0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (16)
  • R250 - R500 (91)
  • R500+ (1,401)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Cellular Automata - 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy,... Cellular Automata - 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy, September 17-21, 2018, Proceedings (Paperback, 1st ed. 2018)
Giancarlo Mauri, Samira El Yacoubi, Alberto Dennunzio, Katsuhiro Nishinari, Luca Manzoni
R1,597 Discovery Miles 15 970 Ships in 10 - 15 working days

This book constitutes the proceedings of the 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, held in Como, Italy, in September 2018. The 47 full papers presented in this volume were carefully reviewed and selected from 64 submissions.This volume contains invited contributions and accepted papers from the main track and from the three organized workshops. The volume is organized in the following topics: biological systems modeling; simulation and other applications of CA; multi-agent systems; pedestrian and traffic dynamics; synchronization and control; theory and cryptography; asynchronous cellular automata; and crowds, traffic and cellular automata.

Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23,... Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part I (Paperback, 1st ed. 2018)
Hovav Shacham, Alexandra Boldyreva
R3,057 Discovery Miles 30 570 Ships in 10 - 15 working days

The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.

Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23,... Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part III (Paperback, 1st ed. 2018)
Hovav Shacham, Alexandra Boldyreva
R3,040 Discovery Miles 30 400 Ships in 10 - 15 working days

The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.

Introduction to Security Reduction (Hardcover, 1st ed. 2018): Fuchun Guo, Willy Susilo, Yi Mu Introduction to Security Reduction (Hardcover, 1st ed. 2018)
Fuchun Guo, Willy Susilo, Yi Mu
R5,372 Discovery Miles 53 720 Ships in 10 - 15 working days

This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography.

The The Modern C# Challenge - Become an expert C# programmer by solving interesting programming problems (Paperback): Rod... The The Modern C# Challenge - Become an expert C# programmer by solving interesting programming problems (Paperback)
Rod Stephens
R1,073 Discovery Miles 10 730 Ships in 10 - 15 working days

Learn advanced C# concepts and techniques such as building caches, cryptography, and parallel programming by solving interesting programming challenges Key Features Gain useful insights on advanced C# programming topics and APIs Use locking and cached values to solve parallel problems Take advantage of .NET's cryptographic tools to encrypt and decrypt strings Book DescriptionC# is a multi-paradigm programming language. The Modern C# Challenge covers with aspects of the .NET Framework such as the Task Parallel Library (TPL) and CryptoAPI. It also encourages you to explore important programming trade-offs such as time versus space or simplicity. There may be many ways to solve a problem and there is often no single right way, but some solutions are definitely better than others. This book has combined these solutions to help you solve real-world problems with C#. In addition to describing programming trade-offs, The Modern C# Challenge will help you build a useful toolkit of techniques such as value caching, statistical analysis, and geometric algorithms. By the end of this book, you will have walked through challenges in C# and explored the .NET Framework in order to develop program logic for real-world applications. What you will learn Perform statistical calculations such as finding the standard deviation Find combinations and permutations Search directories for files matching patterns using LINQ and PLINQ Find areas of polygons using geometric operations Randomize arrays and lists with extension methods Explore the filesystem to find duplicate files Simulate complex systems and implement equality in a class Use cryptographic techniques to encrypt and decrypt strings and files Who this book is forThe Modern C# Challenge is for all C# developers of different abilities wanting to solve real-world problems. There are problems for everyone at any level of expertise in C#

Blockchain Technology And Hacking - Digital Economy Financial Framework With Blockchain And Beginners Guide To Learn Hacking... Blockchain Technology And Hacking - Digital Economy Financial Framework With Blockchain And Beginners Guide To Learn Hacking Computers and Mobile Hacking (Paperback)
Isaac D Cody
R570 Discovery Miles 5 700 Ships in 10 - 15 working days
Hacking Made Simple - Full Beginners Guide To Master Hacking (Paperback): Project Syntax Hacking Made Simple - Full Beginners Guide To Master Hacking (Paperback)
Project Syntax
R278 Discovery Miles 2 780 Ships in 10 - 15 working days
Blockchain across Oracle - Understand the details and implications of the Blockchain for Oracle developers and customers... Blockchain across Oracle - Understand the details and implications of the Blockchain for Oracle developers and customers (Paperback)
Robert van Moelken
R1,246 Discovery Miles 12 460 Ships in 10 - 15 working days

Learn what the Blockchain is, what the differences between available blockchain platforms are, how to work with Oracle's Blockchain Cloud Service, and how Blockchain can change the direction of your Oracle work and the focus of your customers. Key Features A professional orientation of the Blockchain for Oracle developers and customers Learn what the Blockchain is and how it will affect for you and your customers Learn how blockchain will disrupt traditional cross-organizational applications Implement your own Blockchain on Oracle and develop your first smart contract Industry directions of the Blockchain to help you decide where to develop your skills Book DescriptionBlockchain across Oracle gives you the professional orientation to Blockchain that you need as an Oracle developer in today's changing world. Written and prepared for you by Oracle Developer Champion Robert van Moelken, this book gets you up to speed with the details of the Blockchain - core concepts, how to implement Oracle's Blockchain Cloud Service, industry implications for the Blockchain, and how the Blockchain will affect your Oracle customers. Robert van Moelken introduces you to the history and concepts of the Blockchain. You'll really get to understand the Blockchain inside and out, as an Oracle developer or solution architect. You'll understand the Blockchain flow, and how the hashes and chains create a new decentralised paradigm for you as an Oracle developer. You'll gain insights into how the Blockchain affects Oracle developers and customers in this modern and disruptive era. You'll see how the Blockchain concepts work in this new world where Assets, Transactions, Security, and Privacy, can all be sustained across a decentralized system for your customers. Then you'll find a detailed look at the cutting-edge Oracle middleware solutions. You'll learn about Hyperledger Fabric, the opensource Blockchain framework used by Oracle as its core, and how to set up your own Oracle Blockchain Network. You'll design and develop a smart contract, and learn how to run it on the Oracle Blockchain Cloud Service. The final part of the book looks at how the Blockchain will affect your customers across various industry sectors. By studying industry trends in the financial services sector, healthcare industry, and the transport industry, you'll discover how the options and possibilities for you and your clients are being transformed by the Blockchain across Oracle. You'll complete this professional orientation by looking at Blockchain trends and future directions. What you will learn A full introduction to the Blockchain How the Blockchain affects Oracle developers and customers Core concepts including blocks, hashes, and chains, assets, transactions, and consensus How to work with Oracle Cloud to implement a Blockchain Network Design, develop, and run smart contracts on the Oracle Blockchain Cloud Service Blockchain security and privacy for Oracle developers and clients Public and private Blockchain decisions for Oracle architects and developers Industry analysis across finance, governance, and healthcare sectors Industry trends and the future of the Blockchain technology Who this book is forThis book is a professional orientation for all Oracle developers, solution architects, and decisions makers involved in Oracle system and future development.

Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018,... Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings (Paperback, 1st ed. 2018)
Bart Preneel, Frederik Vercauteren
R3,021 Discovery Miles 30 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018. The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security.

Cryptology Transmitted Message Protection - From Deterministic Chaos up to Optical Vortices (Paperback, Softcover reprint of... Cryptology Transmitted Message Protection - From Deterministic Chaos up to Optical Vortices (Paperback, Softcover reprint of the original 1st ed. 2016)
Igor Izmailov, Boris Poizner, Ilia Romanov, Sergey Smolskiy
R4,016 Discovery Miles 40 160 Ships in 10 - 15 working days

This book presents methods to improve information security for protected communication. It combines and applies interdisciplinary scientific engineering concepts, including cryptography, chaos theory, nonlinear and singular optics, radio-electronics and self-changing artificial systems. It also introduces additional ways to improve information security using optical vortices as information carriers and self-controlled nonlinearity, with nonlinearity playing a key "evolving" role. The proposed solutions allow the universal phenomenon of deterministic chaos to be discussed in the context of information security problems on the basis of examples of both electronic and optical systems. Further, the book presents the vortex detector and communication systems and describes mathematical models of the chaos oscillator as a coder in the synchronous chaotic communication and appropriate decoders, demonstrating their efficiency both analytically and experimentally. Lastly it discusses the cryptologic features of analyzed systems and suggests a series of new structures for confident communication.

Ethereum Cookbook - Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps... Ethereum Cookbook - Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps (Paperback)
Manoj P R
R1,299 Discovery Miles 12 990 Ships in 10 - 15 working days

Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of Ethereum Key Features Build end-to-end decentralized Ethereum apps using Truffle, Web3, and Solidity Explore various solution-based recipes to build smart contracts and foolproof decentralized applications Develop decentralized marketplaces from scratch, build wallets, and manage transactions Book DescriptionEthereum and Blockchain will change the way software is built for business transactions. Most industries have been looking to leverage these new technologies to gain efficiencies and create new business models and opportunities. The Ethereum Cookbook covers various solutions such as setting up Ethereum, writing smart contracts, and creating tokens, among others. You'll learn about the security vulnerabilities, along with other protocols of Ethereum. Once you have understood the basics, you'll move on to exploring various design decisions and tips to make your application scalable and secure. In addition to this, you'll work with various Ethereum packages such as Truffle, Web3, and Ganache. By the end of this book, you'll have comprehensively grasped the Ethereum principles and ecosystem. What you will learn Efficiently write smart contracts in Ethereum Build scalable distributed applications and deploy them Use tools and frameworks to develop, deploy, and test your application Use block explorers such as Etherscan to find a specific transaction Create your own tokens, initial coin offerings (ICOs), and games Understand various security flaws in smart contracts in order to avoid them Who this book is forThe Ethereum Cookbook is for you if you are a software engineer, Blockchain developer, or research scientist who wants to build smart contracts, develop decentralized applications, and facilitate peer-to-peer transaction. It is assumed that you are familiar with Blockchain concepts and have sound knowledge of JavaScript.

Tor - Remaining Anonymous on the Dark Net in an Era of NSA Spying (Paperback): Miles Price Tor - Remaining Anonymous on the Dark Net in an Era of NSA Spying (Paperback)
Miles Price
R326 Discovery Miles 3 260 Ships in 10 - 15 working days
Hacking with Kali Linux - A Step by Step Guide for you to Learn the Basics of CyberSecurity and Hacking (Paperback): Ramon... Hacking with Kali Linux - A Step by Step Guide for you to Learn the Basics of CyberSecurity and Hacking (Paperback)
Ramon Nastase
R271 Discovery Miles 2 710 Ships in 10 - 15 working days
Fault Tolerant Architectures for Cryptography and Hardware Security (Hardcover, 1st ed. 2018): Sikhar Patranabis, Debdeep... Fault Tolerant Architectures for Cryptography and Hardware Security (Hardcover, 1st ed. 2018)
Sikhar Patranabis, Debdeep Mukhopadhyay
R4,148 Discovery Miles 41 480 Ships in 10 - 15 working days

This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.

Tokenomics - The Crypto Shift of Blockchains, ICOs, and Tokens (Paperback): Sean Au, Thomas Power Tokenomics - The Crypto Shift of Blockchains, ICOs, and Tokens (Paperback)
Sean Au, Thomas Power
R1,175 Discovery Miles 11 750 Ships in 10 - 15 working days

Explore the differences between ICOs, cryptocurrencies, and tokens (offerings), enabling the reader to understand the ICO landscape, how millions were raised in minutes, and where the future of the tokenized economy is heading. Take a real-time journey, cutting through the myths, understanding token choices available to everyone. Key Features Interviews with key figures in Tokenomics Unbiased evaluation and comparison of the different offerings Conceptual analysis of the market's reaction League table showing current exposure An account of the theoretical and current legal foundations of alt coins and tokens A complete introduction to the phases of an initial coin offering Book DescriptionTokenomics is the economy of this new world. This is a no-holds-barred, in-depth exploration of the way in which we can participate in the blockchain economy. The reader will learn the basics of bitcoin, blockchains, and tokenomics; what the very first ICO was; and how over a period of 5 years, various projects managed to raise the enormous sums of money they did. The book then provides insights from ICO experts and looks at what the future holds. By comparing the past, current, and future of this technology, the book will inform anyone, whatever motivates their interest. The crypto shift of blockchains, ICOs, and tokens is much more than just buying bitcoins, creating tokens, or raising millions in a minute in an ICO. It is a new paradigm shift from centralized to decentralized, from closed to open, and from opaqueness to transparency. ICOs and the creation of tokens during the craze of 2017 needed a lot of preparation, an understanding of cryptocurrencies and of emerging legal frameworks, but this has spurred a new movement to tokenize the world. The author gives an unbiased, authoritative picture of the current playing field, exploring the token opportunities and provides a unique insight into the developing world of this tokenized economy. This book will nourish hungry minds wanting to grow their knowledge in this fascinating area. What you will learn The background of ICOs and how they came to be The difference between a coin and a token, a utility and a security, and all the other acronyms you're likely to ever encounter How these ICOs raised enormous sums of money Tokenomics: structuring the token with creativity Why it's important to play nicely with the regulators A sneak peak into the future of ICOs from leaders in the industry Who this book is forWith the media hype about bitcoin, this book appeals to anyone, from those with a general interest in anything crypto, or those with some knowledge of the nuances between cryptocurrency, ICOs, IPOs and the Token economy.

Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29 - December 1,... Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Howon Kim, Dong-Chan Kim
R2,626 Discovery Miles 26 260 Ships in 10 - 15 working days

This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017. The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions. The papers were organized in topical sections named: symmetric key encryption; homomorphic encryption, side channel analysis and implementation; broadcast encryption; elliptic curve; signature and protocol; and network and system security.

Hands-On Cryptography with Python - Leverage the power of Python to encrypt and decrypt data (Paperback): Samuel Bowne Hands-On Cryptography with Python - Leverage the power of Python to encrypt and decrypt data (Paperback)
Samuel Bowne
R785 Discovery Miles 7 850 Ships in 10 - 15 working days

Learn to evaluate and compare data encryption methods and attack cryptographic systems Key Features Explore popular and important cryptographic methods Compare cryptographic modes and understand their limitations Learn to perform attacks on cryptographic systems Book DescriptionCryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly. Hands-On Cryptography with Python starts by showing you how to encrypt and evaluate your data. The book will then walk you through various data encryption methods,such as obfuscation, hashing, and strong encryption, and will show how you can attack cryptographic systems. You will learn how to create hashes, crack them, and will understand why they are so different from each other. In the concluding chapters, you will use three NIST-recommended systems: the Advanced Encryption Standard (AES), the Secure Hash Algorithm (SHA), and the Rivest-Shamir-Adleman (RSA). By the end of this book, you will be able to deal with common errors in encryption. What you will learn Protect data with encryption and hashing Explore and compare various encryption methods Encrypt data using the Caesar Cipher technique Make hashes and crack them Learn how to use three NIST-recommended systems: AES, SHA, and RSA Understand common errors in encryption and exploit them Who this book is forHands-On Cryptography with Python is for security professionals who want to learn to encrypt and evaluate data, and compare different encryption methods.

Hands-On Bitcoin Programming with Python - Build powerful online payment centric applications with Python (Paperback): Harish... Hands-On Bitcoin Programming with Python - Build powerful online payment centric applications with Python (Paperback)
Harish Kumar Garg
R651 Discovery Miles 6 510 Ships in 10 - 15 working days

Simplified Python programming for Bitcoin and blockchain Key Features Build Bitcoin applications in Python with the help of simple examples Mine Bitcoins, program Bitcoin-enabled APIs and transaction graphs, and build trading bots Analyze Bitcoin transactions and produce visualizations using Python data analysis tools Book DescriptionBitcoin is a cryptocurrency that's changing the face of online payments. Hands-On Bitcoin Programming with Python teaches you to build software applications for mining and creating Bitcoins using Python. This book starts with the basics of both Bitcoin and blockchain and gives you an overview of these inherent concepts by showing you how to build Bitcoin-driven applications with Python. Packed with clear instructions and practical examples, you will learn to understand simple Python coding examples that work with this cryptocurrency. By the end of the book, you'll be able to mine Bitcoins, accept Bitcoin payments on the app, and work with the basics of blockchain technology to create simply distributed ledgers. What you will learn Master the Bitcoin APIs in Python to manipulate Bitcoin from your Python apps Build your own Bitcoin trading bots to buy Bitcoins at a lower price and sell them at a higher price Write scripts to process Bitcoin payments through a website or app Develop software for Bitcoin mining to create Bitcoin currency on your own computer hardware Create your own keys, addresses, and wallets in Python code Write software to analyze Bitcoin transactions and produce reports, graphs, and other visualizations Who this book is forHands-On Bitcoin Programming with Python consists of examples that will teach you to build your own Bitcoin application. You will learn to write scripts, build software for mining, and create Bitcoins using Python. Anyone with prior Python experience, who wants to explore Python Bitcoin programming and start building Bitcoin-driven Python apps, will find this book useful.

Tor - Exactly How to Remain Invisible on the Anonymous Deep Web (Paperback): Joshua Cody Tor - Exactly How to Remain Invisible on the Anonymous Deep Web (Paperback)
Joshua Cody
R401 Discovery Miles 4 010 Ships in 10 - 15 working days
Hands-On Blockchain with Hyperledger - Building decentralized applications with Hyperledger Fabric and Composer (Paperback):... Hands-On Blockchain with Hyperledger - Building decentralized applications with Hyperledger Fabric and Composer (Paperback)
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O'Dowd, …
R1,460 Discovery Miles 14 600 Ships in 10 - 15 working days

Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease Key Features Write your own chaincode/smart contracts using Golang on hyperledger network Build and deploy decentralized applications (DApps) Dive into real world blockchain challenges such as integration and scalability Book DescriptionBBlockchain and Hyperledger technologiesare hot topics today. Hyperledger Fabric and Hyperledger Composer are open source projects that help organizations create private, permissioned blockchain networks. These find application in finance, banking, supply chain, and IoT among several other sectors. This book will be an easy reference to explore and build blockchain networks using Hyperledger technologies. The book starts by outlining the evolution of blockchain, including an overview of relevant blockchain technologies. You will learn how to configure Hyperledger Fabric and become familiar with its architectural components. Using these components, you will learn to build private blockchain networks, along with the applications that connect to them. Starting from principles first, you'll learn to design and launch a network, implement smart contracts in chaincode and much more. By the end of this book, you will be able to build and deploy your own decentralized applications, handling the key pain points encountered in the blockchain life cycle. What you will learn Discover why blockchain is a game changer in the technology landscape Set up blockchain networks using basic Hyperledger Fabric deployment Understand the considerations for creating decentralized applications Learn to integrate business networks with existing systems Write Smart Contracts quickly with Hyperledger Composer Design transaction model and chaincode with Golang Deploy Composer REST Gateway to access the Composer transactions Maintain, monitor, and govern your blockchain solutions Who this book is forThe book benefits business leaders as it provides a comprehensive view on blockchain business models, governance structure, and business design considerations of blockchain solutions. Technology leaders stand to gain a lot from the detailed discussion around the technology landscape, technology design, and architecture considerations in the book. With model-driven application development, this guide will speed up understanding and concept development for blockchain application developers. The simple and well organized content will put novices at ease with blockchain concepts and constructs.

Bitcoin Takara - 1189 Bitcoin Wallets (Hardcover): Satoshi Nakamoto Bitcoin Takara - 1189 Bitcoin Wallets (Hardcover)
Satoshi Nakamoto
R4,283 R3,319 Discovery Miles 33 190 Save R964 (23%) Ships in 10 - 15 working days
Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22,... Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings (Paperback, 1st ed. 2018)
Itai Dinur, Shlomi Dolev, Sachin Lodha
R1,474 R905 Discovery Miles 9 050 Save R569 (39%) Ships in 9 - 15 working days

This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018. The 16 full and 6 short papers presented in this volume were carefully reviewed and selected from 44 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in the scope.

Cryptography & Malware (Paperback): Solis Tech Cryptography & Malware (Paperback)
Solis Tech
R472 Discovery Miles 4 720 Ships in 10 - 15 working days
Circuit Engineering & Cryptography (Paperback): Solis Tech Circuit Engineering & Cryptography (Paperback)
Solis Tech
R491 Discovery Miles 4 910 Ships in 10 - 15 working days
FIPS PUBs 197, 198, 199 (Paperback): National Institute of Standards and Tech FIPS PUBs 197, 198, 199 (Paperback)
National Institute of Standards and Tech
R419 Discovery Miles 4 190 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Digital Watermarking and Steganography…
Frank Y. Shih Hardcover R3,034 Discovery Miles 30 340
Database Security
Melissa Zgola, Alfred Basta Paperback R1,158 R1,038 Discovery Miles 10 380
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,296 Discovery Miles 32 960
IT Security Governance Guidebook with…
Fred Cohen Hardcover R3,621 Discovery Miles 36 210
CSS in easy steps
Mike McGrath Paperback R420 R336 Discovery Miles 3 360
Hacking Connected Cars - Tactics…
A. Knight Paperback R877 Discovery Miles 8 770
Alice and Bob Learn Application Security
T Janca Paperback R885 Discovery Miles 8 850
Threat Hunting in the Cloud - Defending…
C Peiris Paperback R879 Discovery Miles 8 790
Technology for Success - Computer…
Mark Ciampa, Jill West, … Paperback  (1)
R1,190 R1,070 Discovery Miles 10 700
The Political Economy and Feasibility of…
Spencer J. Pack Hardcover R2,851 Discovery Miles 28 510

 

Partners