0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (99)
  • R500+ (1,352)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Street Coder (Paperback): Sedat Kapanoglu Street Coder (Paperback)
Sedat Kapanoglu
R1,335 R1,190 Discovery Miles 11 900 Save R145 (11%) Ships in 12 - 17 working days

Software development isn't an "ivory tower" exercise.Street coders get the job done by prioritizing tasks, making quick decisions, and knowing which rules to break. Street Coder: Rules to break and how to break themis a programmer's survival guide, full of tips, tricks, and hacks that will make you a more efficient programmer. This book's rebel mindset challenges status quo thinking and exposes the important skills you need on the job. You'll learnthe crucial importance of algorithms and data structures, turn programming chores into programming pleasures, and shatter dogmatic principles keeping you from your full potential. Every new coder starts out with a lot of theory; the "streetsmarts" come with experience. To be successful, you need to know how toput theory into action, understand why "best practices" are the best, and know when to go rogue and break the unbreakable rules.

Real-World Cryptography (Paperback): David Wong Real-World Cryptography (Paperback)
David Wong
R1,409 R1,215 Discovery Miles 12 150 Save R194 (14%) Ships in 9 - 15 working days

If you're browsing the web, using public APIs, making and receiving electronic payments, registering and logging in users, or experimenting with blockchain, you're relying on cryptography. And you're probably trusting a collection of tools, frameworks, and protocols to keep your data, users, and business safe. It's important to understand these tools so you can make the best decisions about how, where, and why to use them. Real-World Cryptography teaches you applied cryptographic techniques to understand and apply security at every level of your systems and applications. about the technologyCryptography is the foundation of information security. This simultaneously ancient and emerging science is based on encryption and secure communication using algorithms that are hard to crack even for high-powered computer systems. Cryptography protects privacy, secures online activity, and defends confidential information, such as credit cards, from attackers and thieves. Without cryptographic techniques allowing for easy encrypting and decrypting of data, almost all IT infrastructure would be vulnerable. about the book Real-World Cryptography helps you understand the cryptographic techniques at work in common tools, frameworks, and protocols so you can make excellent security choices for your systems and applications. There's no unnecessary theory or jargon-just the most up-to-date techniques you'll need in your day-to-day work as a developer or systems administrator. Cryptography expert David Wong takes you hands-on with cryptography building blocks such as hash functions and key exchanges, then shows you how to use them as part of your security protocols and applications. Alongside modern methods, the book also anticipates the future of cryptography, diving into emerging and cutting-edge advances such as cryptocurrencies, password-authenticated key exchange, and post-quantum cryptography. Throughout, all techniques are fully illustrated with diagrams and real-world use cases so you can easily see how to put them into practice. what's inside Best practices for using cryptography Diagrams and explanations of cryptographic algorithms Identifying and fixing cryptography bad practices in applications Picking the right cryptographic tool to solve problems about the readerFor cryptography beginners with no previous experience in the field. about the author David Wong is a senior engineer working on Blockchain at Facebook. He is an active contributor to internet standards like Transport Layer Security and to the applied cryptography research community. David is a recognized authority in the field of applied cryptography; he's spoken at large security conferences like Black Hat and DEF CON and has delivered cryptography training sessions in the industry.

Trusted Computing - Principles and Applications (Hardcover): Dengguo Feng Trusted Computing - Principles and Applications (Hardcover)
Dengguo Feng; Contributions by Tsinghua University Press
R3,606 Discovery Miles 36 060 Ships in 12 - 17 working days

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

Primality Testing and Integer Factorization in Public-Key Cryptography (Hardcover, 2nd ed. 2009): Song Y. Yan Primality Testing and Integer Factorization in Public-Key Cryptography (Hardcover, 2nd ed. 2009)
Song Y. Yan
R4,706 R4,280 Discovery Miles 42 800 Save R426 (9%) Ships in 12 - 17 working days

The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P). There is still no polynomial-time algorithm for IFP. Many practical public-key cryptosystems and protocols such as RSA (Rivest-Shamir-Adleman) rely their security on computational intractability of IFP. Primality Testing and Integer Factorization in Public Key Cryptography, Second Edition, provides a survey of recent progress in primality testing and integer factorization, with implications to factoring based public key cryptography. Notable new features are the comparison of Rabin-Miller probabilistic test in RP, Atkin-Morain elliptic curve test in ZPP and AKS deterministic test. This volume is designed for advanced level students in computer science and mathematics, and as a secondary text or reference book; suitable for practitioners and researchers in industry. First edition was very positively reviewed by Prof Samuel Wagstaff at Purdue University in AMS Mathematical Reviews (See MR2028480 2004j: 11148), and by Professor J.T. Ayuso of University of Simon Bolivar in the European Mathematical Societya (TM)s review journal Zentralblatt fA1/4r Mathematik (see Zbl 1048.11103).

CompTIA PenTest+ Study Guide - Exam PT0-002 2nd Edition (Paperback, 2nd Edition): M. Chapple CompTIA PenTest+ Study Guide - Exam PT0-002 2nd Edition (Paperback, 2nd Edition)
M. Chapple
R1,093 Discovery Miles 10 930 Ships in 12 - 17 working days

Prepare for success on the new PenTest+ certification exam and an exciting career in penetration testing In the revamped Second Edition of CompTIA PenTest+ Study Guide: Exam PT0-002, veteran information security experts Dr. Mike Chapple and David Seidl deliver a comprehensive roadmap to the foundational and advanced skills every pentester (penetration tester) needs to secure their CompTIA PenTest+ certification, ace their next interview, and succeed in an exciting new career in a growing field. You'll learn to perform security assessments of traditional servers, desktop and mobile operating systems, cloud installations, Internet-of-Things devices, and industrial or embedded systems. You'll plan and scope a penetration testing engagement including vulnerability scanning, understand legal and regulatory compliance requirements, analyze test results, and produce a written report with remediation techniques. This book will: Prepare you for success on the newly introduced CompTIA PenTest+ PT0-002 Exam Multiply your career opportunities with a certification that complies with ISO 17024 standards and meets Department of Defense Directive 8140/8570.01-M requirements Allow access to the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Perfect for anyone preparing for the updated CompTIA PenTest+ certification exam, CompTIA PenTest+ Study Guide: Exam PT0-002 is also a must-read resource for aspiring penetration testers and IT security professionals seeking to expand and improve their skillset.

Practical Cryptography - Algorithms and Implementations Using C++ (Hardcover): Saiful Azad, Al-Sakib Khan Pathan Practical Cryptography - Algorithms and Implementations Using C++ (Hardcover)
Saiful Azad, Al-Sakib Khan Pathan
R3,486 Discovery Miles 34 860 Ships in 12 - 17 working days

Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an increased reliance on cryptography. This book discusses the theories and concepts behind modern cryptography and demonstrates how to develop and implement cryptographic algorithms using C++ programming language. Written for programmers and engineers, Practical Cryptography explains how you can use cryptography to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this book shows you how to build security into your computer applications, networks, and storage. Suitable for undergraduate and postgraduate students in cryptography, network security, and other security-related courses, this book will also help anyone involved in computer and network security who wants to learn the nuts and bolts of practical cryptography.

Introduction to Cryptography (Paperback, 2nd ed. 2004): Johannes Buchmann Introduction to Cryptography (Paperback, 2nd ed. 2004)
Johannes Buchmann
R1,705 Discovery Miles 17 050 Ships in 12 - 17 working days

Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control, and so forth. Users therefore should not only know how its techniques work, but they must also be able to estimate their efficiency and security. Based on courses taught by the author, this book explains the basic methods of modern cryptography. It is written for readers with only basic mathematical knowledge who are interested in modern cryptographic algorithms and their mathematical foundation. Several exercises are included following each chapter. This revised and extended edition includes new material on the AES encryption algorithm, the SHA-1 Hash algorithm, on secret sharing, as well as updates in the chapters on factoring and discrete logarithms.

Johannes A. Buchmann is Professor of Computer Science and Mathematics at the Technical University of Darmstadt, and an Associate Editor of the Journal of Cryptology. In 1985, he received a Feodor Lynen Fellowship of the Alexander von Humboldt Foundation. He has also received the most prestigious award in science in Germany, the Leibniz Award of the German Science Foundation (Deutsche Forschungsgemeinschaft).

Database Security XI - Status and Prospects (Hardcover, 1998 ed.): T. Y. Lin, Shelly Qian Database Security XI - Status and Prospects (Hardcover, 1998 ed.)
T. Y. Lin, Shelly Qian
R4,348 Discovery Miles 43 480 Ships in 12 - 17 working days

This book aims to discuss in depth the current state of research and practice in database security. It documents progress and provides researchers and students with a broad perspective of recent developments in what is recognised as a key topic in business and in the public sector.

Cryptography, Information Theory, and Error- Correction - A Handbook for the 21st Century, 2nd Edition (Hardcover, 2nd... Cryptography, Information Theory, and Error- Correction - A Handbook for the 21st Century, 2nd Edition (Hardcover, 2nd Edition)
Bruen
R3,108 Discovery Miles 31 080 Ships in 12 - 17 working days

CRYPTOGRAPHY, INFORMATION THEORY, AND ERROR-CORRECTION A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field As technology continues to evolve Cryptography, Information Theory, and Error-Correction: A Handbook for the 21ST Century is an indispensable resource for anyone interested in the secure exchange of financial information. Identity theft, cybercrime, and other security issues have taken center stage as information becomes easier to access. Three disciplines offer solutions to these digital challenges: cryptography, information theory, and error-correction, all of which are addressed in this book. This book is geared toward a broad audience. It is an excellent reference for both graduate and undergraduate students of mathematics, computer science, cybersecurity, and engineering. It is also an authoritative overview for professionals working at financial institutions, law firms, and governments who need up-to-date information to make critical decisions. The book's discussions will be of interest to those involved in blockchains as well as those working in companies developing and applying security for new products, like self-driving cars. With its reader-friendly style and interdisciplinary emphasis this book serves as both an ideal teaching text and a tool for self-learning for IT professionals, statisticians, mathematicians, computer scientists, electrical engineers, and entrepreneurs. Six new chapters cover current topics like Internet of Things security, new identities in information theory, blockchains, cryptocurrency, compression, cloud computing and storage. Increased security and applicable research in elliptic curve cryptography are also featured. The book also: Shares vital, new research in the field of information theory Provides quantum cryptography updates Includes over 350 worked examples and problems for greater understanding of ideas. Cryptography, Information Theory, and Error-Correction guides readers in their understanding of reliable tools that can be used to store or transmit digital information safely.

Foundations of Cryptography: Volume 1, Basic Tools (Paperback, New ed): Oded Goldreich Foundations of Cryptography: Volume 1, Basic Tools (Paperback, New ed)
Oded Goldreich
R1,479 Discovery Miles 14 790 Ships in 12 - 17 working days

Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. It focuses on the basic mathematical tools: computational difficulty (one-way functions), pseudorandomness and zero-knowledge proofs. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving cryptographic problems, rather than on describing ad-hoc approaches. The book is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful.

Transforming Information Security - Optimizing Five Concurrent Trends to Reduce Resource Drain (Paperback): Kathleen M. Moriarty Transforming Information Security - Optimizing Five Concurrent Trends to Reduce Resource Drain (Paperback)
Kathleen M. Moriarty
R1,515 Discovery Miles 15 150 Ships in 10 - 15 working days

The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable. In this exciting new book from security expert Kathleen M. Moriarty, the examination of all five trends uncovers opportunities to change the state of information security. Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space.

Practical Cryptography (Hardcover): Jamie White Practical Cryptography (Hardcover)
Jamie White
R3,565 R3,127 Discovery Miles 31 270 Save R438 (12%) Ships in 10 - 15 working days
Understanding and Applying Cryptography and Data Security (Hardcover): Adam J. Elbirt Understanding and Applying Cryptography and Data Security (Hardcover)
Adam J. Elbirt
R3,528 Discovery Miles 35 280 Ships in 12 - 17 working days

A How-to Guide for Implementing Algorithms and Protocols
Addressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. Derived from the author s teaching notes and research publications, the text is designed for electrical engineering and computer science courses.

Provides the Foundation for Constructing Cryptographic Protocols
The first several chapters present various types of symmetric-key cryptographic algorithms. These chapters examine basic substitution ciphers, cryptanalysis, the Data Encryption Standard (DES), and the Advanced Encryption Standard (AES). Subsequent chapters on public-key cryptographic algorithms cover the underlying mathematics behind the computation of inverses, the use of fast exponentiation techniques, tradeoffs between public- and symmetric-key algorithms, and the minimum key lengths necessary to maintain acceptable levels of security. The final chapters present the components needed for the creation of cryptographic protocols and investigate different security services and their impact on the construction of cryptographic protocols.

Offers Implementation Comparisons
By examining tradeoffs between code size, hardware logic resource requirements, memory usage, speed and throughput, power consumption, and more, this textbook provides students with a feel for what they may encounter in actual job situations.

A solutions manual is available to qualified instructors with course adoptions.

Mechanics of User Identification and Authentication - Fundamentals of Identity Management (Hardcover): Dobromir Todorov Mechanics of User Identification and Authentication - Fundamentals of Identity Management (Hardcover)
Dobromir Todorov
R3,542 Discovery Miles 35 420 Ships in 12 - 17 working days

User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts of selecting one authentication mechanism or another? Introducing key concepts, Mechanics of User Identification and Authentication: Fundamentals of Identity Management outlines the process of controlled access to resources through authentication, authorization, and accounting in an in-depth, yet accessible manner. It examines today's security landscape and the specific threats to user authentication. The book then outlines the process of controlled access to resources and discusses the types of user credentials that can be presented as proof of identity prior to accessing a computer system. It also contains an overview on cryptography that includes the essential approaches and terms required for understanding how user authentication works. This book provides specific information on the user authentication process for both UNIX and Windows. Addressing more advanced applications and services, the author presents common security models such as GSSAPI and discusses authentication architecture. Each method is illustrated with a specific authentication scenario.

Palm and Treo Hacks (Paperback): Scott Machaffie Palm and Treo Hacks (Paperback)
Scott Machaffie
R587 R420 Discovery Miles 4 200 Save R167 (28%) Out of stock

Palm OS is one of the most popular handheld operating systems on the planet. From the newest Tungstens and Treos all the way down the family tree, Palms are everywhere. Although the Palm OS is simple to learn and use, there is more to it than meets the eye - from new features in the Palm to capabilities you can get with add-on software, the Palm can be made to do quite a lot. "Palm and Treo Hacks" gives you tips and tools that show you how to make the most of your Palm. A few minutes spent reading some of the hacks in this book will save you hours of research. Inside this book, you'll learn how to: find great applications for your Palm and make the most of the ones you're using now; get super-organized, getting more from the built-in Personal Information Manager and learning how to manage complex projects with your Palm; extend the Palm with must-have software and hardware add-ons; take your Palm online, reading email, surfing the web, and sending instant messages; and get some rest and relaxation with your Palm, whether it's listening to music, playing classic games, or watching video. Written for beginning to experienced Palm users, "Palm and Treo Hacks" is full of practical, ingenious tips and tricks you can apply immediately. Whether you're looking to master the built-in applications or you want to trick out your Palm to its fullest extent, this book will show you how to get it.

Wireless Security Handbook (Hardcover): Aaron E. Earle Wireless Security Handbook (Hardcover)
Aaron E. Earle
R4,037 Discovery Miles 40 370 Ships in 12 - 17 working days

The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. This wide scope benefits anyone who has to administer, secure, hack, or conduct business on a wireless network. This text tackles wireless risk from many angles. It discusses the mitigation of wireless risk at the policy level, cost-effective ways of deploying wireless across large enterprises, and financial controls that reduce unforeseen risks in wireless projects. The handbook also offers the technical details of how you can design, build, and hack nearly all wireless security components. This volume also helps advance your career by covering all of the objectives of the three widely recognized wireless certifications--those administered by Planet3 Wireless and Cisco Systems. The book focuses on the wireless local area networking technologies that help you meet these objectives, while also analyzing almost all other facets of mobile communications.

Understanding Cryptography (Hardcover): Ethan Scott Understanding Cryptography (Hardcover)
Ethan Scott
R3,464 R3,040 Discovery Miles 30 400 Save R424 (12%) Ships in 10 - 15 working days
Introduction to Cryptography (Hardcover): Joey Holland Introduction to Cryptography (Hardcover)
Joey Holland
R3,308 R2,905 Discovery Miles 29 050 Save R403 (12%) Ships in 10 - 15 working days
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Paperback, 1st ed. 2021): Matthew Ryan Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Paperback, 1st ed. 2021)
Matthew Ryan
R4,912 Discovery Miles 49 120 Ships in 10 - 15 working days

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the 'ransomware revolution' after a series of major attacks beginning in 2013, and how the advent of cryptocurrencies provided the catalyst for the development and increased profitability of ransomware, sparking a phenomenal rise in the number and complexity of ransomware attacks. This book analyzes why the speed of technology adoption has been a fundamental factor in the continued success of financially motivated cybercrime, and how the ease of public access to advanced encryption techniques has allowed malicious actors to continue to operate with increased anonymity across the internet. This anonymity has enabled increased collaboration between attackers, which has aided the development of new ransomware attacks, and led to an increasing level of technical complexity in ransomware attacks. This book highlights that the continuous expansion and early adoption of emerging technologies may be beyond the capacity of conventional risk managers and risk management frameworks. Researchers and advanced level students studying or working in computer science, business or criminology will find this book useful as a reference or secondary text. Professionals working in cybersecurity, cryptography, information technology, financial crime (and other related topics) will also welcome this book as a reference.

Database and Applications Security - Integrating Information Security and Data Management (Hardcover, New): Bhavani... Database and Applications Security - Integrating Information Security and Data Management (Hardcover, New)
Bhavani Thuraisingham
R3,503 Discovery Miles 35 030 Ships in 12 - 17 working days

This is the first book to provide an in-depth coverage of all the developments, issues, and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections, each section focusing on some key concept of secure databases and applications. Database and Applications Security provides a comprehensive overview and focuses on all aspects of the technology including secure relational databases, inference problems, secure object databases, secure distributed databases and emerging applications.

Arithmetic and Algebraic Circuits (Paperback, 1st ed. 2021): Antonio Lloris Ruiz, Encarnacion Castillo Morales, Luis Parrilla... Arithmetic and Algebraic Circuits (Paperback, 1st ed. 2021)
Antonio Lloris Ruiz, Encarnacion Castillo Morales, Luis Parrilla Roure, Antonio Garcia Rios, Maria Jose Lloris Meseguer
R5,066 Discovery Miles 50 660 Ships in 10 - 15 working days

This book presents a complete and accurate study of arithmetic and algebraic circuits. The first part offers a review of all important basic concepts: it describes simple circuits for the implementation of some basic arithmetic operations; it introduces theoretical basis for residue number systems; and describes some fundamental circuits for implementing the main modular operations that will be used in the text. Moreover, the book discusses floating-point representation of real numbers and the IEEE 754 standard. The second and core part of the book offers a deep study of arithmetic circuits and specific algorithms for their implementation. It covers the CORDIC algorithm, and optimized arithmetic circuits recently developed by the authors for adders and subtractors, as well as multipliers, dividers and special functions. It describes the implementation of basic algebraic circuits, such as LFSRs and cellular automata. Finally, it offers a complete study of Galois fields, showing some exemplary applications and discussing the advantages in comparison to other methods. This dense, self-contained text provides students, researchers and engineers, with extensive knowledge on and a deep understanding of arithmetic and algebraic circuits and their implementation.

Multimedia Security Handbook (Hardcover, New): Borko Furht, Darko Kirovski Multimedia Security Handbook (Hardcover, New)
Borko Furht, Darko Kirovski
R5,933 Discovery Miles 59 330 Ships in 12 - 17 working days

Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. Multimedia Security Handbook addresses multiple issues related to the protection of digital media, including audio, image, and video content. This volume examines leading-edge multimedia security concepts including protection architectures, encryption, watermarking, fingerprinting, authentication, and various applications. Comprinsing 26 chapters, the Handbook begins by introducing security fundamentals and discussing the vulnerabilities of individual protection schemes. Part II focuses on multimedia encryption, detailing audio, image, and video encryption techniques. Part III examines watermarking techniques, reviewing current and future trends and discussing multidimensional, fragile, and robust watermarks. Part IV covers multimedia data hiding, fingerprinting, and authentication. The text concludes with chapters describing applications of multimedia protection schemes, presenting topics such as application taxonomy, digital rights management, and techniques for adult image filtering. The Handbook offers comprehensive reference material on advanced topics in the field. It delivers invaluable insight for researchers, practitioners, and engineers involved in designing and developing systems that protect digital multimedia content.

The Hacker's Handbook - The Strategy Behind Breaking into and Defending Networks (Hardcover, New): Susan Young, Dave Aitel The Hacker's Handbook - The Strategy Behind Breaking into and Defending Networks (Hardcover, New)
Susan Young, Dave Aitel
R3,527 Discovery Miles 35 270 Ships in 12 - 17 working days

The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders.

This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.

Each section provides a "path" to hacking/security Web sites and other resources that augment existing content. Referencing these supplemental and constantly-updated resources ensures that this volume remains timely and enduring. By informing IT professionals how to think like hackers, this book serves as a valuable weapon in the fight to protect digital assets.

Biometrics - Identity Verification in a Networked World (Paperback): S. Nanavati Biometrics - Identity Verification in a Networked World (Paperback)
S. Nanavati
R817 R658 Discovery Miles 6 580 Save R159 (19%) Out of stock

An insight into the biometric industry and the steps for successful deployment
Biometrics technologies verify identity through characteristics such as fingerprints, voices, and faces. By providing increased security and convenience, biometrics have begun to see widespread deployment in network, e-commerce, and retail applications. This book provides in-depth analysis of biometrics as a solution for authenticating employees and customers. Leading authority, Samir Nanavati explores privacy, security, accuracy, system design, user perceptions, and lessons learned in biometric deployments. He also assesses the real-world strengths and weaknesses of leading biometric technologies: finger-scan, iris-scan, facial-scan, voice-scan, and signature-scan. This accessible book is a necessary step in understanding and implementing biometrics.
Demystifies the complex world of optical networks for IT and business managers
Over the past few years, the cost of fiber optic networking has decreased, making it the best solution for providing virtually unlimited bandwidth for corporate LANs and WANs, metropolitan networks, Internet access, and broadband to the home. The only strategic book on optical networking technologies written from a real-world business perspective, Optical Networking demystifies complex fiber technologies for managers, and details the practical business benefits an optical network can offer. Debra Cameron explores established and emerging markets for optical networks as well as the enabling technologies, applications, network architectures, key deployment issues, and cost considerations. She also provides in-depth case studies of optical networks now in use in the United States and abroad.

Protocols for Authentication and Key Establishment (Hardcover, 2003 ed.): Colin Boyd, Anish Mathuria Protocols for Authentication and Key Establishment (Hardcover, 2003 ed.)
Colin Boyd, Anish Mathuria
R2,823 Discovery Miles 28 230 Ships in 10 - 15 working days

Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly.This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature.As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Word Ryk, Bly Ryk - Hoe Om Welvaart Te…
PJ Botha, Geo Botha Paperback R280 R132 Discovery Miles 1 320
Small Changes for Big Results - How To…
Warren Ingram, Marc Rogatschnig Paperback R290 R227 Discovery Miles 2 270
Abundance Living Basics - How to Live…
Jim Stephens Paperback R208 Discovery Miles 2 080
Plan B - How South Africans Can Invest…
Sean Thomson Paperback R200 R172 Discovery Miles 1 720
The Runway Decade - Building a…
Pete Bush, Bill Bush Hardcover R639 R542 Discovery Miles 5 420
Invest Your Way To Wealth
Thobelani Maphumulo Paperback R290 R227 Discovery Miles 2 270
Mother Hubbard's Cupboard, or, Canadian…
Anonymous Hardcover R760 Discovery Miles 7 600
The Psychology Of Money - Timeless…
Morgan Housel Paperback R399 R312 Discovery Miles 3 120
Old Age for Beginners - Hilarious Life…
Clive Whichelow Hardcover R173 Discovery Miles 1 730
Pathfinders - Extraordinary Stories Of…
J.L. Collins Paperback R399 R312 Discovery Miles 3 120

 

Partners