0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (16)
  • R250 - R500 (94)
  • R500+ (1,405)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Secure and Trustworthy Transportation Cyber-Physical Systems (Paperback, 1st ed. 2017): Yunchuan Sun, Houbing Song Secure and Trustworthy Transportation Cyber-Physical Systems (Paperback, 1st ed. 2017)
Yunchuan Sun, Houbing Song
R1,985 Discovery Miles 19 850 Ships in 10 - 15 working days

This book comprehensively reviews the cyber security and privacy issues in transportation cyber-physical systems (TCPSs). It examines theories and various state-of-the-art technologies and methodologies. Starting with a survey of the latest solutions in TCPSs, it introduces a smart-transport-system architecture design based on cyber-physical systems. It then discusses in detail the principles and metrics of evaluating safety and privacy in TCPSs and elaborates the verification and analysis of secure, robust and trustworthy TCPSs. Moreover, it demonstrates the advanced and novel tools commonly used in practice by several researchers. Lastly it provides an exhaustive case study on the authentication and attestation in TCPSs. This book is of interest not only to readers in the field of TCPSs, but also to those in interdisciplinary fields, such as energy, healthcare, bio-engineering etc.

Hijacked By Hackers Be Afraid - Be very, Very Afraid (Paperback): Michael Klein Hijacked By Hackers Be Afraid - Be very, Very Afraid (Paperback)
Michael Klein
R422 Discovery Miles 4 220 Ships in 10 - 15 working days
Hacking - 3 Books in 1: The Beginner's Complete Guide to Computer Hacking and Penetration Testing & The Complete... Hacking - 3 Books in 1: The Beginner's Complete Guide to Computer Hacking and Penetration Testing & The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples & The Comprehensive Beginner's Guide to Take Control of (Paperback)
Miles Price
R700 Discovery Miles 7 000 Ships in 10 - 15 working days
Computational Intelligence, Communications, and Business Analytics - First International Conference, CICBA 2017, Kolkata,... Computational Intelligence, Communications, and Business Analytics - First International Conference, CICBA 2017, Kolkata, India, March 24 - 25, 2017, Revised Selected Papers, Part II (Paperback, 1st ed. 2017)
J K Mandal, Paramartha Dutta, Somnath Mukhopadhyay
R3,472 Discovery Miles 34 720 Ships in 10 - 15 working days

The two volume set CCIS 775 and 776 constitutes the refereed proceedings of the First International Conference on Computational Intelligence, Communications, and Business Analytics, CICBA 2017, held in Kolkata, India, in March 2017.The 90 revised full papers presented in the two volumes were carefully reviewed and selected from 276 submissions. The papers are organized in topical sections on data science and advanced data analytics; signal processing and communications; microelectronics, sensors, intelligent networks; computational forensics (privacy and security); computational intelligence in bio-computing; computational intelligence in mobile and quantum computing; intelligent data mining and data warehousing; computational intelligence.

Cyber Crimes - History of World's Worst Cyber Attacks (Paperback): Vannesa Pitts Cyber Crimes - History of World's Worst Cyber Attacks (Paperback)
Vannesa Pitts
R386 Discovery Miles 3 860 Ships in 10 - 15 working days
Shishi - Kerberos 5 Implementation (Paperback): Simon Josefsson Shishi - Kerberos 5 Implementation (Paperback)
Simon Josefsson
R816 Discovery Miles 8 160 Ships in 10 - 15 working days
Blockchain - How Bitcoin and Blockchain Are Reshaping the World of Finance (Paperback): K Connors Blockchain - How Bitcoin and Blockchain Are Reshaping the World of Finance (Paperback)
K Connors
R316 Discovery Miles 3 160 Ships in 10 - 15 working days
GnuPG - Using the GNU Privacy Guard (Paperback): The Gnupg Project GnuPG - Using the GNU Privacy Guard (Paperback)
The Gnupg Project
R669 Discovery Miles 6 690 Ships in 10 - 15 working days
Computer and Network Security Essentials (Hardcover, 1st ed. 2018): Kevin Daimi Computer and Network Security Essentials (Hardcover, 1st ed. 2018)
Kevin Daimi; Contributions by Guillermo Francia, Levent Ertaul, Luis Hernandez Encinas, Eman El-Sheikh
R5,318 Discovery Miles 53 180 Ships in 10 - 15 working days

This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is a security problem. The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management, Information Assurance, Security Applications, Computer Security, Hardware Security, and Biometrics and Forensics. It introduces the concepts, techniques, methods, approaches, and trends needed by security specialists to improve their security skills and capabilities. Further, it provides a glimpse into future directions where security techniques, policies, applications, and theories are headed. The book represents a collection of carefully selected and reviewed chapters written by diverse security experts in the listed fields and edited by prominent security researchers. Complementary slides are available for download on the book's website at Springer.com.

Introduction to Cyberdeception (Hardcover, 1st ed. 2016): Neil C. Rowe, Julian Rrushi Introduction to Cyberdeception (Hardcover, 1st ed. 2016)
Neil C. Rowe, Julian Rrushi
R3,382 Discovery Miles 33 820 Ships in 10 - 15 working days

This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list.Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application. Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems.

Blockchain - Ultimate guide to understanding blockchain, bitcoin, cryptocurrencies, smart contracts and the future of money.... Blockchain - Ultimate guide to understanding blockchain, bitcoin, cryptocurrencies, smart contracts and the future of money. (Paperback)
Mark Gates
R405 Discovery Miles 4 050 Ships in 10 - 15 working days
Identity Theft - Breakthroughs in Research and Practice (Hardcover): Information Resources Management Association Identity Theft - Breakthroughs in Research and Practice (Hardcover)
Information Resources Management Association
R9,382 Discovery Miles 93 820 Ships in 10 - 15 working days

The preservation of private data is a main concern of governments, organizations, and individuals alike. For individuals, a breach in personal information can mean dire consequences for an individual's finances, medical information, and personal property. Identity Theft: Breakthroughs in Research and Practice highlights emerging perspectives and critical insights into the preservation of personal data and the complications that can arise when one's identity is compromised. This critical volume features key research on methods and technologies for protection, the problems associated with identity theft, and outlooks for the future. This publication is an essential resource for information security professionals, researchers, and graduate-level students in the fields of criminal science, business, and computer science.

Proceedings of the 2nd Workshop on Communication Security - Cryptography and Physical Layer Security (Hardcover, 1st ed. 2018):... Proceedings of the 2nd Workshop on Communication Security - Cryptography and Physical Layer Security (Hardcover, 1st ed. 2018)
Marco Baldi, Stefano Tomasin, Elizabeth A. Quaglia
R5,031 Discovery Miles 50 310 Ships in 10 - 15 working days

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-edge research and innovative findings from leading researchers. The characteristic feature of all the contributions in this book is their relevance for the practical application of security principles to a variety of widely used communication techniques, including: multiantenna systems, ultra-wide-band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, building a bridge between two usually distinct worlds. The book gathers extended versions of contributions delivered at the Second Workshop on Communication Security, held in Paris, France, in April 2017 and affiliated with the conference EUROCRYPT 2017.

Hacking University - Mobile Phone & App Hacking And Complete Beginners Guide to Learn Linux: Hacking Mobile Devices, Tablets,... Hacking University - Mobile Phone & App Hacking And Complete Beginners Guide to Learn Linux: Hacking Mobile Devices, Tablets, Game Consoles, Apps and Precisely Learn and Conquer the Linux Operating System (Paperback)
Isaac D Cody
R514 Discovery Miles 5 140 Ships in 10 - 15 working days
Trusted Computing - Principles and Applications (Hardcover): Dengguo Feng Trusted Computing - Principles and Applications (Hardcover)
Dengguo Feng; Contributions by Tsinghua University Press
R4,013 Discovery Miles 40 130 Ships in 10 - 15 working days

The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

Cyber Nation - How Venture Capital & Startups Are Protecting America from Cyber Criminals, Threats and Cyber Attacks.... Cyber Nation - How Venture Capital & Startups Are Protecting America from Cyber Criminals, Threats and Cyber Attacks. (Paperback)
Ross Blankenship
R502 Discovery Miles 5 020 Ships in 10 - 15 working days
Cryptography & Open Source (Paperback): Solis Tech Cryptography & Open Source (Paperback)
Solis Tech
R245 Discovery Miles 2 450 Ships in 10 - 15 working days
Cryptography & Robotics (Paperback): Solis Tech Cryptography & Robotics (Paperback)
Solis Tech
R247 Discovery Miles 2 470 Ships in 10 - 15 working days
The Encrypted Book of Passwords (Hardcover): Raef Meeuwisse The Encrypted Book of Passwords (Hardcover)
Raef Meeuwisse
R685 Discovery Miles 6 850 Ships in 10 - 15 working days
Innovative Solutions for Access Control Management (Hardcover): Ahmad Kamran Malik, Adeel Anjum, Basit Raza Innovative Solutions for Access Control Management (Hardcover)
Ahmad Kamran Malik, Adeel Anjum, Basit Raza
R5,346 Discovery Miles 53 460 Ships in 10 - 15 working days

Technological innovation and evolution continues to improve personal and professional lifestyles, as well as general organizational and business practices; however, these advancements also create potential issues in the security and privacy of the user's information. Innovative Solutions for Access Control Management features a comprehensive discussion on the trending topics and emergent research in IT security and governance. Highlighting theoretical frameworks and best practices, as well as challenges and solutions within the topic of access control and management, this publication is a pivotal reference source for researchers, practitioners, students, database vendors, and organizations within the information technology and computer science fields.

Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers... Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers (Paperback, 1st ed. 2016)
Thomas Peyrin
R4,409 Discovery Miles 44 090 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Fast Software Encryption, held in Bochum, Germany, in March 2016. The 29 revised full papers presented were carefully reviewed and selected from 86 initial submissions. The papers are organized in topical sections on operating modes; stream-cipher cryptanalysis; components; side-channels and implementations; automated tools for cryptanalysis; designs; block-cipher cryptanalysis; foundations and theory; and authenticated-encryption and hash function cryptanalysis.

Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography,... Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Serge Fehr
R1,606 Discovery Miles 16 060 Ships in 10 - 15 working days

The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017. The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols, Encryption Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control, Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.

Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography,... Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I (Paperback, 1st ed. 2017)
Serge Fehr
R2,916 Discovery Miles 29 160 Ships in 10 - 15 working days

The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017. The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols, Encrpytion Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control, Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.

Feistel Ciphers - Security Proofs and Cryptanalysis (Hardcover, 1st ed. 2017): Valerie Nachef, Jacques Patarin, Emmanuel Volte Feistel Ciphers - Security Proofs and Cryptanalysis (Hardcover, 1st ed. 2017)
Valerie Nachef, Jacques Patarin, Emmanuel Volte
R6,301 Discovery Miles 63 010 Ships in 10 - 15 working days

This book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers are widely used in cryptography in order to obtain pseudorandom permutations and secret-key block ciphers. In Part 1, we describe Feistel ciphers and their variants. We also give a brief story of these ciphers and basic security results. In Part 2, we describe generic attacks on Feistel ciphers. In Part 3, we give results on DES and specific Feistel ciphers. Part 4 is devoted to improved security results. We also give results on indifferentiability and indistinguishability.

Malware + Robotics + Human-Computer Interaction (Paperback): Solis Tech Malware + Robotics + Human-Computer Interaction (Paperback)
Solis Tech
R244 Discovery Miles 2 440 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cryptoeconomics - Igniting a New Era of…
Jian Gong, Wei Xu Paperback R1,348 Discovery Miles 13 480
Threat Hunting in the Cloud - Defending…
C Peiris Paperback R879 Discovery Miles 8 790
Human Factors in Safety-Critical Systems
Felix Redmill, Jane Rajan Hardcover R3,351 Discovery Miles 33 510
Database Security
Melissa Zgola, Alfred Basta Paperback R1,158 R1,038 Discovery Miles 10 380
Cybersecurity and Third-Party Risk
GC Rasner Paperback R759 Discovery Miles 7 590
On Privacy-Preserving Protocols for…
Fabio Borges de Oliveira Hardcover R1,526 Discovery Miles 15 260
The Official (ISC)2 CCSP CBK Reference…
a. Kraus Hardcover R1,390 Discovery Miles 13 900
Alice and Bob Learn Application Security
T Janca Paperback R885 Discovery Miles 8 850
The Political Economy and Feasibility of…
Spencer J. Pack Hardcover R2,851 Discovery Miles 28 510
Technology for Success - Computer…
Mark Ciampa, Jill West, … Paperback  (1)
R1,190 R1,070 Discovery Miles 10 700

 

Partners