0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (78)
  • R250 - R500 (115)
  • R500+ (1,464)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Internet Password Organizer - Internet Address & Password Organizer with Table of Contents (Leather Design Cover) 5.5x8.5... Internet Password Organizer - Internet Address & Password Organizer with Table of Contents (Leather Design Cover) 5.5x8.5 Inches (Paperback)
Annalise K Thornton
R122 Discovery Miles 1 220 Ships in 7 - 11 working days
Password Organizer for Kids - Colorful Password Book to Store All Your Websites and Usernames. Internet Computer-Related... Password Organizer for Kids - Colorful Password Book to Store All Your Websites and Usernames. Internet Computer-Related Information in One Convenient Place with the Internet Password Vault. Protect and Organize All Your Info and Be Safe. (Paperback)
Lula Belle
R186 Discovery Miles 1 860 Ships in 7 - 11 working days
Guide to Automotive Connectivity and Cybersecurity - Trends, Technologies, Innovations and Applications (Hardcover, 1st ed.... Guide to Automotive Connectivity and Cybersecurity - Trends, Technologies, Innovations and Applications (Hardcover, 1st ed. 2019)
Dietmar P. F Moeller, Roland E. Haas
R2,056 R1,781 Discovery Miles 17 810 Save R275 (13%) Ships in 10 - 15 working days

This comprehensive text/reference presents an in-depth review of the state of the art of automotive connectivity and cybersecurity with regard to trends, technologies, innovations, and applications. The text describes the challenges of the global automotive market, clearly showing where the multitude of innovative activities fit within the overall effort of cutting-edge automotive innovations, and provides an ideal framework for understanding the complexity of automotive connectivity and cybersecurity. Topics and features: discusses the automotive market, automotive research and development, and automotive electrical/electronic and software technology; examines connected cars and autonomous vehicles, and methodological approaches to cybersecurity to avoid cyber-attacks against vehicles; provides an overview on the automotive industry that introduces the trends driving the automotive industry towards smart mobility and autonomous driving; reviews automotive research and development, offering background on the complexity involved in developing new vehicle models; describes the technologies essential for the evolution of connected cars, such as cyber-physical systems and the Internet of Things; presents case studies on Car2Go and car sharing, car hailing and ridesharing, connected parking, and advanced driver assistance systems; includes review questions and exercises at the end of each chapter. The insights offered by this practical guide will be of great value to graduate students, academic researchers and professionals in industry seeking to learn about the advanced methodologies in automotive connectivity and cybersecurity.

Improving your C# Skills - Solve modern challenges with functional programming and test-driven techniques of C# (Paperback):... Improving your C# Skills - Solve modern challenges with functional programming and test-driven techniques of C# (Paperback)
Ovais Mehboob Ahmed Khan, John Callaway, Clayton Hunt, Rod Stephens
R1,313 Discovery Miles 13 130 Ships in 10 - 15 working days

Conquer complex and interesting programming challenges by building robust and concurrent applications with caches, cryptography, and parallel programming. Key Features Understand how to use .NET frameworks like the Task Parallel Library (TPL)and CryptoAPI Develop a containerized application based on microservices architecture Gain insights into memory management techniques in .NET Core Book DescriptionThis Learning Path shows you how to create high performing applications and solve programming challenges using a wide range of C# features. You'll begin by learning how to identify the bottlenecks in writing programs, highlight common performance pitfalls, and apply strategies to detect and resolve these issues early. You'll also study the importance of micro-services architecture for building fast applications and implementing resiliency and security in .NET Core. Then, you'll study the importance of defining and testing boundaries, abstracting away third-party code, and working with different types of test double, such as spies, mocks, and fakes. In addition to describing programming trade-offs, this Learning Path will also help you build a useful toolkit of techniques, including value caching, statistical analysis, and geometric algorithms. This Learning Path includes content from the following Packt products: C# 7 and .NET Core 2.0 High Performance by Ovais Mehboob Ahmed Khan Practical Test-Driven Development using C# 7 by John Callaway, Clayton Hunt The Modern C# Challenge by Rod Stephens What you will learn Measure application performance using BenchmarkDotNet Leverage the Task Parallel Library (TPL) and Parallel Language Integrated Query (PLINQ)library to perform asynchronous operations Modify a legacy application to make it testable Use LINQ and PLINQ to search directories for files matching patterns Find areas of polygons using geometric operations Randomize arrays and lists with extension methods Use cryptographic techniques to encrypt and decrypt strings and files Who this book is forIf you want to improve the speed of your code and optimize the performance of your applications, or are simply looking for a practical resource on test driven development, this is the ideal Learning Path for you. Some familiarity with C# and .NET will be beneficial.

Kryptografie fur Dummies (German, Paperback): Hans Werner Lang Kryptografie fur Dummies (German, Paperback)
Hans Werner Lang
R613 R567 Discovery Miles 5 670 Save R46 (8%) Ships in 10 - 15 working days

Die Kommunikation ber das Internet ist quasi ffentlich: Dritte k nnen Nachrichten mitlesen, abfangen oder f lschen. Genauso kann ein Sender einer Nachricht behaupten, diese nie gesendet zu haben, und ein Empf nger kann behaupten, eine Nachricht nie erhalten zu haben. Abhilfe schafft die Kryptografie. Sie erm glicht nicht nur die Verschl sselung von Nachrichten, sondern auch digitale Unterschriften, die Authentifizierung und die Anonymisierung von Kommunikationspartnern. Das hier vorliegende Buch ist eine Einf hrung in die Kryptografie f r Studierende - von der symmetrischen ber die asymmetrische Verschl sselung bis hin zu Hash-Funktionen. Umfassend, keinesfalls oberfl chlich, aber ohne Vorwissen verst ndlich.

Hands-On Blockchain for Python Developers - Gain blockchain programming skills to build decentralized applications using Python... Hands-On Blockchain for Python Developers - Gain blockchain programming skills to build decentralized applications using Python (Paperback)
Arjuna Sky Kok
R1,094 Discovery Miles 10 940 Ships in 7 - 11 working days

Implement real-world decentralized applications using Python, Vyper, Populus, and Ethereum Key Features Stay up-to-date with everything you need to know about the blockchain ecosystem Implement smart contracts, wallets, and decentralized applications(DApps) using Python libraries Get deeper insights into storing content in a distributed storage platform Book DescriptionBlockchain is seen as the main technological solution that works as a public ledger for all cryptocurrency transactions. This book serves as a practical guide to developing a full-fledged decentralized application with Python to interact with the various building blocks of blockchain applications. Hands-On Blockchain for Python Developers starts by demonstrating how blockchain technology and cryptocurrency hashing works. You will understand the fundamentals and benefits of smart contracts such as censorship resistance and transaction accuracy. As you steadily progress, you'll go on to build smart contracts using Vyper, which has a similar syntax to Python. This experience will further help you unravel the other benefits of smart contracts, including reliable storage and backup, and efficiency. You'll also use web3.py to interact with smart contracts and leverage the power of both the web3.py and Populus framework to build decentralized applications that offer security and seamless integration with cryptocurrencies. As you explore later chapters, you'll learn how to create your own token on top of Ethereum and build a cryptocurrency wallet graphical user interface (GUI) that can handle Ethereum and Ethereum Request for Comments (ERC-20) tokens using the PySide2 library. This will enable users to seamlessly store, send, and receive digital money. Toward the end, you'll implement InterPlanetary File System (IPFS) technology in your decentralized application to provide a peer-to-peer filesystem that can store and expose media. By the end of this book, you'll be well-versed in blockchain programming and be able to build end-to-end decentralized applications on a range of domains using Python. What you will learn Understand blockchain technology and what makes it an immutable database Use the features of web3.py API to interact with the smart contract Create your own cryptocurrency and token in Ethereum using Vyper Use IPFS features to store content on the decentralized storage platform Implement a Twitter-like decentralized application with a desktop frontend Build decentralized applications in the shape of console, web, and desktop applications Who this book is forIf you are a Python developer who wants to enter the world of blockchain, Hands-On Blockchain for Python Developers is for you. The book will be your go-to guide to becoming well-versed with the blockchain ecosystem and building your own decentralized applications using Python and library support.

Microsoft Vista for IT Security Professionals (Paperback): Anthony Piltzecker Microsoft Vista for IT Security Professionals (Paperback)
Anthony Piltzecker
R888 R366 Discovery Miles 3 660 Save R522 (59%) Ships in 10 - 15 working days

This book is designed for the professional system administrators who need to securely deploy Microsoft Vista in their networks. Readers will not only learn about the new security features of Vista, but they will learn how to safely integrate Vista with their existing wired and wireless network infrastructure and safely deploy with their existing applications and databases. The book begins with a discussion of Microsoft's Trustworthy Computing Initiative and Vista's development cycle, which was like none other in Microsoft's history. Expert authors will separate the hype from the reality of Vista s preparedness to withstand the 24 x 7 attacks it will face from malicious attackers as the world s #1 desktop operating system. The book has a companion CD which contains hundreds of working scripts and utilities to help administrators secure their environments.
. Microsoft Windows operating systems run more than 90% of the desktop PCs in the world and Vista is the first major Windows release in more than 5 years
. This is currently the only book on Windows Vista Security
. The companion CD contains hundreds of working scripts and utilities to help administrators secure their environments."

Hands-On IoT Solutions with Blockchain - Discover how converging IoT and blockchain can help you build effective solutions... Hands-On IoT Solutions with Blockchain - Discover how converging IoT and blockchain can help you build effective solutions (Paperback)
Maximiliano Santos, Enio Moura
R878 Discovery Miles 8 780 Ships in 10 - 15 working days

Integrate an end-to-end logistic chain using IBM Blockchain and IoT platforms Key Features Explore practical implementation of ledger technology in the IoT architecture Study security best practices for your smart devices Understand Blockchain implementation for end-to-end IoT solutions Book DescriptionBlockchain has been the hot topic of late thanks to cryptocurrencies. To make matters more interesting, the financial market is looking for ways to reduce operational costs and generate new business models, and this is where blockchain solutions come into the picture. In addition to this, with Internet of Things (IoT) trending and Arduino, Raspberry Pi, and other devices flooding the market, you can now create cheap devices even at home. Hands-On IoT Solutions with Blockchain starts with an overview of IoT concepts in the current business scenario. It then helps you develop your own device on the IBM Watson IoT platform and create your fi rst IoT solution using Watson and Intel Edison.Once you are familiar with IoT, you will learn about Blockchain technology and its use cases. You will also work with the Hyperledger framework and develop your own Blockchain network. As you progress through the chapters, you'll work with problem statements and learn how to design your solution architecture so that you can create your own integrated Blockchain and IoT solution. The next set of chapters will explain how to implement end-to-end Blockchain solutions with IoT using the IBM Cloud platform. By the end of this book, you will have mastered the convergence of IoT and Blockchain technology and exploited the best practices and drivers to develop a bulletproof integrated solution. What you will learn Understand the key roles of IoT in the current market Study the different aspects of IBM Watson IoT platform Create devices, gateways, and applications connected to the platform Explore the fundamentals of Blockchain Define good use cases for Blockchain Discover the Hyperledger Fabric and Composer frameworks Develop an IBM Watson IoT application using a Intel Edison Integrate IoT with the Blockchain platform Who this book is forHands-On IoT Solutions with Blockchain is for you if you are an Internet of Things (IoT) analyst, architect, engineer, or any stakeholder responsible for security mechanisms on an IoT infrastructure. This book is also for IT professionals who want to start developing solutions using Blockchain and IoT on the IBM Cloud platform. Basic understanding of IoT will assist you in understanding key concepts covered in the book.

Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected... Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers (Paperback, 1st ed. 2018)
Feng Liu, Shouhuai Xu, Moti Yung
R1,533 Discovery Miles 15 330 Ships in 7 - 11 working days

This book constitutes the proceedings of the First International Conference on Science of Cyber Security, SciSec 2018, held in Beijing, China, in August 2018. The 11 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 54 submissions. The papers focus on science of security; cybersecurity dynamics; attacks and defenses; network security; security metrics and measurements; and performance enhancements.

Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised... Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers (Paperback, 1st ed. 2017)
Aggelos Kiayias
R2,095 R1,764 Discovery Miles 17 640 Save R331 (16%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Conference on Financial Cryptography and Data Security, FC 2017, held in Sliema, Malta, in April 2017. The 30 revised full papers and 5 short papers were carefully selected and reviewed from 132 submissions. The papers are grouped in the following topical sections: Privacy and Identity Management; Privacy and Data Processing; Cryptographic Primitives and API's; Vulnerabilities and Exploits; Blockchain Technology; Security of Internet Protocols; Blind signatures; Searching and Processing Private Data; Secure Channel Protocols; and Privacy in Data Storage and Retrieval.

Trusted Computing - Principles and Applications (Hardcover): Dengguo Feng Trusted Computing - Principles and Applications (Hardcover)
Dengguo Feng; Contributions by Tsinghua University Press
R2,359 R2,073 Discovery Miles 20 730 Save R286 (12%) Ships in 10 - 15 working days

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

Bitcoin Takara - 1189 Bitcoin Wallets (Hardcover): Satoshi Nakamoto Bitcoin Takara - 1189 Bitcoin Wallets (Hardcover)
Satoshi Nakamoto
R3,533 R2,724 Discovery Miles 27 240 Save R809 (23%) Ships in 7 - 11 working days
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and... Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I (Paperback, 1st ed. 2017)
Tsuyoshi Takagi, Thomas Peyrin
R2,804 R2,462 Discovery Miles 24 620 Save R342 (12%) Ships in 10 - 15 working days

The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.

Information Theoretic Security - 10th International Conference, ICITS 2017, Hong Kong, China, November 29 - December 2, 2017,... Information Theoretic Security - 10th International Conference, ICITS 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings (Paperback, 1st ed. 2017)
Junji Shikata
R1,386 R1,175 Discovery Miles 11 750 Save R211 (15%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017. The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.

Domain Specific High-Level Synthesis for Cryptographic Workloads (Hardcover, 1st ed. 2019): Ayesha Khalid, Goutam Paul, Anupam... Domain Specific High-Level Synthesis for Cryptographic Workloads (Hardcover, 1st ed. 2019)
Ayesha Khalid, Goutam Paul, Anupam Chattopadhyay
R3,499 R2,873 Discovery Miles 28 730 Save R626 (18%) Ships in 10 - 15 working days

This book offers an in-depth study of the design and challenges addressed by a high-level synthesis tool targeting a specific class of cryptographic kernels, i.e. symmetric key cryptography. With the aid of detailed case studies, it also discusses optimization strategies that cannot be automatically undertaken by CRYKET (Cryptographic kernels toolkit. The dynamic nature of cryptography, where newer cryptographic functions and attacks frequently surface, means that such a tool can help cryptographers expedite the very large scale integration (VLSI) design cycle by rapidly exploring various design alternatives before reaching an optimal design option. Features include flexibility in cryptographic processors to support emerging cryptanalytic schemes; area-efficient multinational designs supporting various cryptographic functions; and design scalability on modern graphics processing units (GPUs). These case studies serve as a guide to cryptographers exploring the design of efficient cryptographic implementations.

Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part... Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Yael Kalai, Leonid Reyzin
R2,553 R2,138 Discovery Miles 21 380 Save R415 (16%) Ships in 10 - 15 working days

The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017. The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Cybersecurity - 3 Books in 1: Beginners, Intermediate and Advance Guide in Cybersecurity Measures Effectively (Paperback): Zach... Cybersecurity - 3 Books in 1: Beginners, Intermediate and Advance Guide in Cybersecurity Measures Effectively (Paperback)
Zach Webber
R498 Discovery Miles 4 980 Ships in 7 - 11 working days
Blockchain Technology and Applications (Hardcover): Ahmed Banafa Blockchain Technology and Applications (Hardcover)
Ahmed Banafa
R2,246 Discovery Miles 22 460 Ships in 7 - 11 working days

Blockchain is an emerging technology that can radically improve security in transaction networks, it provides the basis for a dynamic distributed ledger that can be applied to save time when recording transactions between parties, remove costs associated with intermediaries, and reduce risks of fraud and tampering. This book explores the fundamentals and applications of Blockchain technology; the transparent, secure, immutable and distributed database used currently as the underlying technology for Cryptocurrency. Decentralized peer-to-peer network, distributed ledger and the trust model that defines Blockchain technology will be explained. Components of Blockchain, its operations, underlying algorithms, and essentials of trust will be defined. Types of Blockchain networks including private and public Blockchain networks will be introduced. Concepts of smart contracts, proof of work and proof of stack will be clarified. The relationship between Blockchain technology, Internet of Things (IoT), Artificial Intelligence (AI), Cybersecurity and Digital Transformation will be explored in this book. Myths about Blockchain will be exposed and a look at the future of Blockchain will be presented. Topics will be covered in this book: Blockchain technology, Smart contracts, Hashing, SHA-256 Hash, Verification, Validation, Consensus models, Digital Mining, Hard fork, Soft fork, Bitcoin, Ethereum, Proof of work, Proof of stack, Myths about Blockchain, Decentralized peer-to-peer network, Types of Blockchain networks, Hot and Cold Wallets, Double Spend, Decentralized Applications, Transaction networks, Sidechains, 51% attack, Cryptocurrency, Digital transformation, Internet of Things (IoT), Artificial Intelligence (AI), Cybersecurity and the Future of Blockchain.

Cybersecurity - The Advance Guide in System Security and Defense Strategies in Cybersecurity (Paperback): Zach Webber Cybersecurity - The Advance Guide in System Security and Defense Strategies in Cybersecurity (Paperback)
Zach Webber
R305 Discovery Miles 3 050 Ships in 7 - 11 working days
Internet Password Book - Your Username and Password Vault (Paperback): Sara Brein Internet Password Book - Your Username and Password Vault (Paperback)
Sara Brein
R168 Discovery Miles 1 680 Ships in 7 - 11 working days
Hands-On Bitcoin Programming with Python - Build powerful online payment centric applications with Python (Paperback): Harish... Hands-On Bitcoin Programming with Python - Build powerful online payment centric applications with Python (Paperback)
Harish Garg
R614 Discovery Miles 6 140 Ships in 7 - 11 working days

Simplified Python programming for Bitcoin and blockchain Key Features Build Bitcoin applications in Python with the help of simple examples Mine Bitcoins, program Bitcoin-enabled APIs and transaction graphs, and build trading bots Analyze Bitcoin transactions and produce visualizations using Python data analysis tools Book DescriptionBitcoin is a cryptocurrency that's changing the face of online payments. Hands-On Bitcoin Programming with Python teaches you to build software applications for mining and creating Bitcoins using Python. This book starts with the basics of both Bitcoin and blockchain and gives you an overview of these inherent concepts by showing you how to build Bitcoin-driven applications with Python. Packed with clear instructions and practical examples, you will learn to understand simple Python coding examples that work with this cryptocurrency. By the end of the book, you'll be able to mine Bitcoins, accept Bitcoin payments on the app, and work with the basics of blockchain technology to create simply distributed ledgers. What you will learn Master the Bitcoin APIs in Python to manipulate Bitcoin from your Python apps Build your own Bitcoin trading bots to buy Bitcoins at a lower price and sell them at a higher price Write scripts to process Bitcoin payments through a website or app Develop software for Bitcoin mining to create Bitcoin currency on your own computer hardware Create your own keys, addresses, and wallets in Python code Write software to analyze Bitcoin transactions and produce reports, graphs, and other visualizations Who this book is forHands-On Bitcoin Programming with Python consists of examples that will teach you to build your own Bitcoin application. You will learn to write scripts, build software for mining, and create Bitcoins using Python. Anyone with prior Python experience, who wants to explore Python Bitcoin programming and start building Bitcoin-driven Python apps, will find this book useful.

Electronic Voting - Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings... Electronic Voting - Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings (Paperback, 1st ed. 2018)
Robert Krimmer, Melanie Volkamer, Veronique Cortier, Rajeev Gore, Manik Hapsara, …
R1,527 Discovery Miles 15 270 Ships in 7 - 11 working days

This book constitutes the refereed proceedings of the Third International Joint Conference on Electronic Voting, E-Vote-ID 2018, held in Bregenz, Austria, in October 2018. The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The papers deal with topics connected with electronic voting including experiences and revisions of the real uses of E-voting systems and corresponding processes in elections.

For My Senior Moments - Never Lose a Password Again! Password Logbook to Store and Organize Important Information - with... For My Senior Moments - Never Lose a Password Again! Password Logbook to Store and Organize Important Information - with Alphabetical Index (5x8) (Paperback)
Notebooks and Journals to Write in
R159 Discovery Miles 1 590 Ships in 7 - 11 working days
Password Logbook - Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With... Password Logbook - Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8) (V1) (Paperback)
Notebooks and Journals to Write in
R158 Discovery Miles 1 580 Ships in 7 - 11 working days
Password Logbook - Never Lose a Password Again! Password Logbook to Store and Organize Important Information - with... Password Logbook - Never Lose a Password Again! Password Logbook to Store and Organize Important Information - with Alphabetical Index (5x8) (V2) (Paperback)
Notebooks and Journals to Write in
R159 Discovery Miles 1 590 Ships in 7 - 11 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Mastering Blockchain - Unlocking the…
Lorne Lantz, Daniel Cawrey Paperback R1,422 R1,085 Discovery Miles 10 850
The Truth Machine - The Blockchain and…
Michael J. Casey, Paul Vigna Paperback  (1)
R399 R304 Discovery Miles 3 040
Tribe of Hackers Blue Team - Tribal…
Marcus J. Carey, Jennifer Jin Paperback R565 R467 Discovery Miles 4 670
You CAN Stop Stupid - Stopping Losses…
Ira Winkler, Dr. Tracy Celaya Brown Paperback R778 R627 Discovery Miles 6 270
Security Awareness - Applying Practical…
Mark Ciampa Paperback R746 R641 Discovery Miles 6 410
The Shellcoder's Handbook - Discovering…
Chris Anley, John Heasman, … Paperback R964 R627 Discovery Miles 6 270
Networks, Security and Complexity - The…
Sean P. Gorman Hardcover R2,465 Discovery Miles 24 650
The Mathematics of Secrets…
Joshua Holden Paperback R464 R379 Discovery Miles 3 790
Guide to Network Defense and…
Randy Weaver, Dean Farwood, … Paperback R1,206 R1,019 Discovery Miles 10 190
Mastering Corda - Blockchain for Java…
Jamiel Sheikh Paperback R1,438 R1,116 Discovery Miles 11 160

 

Partners