0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (16)
  • R250 - R500 (95)
  • R500+ (1,405)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Hands-On Bitcoin Programming with Python - Build powerful online payment centric applications with Python (Paperback): Harish... Hands-On Bitcoin Programming with Python - Build powerful online payment centric applications with Python (Paperback)
Harish Kumar Garg
R651 Discovery Miles 6 510 Ships in 10 - 15 working days

Simplified Python programming for Bitcoin and blockchain Key Features Build Bitcoin applications in Python with the help of simple examples Mine Bitcoins, program Bitcoin-enabled APIs and transaction graphs, and build trading bots Analyze Bitcoin transactions and produce visualizations using Python data analysis tools Book DescriptionBitcoin is a cryptocurrency that's changing the face of online payments. Hands-On Bitcoin Programming with Python teaches you to build software applications for mining and creating Bitcoins using Python. This book starts with the basics of both Bitcoin and blockchain and gives you an overview of these inherent concepts by showing you how to build Bitcoin-driven applications with Python. Packed with clear instructions and practical examples, you will learn to understand simple Python coding examples that work with this cryptocurrency. By the end of the book, you'll be able to mine Bitcoins, accept Bitcoin payments on the app, and work with the basics of blockchain technology to create simply distributed ledgers. What you will learn Master the Bitcoin APIs in Python to manipulate Bitcoin from your Python apps Build your own Bitcoin trading bots to buy Bitcoins at a lower price and sell them at a higher price Write scripts to process Bitcoin payments through a website or app Develop software for Bitcoin mining to create Bitcoin currency on your own computer hardware Create your own keys, addresses, and wallets in Python code Write software to analyze Bitcoin transactions and produce reports, graphs, and other visualizations Who this book is forHands-On Bitcoin Programming with Python consists of examples that will teach you to build your own Bitcoin application. You will learn to write scripts, build software for mining, and create Bitcoins using Python. Anyone with prior Python experience, who wants to explore Python Bitcoin programming and start building Bitcoin-driven Python apps, will find this book useful.

Hands-On Cryptography with Python - Leverage the power of Python to encrypt and decrypt data (Paperback): Samuel Bowne Hands-On Cryptography with Python - Leverage the power of Python to encrypt and decrypt data (Paperback)
Samuel Bowne
R785 Discovery Miles 7 850 Ships in 10 - 15 working days

Learn to evaluate and compare data encryption methods and attack cryptographic systems Key Features Explore popular and important cryptographic methods Compare cryptographic modes and understand their limitations Learn to perform attacks on cryptographic systems Book DescriptionCryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly. Hands-On Cryptography with Python starts by showing you how to encrypt and evaluate your data. The book will then walk you through various data encryption methods,such as obfuscation, hashing, and strong encryption, and will show how you can attack cryptographic systems. You will learn how to create hashes, crack them, and will understand why they are so different from each other. In the concluding chapters, you will use three NIST-recommended systems: the Advanced Encryption Standard (AES), the Secure Hash Algorithm (SHA), and the Rivest-Shamir-Adleman (RSA). By the end of this book, you will be able to deal with common errors in encryption. What you will learn Protect data with encryption and hashing Explore and compare various encryption methods Encrypt data using the Caesar Cipher technique Make hashes and crack them Learn how to use three NIST-recommended systems: AES, SHA, and RSA Understand common errors in encryption and exploit them Who this book is forHands-On Cryptography with Python is for security professionals who want to learn to encrypt and evaluate data, and compare different encryption methods.

Tor - Exactly How to Remain Invisible on the Anonymous Deep Web (Paperback): Joshua Cody Tor - Exactly How to Remain Invisible on the Anonymous Deep Web (Paperback)
Joshua Cody
R401 Discovery Miles 4 010 Ships in 10 - 15 working days
Progress in Cryptology - INDOCRYPT 2017 - 18th International Conference on Cryptology in India, Chennai, India, December 10-13,... Progress in Cryptology - INDOCRYPT 2017 - 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings (Paperback, 1st ed. 2017)
Arpita Patra, Nigel P. Smart
R2,723 Discovery Miles 27 230 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th International Conference on Cryptology in India, INDOCRYPT 2017, held in Chennai, India, in December 2017. The 19 revised full papers presented in this book were carefully reviewed and selected from 75 submissions. The focus of the conference includes works on Public-Key Cryptography, Cryptographic Protocols, Side-Channel Attacks, Implementation of Cryptographic Schemes, Functional Encryption, Symmetric-Key Cryptanalysis, Foundations, and New Cryptographic Constructions.

Hands-On Blockchain with Hyperledger - Building decentralized applications with Hyperledger Fabric and Composer (Paperback):... Hands-On Blockchain with Hyperledger - Building decentralized applications with Hyperledger Fabric and Composer (Paperback)
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O'Dowd, …
R1,460 Discovery Miles 14 600 Ships in 10 - 15 working days

Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease Key Features Write your own chaincode/smart contracts using Golang on hyperledger network Build and deploy decentralized applications (DApps) Dive into real world blockchain challenges such as integration and scalability Book DescriptionBBlockchain and Hyperledger technologiesare hot topics today. Hyperledger Fabric and Hyperledger Composer are open source projects that help organizations create private, permissioned blockchain networks. These find application in finance, banking, supply chain, and IoT among several other sectors. This book will be an easy reference to explore and build blockchain networks using Hyperledger technologies. The book starts by outlining the evolution of blockchain, including an overview of relevant blockchain technologies. You will learn how to configure Hyperledger Fabric and become familiar with its architectural components. Using these components, you will learn to build private blockchain networks, along with the applications that connect to them. Starting from principles first, you'll learn to design and launch a network, implement smart contracts in chaincode and much more. By the end of this book, you will be able to build and deploy your own decentralized applications, handling the key pain points encountered in the blockchain life cycle. What you will learn Discover why blockchain is a game changer in the technology landscape Set up blockchain networks using basic Hyperledger Fabric deployment Understand the considerations for creating decentralized applications Learn to integrate business networks with existing systems Write Smart Contracts quickly with Hyperledger Composer Design transaction model and chaincode with Golang Deploy Composer REST Gateway to access the Composer transactions Maintain, monitor, and govern your blockchain solutions Who this book is forThe book benefits business leaders as it provides a comprehensive view on blockchain business models, governance structure, and business design considerations of blockchain solutions. Technology leaders stand to gain a lot from the detailed discussion around the technology landscape, technology design, and architecture considerations in the book. With model-driven application development, this guide will speed up understanding and concept development for blockchain application developers. The simple and well organized content will put novices at ease with blockchain concepts and constructs.

Network Security Metrics (Hardcover, 1st ed. 2017): Lingyu Wang, Sushil Jajodia, Anoop Singhal Network Security Metrics (Hardcover, 1st ed. 2017)
Lingyu Wang, Sushil Jajodia, Anoop Singhal
R4,493 Discovery Miles 44 930 Ships in 10 - 15 working days

This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since "you cannot improve what you cannot measure", a network security metric is essential to evaluating the relative effectiveness of potential network security solutions. The authors start by examining the limitations of existing solutions and standards on security metrics, such as CVSS and attack surface, which typically focus on known vulnerabilities in individual software products or systems. The first few chapters of this book describe different approaches to fusing individual metric values obtained from CVSS scores into an overall measure of network security using attack graphs. Since CVSS scores are only available for previously known vulnerabilities, such approaches do not consider the threat of unknown attacks exploiting the so-called zero day vulnerabilities. Therefore, several chapters of this book are dedicated to develop network security metrics especially designed for dealing with zero day attacks where the challenge is that little or no prior knowledge is available about the exploited vulnerabilities, and thus most existing methodologies for designing security metrics are no longer effective. Finally, the authors examine several issues on the application of network security metrics at the enterprise level. Specifically, a chapter presents a suite of security metrics organized along several dimensions for measuring and visualizing different aspects of the enterprise cyber security risk, and the last chapter presents a novel metric for measuring the operational effectiveness of the cyber security operations center (CSOC). Security researchers who work on network security or security analytics related areas seeking new research topics, as well as security practitioners including network administrators and security architects who are looking for state of the art approaches to hardening their networks, will find this book helpful as a reference. Advanced-level students studying computer science and engineering will find this book useful as a secondary text.

Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings... Cryptography and Coding - 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings (Paperback, 1st ed. 2017)
Maire O'Neill
R2,686 Discovery Miles 26 860 Ships in 10 - 15 working days

This book constitutes the proceedings of the 16th IMA International Conference on Cryptography and Coding, IMACC 2017, held at Oxford, UK, in December 2017. The 19 papers presented were carefully reviewed and selected from 32 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory.

Information Theoretic Security - 10th International Conference, ICITS 2017, Hong Kong, China, November 29 - December 2, 2017,... Information Theoretic Security - 10th International Conference, ICITS 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings (Paperback, 1st ed. 2017)
Junji Shikata
R1,520 Discovery Miles 15 200 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017. The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.

Bitcoin Takara - 1189 Bitcoin Wallets (Hardcover): Satoshi Nakamoto Bitcoin Takara - 1189 Bitcoin Wallets (Hardcover)
Satoshi Nakamoto
R4,283 R3,319 Discovery Miles 33 190 Save R964 (23%) Ships in 10 - 15 working days
Cryptography & Malware (Paperback): Solis Tech Cryptography & Malware (Paperback)
Solis Tech
R472 Discovery Miles 4 720 Ships in 10 - 15 working days
Circuit Engineering & Cryptography (Paperback): Solis Tech Circuit Engineering & Cryptography (Paperback)
Solis Tech
R491 Discovery Miles 4 910 Ships in 10 - 15 working days
Algebraic Geometry for Coding Theory and Cryptography - IPAM, Los Angeles, CA, February 2016 (Hardcover, 1st ed. 2017): Everett... Algebraic Geometry for Coding Theory and Cryptography - IPAM, Los Angeles, CA, February 2016 (Hardcover, 1st ed. 2017)
Everett W. Howe, Kristin E. Lauter, Judy L. Walker
R5,126 Discovery Miles 51 260 Ships in 10 - 15 working days

Covering topics in algebraic geometry, coding theory, and cryptography, this volume presents interdisciplinary group research completed for the February 2016 conference at the Institute for Pure and Applied Mathematics (IPAM) in cooperation with the Association for Women in Mathematics (AWM). The conference gathered research communities across disciplines to share ideas and problems in their fields and formed small research groups made up of graduate students, postdoctoral researchers, junior faculty, and group leaders who designed and led the projects. Peer reviewed and revised, each of this volume's five papers achieves the conference's goal of using algebraic geometry to address a problem in either coding theory or cryptography. Proposed variants of the McEliece cryptosystem based on different constructions of codes, constructions of locally recoverable codes from algebraic curves and surfaces, and algebraic approaches to the multicast network coding problem are only some of the topics covered in this volume. Researchers and graduate-level students interested in the interactions between algebraic geometry and both coding theory and cryptography will find this volume valuable.

Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22,... Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings (Paperback, 1st ed. 2018)
Itai Dinur, Shlomi Dolev, Sachin Lodha
R1,474 R905 Discovery Miles 9 050 Save R569 (39%) Ships in 9 - 15 working days

This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018. The 16 full and 6 short papers presented in this volume were carefully reviewed and selected from 44 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in the scope.

Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I... Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I (Paperback, 1st ed. 2017)
Yael Kalai, Leonid Reyzin
R3,045 Discovery Miles 30 450 Ships in 10 - 15 working days

The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017. The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

The GnuTLS 3.6.1 Manual (Paperback): Nikos Mavrogiannopoulos, Simon Josefsson The GnuTLS 3.6.1 Manual (Paperback)
Nikos Mavrogiannopoulos, Simon Josefsson
R662 Discovery Miles 6 620 Ships in 10 - 15 working days
FIPS PUBs 197, 198, 199 (Paperback): National Institute of Standards and Tech FIPS PUBs 197, 198, 199 (Paperback)
National Institute of Standards and Tech
R419 Discovery Miles 4 190 Ships in 10 - 15 working days
Hacking University Graduation Edition - 4 Manuscripts (Computer, Mobile, Python & Linux): Hacking Computers, Mobile Devices,... Hacking University Graduation Edition - 4 Manuscripts (Computer, Mobile, Python & Linux): Hacking Computers, Mobile Devices, Apps, Game Consoles and Learn Python & Linux (Paperback)
Isaac D Cody
R713 Discovery Miles 7 130 Ships in 10 - 15 working days
Artificial Immune System - Applications in Computer Security (Hardcover): Y Tan Artificial Immune System - Applications in Computer Security (Hardcover)
Y Tan
R2,574 Discovery Miles 25 740 Ships in 12 - 17 working days

This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security * Covers all of the current achievements in computer security based on immune principles, which were obtained by the Computational Intelligence Laboratory of Peking University, China * Includes state-of-the-art information on designing and developing artificial immune systems (AIS) and AIS-based solutions to computer security issues * Presents new concepts such as immune danger theory, immune concentration, and class-wise information gain (CIG)

Cybersecurity Exposed - The Cyber House Rules (Hardcover): Raef Meeuwisse Cybersecurity Exposed - The Cyber House Rules (Hardcover)
Raef Meeuwisse
R696 Discovery Miles 6 960 Ships in 10 - 15 working days
Verifiable Composition of Signature and Encryption - A Comprehensive Study of the Design Paradigms (Hardcover, 1st ed. 2017):... Verifiable Composition of Signature and Encryption - A Comprehensive Study of the Design Paradigms (Hardcover, 1st ed. 2017)
Laila El Aimani
R2,886 Discovery Miles 28 860 Ships in 10 - 15 working days

This monograph gives a thorough treatment of the celebrated compositions of signature and encryption that allow for verifiability, that is, to efficiently prove properties about the encrypted data. This study is provided in the context of two cryptographic primitives: (1) designated confirmer signatures, an opaque signature which was introduced to control the proliferation of certified copies of documents, and (2) signcryption, a primitive that offers privacy and authenticity at once in an efficient way. This book is a useful resource to researchers in cryptology and information security, graduate and PhD students, and security professionals.

Quantum Computing for High School Students (Hardcover): Yuly Billig Quantum Computing for High School Students (Hardcover)
Yuly Billig
R893 R721 Discovery Miles 7 210 Save R172 (19%) Ships in 10 - 15 working days
Solidity Programming Essentials - A beginner's guide to build smart contracts for Ethereum and blockchain (Paperback):... Solidity Programming Essentials - A beginner's guide to build smart contracts for Ethereum and blockchain (Paperback)
Ritesh Modi
R1,007 Discovery Miles 10 070 Ships in 10 - 15 working days

Learn the most powerful and primary programming language for writing smart contracts and find out how to write, deploy, and test smart contracts in Ethereum. Key Features Get you up and running with Solidity Programming language Build Ethereum Smart Contracts with Solidity as your scripting language Learn to test and deploy the smart contract to your private Blockchain Book DescriptionSolidity is a contract-oriented language whose syntax is highly influenced by JavaScript, and is designed to compile code for the Ethereum Virtual Machine. Solidity Programming Essentials will be your guide to understanding Solidity programming to build smart contracts for Ethereum and blockchain from ground-up. We begin with a brief run-through of blockchain, Ethereum, and their most important concepts or components. You will learn how to install all the necessary tools to write, test, and debug Solidity contracts on Ethereum. Then, you will explore the layout of a Solidity source file and work with the different data types. The next set of recipes will help you work with operators, control structures, and data structures while building your smart contracts. We take you through function calls, return types, function modifers, and recipes in object-oriented programming with Solidity. Learn all you can on event logging and exception handling, as well as testing and debugging smart contracts. By the end of this book, you will be able to write, deploy, and test smart contracts in Ethereum. This book will bring forth the essence of writing contracts using Solidity and also help you develop Solidity skills in no time. What you will learn Learn the basics and foundational concepts of Solidity and Ethereum Explore the Solidity language and its uniqueness in depth Create new accounts and submit transactions to blockchain Get to know the complete language in detail to write smart contracts Learn about major tools to develop and deploy smart contracts Write defensive code using exception handling and error checking Understand Truffle basics and the debugging process Who this book is forThis book is for anyone who would like to get started with Solidity Programming for developing an Ethereum smart contract. No prior knowledge of EVM is required.

Cryptographic Algorithms (Paperback): Gerard Swedberg Cryptographic Algorithms (Paperback)
Gerard Swedberg
R1,803 R1,690 Discovery Miles 16 900 Save R113 (6%) Ships in 10 - 15 working days
Quality Assurance + Cryptography + Human-Computer Interaction (Paperback): Solis Tech Quality Assurance + Cryptography + Human-Computer Interaction (Paperback)
Solis Tech
R235 Discovery Miles 2 350 Ships in 10 - 15 working days
Mastering Blockchain - Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition (Paperback,... Mastering Blockchain - Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition (Paperback, 2nd Revised edition)
Imran Bashir
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

Learn about cryptography and cryptocurrencies, so you can build highly secure, decentralized applications and conduct trusted in-app transactions. Key Features Get to grips with the underlying technical principles and implementations of blockchain Build powerful applications using Ethereum to secure transactions and create smart contracts Explore cryptography, mine cryptocurrencies, and solve scalability issues with this comprehensive guide Book DescriptionA blockchain is a distributed ledger that is replicated across multiple nodes and enables immutable, transparent and cryptographically secure record-keeping of transactions. The blockchain technology is the backbone of cryptocurrencies, and it has applications in finance, government, media and almost all other industries. Mastering Blockchain, Second Edition has been thoroughly updated and revised to provide a detailed description of this leading technology and its implementation in the real world. This book begins with the technical foundations of blockchain technology, teaching you the fundamentals of distributed systems, cryptography and how it keeps data secure. You will learn about the mechanisms behind cryptocurrencies and how to develop applications using Ethereum, a decentralized virtual machine. You will also explore different other blockchain solutions and get an introduction to business blockchain frameworks under Hyperledger, a collaborative effort for the advancement of blockchain technologies hosted by the Linux Foundation. You will also be shown how to implement blockchain solutions beyond currencies, Internet of Things with blockchain, blockchain scalability, and the future scope of this fascinating and powerful technology. What you will learn Master the theoretical and technical foundations of the blockchain technology Understand the concept of decentralization, its impact, and its relationship with blockchain technology Master how cryptography is used to secure data - with practical examples Grasp the inner workings of blockchain and the mechanisms behind bitcoin and alternative cryptocurrencies Understand the theoretical foundations of smart contracts Learn how Ethereum blockchain works and how to develop decentralized applications using Solidity and relevant development frameworks Identify and examine applications of the blockchain technology - beyond currencies Investigate alternative blockchain solutions including Hyperledger, Corda, and many more Explore research topics and the future scope of blockchain technology Who this book is forThis book will appeal to those who wish to build fast, highly secure, transactional applications. It targets people who are familiar with the concept of blockchain and are comfortable with a programming language.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Political Economy and Feasibility of…
Spencer J. Pack Hardcover R2,851 Discovery Miles 28 510
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,296 Discovery Miles 32 960
CSS in easy steps
Mike McGrath Paperback R420 R336 Discovery Miles 3 360
Alice and Bob Learn Application Security
T Janca Paperback R885 Discovery Miles 8 850
Official (ISC)2 (R) Guide to the CISSP…
Susan Hansche Hardcover R2,663 Discovery Miles 26 630
Database Security
Melissa Zgola, Alfred Basta Paperback R1,158 R1,038 Discovery Miles 10 380
Strategic Information Security
John Wylder Hardcover R2,893 Discovery Miles 28 930
Cryptography - Theory and Practice
Douglas Robert Stinson, Maura Paterson Paperback R1,410 Discovery Miles 14 100
Security without Obscurity - Frequently…
Jeff Stapleton Paperback R1,160 Discovery Miles 11 600
Hands-On Ethical Hacking and Network…
Rob Wilson Paperback R1,330 R1,188 Discovery Miles 11 880

 

Partners