0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (87)
  • R500+ (1,277)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Privacy Enhancing Technologies - 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012, Proceedings... Privacy Enhancing Technologies - 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012, Proceedings (Paperback, 2012 ed.)
Simone Fischer-Hubner, Matthew Wright
R1,418 Discovery Miles 14 180 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 12 th International Symposium on Privacy Enhancing Technologies, PET 2012, held in Vigo, Spain, in July 2012. The 16 full papers presented were carefully selected from 72 submissions. Topics addressed include anonymization of statistics, content, and traffic, network traffic analysis, censorship-resistant systems, user profiling, training users in privacy risk management, and privacy of internet and cloud-bases services. A further highlight is the HotPETS session, designed as a venue to present existing but still preliminary and evolving ideas.

Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011.... Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers (Paperback, 2012 ed.)
Howon Kim
R1,469 Discovery Miles 14 690 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011. The 32 revised full papers presented were carefully selected from 126 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on hash function, side channel analysis, public key cryptography, network and mobile security, digital signature, cryptanalysis, efficient implementation, cryptographic application, and cryptographic protocol.

Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012, Proceedings... Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012, Proceedings (Paperback, 2012 ed.)
Feng Bao, Pierangela Samarati, Jianying Zhou
R1,487 Discovery Miles 14 870 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.

Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, September 7-9,... Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, September 7-9, 2011, Revised Selected Papers (Paperback, 2012 ed.)
Muttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis
R1,480 Discovery Miles 14 800 Ships in 18 - 22 working days

This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection; anonymity and privacy; wireless security; system security; DNS and routing security; and key management.

Financial Cryptography and Data Security - FC 2011 Workshops, RLCPS and WECSR, Rodney Bay, St. Lucia, February 28 - March 4,... Financial Cryptography and Data Security - FC 2011 Workshops, RLCPS and WECSR, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers (Paperback, 2012 ed.)
George Danezis, Sven Dietrich, Kazue Sako
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Research, WECSR 2011, held in conjunction with the 15th International Conference on Financial Cryptography and Data Security, FC 2010, in Rodney Bay, St. Lucia, in February/March 2011. The 16 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics ranging from anonymity and privacy, authentication and identification, biometrics, commercial cryptographic, digital cash and payment systems, infrastructure design, management and operations, to security economics and trust management.

Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012.... Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings (Paperback, 2012 ed.)
Willy Susilo, Yi Mu, Jennifer Seberry
R1,455 Discovery Miles 14 550 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography.

Smart Card Research and Advanced Applications - 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30,... Smart Card Research and Advanced Applications - 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Stefan Mangard
R1,412 Discovery Miles 14 120 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Smart Card Research and Advanced Applications, CARDIS 2012, held in Graz, Austria, in November 2012. The 18 revised full papers presented together with an invited talk were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on Java card security, protocols, side-channel attacks, implementations, and implementations for resource-constrained devices.

Applied Quantum Cryptography (Paperback, 2010 ed.): Christian Kollmitzer, Mario Pivk Applied Quantum Cryptography (Paperback, 2010 ed.)
Christian Kollmitzer, Mario Pivk
R2,069 Discovery Miles 20 690 Ships in 18 - 22 working days

Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely novel technology. Only a few years ago quantum cryptography or better: quantum key distribution (QKD) was the domain of basic research laboratories at universities. But during the last few years things changed. QKD left the laboratories and was picked up by more practical oriented teams that worked hard to develop a practically applicable technology out of the astonishing results of basic research.

One major milestone towards a QKD technology was a large research and development project funded by the European Commission that aimed at combining quantum physics with complementary technologies that are necessary to create a technical solution: electronics, software, and network components were added within the project SECOQC (Development of a Global Network for Secure Communication based on Quantum Cryptography) that teamed up all expertise on European level to get a technology for future encryption.

The practical application of QKD in a standard optical fibre network was demonstrated October 2008 in Vienna, giving a glimpse of the future of secure communication. Although many steps have still to be done in order to achieve a real mature technology, the corner stone for future secure communication is already laid.

QKD will not be the Holy Grail of security, it will not be able to solve all problems for evermore. But QKD has the potential to replace one of the weakest parts of symmetric encryption: the exchange of the key. It can be proven that the key exchange process cannot be corrupted and that keys that are generated and exchanged quantum cryptographically will be secure for ever (as long as some additional conditions are kept).

This book will show the state of the art of Quantum Cryptography and it will sketch how it can be implemented in standard communication infrastructure. The growing vulnerability of sensitive data requires new concepts and QKD will be a possible solution to overcome some of today s limitations."

NETWORKING 2012 Workshops - International IFIP TC 6 Workshops, ETICS, HetsNets, and CompNets, Held at NETWORKING 2012, Prague,... NETWORKING 2012 Workshops - International IFIP TC 6 Workshops, ETICS, HetsNets, and CompNets, Held at NETWORKING 2012, Prague, Czech Republic, May 25, 2012, Proceedings (Paperback, 2012 ed.)
Zdenek Becvar, Robert Bestak, Lukas Kencl
R1,377 Discovery Miles 13 770 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of three workshops colocated with NETWORKING 2012, held in Prague, Czech Republic, in May 2012: the Workshop on Economics and Technologies for Inter-Carrier Services (ETICS 2012), the Workshop on Future Heterogeneous Network (HetsNets 2012), and the Workshop on Computing in Networks (CompNets 2012). The 21 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers cover a wide range of topics addressing the main research efforts in the fields of network management, quality of services, heterogeneous networks, and analysis or modeling of networks.

Security for Cloud Storage Systems (Paperback, 2014 ed.): Kan Yang, Xiaohua Jia Security for Cloud Storage Systems (Paperback, 2014 ed.)
Kan Yang, Xiaohua Jia
R1,274 Discovery Miles 12 740 Ships in 18 - 22 working days

Cloud storage is an important service of cloud computing, which offers service for data owners to host their data in the cloud. This new paradigm of data hosting and data access services introduces two major security concerns. The first is the protection of data integrity. Data owners may not fully trust the cloud server and worry that data stored in the cloud could be corrupted or even removed. The second is data access control. Data owners may worry that some dishonest servers provide data access to users that are not permitted for profit gain and thus they can no longer rely on the servers for access control. To protect the data integrity in the cloud, an efficient and secure dynamic auditing protocol is introduced, which can support dynamic auditing and batch auditing. To ensure the data security in the cloud, two efficient and secure data access control schemes are introduced in this brief: ABAC for Single-authority Systems and DAC-MACS for Multi-authority Systems. While Ciphertext-Policy Attribute-based Encryption (CP-ABE) is a promising technique for access control of encrypted data, the existing schemes cannot be directly applied to data access control for cloud storage systems because of the attribute revocation problem. To solve the attribute revocation problem, new Revocable CP-ABE methods are proposed in both ABAC and DAC-MACS.

Android Malware (Paperback, 2013 ed.): Xuxian Jiang, Yajin Zhou Android Malware (Paperback, 2013 ed.)
Xuxian Jiang, Yajin Zhou
R1,508 Discovery Miles 15 080 Ships in 18 - 22 working days

Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile malware raises substantial security and privacy concerns. Android Malware presents a systematic view on state-of-the-art mobile malware that targets the popular Android mobile platform. Covering key topics like the Android malware history, malware behavior and classification, as well as, possible defense techniques.

NETWORKING 2012 - 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings,... NETWORKING 2012 - 11th International IFIP TC 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part I (Paperback)
Robert Bestak, Lukas Kencl, Li Erran Li, Joerg Widmer, Hao Yin
R1,452 Discovery Miles 14 520 Ships in 18 - 22 working days

The two-volume set LNCS 7289 and 7290 constitutes the refereed proceedings of the 11th International IFIP TC 6 Networking Conference held in Prague, Czech Republic, in May 2012. The 64 revised full papers presented were carefully reviewed and selected from a total of 225 submissions. The papers feature innovative research in the areas of network architecture, applications and services, next generation Internet, wireless and sensor networks, and network science. The first volume includes 32 papers and is organized in topical sections on content-centric networking, social networks, reliability and resilience, virtualization and cloud services, IP routing, network measurement, network mapping, and LISP and multi-domain routing.

Quality, Reliability, Security and Robustness in Heterogeneous Networks - 9th International Confernce, QShine 2013, Greader... Quality, Reliability, Security and Robustness in Heterogeneous Networks - 9th International Confernce, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Karan Singh, Amit K. Awasthi
R2,851 Discovery Miles 28 510 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2013, which was held in National Capital Region (NCR) of India during January 2013. The 87 revised full papers were carefully selected from 169 submissions and present the recent technological developments in broadband high-speed networks, peer-to-peer networks, and wireless and mobile networks.

Encryption for Digital Content (Paperback, 2010 ed.): Aggelos Kiayias, Serdar Pehlivanoglu Encryption for Digital Content (Paperback, 2010 ed.)
Aggelos Kiayias, Serdar Pehlivanoglu
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques. Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray disks), fingerprinting codes, traitor tracing schemes as well as related security models and attacks. It provides an extensive treatment of the complexity of the revocation problem for multi-receiver (subscriber) encryption mechanisms, as well as the complexity of the traceability problem. Pirate evolution type of attacks are covered in depth. This volume also illustrates the manner that attacks affect parameter selection, and how this impacts implementations. The authors gratefully acknowledge the support of the National Science Foundation under Grant No. 0447808.

Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His... Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday (Paperback, 2012)
David Naccache
R1,468 Discovery Miles 14 680 Ships in 18 - 22 working days

This Festschrift volume, published in honor of Jean-Jaques Quisquater on the occasion of his 65th Birthday, contains 33 papers from colleagues all over the world and deals with all the fields to which Jean-Jaques dedicated his work during his academic career. Focusing on personal tributes and re-visits of Jean-Jaques Quisquater's legacy, the volume addresses the following central topics: symmetric and asymmetric cryptography, side-channels attacks, hardware and implementations, smart cards, and information security. In addition there are four more contributions just "as diverse as Jean-Jacques' scientific interests."

Network Intrusion Detection and Prevention - Concepts and Techniques (Paperback, 2010 ed.): Ali A. Ghorbani, Wei Lu, Mahbod... Network Intrusion Detection and Prevention - Concepts and Techniques (Paperback, 2010 ed.)
Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee
R3,785 Discovery Miles 37 850 Ships in 18 - 22 working days

Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems. On the topic of intrusion detection system it is impossible to include everything there is to say on all subjects. However, we have tried to cover the most important and common ones.

Network Intrusion Detection and Prevention: Concepts and Techniques is designed for researchers and practitioners in industry. This book is suitable for advanced-level students in computer science as a reference book as well.

Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013.... Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings (Paperback, 2013 ed.)
Michael Jacobson, Michael Locasto, Payman Mohassel, Reihaneh Safavi-Naini
R1,487 Discovery Miles 14 870 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems.

Cyber Situational Awareness - Issues and Research (Paperback, 2010 ed.): Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang Cyber Situational Awareness - Issues and Research (Paperback, 2010 ed.)
Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive science, and decision science areas elab orate on the fundamental challenges facing the research community and identify promising solution paths. Today, when a security incident occurs, the top three questions security admin istrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the ?rst two questions form the core of Cyber Situational Awareness. Whether the last question can be satisfactorily answered is greatly de pendent upon the cyber situational awareness capability of an enterprise. A variety of computer and network security research topics (especially some sys tems security topics) belong to or touch the scope of Cyber Situational Awareness. However, the Cyber Situational Awareness capability of an enterprise is still very limited for several reasons: * Inaccurate and incomplete vulnerability analysis, intrusion detection, and foren sics. * Lack of capability to monitor certain microscopic system/attack behavior. * Limited capability to transform/fuse/distill information into cyber intelligence. * Limited capability to handle uncertainty. * Existing system designs are not very "friendly" to Cyber Situational Awareness.

Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012,... Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Miroslaw Kutylowski, Moti Yung
R1,438 Discovery Miles 14 380 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information Security and Cryptology, Inscrypt 2012, held in Beijing, China, in November 2012. The 23 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers cover the topics of side channel attacks, extractor and secret sharing, public key cryptography, block ciphers, stream ciphers, new constructions and protocols.

Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Paperback, Softcover reprint of the original 1st... Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Paperback, Softcover reprint of the original 1st ed. 2004)
Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang
R1,371 Discovery Miles 13 710 Ships in 18 - 22 working days

Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.

Arithmetic of Finite Fields - 4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012, Proceedings... Arithmetic of Finite Fields - 4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012, Proceedings (Paperback, 2012 ed.)
Ferruh OEzbudak, Francisco Rodriguez-henriquez
R1,285 Discovery Miles 12 850 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th International Workshop on the Arithmetic of Finite Field, WAIFI 2012, held in Bochum, Germany, in July 2012. The 13 revised full papers and 4 invited talks presented were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on coding theory and code-based cryptography, Boolean functions, finite field arithmetic, equations and functions, and polynomial factorization and permutation polynomial.

Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings... Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings (Paperback, 2011)
Sushil Jajodia, Chandan Mazumdar
R1,437 Discovery Miles 14 370 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011.
The 20 revised full papers presented together with 4 short papers and 4 invited papers were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on access control and authorization, malwares and anomaly detection, crypto and steganographic systems, verification and analysis, wireless and mobile systems security, Web and network security.

Security and Trust Management - 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected... Security and Trust Management - 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers (Paperback, 2011)
Jorge Cuellar, Javier Lopez, Gilles Barthe, Alexander Pretschner
R1,744 Discovery Miles 17 440 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, STM 2010, held in Athens, Greece, in September 2010.
The 17 revised full papers presented were carefully reviewed and selected from 40 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2010 encouraged submissions discussing the application and deployment of security technologies in practice.

Progress in Cryptology -- AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12,... Progress in Cryptology -- AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012, Proceedings (Paperback, 2012 ed.)
Aikaterini Mitrokotsa, Serge Vaudenay
R1,444 Discovery Miles 14 440 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Ifrane, Morocco, in July 2012. The 24 papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 56 submissions. They are organized in topical sections on signature schemes, stream ciphers, applications of information theory, block ciphers, network security protocols, public-key cryptography, cryptanalysis of hash functions, hash functions: design and implementation, algorithms for public-key cryptography, and cryptographic protocols.

Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May/June 2012, Revised Selected... Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May/June 2012, Revised Selected Papers (Paperback, 2013 ed.)
Yuyu Yuan, Xu Wu, Yueming Lu
R2,778 Discovery Miles 27 780 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2012, held in Beijing, China, in May/June 2012. The 92 revised full papers presented were carefully reviewed and selected from 278 papers. The topics covered are architecture for trusted computing systems, trusted computing platform, trusted systems build, network and protocol security, mobile network security, network survivability and other critical theories and standard systems, credible assessment, credible measurement and metrics, trusted systems, trusted networks, trusted mobile network, trusted routing, trusted software, trusted operating systems, trusted storage, fault-tolerant computing and other key technologies, trusted e-commerce and e-government, trusted logistics, trusted internet of things, trusted cloud and other trusted services and applications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R549 R503 Discovery Miles 5 030
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,321 R1,228 Discovery Miles 12 280
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Conflicts, Crimes and Regulations in…
SY Laurent Hardcover R3,743 Discovery Miles 37 430
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
Providing Sound Foundations for…
Oded Goldreich Hardcover R3,016 Discovery Miles 30 160
Architectures and Frameworks for…
Nansi Shi Hardcover R6,093 Discovery Miles 60 930
Technical Articles about the Voynich…
National Security Agency Hardcover R697 Discovery Miles 6 970
TLS Mastery
Michael W Lucas Hardcover R893 R812 Discovery Miles 8 120
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R778 R682 Discovery Miles 6 820

 

Partners