0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (78)
  • R250 - R500 (115)
  • R500+ (1,464)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Shit That Matters - Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With... Shit That Matters - Never Lose a Password Again! Password Logbook to Store and Organize Important Information - With Alphabetical Index (5x8) (Paperback)
Notebooks and Journals to Write in
R158 Discovery Miles 1 580 Ships in 7 - 11 working days
Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings... Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings (Paperback, 1st ed. 2017)
Tanja Lange, Tsuyoshi Takagi
R2,172 R1,894 Discovery Miles 18 940 Save R278 (13%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017, held in Utrecht, The Netherlands, in June 2017. The 23 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on code-based cryptography, isogeny-based cryptography, lattice-based cryptography, multivariate cryptography, quantum algorithms, and security models.

Cryptology and Network Security - 17th International Conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018,... Cryptology and Network Security - 17th International Conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018, Proceedings (Paperback, 1st ed. 2018)
Jan Camenisch, Panos Papadimitratos
R1,884 R1,589 Discovery Miles 15 890 Save R295 (16%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17th International Conference on Cryptology and Network Security, CANS 2018, held in Naples, Italy, in September/October 2018. The 26 full papers were carefully reviewed and selected from 79 submissions. The papers are organized in the following topical sections: privacy; Internet misbehavior and protection; malware; symmetric key cryptography; signatures; cryptanalysis; cryptographic primitives; and cryptographic protocols.

Threshold Schemes for Cryptographic Primitives - Nistir 8214 (Paperback): National Institute of Standards and Tech Threshold Schemes for Cryptographic Primitives - Nistir 8214 (Paperback)
National Institute of Standards and Tech
R277 Discovery Miles 2 770 Ships in 7 - 11 working days
Introduction to Certificateless Cryptography (Hardcover): Hu Xiong, Zhen Qin, Athanasios V Vasilakos Introduction to Certificateless Cryptography (Hardcover)
Hu Xiong, Zhen Qin, Athanasios V Vasilakos
R2,066 Discovery Miles 20 660 Ships in 10 - 15 working days

As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC. Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.

Recommendation for Pair-Wise Key Establishment Using Integer Factorization Cryptography - Nist Sp 800-56b REV 2 (Paperback):... Recommendation for Pair-Wise Key Establishment Using Integer Factorization Cryptography - Nist Sp 800-56b REV 2 (Paperback)
National Institute of Standards and Tech
R517 Discovery Miles 5 170 Ships in 7 - 11 working days
Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22,... Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings (Paperback, 1st ed. 2018)
Itai Dinur, Shlomi Dolev, Sachin Lodha
R1,253 Discovery Miles 12 530 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018. The 16 full and 6 short papers presented in this volume were carefully reviewed and selected from 44 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in the scope.

Recommendation for Key Establishment Using Symmetric Block Ciphers - NiST SP 800-71 (Paperback): National Institute of... Recommendation for Key Establishment Using Symmetric Block Ciphers - NiST SP 800-71 (Paperback)
National Institute of Standards and Tech
R326 Discovery Miles 3 260 Ships in 7 - 11 working days
Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Jean-Sebastien Coron, Jesper Buus Nielsen
R2,296 R2,087 Discovery Miles 20 870 Save R209 (9%) Ships in 10 - 15 working days

The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017. The 67 full papers included in these volumes were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections named: lattice attacks and constructions; obfuscation and functional encryption; discrete logarithm; multiparty computation; universal composability; zero knowledge; side-channel attacks and countermeasures; functional encryption; elliptic curves; symmetric cryptanalysis; provable security for symmetric cryptography; security models; blockchain; memory hard functions; symmetric-key constructions; obfuscation; quantum cryptography; public-key encryption and key-exchange.

Discreet Password Book - Never Forget A Password Again! 5.5" x 8.5" Cute Girl And Unicorn Design, Small Password Book With... Discreet Password Book - Never Forget A Password Again! 5.5" x 8.5" Cute Girl And Unicorn Design, Small Password Book With Tabbed Large Alphabet, Pocket-Size Over 350 Record User And Password (Large print, Paperback, Large type / large print edition)
Ellie And Scott
R153 Discovery Miles 1 530 Ships in 7 - 11 working days
Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29 - December 1,... Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Howon Kim, Dong-Chan Kim
R2,747 Discovery Miles 27 470 Ships in 7 - 11 working days

This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017. The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security.

Cybersecurity - The Utmost Intermediate Course Guide in the Fundamentals and Concept of Cybersecurity (Paperback): Zach Webber Cybersecurity - The Utmost Intermediate Course Guide in the Fundamentals and Concept of Cybersecurity (Paperback)
Zach Webber
R345 Discovery Miles 3 450 Ships in 7 - 11 working days
Topics in Cryptology - CT-RSA 2017 - The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA,... Topics in Cryptology - CT-RSA 2017 - The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings (Paperback, 1st ed. 2017)
Helena Handschuh
R2,200 R1,916 Discovery Miles 19 160 Save R284 (13%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2017, CT-RSA 2017, held in San Francisco, CA, USA, in February 2017. The 25 papers presented in this volume were carefully reviewed and selected from 77 submissions. CT-RSA has become a major publication venue in cryptography. It covers a wide variety of topics from public-key to symmetric key cryptography and from cryptographic protocols to primitives and their implementation security. This year selected topics such as cryptocurrencies and white-box cryptography were added to the call for papers.

Blockchain - How Bitcoin and Blockchain Are Reshaping the World of Finance (Paperback): K Connors Blockchain - How Bitcoin and Blockchain Are Reshaping the World of Finance (Paperback)
K Connors
R253 Discovery Miles 2 530 Ships in 7 - 11 working days
Computer Forensics - An Essential Guide for Accountants, Lawyers, and Managers (Hardcover): Michael Sheetz Computer Forensics - An Essential Guide for Accountants, Lawyers, and Managers (Hardcover)
Michael Sheetz
R1,677 Discovery Miles 16 770 Ships in 10 - 15 working days

Would your company be prepared in the event of:
* Computer-driven espionage
* A devastating virus attack
* A hacker's unauthorized access
* A breach of data security?
As the sophistication of computer technology has grown, so has the rate of computer-related criminal activity. Subsequently, American corporations now lose billions of dollars a year to hacking, identity theft, and other computer attacks. More than ever, businesses and professionals responsible for the critical data of countless customers and employees need to anticipate and safeguard against computer intruders and attacks.
The first book to successfully speak to the nontechnical professional in the fields of business and law on the topic of computer crime, Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers provides valuable advice on the hidden difficulties that can blindside companies and result in damaging costs.
Written by industry expert Michael Sheetz, this important book provides readers with an honest look at the computer crimes that can annoy, interrupt--and devastate--a business. Readers are equipped not only with a solid understanding of how computers facilitate fraud and financial crime, but also how computers can be used to investigate, prosecute, and prevent these crimes.
If you want to know how to protect your company from computer crimes but have a limited technical background, this book is for you. Get Computer Forensics: An Essential Guide for Accountants, Lawyers, and Managers and get prepared.

Password Organizer And Hide This Book - 6" x 9" Butterfly Floral Design, See It Bigger Alphabet Password Organizer Book, Large... Password Organizer And Hide This Book - 6" x 9" Butterfly Floral Design, See It Bigger Alphabet Password Organizer Book, Large Print With Tabbed Pages, Over 220 Record User And Password. Keep Favorite Website, Username, Email Used, And Passwords In One Eas (Paperback)
Ellie And Scott
R157 Discovery Miles 1 570 Ships in 7 - 11 working days
Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Jung Hee Cheon, Tsuyoshi Takagi
R3,064 R2,554 Discovery Miles 25 540 Save R510 (17%) Ships in 10 - 15 working days

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.

Hacking - The Ultimate Beginners Guide to Learn and Understand Hacking Effectively (Paperback): Zach Webber Hacking - The Ultimate Beginners Guide to Learn and Understand Hacking Effectively (Paperback)
Zach Webber
R305 Discovery Miles 3 050 Ships in 7 - 11 working days
Cybersecurity - The Ultimate Beginners Guide to Learn and Understand Cybersecurity Measures Effectively (Paperback): Zach Webber Cybersecurity - The Ultimate Beginners Guide to Learn and Understand Cybersecurity Measures Effectively (Paperback)
Zach Webber
R396 Discovery Miles 3 960 Ships in 7 - 11 working days
Minoli-Cordovana's Authoritative Computer & Network Security Dictionary (Paperback): Daniel Minoli, James Cordovana Minoli-Cordovana's Authoritative Computer & Network Security Dictionary (Paperback)
Daniel Minoli, James Cordovana
R1,243 Discovery Miles 12 430 Ships in 10 - 15 working days

A dictionary and handbook that defines the field and provides unique insight

Turn to Minoli-Cordovana's Authoritative Computer and Network Security Dictionary for clear, concise, and up-to-date definitions of terms, concepts, methods, solutions, and tools in the field of computer and network security. About 5,555 security- and IT-related words and phrases are defined. Drawing their definitions from their work experience and from a variety of established and respected sources, the authors have created a single, up-to-the-minute, and standardized resource that users can trust for accuracy and authority.
The dictionary is written for industry executives, managers, and planners who are charged with the responsibility of protecting their organizations from random, negligent, or planned attacks on their information technology resources. It not only defines terms, but also provides these professionals with critical insight into the terms' use and applicability in the field of IT security. Users can therefore refer to the dictionary as a handbook and guide to provide direction and support in all critical areas of computer and network security.
Using a holistic approach, the dictionary takes a broad view of computer and network security, providing users with a single source that defines the complete field, including:
* Definitions targeting the many resources that need to be protected, such as hosts, systems, OSs, databases, storage, information, communications links, communications network elements, clients, PCs, PDAs, VoIP devices, wireless access points and devices, Bluetooth systems, digital content, e-mail, and more
* Definitions for a core set of general IT and networking topics and terms, focusing on recent threats such as worms, viruses, trojans, physical security, internally based attacks, and social engineering
* Definitions for financial topics and terms that are connected to IT security issues, to support the business case for strong security mechanisms at the firm
With the worldwide financial impact of malicious code estimated at roughly 100 billion dollars a year and the threat of ever-increasing vulnerabilities, this dictionary provides essential support to help identify and reduce security risks and protect network and computer users from hostile applicationsand viruses.

Professional Pen Testing for Web Applications (Paperback): Andres Andreu Professional Pen Testing for Web Applications (Paperback)
Andres Andreu
R1,119 R787 Discovery Miles 7 870 Save R332 (30%) Ships in 10 - 15 working days

There is no such thing as "perfect security" when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing creates a balance that allows a system to be secure while simultaneously being fully functional. With this book, you'll learn how to become an effective penetrator (i.e., a white hat or ethical hacker) in order to circumvent the security features of a Web application so that those features can be accurately evaluated and adequate security precautions can be put in place.
After a review of the basics of web applications, you'll be introduced to web application hacking concepts and techniques such as vulnerability analysis, attack simulation, results analysis, manuals, source code, and circuit diagrams. These web application hacking concepts and techniques will prove useful information for ultimately securing the resources that need your protection.
What you will learn from this book
* Surveillance techniques that an attacker uses when targeting a system for a strike
* Various types of issues that exist within the modern day web application space
* How to audit web services in order to assess areas of risk and exposure
* How to analyze your results and translate them into documentation that is useful for remediation
* Techniques for pen-testing trials to practice before a live project
Who this book is for
This book is for programmers, developers, and information security professionals who want to become familiar with web application security and how to audit it.
Wrox Professional guides are planned and written by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job.

Cyber Deception - Building the Scientific Foundation (Hardcover, 1st ed. 2016): Sushil Jajodia, V.S. Subrahmanian, Vipin... Cyber Deception - Building the Scientific Foundation (Hardcover, 1st ed. 2016)
Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang
R3,621 R3,390 Discovery Miles 33 900 Save R231 (6%) Ships in 10 - 15 working days

This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems. This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computer science research relating to cyber-security, or as a supplemental text for a regular graduate-level course on cyber-security.

Hacking Wireless Networks For Dummies (Paperback): Kevin Beaver, Peter T. Davis Hacking Wireless Networks For Dummies (Paperback)
Kevin Beaver, Peter T. Davis; Foreword by Devin K. Akin
R731 R512 Discovery Miles 5 120 Save R219 (30%) Ships in 10 - 15 working days

This book enables readers to become a cyber hero and know the common wireless weaknesses. "Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional." - Devin Akin CTO, The Certified Wireless Network Professional (CWNP) Program. Wireless networks are so convenient not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor. Discover how to: perform ethical hacks without compromising a system; combat denial of service and WEP attacks; understand how invaders think; recognize the effects of different hacks; and protect against war drivers and rogue devices.

Diffusion in Social Networks (Paperback, 1st ed. 2015): Paulo Shakarian, Abhivav Bhatnagar, Ashkan Aleali, Elham Shaabani,... Diffusion in Social Networks (Paperback, 1st ed. 2015)
Paulo Shakarian, Abhivav Bhatnagar, Ashkan Aleali, Elham Shaabani, Ruocheng Guo
R1,500 R1,288 Discovery Miles 12 880 Save R212 (14%) Ships in 10 - 15 working days

This book presents the leading models of social network diffusion that are used to demonstrate the spread of disease, ideas, and behavior. It introduces diffusion models from the fields of computer science (independent cascade and linear threshold), sociology (tipping models), physics (voter models), biology (evolutionary models), and epidemiology (SIR/SIS and related models). A variety of properties and problems related to these models are discussed including identifying seeds sets to initiate diffusion, game theoretic problems, predicting diffusion events, and more. The book explores numerous connections between social network diffusion research and artificial intelligence through topics such as agent-based modeling, logic programming, game theory, learning, and data mining. The book also surveys key empirical results in social network diffusion, and reviews the classic and cutting-edge research with a focus on open problems.

Security of Industrial Control Systems and Cyber Physical Systems - First Workshop, CyberICS 2015 and First Workshop, WOS-CPS... Security of Industrial Control Systems and Cyber Physical Systems - First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21-22, 2015 Revised Selected Papers (Paperback, 1st ed. 2016)
Adrien Becue, Nora Cuppens-Boulahia, Frederic Cuppens, Sokratis Katsikas, Costas Lambrinoudakis
R1,425 R1,236 Discovery Miles 12 360 Save R189 (13%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the First Conference on Cybersecurity of Industrial Control Systems, CyberICS 2015, and the First Workshop on the Security of Cyber Physical Systems, WOS-CPS 2015, held in Vienna, Austria, in September 2015 in conjunction with ESORICS 2015, the 20th annual European Symposium on Research in Computer Security. The 6 revised full papers and 2 short papers of CyberICS 2015 presented together with 3 revised full papers of WOS-CPS 2015 were carefully reviewed and selected from 28 initial submissions. CyberICS 2015 focuses on topics covering ICSs, including cyber protection and cyber defense of SCADA systems, plant control systems, engineering workstations, substation equipment, programmable logic controllers, PLCs, and other industrial control system. WOS-CPS 2015 deals with the Security of Cyber Physical Systems, that exist everywhere around us, and range in size, complexity and criticality, from embedded systems used in smart vehicles, to SCADA systems in smart grids to control systems in water distribution systems, to smart transportation systems etc.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Practical Cryptology and Web Security
P.K. Yuen Paperback R2,035 R1,422 Discovery Miles 14 220
The Shellcoder's Handbook - Discovering…
Chris Anley, John Heasman, … Paperback R964 R627 Discovery Miles 6 270
Mastering Blockchain - Unlocking the…
Lorne Lantz, Daniel Cawrey Paperback R1,422 R1,085 Discovery Miles 10 850
The Truth Machine - The Blockchain and…
Michael J. Casey, Paul Vigna Paperback  (1)
R399 R304 Discovery Miles 3 040
A Cryptography Primer - Secrets and…
Philip N. Klein Paperback R689 Discovery Miles 6 890
Tribe of Hackers Blue Team - Tribal…
Marcus J. Carey, Jennifer Jin Paperback R565 R467 Discovery Miles 4 670
2019 Standard Catalog of…
Mateo Marin Hardcover R903 R638 Discovery Miles 6 380
The Mathematics of Secrets…
Joshua Holden Paperback R464 R379 Discovery Miles 3 790
You CAN Stop Stupid - Stopping Losses…
Ira Winkler, Dr. Tracy Celaya Brown Paperback R778 R627 Discovery Miles 6 270
The Design of Rijndael - The Advanced…
Joan Daemen, Vincent Rijmen Hardcover R3,215 Discovery Miles 32 150

 

Partners