperback): Data Protection Books Top Secret - Password Logbook Store Easily Forgotten Data Compact Size Hacker Proof (Paperback)
Data Protection Books
R129 Discovery Miles 1 290 Ships in 7 - 11 working days
Birds With Bad Attitudes - Password Logbook With Encryption Cipher (A True Discreet Password Keeper, No Words On Spine)... Birds With Bad Attitudes - Password Logbook With Encryption Cipher (A True Discreet Password Keeper, No Words On Spine) (Paperback)
Secure Password Publishing
R202 Discovery Miles 2 020 Ships in 7 - 11 working days
Hiding In Plain Sight, Memoir Of A Spy - Password Logbook With Encryption Cipher (A True Discreet Password Keeper, No Words On... Hiding In Plain Sight, Memoir Of A Spy - Password Logbook With Encryption Cipher (A True Discreet Password Keeper, No Words On Spine) (Paperback)
Secure Password Publishing
R202 Discovery Miles 2 020 Ships in 7 - 11 working days
Guideline for Using Cryptographic Standards in the Federal Government - Cryptographic Mechanisms: NIST SP 800-175B Rev. 1... Guideline for Using Cryptographic Standards in the Federal Government - Cryptographic Mechanisms: NIST SP 800-175B Rev. 1 (Paperback)
National Institute of Standards and Tech
R421 Discovery Miles 4 210 Ships in 7 - 11 working days
Kali Linux - Comprehensive Beginners Guide to Learn Kali Linux Step by Step (Paperback): Ethan Thorpe Kali Linux - Comprehensive Beginners Guide to Learn Kali Linux Step by Step (Paperback)
Ethan Thorpe
R415 Discovery Miles 4 150 Ships in 7 - 11 working days
You Are The #1 Target (Hardcover): The World Experts You Are The #1 Target (Hardcover)
The World Experts
R546 Discovery Miles 5 460 Ships in 7 - 11 working days
Computational Intelligence, Communications, and Business Analytics - Second International Conference, CICBA 2018, Kalyani,... Computational Intelligence, Communications, and Business Analytics - Second International Conference, CICBA 2018, Kalyani, India, July 27-28, 2018, Revised Selected Papers, Part II (Paperback, 1st ed. 2019)
Jyotsna Kumar Mandal, Somnath Mukhopadhyay, Paramartha Dutta, Kousik Dasgupta
R2,425 Discovery Miles 24 250 Ships in 7 - 11 working days

The two volume set CCIS 1030 and 1031 constitutes the refereed proceedings of the Second International Conference on Computational Intelligence, Communications, and Business Analytics, CICBA 2018, held in Kalyani, India, in July 2018. The 76 revised full papers presented in the two volumes were carefully reviewed and selected from 240 submissions. The papers are organized in topical sections on computational intelligence; signal processing and communications; microelectronics, sensors, and intelligent networks; data science & advanced data analytics; intelligent data mining & data warehousing; and computational forensics (privacy and security).

The Design of Rijndael - AES - The Advanced Encryption Standard (Hardcover, 2002 ed.): Joan Daemen, Vincent Rijmen The Design of Rijndael - AES - The Advanced Encryption Standard (Hardcover, 2002 ed.)
Joan Daemen, Vincent Rijmen 1
R2,139 R1,983 Discovery Miles 19 830 Save R156 (7%) Ships in 10 - 15 working days

In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented. This book is THE authoritative guide to the Rijndael algorithm and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference.

Public Key Cryptography - PKC 2010 - 13th International Conference on Practice and Theory in Public Key Cryptography, Paris,... Public Key Cryptography - PKC 2010 - 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010, Proceedings (Paperback, Edition.)
Phong Q. Nguyen, David Pointcheval
R1,706 Discovery Miles 17 060 Ships in 10 - 15 working days

The 13th International Conference on Practice and Theory in Public Key Cryp- ' tography(PKC2010)washeldMay26-28,2010,attheEcoleNormaleSup' erieure (ENS) in Paris, France. PKC 2010 was sponsored by the International Associ- ' ation for Cryptologic Research (IACR), in cooperation with the Ecole Normale Sup' erieure (ENS) and the Institut National de Recherche en Informatique et en Automatique (INRIA). The General Chairs of the conference were Michel Abdalla and Pierre-Alain Fouque. The conference received a record number of 145 submissions and each s- missionwas assignedto at least 3 committee members. Submissions co-authored by members of the Program Committee were assigned to at least ?ve comm- tee members. Due to the large number of high-quality submissions, the review process was challenging and we are deeply grateful to the 34 committee m- bers and the 163 external reviewers for their outstanding work. After extensive discussions, the Program Committee selected 29 submissions for presentation during the conference and these are the articles that are included in this v- ume. The best paper was awardedto Petros Mol and Scott Yilek for their paper "Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions. " The - view process was run using the iChair software, written by Thomas Baign' eres and Matthieu Finiasz from EPFL, LASEC, Switzerland, and we are indebted to them for letting us use their software. The program also included two invited talks: it was a great honor to have Daniele Micciancio and Jacques Stern as invited speakers.

Password Book - Passwords organizer in Extra Large!, Size 8x10 inches Adequate space in which to record and Easy to Find All... Password Book - Passwords organizer in Extra Large!, Size 8x10 inches Adequate space in which to record and Easy to Find All Your Login Information In One Place With lphabetically Organized Pages-Food Cover Design. (Large print, Paperback, Large type / large print edition)
Kali Neale
R175 Discovery Miles 1 750 Ships in 7 - 11 working days
A Reference or Randomness Beacons - NiSTIR 8213 (Paperback): National Institute of Standards and Tech A Reference or Randomness Beacons - NiSTIR 8213 (Paperback)
National Institute of Standards and Tech
R514 Discovery Miles 5 140 Ships in 7 - 11 working days
Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23,... Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part I (Paperback, 1st ed. 2018)
Hovav Shacham, Alexandra Boldyreva
R2,508 R2,103 Discovery Miles 21 030 Save R405 (16%) Ships in 10 - 15 working days

The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.

Internet Address & Password Logbook - Keep Track of Your Internet Usernames, Passwords, Web Addresses and Emails, 5.5x8.5... Internet Address & Password Logbook - Keep Track of Your Internet Usernames, Passwords, Web Addresses and Emails, 5.5x8.5 Inches (Paperback)
Charlie R Rivas
R122 Discovery Miles 1 220 Ships in 7 - 11 working days
Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008, Proceedings (Paperback, 2008 ed.)
Nigel Smart
R2,531 R2,109 Discovery Miles 21 090 Save R422 (17%) Ships in 10 - 15 working days

These are the proceedings of Eurocrypt 2008, the 27th Annual IACR Eu- crypt Conference. The conference was sponsored by the International Asso- ation for Cryptologic Research (www.iacr.org), this year in cooperation with Tubitak (www.tubitak.gov.tr). The Eurocrypt 2008 Program Committee (PC) consisted of 28 members whose names are listed on the next page. There were 163 papers submitted to the conference and the PC chose 31 of them. Each paper was assigned to at least three PC members, who either handled it themselves or assigned it to an external referee. After the reviews were submitted, the committee deliberated both online for severalweeks and?nally ina face-to-facemeetingheldinBristol. Papers were refereed anonymously, with PC papers having a minimum of ?ve reviewers. All of our deliberations were aided by theWeb Submission and- viewSoftware written and maintainedby Shai Halevi. In addition to noti?cation of the decision of the committee, authors received reviews; the default for any report given to the committee was that it should be available to the authors as well.

Steganography Techniques for Digital Images (Hardcover, 1st ed. 2019): Abid Yahya Steganography Techniques for Digital Images (Hardcover, 1st ed. 2019)
Abid Yahya
R2,993 R2,511 Discovery Miles 25 110 Save R482 (16%) Ships in 10 - 15 working days

This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding. Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption; Provides a variety of methods to achieve characteristic region Steganography synchronization; Shows how Steganography improves upon cryptography by using obscurity features.

Password Tracker - Internet Address & Password Organizer with Table of Contents (Floral Design Cover) 5.5x8.5 Inches... Password Tracker - Internet Address & Password Organizer with Table of Contents (Floral Design Cover) 5.5x8.5 Inches (Paperback)
Annalise K Thornton
R122 Discovery Miles 1 220 Ships in 7 - 11 working days
Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings... Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings (Paperback, 2007 ed.)
Josef Pieprzyk, Hossein Ghodosi, Ed Dawson
R2,361 R1,968 Discovery Miles 19 680 Save R393 (17%) Ships in 10 - 15 working days

Here is a highly relevant book that covers a wide array of key aspects in information security. It constitutes the refereed proceedings of the 12th Australasian Conference on Information Security and Privacy held in Townsville, Australia in July 2007. The 33 revised full papers presented were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on stream ciphers, hashing, biometrics, secret sharing, cryptanalysis, public key cryptography, authentication, e-commerce, and security.

Internet Password Organizer - Internet Address & Password Organizer with Table of Contents (Leather Design Cover) 5.5x8.5... Internet Password Organizer - Internet Address & Password Organizer with Table of Contents (Leather Design Cover) 5.5x8.5 Inches (Paperback)
Annalise K Thornton
R122 Discovery Miles 1 220 Ships in 7 - 11 working days
Password Organizer for Kids - Colorful Password Book to Store All Your Websites and Usernames. Internet Computer-Related... Password Organizer for Kids - Colorful Password Book to Store All Your Websites and Usernames. Internet Computer-Related Information in One Convenient Place with the Internet Password Vault. Protect and Organize All Your Info and Be Safe. (Paperback)
Lula Belle
R186 Discovery Miles 1 860 Ships in 7 - 11 working days
Improving your C# Skills - Solve modern challenges with functional programming and test-driven techniques of C# (Paperback):... Improving your C# Skills - Solve modern challenges with functional programming and test-driven techniques of C# (Paperback)
Ovais Mehboob Ahmed Khan, John Callaway, Clayton Hunt, Rod Stephens
R1,313 Discovery Miles 13 130 Ships in 10 - 15 working days

Conquer complex and interesting programming challenges by building robust and concurrent applications with caches, cryptography, and parallel programming. Key Features Understand how to use .NET frameworks like the Task Parallel Library (TPL)and CryptoAPI Develop a containerized application based on microservices architecture Gain insights into memory management techniques in .NET Core Book DescriptionThis Learning Path shows you how to create high performing applications and solve programming challenges using a wide range of C# features. You'll begin by learning how to identify the bottlenecks in writing programs, highlight common performance pitfalls, and apply strategies to detect and resolve these issues early. You'll also study the importance of micro-services architecture for building fast applications and implementing resiliency and security in .NET Core. Then, you'll study the importance of defining and testing boundaries, abstracting away third-party code, and working with different types of test double, such as spies, mocks, and fakes. In addition to describing programming trade-offs, this Learning Path will also help you build a useful toolkit of techniques, including value caching, statistical analysis, and geometric algorithms. This Learning Path includes content from the following Packt products: C# 7 and .NET Core 2.0 High Performance by Ovais Mehboob Ahmed Khan Practical Test-Driven Development using C# 7 by John Callaway, Clayton Hunt The Modern C# Challenge by Rod Stephens What you will learn Measure application performance using BenchmarkDotNet Leverage the Task Parallel Library (TPL) and Parallel Language Integrated Query (PLINQ)library to perform asynchronous operations Modify a legacy application to make it testable Use LINQ and PLINQ to search directories for files matching patterns Find areas of polygons using geometric operations Randomize arrays and lists with extension methods Use cryptographic techniques to encrypt and decrypt strings and files Who this book is forIf you want to improve the speed of your code and optimize the performance of your applications, or are simply looking for a practical resource on test driven development, this is the ideal Learning Path for you. Some familiarity with C# and .NET will be beneficial.

Kryptografie fur Dummies (German, Paperback): Hans Werner Lang Kryptografie fur Dummies (German, Paperback)
Hans Werner Lang
R613 R567 Discovery Miles 5 670 Save R46 (8%) Ships in 10 - 15 working days

Die Kommunikation ber das Internet ist quasi ffentlich: Dritte k nnen Nachrichten mitlesen, abfangen oder f lschen. Genauso kann ein Sender einer Nachricht behaupten, diese nie gesendet zu haben, und ein Empf nger kann behaupten, eine Nachricht nie erhalten zu haben. Abhilfe schafft die Kryptografie. Sie erm glicht nicht nur die Verschl sselung von Nachrichten, sondern auch digitale Unterschriften, die Authentifizierung und die Anonymisierung von Kommunikationspartnern. Das hier vorliegende Buch ist eine Einf hrung in die Kryptografie f r Studierende - von der symmetrischen ber die asymmetrische Verschl sselung bis hin zu Hash-Funktionen. Umfassend, keinesfalls oberfl chlich, aber ohne Vorwissen verst ndlich.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
IT Security Governance Guidebook with…
Fred Cohen Hardcover R3,051 Discovery Miles 30 510
Everyday Cryptography - Fundamental…
Keith Martin Paperback R1,106 Discovery Miles 11 060
The Art of Deception - Controlling the…
Kevin D. Mitnick, William L Simon Paperback R319 R217 Discovery Miles 2 170
Management of Information Security
Michael Whitman, Herbert Mattord Paperback R937 R803 Discovery Miles 8 030
Practical Cryptology and Web Security
P.K. Yuen Paperback R2,035 R1,422 Discovery Miles 14 220
The Truth Machine - The Blockchain and…
Michael J. Casey, Paul Vigna Paperback  (1)
R399 R304 Discovery Miles 3 040
You CAN Stop Stupid - Stopping Losses…
Ira Winkler, Dr. Tracy Celaya Brown Paperback R778 R627 Discovery Miles 6 270
The Mathematics of Secrets…
Joshua Holden Paperback R464 R379 Discovery Miles 3 790
2019 Standard Catalog of…
Mateo Marin Hardcover R903 R638 Discovery Miles 6 380
Tribe of Hackers Blue Team - Tribal…
Marcus J. Carey, Jennifer Jin Paperback R565 R467 Discovery Miles 4 670

 

Partners