0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (18)
  • R250 - R500 (100)
  • R500+ (1,350)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Cryptanalysis of Number Theoretic Ciphers (Hardcover): Mikhail J. Atallah Cryptanalysis of Number Theoretic Ciphers (Hardcover)
Mikhail J. Atallah; Samuel S. Wagstaff, Jr.
R3,902 Discovery Miles 39 020 Ships in 12 - 17 working days

At the heart of modern cryptographic algorithms lies computational number theory. Whether you're encrypting or decrypting ciphers, a solid background in number theory is essential for success. Written by a number theorist and practicing cryptographer, Cryptanalysis of Number Theoretic Ciphers takes you from basic number theory to the inner workings of ciphers and protocols.

First, the book provides the mathematical background needed in cryptography as well as definitions and simple examples from cryptography. It includes summaries of elementary number theory and group theory, as well as common methods of finding or constructing large random primes, factoring large integers, and computing discrete logarithms. Next, it describes a selection of cryptographic algorithms, most of which use number theory. Finally the book presents methods of attack on the cryptographic algorithms and assesses their effectiveness. For each attack method the author lists the systems it applies to and tells how they may be broken with it.

Computational number theorists are some of the most successful cryptanalysts against public key systems. Cryptanalysis of Number Theoretic Ciphers builds a solid foundation in number theory and shows you how to apply it not only when breaking ciphers, but also when designing ones that are difficult to break.

Invitation to Cryptology (Paperback): Thomas Barr Invitation to Cryptology (Paperback)
Thomas Barr
R3,526 Discovery Miles 35 260 Ships in 12 - 17 working days

For a one-semester undergraduate-level course in Cryptology, Mathematics, or Computer Science.

Designed for either the intelligent freshman (good at math) or for a low-level junior year first course, Cryptology introduces a wide range of up-to-date cryptological concepts along with the mathematical ideas that are behind them. The new and old are organized around a historical framework. A variety of mathematical topics that are germane to cryptology (e.g., modular arithmetic, Boolean functions, complexity theory, etc.) are developed, but they do not overshadow the main focus of the text. Unlike other texts in this field, Cryptology brings students directly to concepts of classical substitutions and transpositions and issues in modern cryptographic methods.

Cryptology For Engineers: An Application-oriented Mathematical Introduction (Hardcover): Robert Schmied Cryptology For Engineers: An Application-oriented Mathematical Introduction (Hardcover)
Robert Schmied
R2,550 Discovery Miles 25 500 Ships in 10 - 15 working days

Cryptology is increasingly becoming one of the most essential topics of interest in everyday life. Digital communication happens by transferring data between at least two participants - But do we want to disclose private information while executing a sensitive bank transfer? How about allowing third-party entities to eavesdrop on private calls while performing an important secret business discussion? Do we want to allow ambient communication concerning us to be manipulated while control software is driving our autonomous car along a steep slope? Questions like these make it clear why issues of security are a great concern in our increasingly augmented world.Cryptology for Engineers is a study of digital security in communications systems. The book covers the cryptographical functionalities of ciphering, hash generation, digital signature generation, key management and random number generation, with a clear sense of the mathematical background on the one hand and engineers' requirements on the other. Numerous examples computable by hand or with a small additional cost in most cases are provided inside.

Managing Cybersecurity in the Process Industries: A Risk-based Approach (Hardcover): Ccps Managing Cybersecurity in the Process Industries: A Risk-based Approach (Hardcover)
Ccps
R3,706 Discovery Miles 37 060 Ships in 12 - 17 working days

The chemical process industry is a rich target for cyber attackers who are intent on causing harm. Current risk management techniques are based on the premise that events are initiated by a single failure and the succeeding sequence of events is predictable. A cyberattack on the Safety, Controls, Alarms, and Interlocks (SCAI) undermines this basic assumption. Each facility should have a Cybersecurity Policy, Implementation Plan and Threat Response Plan in place. The response plan should address how to bring the process to a safe state when controls and safety systems are compromised. The emergency response plan should be updated to reflect different actions that may be appropriate in a sabotage situation. IT professionals, even those working at chemical facilities are primarily focused on the risk to business systems. This book contains guidelines for companies on how to improve their process safety performance by applying Risk Based Process Safety (RBPS) concepts and techniques to the problem of cybersecurity.

Foundations of Cryptography: Volume 2, Basic Applications (Paperback): Oded Goldreich Foundations of Cryptography: Volume 2, Basic Applications (Paperback)
Oded Goldreich
R1,594 Discovery Miles 15 940 Ships in 12 - 17 working days

Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Foundations of Cryptography presents a rigorous and systematic treatment of foundational issues, defining cryptographic tasks and solving cryptographic problems. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving several central cryptographic problems, as opposed to describing ad-hoc approaches. This second volume contains a thorough treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It builds on the previous volume, which provided a treatment of one-way functions, pseudorandomness, and zero-knowledge proofs. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful.

Secure Computers and Networks - Analysis, Design, and Implementation (Hardcover): Eric A. Fisch, Gregory B White Secure Computers and Networks - Analysis, Design, and Implementation (Hardcover)
Eric A. Fisch, Gregory B White
R1,193 Discovery Miles 11 930 Ships in 12 - 17 working days

This updated guide presents expert information on analyzing, designing, and implementing all aspects of computer network security. Based on the authors' earlier work, Computer System and Network Security, this new book addresses important concerns regarding network security. It contains new chapters on World Wide Web security issues, secure electronic commerce, incident response, as well as two new appendices on PGP and UNIX security fundamentals.

Cryptography for Dummies (Paperback, 1st ed): C Cobb Cryptography for Dummies (Paperback, 1st ed)
C Cobb
R855 R663 Discovery Miles 6 630 Save R192 (22%) Ships in 12 - 17 working days

  • Cryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping, stock trading, and banking
  • This invaluable introduction to the basics of encryption covers everything from the terminology used in the field to specific technologies to the pros and cons of different implementations
  • Discusses specific technologies that incorporate cryptography in their design, such as authentication methods, wireless encryption, e-commerce, and smart cards
  • Based entirely on real-world issues and situations, the material provides instructions for already available technologies that readers can put to work immediately
  • Expert author Chey Cobb is retired from the NRO, where she held a Top Secret security clearance, instructed employees of the CIA and NSA on computer security and helped develop the computer security policies used by all U.S. intelligence agencies
Blockchain - Una Guia Esencial Para Principiantes Para Comprender La Tecnologia Blockchain, Criptomonedas, Bitcoin y el Futuro... Blockchain - Una Guia Esencial Para Principiantes Para Comprender La Tecnologia Blockchain, Criptomonedas, Bitcoin y el Futuro del Dinero (Spanish Edition) (Spanish, Hardcover)
Herbert Jones
R713 R591 Discovery Miles 5 910 Save R122 (17%) Ships in 10 - 15 working days
The Art of Hacking - Ancient Wisdom for Cybersecurity Defense (Paperback): Ken May The Art of Hacking - Ancient Wisdom for Cybersecurity Defense (Paperback)
Ken May
R494 R414 Discovery Miles 4 140 Save R80 (16%) Ships in 10 - 15 working days
The Shellcoder's Handbook - Discovering and Exploiting Security Holes 2e (Paperback, 2nd Edition): C Anley The Shellcoder's Handbook - Discovering and Exploiting Security Holes 2e (Paperback, 2nd Edition)
C Anley
R1,099 R766 Discovery Miles 7 660 Save R333 (30%) Ships in 12 - 17 working days

* This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application * New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista * Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored * The companion Web site features downloadable code files

The Design of Rijndael - The Advanced Encryption Standard (AES) (Paperback, 2nd ed. 2020): Joan Daemen, Vincent Rijmen The Design of Rijndael - The Advanced Encryption Standard (AES) (Paperback, 2nd ed. 2020)
Joan Daemen, Vincent Rijmen
R4,469 Discovery Miles 44 690 Ships in 10 - 15 working days

An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.

Enterprise Security Architecture - A Business-Driven Approach (Hardcover): Nicholas Sherwood Enterprise Security Architecture - A Business-Driven Approach (Hardcover)
Nicholas Sherwood
R2,985 Discovery Miles 29 850 Ships in 12 - 17 working days

Security is too important to be left in the hands of just one department or employee-it's a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software-it requires a framework for developing and maintaining a system that is proactive. The book is based around the SABSA layered framework. It provides a structured approach to the steps and processes involved in developing security architectures. It also considers how some of the major business issues likely to be encountered can be resolved.

Investigating Cryptocurrencies - Understanding, Extracting, and Analyzing Blockchain Evidence (Paperback): N Furneaux Investigating Cryptocurrencies - Understanding, Extracting, and Analyzing Blockchain Evidence (Paperback)
N Furneaux
R1,373 R988 Discovery Miles 9 880 Save R385 (28%) Ships in 12 - 17 working days

Investigate crimes involving cryptocurrencies and other blockchain technologies Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their money into the market. Worse still, the blockchain can even be used to hide information and covert messaging, unknown to most investigators. Investigating Cryptocurrencies is the first book to help corporate, law enforcement, and other investigators understand the technical concepts and the techniques for investigating crimes utilizing the blockchain and related digital currencies such as Bitcoin and Ethereum. Understand blockchain and transaction technologies Set up and run cryptocurrency accounts Build information about specific addresses Access raw data on blockchain ledgers Identify users of cryptocurrencies Extracting cryptocurrency data from live and imaged computers Following the money With nearly $150 billion in cryptocurrency circulating and $3 billion changing hands daily, crimes committed with or paid for with digital cash are a serious business. Luckily, Investigating Cryptocurrencies Forensics shows you how to detect it and, more importantly, stop it in its tracks.

CEH v11 - Certified Ethical Hacker Version 11 Practice Tests (Paperback, 2nd Edition): R Messier CEH v11 - Certified Ethical Hacker Version 11 Practice Tests (Paperback, 2nd Edition)
R Messier
R672 Discovery Miles 6 720 Ships in 12 - 17 working days

Master CEH v11 and identify your weak spots CEH: Certified Ethical Hacker Version 11 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence--and skills--you need to pass. These tests cover all section sections of the exam blueprint, allowing you to test your knowledge of Background, Analysis/Assessment, Security, Tools/Systems/Programs, Procedures/Methodology, Regulation/Policy, and Ethics. Coverage aligns with CEH version 11, including material to test your knowledge of reconnaissance and scanning, cloud, tablet, and mobile and wireless security and attacks, the latest vulnerabilities, and the new emphasis on Internet of Things (IoT). The exams are designed to familiarize CEH candidates with the test format, allowing them to become more comfortable apply their knowledge and skills in a high-pressure test setting. The ideal companion for the Sybex CEH v11 Study Guide, this book is an invaluable tool for anyone aspiring to this highly-regarded certification. Offered by the International Council of Electronic Commerce Consultants, the Certified Ethical Hacker certification is unique in the penetration testing sphere, and requires preparation specific to the CEH exam more than general IT security knowledge. This book of practice tests help you steer your study where it needs to go by giving you a glimpse of exam day while there's still time to prepare. Practice all seven sections of the CEH v11 exam Test your knowledge of security, tools, procedures, and regulations Gauge your understanding of vulnerabilities and threats Master the material well in advance of exam day By getting inside the mind of an attacker, you gain a one-of-a-kind perspective that dramatically boosts your marketability and advancement potential. If you're ready to attempt this unique certification, the CEH: Certified Ethical Hacker Version 11 Practice Tests are the major preparation tool you should not be without.

Intelligent Security Systems - How Artificial Intelligence, Machine Learning and Data Science Work For and Against Computer... Intelligent Security Systems - How Artificial Intelligence, Machine Learning and Data Science Work For and Against Computer Security (Hardcover)
L. Reznik
R2,356 Discovery Miles 23 560 Ships in 12 - 17 working days

INTELLIGENT SECURITY SYSTEMS Dramatically improve your cybersecurity using AI and machine learning In Intelligent Security Systems, distinguished professor and computer scientist Dr. Leon Reznik delivers an expert synthesis of artificial intelligence, machine learning and data science techniques, applied to computer security to assist readers in hardening their computer systems against threats. Emphasizing practical and actionable strategies that can be immediately implemented by industry professionals and computer device's owners, the author explains how to install and harden firewalls, intrusion detection systems, attack recognition tools, and malware protection systems. He also explains how to recognize and counter common hacking activities. This book bridges the gap between cybersecurity education and new data science programs, discussing how cutting-edge artificial intelligence and machine learning techniques can work for and against cybersecurity efforts. Intelligent Security Systems includes supplementary resources on an author-hosted website, such as classroom presentation slides, sample review, test and exam questions, and practice exercises to make the material contained practical and useful. The book also offers: A thorough introduction to computer security, artificial intelligence, and machine learning, including basic definitions and concepts like threats, vulnerabilities, risks, attacks, protection, and tools An exploration of firewall design and implementation, including firewall types and models, typical designs and configurations, and their limitations and problems Discussions of intrusion detection systems (IDS), including architecture topologies, components, and operational ranges, classification approaches, and machine learning techniques in IDS design A treatment of malware and vulnerabilities detection and protection, including malware classes, history, and development trends Perfect for undergraduate and graduate students in computer security, computer science and engineering, Intelligent Security Systems will also earn a place in the libraries of students and educators in information technology and data science, as well as professionals working in those fields.

Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working... Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference (Hardcover, 2006 ed.)
Steve Furnell; Edited by (ghost editors) Paul Dowland; Edited by Bhavani Thuraisingham, X.Sean Wang
R2,842 Discovery Miles 28 420 Ships in 10 - 15 working days

This is the first joint working conference between the IFIP Working Groups 11. 1 and 11. 5. We hope this joint conference will promote collaboration among researchers who focus on the security management issues and those who are interested in integrity and control of information systems. Indeed, as management at any level may be increasingly held answerable for the reliable and secure operation of the information systems and services in their respective organizations in the same manner as they are for financial aspects of the enterprise, there is an increasing need for ensuring proper standards of integrity and control in information systems in order to ensure that data, software and, ultimately, the business processes are complete, adequate and valid for intended functionality and expectations of the owner (i. e. the user organization). As organizers, we would like to thank the members of the international program committee for their review work during the paper selection process. We would also like to thank the authors of the invited papers, who added valuable contribution to this first joint working conference. Paul Dowland X. Sean Wang December 2005 Contents Preface vii Session 1 - Security Standards Information Security Standards: Adoption Drivers (Invited Paper) 1 JEAN-NOEL EZINGEARD AND DAVID BIRCHALL Data Quality Dimensions for Information Systems Security: A Theorectical Exposition (Invited Paper) 21 GURVIRENDER TEJAY, GURPREET DHILLON, AND AMITA GOYAL CHIN From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper) 41 C. FARKAS, V. GowADiA, A. JAIN, AND D.

Digital Transformation for a Sustainable Society in the 21st Century - I3E 2019 IFIP WG 6.11 International Workshops,... Digital Transformation for a Sustainable Society in the 21st Century - I3E 2019 IFIP WG 6.11 International Workshops, Trondheim, Norway, September 18-20, 2019, Revised Selected Papers (Paperback, 1st ed. 2020)
Ilias O. Pappas, Patrick Mikalef, Yogesh K. Dwivedi, Letizia Jaccheri, John Krogstie, …
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book constitutes papers from the workshops held at the 18th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2019, which took place in Trondheim, Norway, in September 2019. The 11 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 33 submissions to the following workshops: DTIS: Digital Transformation for an Inclusive Society TPSIE: Trust and Privacy Aspects of Smart Information Environments 3(IT): Innovative Teaching of Introductory Topics in Information Technology CROPS: CROwd-Powered e-Services

Encryption for Digital Content (Hardcover, 2010 ed.): Aggelos Kiayias, Serdar Pehlivanoglu Encryption for Digital Content (Hardcover, 2010 ed.)
Aggelos Kiayias, Serdar Pehlivanoglu
R2,914 Discovery Miles 29 140 Ships in 10 - 15 working days

Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques.

"Encryption for Digital Content" details the subset cover framework (currently used in the AACS encryption of Blu-Ray disks), fingerprinting codes, traitor tracing schemes as well as related security models and attacks. It provides an extensive treatment of the complexity of the revocation problem for multi-receiver (subscriber) encryption mechanisms, as well as the complexity of the traceability problem. Pirate evolution type of attacks are covered in depth. This volume also illustrates the manner that attacks affect parameter selection, and how this impacts implementations. The authors gratefully acknowledge the support of the National Science Foundation under Grant No. 0447808.

"

Managing Information Technology (Hardcover): Liam Lewis Managing Information Technology (Hardcover)
Liam Lewis
R3,428 R3,009 Discovery Miles 30 090 Save R419 (12%) Ships in 10 - 15 working days
The Truth Machine - The Blockchain and the Future of Everything (Paperback, Epub Edition): Michael J. Casey, Paul Vigna The Truth Machine - The Blockchain and the Future of Everything (Paperback, Epub Edition)
Michael J. Casey, Paul Vigna 1
R455 R353 Discovery Miles 3 530 Save R102 (22%) Ships in 12 - 17 working days

From the authors of the fascinating The Age of Cryptocurrency, comes the definitive work on the Internet's next big thing: the blockchain. Many of the 'legacy systems' once designed to make our lives easier and our economy more efficient are no longer up to the task; big banks have grown more entrenched, privacy exists only until the next hack, and credit card fraud has become a fact of life. However, there is a way past all this a new kind of operating system with the potential to revolutionise our economy: the blockchain. In The Truth Machine, Michael J. Casey and Paul Vigna demystify the blockchain and explain why it can restore personal control over our data, assets, and identities; grant billions of excluded people access to the global economy; and shift the balance of power to revive society's faith in itself. They reveal the empowerment possible when self-interested middlemen give way to the transparency of the blockchain, while highlighting the job losses, assertion of special interests, and threat to social cohesion that will accompany this shift. With a balanced perspective, Casey and Vigna show why we all must care about the path that blockchain technology takes moving humanity forward, not backward.

Encryption for Organizations and Individuals - Basics of Contemporary and Quantum Cryptography (Paperback, 1st ed.): Robert... Encryption for Organizations and Individuals - Basics of Contemporary and Quantum Cryptography (Paperback, 1st ed.)
Robert Ciesla
R1,623 R1,273 Discovery Miles 12 730 Save R350 (22%) Ships in 10 - 15 working days

Cryptography and encryption aren't just for geeks and spies-they're also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers. You will uncover the concepts of digital encryption and examine key digital encryption algorithms and their various applications. Gauging cryptography from an enterprise perspective, you will get an in-depth look at common attacks that can occur in your systems and lean how to counter them Moving on to quantum computing, you will discover how it differs from the current computing paradigm and understand its potential for the future. After clearing the basics, you will take a close look at how quantum computers work in practice. Shifting focus to quantum cryptography, you will learn more about quantum key distribution (QKD) and how it differs from present-day encryption methodologies. You will also consider the current implementations of QKD, including distribution systems by SwissQuantum and QKD-distribution networks provided by the DARPA Quantum Network. Ultimately, you will learn the means of defending against cryptographic attacks in the up-and-coming quantum age, such as utilizing zero-knowledge proof (ZKP) systems. Deepen your knowledge of cryptographic concepts and be introduced to the new paradigm of quantum cryptography with this book. What You Will Learn Appreciate how digital encryption algorithms work Secure your infrastructure from cryptographic attacks Understand the basics of quantum information science Discover how cryptography relates to quantum computing Implement Quantum Key Distribution (QKD) Who This Book Is For This book is aimed at readers who have an interest in both well-established and up-and-coming types of cryptography, as well as members of organizations to whom privacy is a top priority.

Transformational Security Awareness - What Neuroscientists, Storytellers, and Marketers Can Tech us About Driving Secure... Transformational Security Awareness - What Neuroscientists, Storytellers, and Marketers Can Tech us About Driving Secure Behaviors (Paperback)
P. Carpenter
R686 R579 Discovery Miles 5 790 Save R107 (16%) Ships in 12 - 17 working days

Expert guidance on the art and science of driving secure behaviors Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness programs that drive secure behaviors and culture change. When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That's what Transformational Security Awareness is all about. Author Perry Carpenter weaves together insights and best practices from experts in communication, persuasion, psychology, behavioral economics, organizational culture management, employee engagement, and storytelling to create a multidisciplinary masterpiece that transcends traditional security education and sets you on the path to make a lasting impact in your organization. Find out what you need to know about marketing, communication, behavior science, and culture management Overcome the knowledge-intention-behavior gap Optimize your program to work with the realities of human nature Use simulations, games, surveys, and leverage new trends like escape rooms to teach security awareness Put effective training together into a well-crafted campaign with ambassadors Understand the keys to sustained success and ongoing culture change Measure your success and establish continuous improvements Do you care more about what your employees know or what they do? It's time to transform the way we think about security awareness. If your organization is stuck in a security awareness rut, using the same ineffective strategies, materials, and information that might check a compliance box but still leaves your organization wide open to phishing, social engineering, and security-related employee mistakes and oversights, then you NEED this book.

Steganography Techniques for Digital Images (Paperback, Softcover reprint of the original 1st ed. 2019): Abid Yahya Steganography Techniques for Digital Images (Paperback, Softcover reprint of the original 1st ed. 2019)
Abid Yahya
R3,268 Discovery Miles 32 680 Ships in 10 - 15 working days

This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding. Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption; Provides a variety of methods to achieve characteristic region Steganography synchronization; Shows how Steganography improves upon cryptography by using obscurity features.

Forensic Discovery (Paperback): Daniel Farmer, Wietse Venema Forensic Discovery (Paperback)
Daniel Farmer, Wietse Venema
R1,130 Discovery Miles 11 300 Ships in 12 - 17 working days

"Don't look now, but your fingerprints are all over the cover of this book. Simply picking it up off the shelf to read the cover has left a trail of evidence that you were here.
"If you think book covers are bad, computers are worse. Every time you use a computer, you leave elephant-sized tracks all over it. As Dan and Wietse show, even people trying to be sneaky leave evidence all over, sometimes in surprising places.
"This book is about computer archeology. It's about finding out what might have been based on what is left behind. So pick up a tool and dig in. There's plenty to learn from these masters of computer security."
--Gary McGraw, Ph.D., CTO, Cigital, coauthor of "Exploiting Software" and "Building Secure Software"

"A wonderful book. Beyond its obvious uses, it also teaches a great deal about operating system internals."
--Steve Bellovin, coauthor of "Firewalls and Internet Security, Second Edition," and Columbia University professor

"A must-have reference book for anyone doing computer forensics. Dan and Wietse have done an excellent job of taking the guesswork out of a difficult topic."
--Brad Powell, chief security architect, Sun Microsystems, Inc.

"Farmer and Venema provide the essential guide to 'fossil' data. Not only do they clearly describe what you can find during a forensic investigation, they also provide research found nowhere else about how long data remains on disk and in memory. If you ever expect to look at an exploited system, I highly recommend reading this book."
--Rik Farrow, Consultant, author of "Internet Security for Home and Office"

"Farmer and Venema do for digital archaeology what Indiana Jones did for historicalarchaeology. "Forensic Discovery" unearths hidden treasures in enlightening and entertaining ways, showing how a time-centric approach to computer forensics reveals even the cleverest intruder."
--Richard Bejtlich, technical director, ManTech CFIA, and author of "The Tao of Network Security Monitoring"

"Farmer and Venema are 'hackers' of the old school: They delight in understanding computers at every level and finding new ways to apply existing information and tools to the solution of complex problems."
--Muffy Barkocy, Senior Web Developer, Shopping.com

"This book presents digital forensics from a unique perspective because it examines the systems that create digital evidence in addition to the techniques used to find it. I would recommend this book to anyone interested in learning more about digital evidence from UNIX systems."
--Brian Carrier, digital forensics researcher, and author of "File System Forensic Analysis"The Definitive Guide to Computer Forensics: Theory and Hands-On Practice

Computer forensics--the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators--is becoming ever more important as IT and law enforcement professionals face an epidemic in computer crime. In Forensic Discovery, two internationally recognized experts present a thorough and realistic guide to the subject.

Dan Farmer and Wietse Venema cover both theory and hands-on practice, introducing a powerful approach that can often recover evidence considered lost forever.

The authors draw on their extensive firsthand experience to cover everything from file systems, to memory and kernel hacks, to malware. They expose a widevariety of computer forensics myths that often stand in the way of success. Readers will find extensive examples from Solaris, FreeBSD, Linux, and Microsoft Windows, as well as practical guidance for writing one's own forensic tools. The authors are singularly well-qualified to write this book: They personally created some of the most popular security tools ever written, from the legendary SATAN network scanner to the powerful Coroner's Toolkit for analyzing UNIX break-ins.

After reading this book you will be able to Understand essential forensics concepts: volatility, layering, and trustGather the maximum amount of reliable evidence from a running systemRecover partially destroyed information--and make sense of itTimeline your system: understand what really happened whenUncover secret changes to everything from system utilities to kernel modulesAvoid cover-ups and evidence traps set by intrudersIdentify the digital footprints associated with suspicious activityUnderstand file systems from a forensic analyst's point of viewAnalyze malware--without giving it a chance to escapeCapture and examine the contents of main memory on running systems Walk through the unraveling of an intrusion, one step at a time

The book's companion Web site contains complete source and binary code for open source software discussed in the book, plus additional computer forensics case studies and resource links.

Computational Intelligence, Communications, and Business Analytics - Second International Conference, CICBA 2018, Kalyani,... Computational Intelligence, Communications, and Business Analytics - Second International Conference, CICBA 2018, Kalyani, India, July 27-28, 2018, Revised Selected Papers, Part II (Paperback, 1st ed. 2019)
Jyotsna Kumar Mandal, Somnath Mukhopadhyay, Paramartha Dutta, Kousik Dasgupta
R1,536 Discovery Miles 15 360 Ships in 10 - 15 working days

The two volume set CCIS 1030 and 1031 constitutes the refereed proceedings of the Second International Conference on Computational Intelligence, Communications, and Business Analytics, CICBA 2018, held in Kalyani, India, in July 2018. The 76 revised full papers presented in the two volumes were carefully reviewed and selected from 240 submissions. The papers are organized in topical sections on computational intelligence; signal processing and communications; microelectronics, sensors, and intelligent networks; data science & advanced data analytics; intelligent data mining & data warehousing; and computational forensics (privacy and security).

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R784 Discovery Miles 7 840
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R595 R494 Discovery Miles 4 940
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,512 Discovery Miles 65 120
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,512 Discovery Miles 65 120
Alice and Bob Learn Application Security
T Janca Paperback R849 Discovery Miles 8 490
Bitcoin - Invest In Digital Gold
Szabolcs Juhasz Hardcover R798 Discovery Miles 7 980
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R844 R699 Discovery Miles 6 990
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R757 R639 Discovery Miles 6 390
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,321 R1,183 Discovery Miles 11 830
The Political Economy and Feasibility of…
Spencer J. Pack Hardcover R2,728 Discovery Miles 27 280

 

Partners