0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (12)
  • R250 - R500 (86)
  • R500+ (1,344)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Metaverso y NFT - El descubrimiento de la Web 3.0, la inversion en tokens no fungibles, la realidad virtual, el criptojuego y... Metaverso y NFT - El descubrimiento de la Web 3.0, la inversion en tokens no fungibles, la realidad virtual, el criptojuego y el criptoarte (Spanish, Hardcover)
Donn Newman
R797 R702 Discovery Miles 7 020 Save R95 (12%) Ships in 10 - 15 working days
Understanding Cryptography (Hardcover): Ethan Scott Understanding Cryptography (Hardcover)
Ethan Scott
R3,464 R3,129 Discovery Miles 31 290 Save R335 (10%) Ships in 10 - 15 working days
Introduction to Cryptography (Hardcover): Joey Holland Introduction to Cryptography (Hardcover)
Joey Holland
R3,308 R2,992 Discovery Miles 29 920 Save R316 (10%) Ships in 10 - 15 working days
Computer System and Network Security (Hardcover): Eric A. Fisch Computer System and Network Security (Hardcover)
Eric A. Fisch; Contributions by Stephen P. Crago; Udo W. Pooch; Contributions by Janice Onanian McMahon, Donald Yeung, …
R4,641 Discovery Miles 46 410 Ships in 12 - 19 working days

Computer System and Network Security provides the reader with a basic understanding of the issues involved in the security of computer systems and networks. Introductory in nature, this important new book covers all aspects related to the growing field of computer security. Such complete coverage in a single text has previously been unavailable, and college professors and students, as well as professionals responsible for system security, will find this unique book a valuable source of information, either as a textbook or as a general reference.
Computer System and Network Security discusses existing and potential threats to computer systems and networks and outlines the basic actions that are generally taken to protect them. The first two chapters of the text introduce the reader to the field of computer security, covering fundamental issues and objectives. The next several chapters describe security models, authentication issues, access control, intrusion detection, and damage control. Later chapters address network and database security and systems/networks connected to wide-area networks and internetworks. Other topics include firewalls, cryptography, malicious software, and security standards. The book includes case studies with information about incidents involving computer security, illustrating the problems and potential damage that can be caused when security fails.
This unique reference/textbook covers all aspects of computer and network security, filling an obvious gap in the existing literature.

Image Encryption - A Communication Perspective (Paperback): Fathi E. Abd El-Samie, Hossam Eldin H.  Ahmed, Ibrahim F Elashry,... Image Encryption - A Communication Perspective (Paperback)
Fathi E. Abd El-Samie, Hossam Eldin H. Ahmed, Ibrahim F Elashry, Mai H. Shahieen, Osama S Faragallah, …
R1,551 Discovery Miles 15 510 Ships in 12 - 19 working days

Presenting encryption algorithms with diverse characteristics, Image Encryption: A Communication Perspective examines image encryption algorithms for the purpose of secure wireless communication. It considers two directions for image encryption: permutation-based approaches and substitution-based approaches. Covering the spectrum of image encryption principles and techniques, the book compares image encryption with permutation- and diffusion-based approaches. It explores number theory-based encryption algorithms such as the Data Encryption Standard, the Advanced Encryption Standard, and the RC6 algorithms. It not only details the strength of various encryption algorithms, but also describes their ability to work within the limitations of wireless communication systems. Since some ciphers were not designed for image encryption, the book explains how to modify these ciphers to work for image encryption. It also provides instruction on how to search for other approaches suitable for this task. To make this work comprehensive, the authors explore communication concepts concentrating on the orthogonal frequency division multiplexing (OFDM) system and present a simplified model for the OFDM communication system with its different implementations. Complete with simulation experiments and MATLAB (R) codes for most of the simulation experiments, this book will help you gain the understanding required to select the encryption method that best fulfills your application requirements.

Quality Of Protection - Security Measurements and Metrics (Hardcover, 2006 ed.): Dieter Gollmann, Fabio Massacci, Artsiom... Quality Of Protection - Security Measurements and Metrics (Hardcover, 2006 ed.)
Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin
R5,694 Discovery Miles 56 940 Ships in 10 - 15 working days

Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano, Italy (September 2005). This volume discusses how security research can progress towards quality of protection in security comparable to quality of service in networking and software measurements, and metrics in empirical software engineering. Information security in the business setting has matured in the last few decades. Standards such as IS017799, the Common Criteria (ISO15408), and a number of industry certifications and risk analysis methodologies have raised the bar for good security solutions from a business perspective.

Designed for a professional audience composed of researchers and practitioners in industry, Quality of Protection: Security Measurements and Metrics is also suitable for advanced-level students in computer science.

Asymmetric Cryptography: Primitives and Protocols (Hardcover): Pointcheval Asymmetric Cryptography: Primitives and Protocols (Hardcover)
Pointcheval
R3,582 Discovery Miles 35 820 Ships in 9 - 17 working days

Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves. Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange. After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation.

CompTIA PenTest+ Study Guide - Exam PT0-002 2nd Edition (Paperback, 2nd Edition): M. Chapple CompTIA PenTest+ Study Guide - Exam PT0-002 2nd Edition (Paperback, 2nd Edition)
M. Chapple
R1,293 R1,183 Discovery Miles 11 830 Save R110 (9%) Ships in 12 - 19 working days

Prepare for success on the new PenTest+ certification exam and an exciting career in penetration testing In the revamped Second Edition of CompTIA PenTest+ Study Guide: Exam PT0-002, veteran information security experts Dr. Mike Chapple and David Seidl deliver a comprehensive roadmap to the foundational and advanced skills every pentester (penetration tester) needs to secure their CompTIA PenTest+ certification, ace their next interview, and succeed in an exciting new career in a growing field. You'll learn to perform security assessments of traditional servers, desktop and mobile operating systems, cloud installations, Internet-of-Things devices, and industrial or embedded systems. You'll plan and scope a penetration testing engagement including vulnerability scanning, understand legal and regulatory compliance requirements, analyze test results, and produce a written report with remediation techniques. This book will: Prepare you for success on the newly introduced CompTIA PenTest+ PT0-002 Exam Multiply your career opportunities with a certification that complies with ISO 17024 standards and meets Department of Defense Directive 8140/8570.01-M requirements Allow access to the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Perfect for anyone preparing for the updated CompTIA PenTest+ certification exam, CompTIA PenTest+ Study Guide: Exam PT0-002 is also a must-read resource for aspiring penetration testers and IT security professionals seeking to expand and improve their skillset.

None of Your Business - World Data Flows, Electronic Commerce, and the European Privacy Directive (Paperback): Peter P. Swire,... None of Your Business - World Data Flows, Electronic Commerce, and the European Privacy Directive (Paperback)
Peter P. Swire, Robert E Litan
R635 Discovery Miles 6 350 Ships in 12 - 19 working days

The historic European Union Directive on Data Protection will take effect in October 1998. A key provision will prohibit transfer of personal information from Europe to other countries if they lack "adequate" protection of privacy. If enforced as written, the Directive could create enormous obstacles to commerce between Europe and other countries, such as the United States, that do not have comprehensive privacy statutes. In this book, Peter Swire and Robert Litan provide the first detailed analysis of the sector-by-sector effects of the Directive. They examine such topics as the text of the Directive, the tension between privacy laws and modern information technologies, issues affecting a wide range of businesses and other organizations, effects on the financial services sector, and effects on other prominent sectors with large transborder data flows. In light of the many and significant effects of the Directive as written, the book concludes with detailed policy recommendations on how to avoid a coming trade war with Europe. The book will be of interest to the wide range of individuals and organizations affected by the important new European privacy laws. More generally, the privacy clash discussed in the book will prove a major precedent for how electronic commerce and world data flows will be governed in the Internet Age.

Primality Testing and Integer Factorization in Public-Key Cryptography (Hardcover, 2nd ed. 2009): Song Y. Yan Primality Testing and Integer Factorization in Public-Key Cryptography (Hardcover, 2nd ed. 2009)
Song Y. Yan
R4,407 Discovery Miles 44 070 Ships in 10 - 15 working days

The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P). There is still no polynomial-time algorithm for IFP. Many practical public-key cryptosystems and protocols such as RSA (Rivest-Shamir-Adleman) rely their security on computational intractability of IFP. Primality Testing and Integer Factorization in Public Key Cryptography, Second Edition, provides a survey of recent progress in primality testing and integer factorization, with implications to factoring based public key cryptography. Notable new features are the comparison of Rabin-Miller probabilistic test in RP, Atkin-Morain elliptic curve test in ZPP and AKS deterministic test. This volume is designed for advanced level students in computer science and mathematics, and as a secondary text or reference book; suitable for practitioners and researchers in industry. First edition was very positively reviewed by Prof Samuel Wagstaff at Purdue University in AMS Mathematical Reviews (See MR2028480 2004j: 11148), and by Professor J.T. Ayuso of University of Simon Bolivar in the European Mathematical Societya (TM)s review journal Zentralblatt fA1/4r Mathematik (see Zbl 1048.11103).

Trusted Computing - Principles and Applications (Hardcover): Dengguo Feng Trusted Computing - Principles and Applications (Hardcover)
Dengguo Feng; Contributions by Tsinghua University Press
R3,877 Discovery Miles 38 770 Ships in 12 - 19 working days

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

Practical Cryptography - Algorithms and Implementations Using C++ (Hardcover): Saiful Azad, Al-Sakib Khan Pathan Practical Cryptography - Algorithms and Implementations Using C++ (Hardcover)
Saiful Azad, Al-Sakib Khan Pathan
R4,049 Discovery Miles 40 490 Ships in 12 - 19 working days

Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an increased reliance on cryptography. This book discusses the theories and concepts behind modern cryptography and demonstrates how to develop and implement cryptographic algorithms using C++ programming language. Written for programmers and engineers, Practical Cryptography explains how you can use cryptography to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this book shows you how to build security into your computer applications, networks, and storage. Suitable for undergraduate and postgraduate students in cryptography, network security, and other security-related courses, this book will also help anyone involved in computer and network security who wants to learn the nuts and bolts of practical cryptography.

Managing Information Technology (Hardcover): Liam Lewis Managing Information Technology (Hardcover)
Liam Lewis
R3,428 R3,098 Discovery Miles 30 980 Save R330 (10%) Ships in 10 - 15 working days
Introduction to Cryptography (Paperback, 2nd ed. 2004): Johannes Buchmann Introduction to Cryptography (Paperback, 2nd ed. 2004)
Johannes Buchmann
R1,838 Discovery Miles 18 380 Ships in 12 - 19 working days

Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control, and so forth. Users therefore should not only know how its techniques work, but they must also be able to estimate their efficiency and security. Based on courses taught by the author, this book explains the basic methods of modern cryptography. It is written for readers with only basic mathematical knowledge who are interested in modern cryptographic algorithms and their mathematical foundation. Several exercises are included following each chapter. This revised and extended edition includes new material on the AES encryption algorithm, the SHA-1 Hash algorithm, on secret sharing, as well as updates in the chapters on factoring and discrete logarithms.

Johannes A. Buchmann is Professor of Computer Science and Mathematics at the Technical University of Darmstadt, and an Associate Editor of the Journal of Cryptology. In 1985, he received a Feodor Lynen Fellowship of the Alexander von Humboldt Foundation. He has also received the most prestigious award in science in Germany, the Leibniz Award of the German Science Foundation (Deutsche Forschungsgemeinschaft).

CSS in easy steps (Paperback, 4th ed.): Mike McGrath CSS in easy steps (Paperback, 4th ed.)
Mike McGrath
R368 Discovery Miles 3 680 Ships in 12 - 19 working days
Database Security XI - Status and Prospects (Hardcover, 1998 ed.): T. Y. Lin, Shelly Qian Database Security XI - Status and Prospects (Hardcover, 1998 ed.)
T. Y. Lin, Shelly Qian
R4,559 Discovery Miles 45 590 Ships in 10 - 15 working days

This book aims to discuss in depth the current state of research and practice in database security. It documents progress and provides researchers and students with a broad perspective of recent developments in what is recognised as a key topic in business and in the public sector.

Cryptography, Information Theory, and Error- Correction - A Handbook for the 21st Century, 2nd Edition (Hardcover, 2nd... Cryptography, Information Theory, and Error- Correction - A Handbook for the 21st Century, 2nd Edition (Hardcover, 2nd Edition)
Bruen
R3,341 Discovery Miles 33 410 Ships in 12 - 19 working days

CRYPTOGRAPHY, INFORMATION THEORY, AND ERROR-CORRECTION A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field As technology continues to evolve Cryptography, Information Theory, and Error-Correction: A Handbook for the 21ST Century is an indispensable resource for anyone interested in the secure exchange of financial information. Identity theft, cybercrime, and other security issues have taken center stage as information becomes easier to access. Three disciplines offer solutions to these digital challenges: cryptography, information theory, and error-correction, all of which are addressed in this book. This book is geared toward a broad audience. It is an excellent reference for both graduate and undergraduate students of mathematics, computer science, cybersecurity, and engineering. It is also an authoritative overview for professionals working at financial institutions, law firms, and governments who need up-to-date information to make critical decisions. The book's discussions will be of interest to those involved in blockchains as well as those working in companies developing and applying security for new products, like self-driving cars. With its reader-friendly style and interdisciplinary emphasis this book serves as both an ideal teaching text and a tool for self-learning for IT professionals, statisticians, mathematicians, computer scientists, electrical engineers, and entrepreneurs. Six new chapters cover current topics like Internet of Things security, new identities in information theory, blockchains, cryptocurrency, compression, cloud computing and storage. Increased security and applicable research in elliptic curve cryptography are also featured. The book also: Shares vital, new research in the field of information theory Provides quantum cryptography updates Includes over 350 worked examples and problems for greater understanding of ideas. Cryptography, Information Theory, and Error-Correction guides readers in their understanding of reliable tools that can be used to store or transmit digital information safely.

Blockchain - Una Guia Esencial Para Principiantes Para Comprender La Tecnologia Blockchain, Criptomonedas, Bitcoin y el Futuro... Blockchain - Una Guia Esencial Para Principiantes Para Comprender La Tecnologia Blockchain, Criptomonedas, Bitcoin y el Futuro del Dinero (Spanish Edition) (Spanish, Hardcover)
Herbert Jones
R713 R629 Discovery Miles 6 290 Save R84 (12%) Ships in 10 - 15 working days
Steganography in Digital Media - Principles, Algorithms, and Applications (Hardcover): Jessica Fridrich Steganography in Digital Media - Principles, Algorithms, and Applications (Hardcover)
Jessica Fridrich
R3,124 Discovery Miles 31 240 Ships in 12 - 19 working days

Steganography, the art of hiding of information in apparently innocuous objects or images, is a field with a rich heritage, and an area of rapid current development. This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the detection of steganography. Assuming only a basic knowledge in calculus and statistics, the book blends the various strands of steganography, including information theory, coding, signal estimation and detection, and statistical signal processing. Experiments on real media files demonstrate the performance of the techniques in real life, and most techniques are supplied with pseudo-code, making it easy to implement the algorithms. The book is ideal for students taking courses on steganography and information hiding, and is also a useful reference for engineers and practitioners working in media security and information assurance.

Understanding and Applying Cryptography and Data Security (Hardcover): Adam J. Elbirt Understanding and Applying Cryptography and Data Security (Hardcover)
Adam J. Elbirt
R4,092 Discovery Miles 40 920 Ships in 12 - 19 working days

A How-to Guide for Implementing Algorithms and Protocols
Addressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. Derived from the author s teaching notes and research publications, the text is designed for electrical engineering and computer science courses.

Provides the Foundation for Constructing Cryptographic Protocols
The first several chapters present various types of symmetric-key cryptographic algorithms. These chapters examine basic substitution ciphers, cryptanalysis, the Data Encryption Standard (DES), and the Advanced Encryption Standard (AES). Subsequent chapters on public-key cryptographic algorithms cover the underlying mathematics behind the computation of inverses, the use of fast exponentiation techniques, tradeoffs between public- and symmetric-key algorithms, and the minimum key lengths necessary to maintain acceptable levels of security. The final chapters present the components needed for the creation of cryptographic protocols and investigate different security services and their impact on the construction of cryptographic protocols.

Offers Implementation Comparisons
By examining tradeoffs between code size, hardware logic resource requirements, memory usage, speed and throughput, power consumption, and more, this textbook provides students with a feel for what they may encounter in actual job situations.

A solutions manual is available to qualified instructors with course adoptions.

Data-driven Block Ciphers for Fast Telecommunication Systems (Hardcover, New): Nikolai Moldovyan, Alexander A. Moldovyan Data-driven Block Ciphers for Fast Telecommunication Systems (Hardcover, New)
Nikolai Moldovyan, Alexander A. Moldovyan
R4,026 Discovery Miles 40 260 Ships in 12 - 19 working days

The Most Progressive and Complete Guide to DDO-Based Ciphers

Developers have long recognized that ciphers based on Permutation Networks (PNs) and Controlled Substitution-Permutation Networks (CSPNs) allow for the implementation of a variety of Data Driven Operations (DDOs). These DDOs can provide fast encryption without incurring excessive hardware costs in modern telecommunication networks. However, until now, with a few exceptions, most DDO-based ciphers have been poorly represented in available literature and have continued to remain known to only a small number of encryption experts.

In Data-Driven Block Ciphers for Fast Telecommunication Systems, Nikolai Moldovyan and Alexander Moldovyan, major innovators and holders of several dozen international patents in encryption technology, provide the background and detail the applications needed to investigate new properties of PNs especially relevant to the improvement of modern wireless systems.Furthermore, they propose a universal architecture involving controlled bit permutation instruction that will permit the performance of both data-driven permutations and an arbitrary prescribed fixed permutation in a single cycle. "Immediately improved efficiency for current and future fast telecommunication systems and mobile networks"

Because of its simplicity and efficient use of current hardware, the embedding of this architecture is a highly attractive option for CPU manufacturers.By detailing all the relevant information into a single volume for the first time, the authors of this book make that option more feasible than ever before.

Transforming Information Security - Optimizing Five Concurrent Trends to Reduce Resource Drain (Paperback): Kathleen M. Moriarty Transforming Information Security - Optimizing Five Concurrent Trends to Reduce Resource Drain (Paperback)
Kathleen M. Moriarty
R1,570 Discovery Miles 15 700 Ships in 10 - 15 working days

The information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable. In this exciting new book from security expert Kathleen M. Moriarty, the examination of all five trends uncovers opportunities to change the state of information security. Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space.

Mechanics of User Identification and Authentication - Fundamentals of Identity Management (Hardcover): Dobromir Todorov Mechanics of User Identification and Authentication - Fundamentals of Identity Management (Hardcover)
Dobromir Todorov
R4,105 Discovery Miles 41 050 Ships in 12 - 19 working days

User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts of selecting one authentication mechanism or another? Introducing key concepts, Mechanics of User Identification and Authentication: Fundamentals of Identity Management outlines the process of controlled access to resources through authentication, authorization, and accounting in an in-depth, yet accessible manner. It examines today's security landscape and the specific threats to user authentication. The book then outlines the process of controlled access to resources and discusses the types of user credentials that can be presented as proof of identity prior to accessing a computer system. It also contains an overview on cryptography that includes the essential approaches and terms required for understanding how user authentication works. This book provides specific information on the user authentication process for both UNIX and Windows. Addressing more advanced applications and services, the author presents common security models such as GSSAPI and discusses authentication architecture. Each method is illustrated with a specific authentication scenario.

Computer Security and Encryption - An Introduction (Paperback): S. R. Chauhan, S. Jangra Computer Security and Encryption - An Introduction (Paperback)
S. R. Chauhan, S. Jangra
R1,439 R1,186 Discovery Miles 11 860 Save R253 (18%) Ships in 10 - 15 working days

Because of the rapid growth of cybercrime, cryptography and system security may be the fastest growing technologies in our culture today. This book describes various aspects of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices in the design of networks and systems. The first portion of the book presents the overall system security concepts and provides a general overview of its features, such as object model and inter-object communications. The objective is to provide an understanding of the cryptography underpinnings on which the rest of the book is based. The book is designed to meet the needs of beginners as well as more advanced readers. Features: Covers the major components of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices used in the design of networks and systems Includes a discussion of emerging technologies such as Big Data Analytics, cloud computing, Internet of Things (IoT), Smart Grid, SCADA, control systems, and Wireless Sensor Networks (WSN)

Quantum Communications and Cryptography (Hardcover): Alexander V. Sergienko Quantum Communications and Cryptography (Hardcover)
Alexander V. Sergienko
R5,383 Discovery Miles 53 830 Ships in 12 - 19 working days

All current methods of secure communication such as public-key cryptography can eventually be broken by faster computing. At the interface of physics and computer science lies a powerful solution for secure communications: quantum cryptography. Because eavesdropping changes the physical nature of the information, users in a quantum exchange can easily detect eavesdroppers. This allows for totally secure random key distribution, a central requirement for use of the one-time pad. Since the one-time pad is theoretically proven to be undecipherable, quantum cryptography is the key to perfect secrecy.

Quantum Communications and Cryptography is the first comprehensive review of the past, present, and potential developments in this dynamic field. Leading expert contributors from around the world discuss the scientific foundations, experimental and theoretical developments, and cutting-edge technical and engineering advances in quantum communications and cryptography.

The book describes the engineering principles and practical implementations in a real-world metropolitan network as well as physical principles and experimental results of such technologies as entanglement swapping and quantum teleportation. It also offers the first detailed treatment of quantum information processing with continuous variables. Technologies include both free-space and fiber-based communications systems along with the necessary protocols and information processing approaches.

Bridging the gap between physics and engineering, Quantum Communications and Cryptography supplies a springboard for further developments and breakthroughs in this rapidly growing area.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Information Security and Ethics - Social…
Marian Quigley Hardcover R2,316 Discovery Miles 23 160
Implementing the ISO/IEC 27001…
Edward Humphreys Hardcover R2,400 Discovery Miles 24 000
Alice and Bob Learn Application Security
T Janca Paperback R1,084 R924 Discovery Miles 9 240
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,692 Discovery Miles 66 920
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,573 Discovery Miles 35 730
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R539 Discovery Miles 5 390
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R673 Discovery Miles 6 730
TLS Mastery
Michael W Lucas Hardcover R970 R875 Discovery Miles 8 750
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R834 Discovery Miles 8 340
Cryptocurrencies and Blockchain…
Keizer Soeze Hardcover R1,469 R1,221 Discovery Miles 12 210

 

Partners