0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (78)
  • R250 - R500 (115)
  • R500+ (1,462)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Password Notebook - Big Polar Bear (Paperback): Cosmoq Password Notebook - Big Polar Bear (Paperback)
Cosmoq
R149 Discovery Miles 1 490 Ships in 7 - 11 working days
Password Log - New Year Strawberry Festival (Paperback): Cosmoq Password Log - New Year Strawberry Festival (Paperback)
Cosmoq
R149 Discovery Miles 1 490 Ships in 7 - 11 working days
Password Log - Black Chalkboard (Paperback): Cosmoq Password Log - Black Chalkboard (Paperback)
Cosmoq
R149 Discovery Miles 1 490 Ships in 7 - 11 working days
Password Log - Black Chic (Paperback): Cosmoq Password Log - Black Chic (Paperback)
Cosmoq
R149 Discovery Miles 1 490 Ships in 7 - 11 working days
Password Log - Blue Chic (Paperback): Cosmoq Password Log - Blue Chic (Paperback)
Cosmoq
R149 Discovery Miles 1 490 Ships in 7 - 11 working days
Password Log - Green Chic (Paperback): Cosmoq Password Log - Green Chic (Paperback)
Cosmoq
R149 Discovery Miles 1 490 Ships in 7 - 11 working days
Password Log - Navy Chic (Paperback): Cosmoq Password Log - Navy Chic (Paperback)
Cosmoq
R149 Discovery Miles 1 490 Ships in 7 - 11 working days
Password Log - Grey Chic (Paperback): Cosmoq Password Log - Grey Chic (Paperback)
Cosmoq
R149 Discovery Miles 1 490 Ships in 7 - 11 working days
Hardware IP Security and Trust (Hardcover, 1st ed. 2017): Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor Hardware IP Security and Trust (Hardcover, 1st ed. 2017)
Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor
R3,665 R3,010 Discovery Miles 30 100 Save R655 (18%) Ships in 10 - 15 working days

This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.

Hacking University - Mobile Phone & App Hacking And Complete Beginners Guide to Learn Linux: Hacking Mobile Devices, Tablets,... Hacking University - Mobile Phone & App Hacking And Complete Beginners Guide to Learn Linux: Hacking Mobile Devices, Tablets, Game Consoles, Apps and Precisely Learn and Conquer the Linux Operating System (Paperback)
Isaac D Cody
R420 Discovery Miles 4 200 Ships in 7 - 11 working days
Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings,... Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Martin Hirt, Adam Smith
R3,603 Discovery Miles 36 030 Ships in 7 - 11 working days

The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016. The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected from 113 submissions. The papers were organized in topical sections named: TCC test-of-time award; foundations; unconditional security; foundations of multi-party protocols; round complexity and efficiency of multi-party computation; differential privacy; delegation and IP; public-key encryption; obfuscation and multilinear maps; attribute-based encryption; functional encryption; secret sharing; new models.

Security and Privacy Preserving in Social Networks (Paperback, Softcover reprint of the original 1st ed. 2013): Richard Chbeir,... Security and Privacy Preserving in Social Networks (Paperback, Softcover reprint of the original 1st ed. 2013)
Richard Chbeir, Bechara Al Bouna
R3,874 Discovery Miles 38 740 Ships in 7 - 11 working days

This volume aims at assessing the current approaches and technologies, as well as to outline the major challenges and future perspectives related to the security and privacy protection of social networks. It provides the reader with an overview of the state-of-the art techniques, studies, and approaches as well as outlining future directions in this field. A wide range of interdisciplinary contributions from various research groups ensures for a balanced and complete perspective.

Security and the Networked Society (Paperback, Softcover reprint of the original 1st ed. 2013): Mark A. Gregory, David Glance Security and the Networked Society (Paperback, Softcover reprint of the original 1st ed. 2013)
Mark A. Gregory, David Glance
R3,110 Discovery Miles 31 100 Ships in 7 - 11 working days

This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information privacy. This book traces the rise into prominence of these issues while also exploring the resulting cultural reaction. The authors' analysis forms the basis of a discussion on future technological directions and their potential impact on society. The book includes forewords by Professor Margaret Gardner AO, Vice-Chancellor and President of RMIT University, and by Professor Robyn Owens, Deputy Vice-Chancellor (Research) at the University of Western Australia. Security and the Networked Society provides a reference for professionals and industry analysts studying digital technologies. Advanced-level students in computer science and electrical engineering will also find this book useful as a thought-provoking resource.

Hacking University Graduation Edition - 4 Manuscripts (Computer, Mobile, Python & Linux): Hacking Computers, Mobile Devices,... Hacking University Graduation Edition - 4 Manuscripts (Computer, Mobile, Python & Linux): Hacking Computers, Mobile Devices, Apps, Game Consoles and Learn Python & Linux (Paperback)
Isaac D Cody
R574 Discovery Miles 5 740 Ships in 7 - 11 working days
Hacking University - Computer Hacking and Mobile Hacking 2 Manuscript Bundle: Essential Beginners Guide on How to Become an... Hacking University - Computer Hacking and Mobile Hacking 2 Manuscript Bundle: Essential Beginners Guide on How to Become an Amateur Hacker and Hacking Mobile Devices, Tablets, Game Consoles, and Apps. (Hacking, How to Hack, Hacking for Beginners, Computer, iPhone, Android) (Paperback)
Isaac D Cody
R418 Discovery Miles 4 180 Ships in 7 - 11 working days
Classical Encryption - Classical Ciphers (Paperback): Andre Girardot Classical Encryption - Classical Ciphers (Paperback)
Andre Girardot
R507 Discovery Miles 5 070 Ships in 7 - 11 working days
Hacking University - Learn Python Computer Programming from Scratch & Precisely Learn How the Linux Operating Command Line... Hacking University - Learn Python Computer Programming from Scratch & Precisely Learn How the Linux Operating Command Line Works 2 Manuscript Bundle: The Ultimate Beginners Guide in Mastering Python and a Complete Step by Step Guide in Learning Linux (Paperback)
Isaac D Cody
R439 Discovery Miles 4 390 Ships in 7 - 11 working days
Hijacked By Hackers Be Afraid - Be very, Very Afraid (Paperback): Michael Klein Hijacked By Hackers Be Afraid - Be very, Very Afraid (Paperback)
Michael Klein
R349 Discovery Miles 3 490 Ships in 7 - 11 working days
Security and Privacy for Implantable Medical Devices (Paperback, Softcover reprint of the original 1st ed. 2014): Wayne... Security and Privacy for Implantable Medical Devices (Paperback, Softcover reprint of the original 1st ed. 2014)
Wayne Burleson, Sandro Carrara
R3,260 Discovery Miles 32 600 Ships in 7 - 11 working days

This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD). It describes in detail new issues termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. Coverage includes vulnerabilities and defense across multiple levels, with basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures. Experts from Computer Security and Cryptography present new research which shows vulnerabilities in existing IMDs and proposes solutions. Experts from Privacy Technology and Policy will discuss the societal, legal and ethical challenges surrounding IMD security as well as technological solutions that build on the latest in Computer Science privacy research, as well as lightweight solutions appropriate for implementation in IMDs.

Digital Watermarking - Techniques and Trends (Hardcover, 1st ed. 2017): Mohammad Ali Nematollahi, Chalee Vorakulpipat, Hamurabi... Digital Watermarking - Techniques and Trends (Hardcover, 1st ed. 2017)
Mohammad Ali Nematollahi, Chalee Vorakulpipat, Hamurabi Gamboa Rosales
R3,918 Discovery Miles 39 180 Ships in 7 - 11 working days

This book presents the state-of-the-arts application of digital watermarking in audio, speech, image, video, 3D mesh graph, text, software, natural language, ontology, network stream, relational database, XML, and hardware IPs. It also presents new and recent algorithms in digital watermarking for copyright protection and discusses future trends in the field. Today, the illegal manipulation of genuine digital objects and products represents a considerable problem in the digital world. Offering an effective solution, digital watermarking can be applied to protect intellectual property, as well as fingerprinting, enhance the security and proof-of-authentication through unsecured channels.

Geometry, Algebra and Applications: From Mechanics to Cryptography (Hardcover, 1st ed. 2016): Marco Castrillon Lopez, Luis... Geometry, Algebra and Applications: From Mechanics to Cryptography (Hardcover, 1st ed. 2016)
Marco Castrillon Lopez, Luis Hernandez Encinas, Pedro Martinez Gadea, M* Eugenia Rosado Maria
R4,072 Discovery Miles 40 720 Ships in 7 - 11 working days

This volume collects contributions written by different experts in honor of Prof. Jaime Munoz Masque. It covers a wide variety of research topics, from differential geometry to algebra, but particularly focuses on the geometric formulation of variational calculus; geometric mechanics and field theories; symmetries and conservation laws of differential equations, and pseudo-Riemannian geometry of homogeneous spaces. It also discusses algebraic applications to cryptography and number theory. It offers state-of-the-art contributions in the context of current research trends. The final result is a challenging panoramic view of connecting problems that initially appear distant.

Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers... Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers (Paperback, 1st ed. 2016)
Thomas Peyrin
R2,580 R2,395 Discovery Miles 23 950 Save R185 (7%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Fast Software Encryption, held in Bochum, Germany, in March 2016. The 29 revised full papers presented were carefully reviewed and selected from 86 initial submissions. The papers are organized in topical sections on operating modes; stream-cipher cryptanalysis; components; side-channels and implementations; automated tools for cryptanalysis; designs; block-cipher cryptanalysis; foundations and theory; and authenticated-encryption and hash function cryptanalysis.

Cyber-Physical Attack Recovery Procedures - A Step-by-Step Preparation and Response Guide (Paperback, 1st ed.): Luis Ayala Cyber-Physical Attack Recovery Procedures - A Step-by-Step Preparation and Response Guide (Paperback, 1st ed.)
Luis Ayala
R1,554 Discovery Miles 15 540 Ships in 7 - 11 working days

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time-even from the other side of the planet. Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won't suspect it was a hacker-until you see a pattern. The building control system (BCS) will act "squirrelly" and you will know-it really is a cyber-physical attack. Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. Cyber-Physical Attack Recovery Procedures provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives. The book contains: A one-of-a-kind action plan describing how hackers attack building equipment, the extent of damage possible, and how to respond when a cyber-physical attack occurs. Detailed descriptions of cyber-physical attacks directed against SCADA systems or building controls, as well as cyber booby traps Invaluable appendices, including: Emergency Procedures, Team Staffing and Tasking, Alternate Site Procedures, a Documentation List, Software and Hardware Inventories, Vendor Contact Lists, External Support Agreements, and much more. What you'll learn Possible ways hackers can cause building equipment to fail. How to quickly assess the threat to his facilities in real time, how to stop a cyber-physical attack. How to restore equipment operation without doing any more damage. Who This Book Is For Architects, Engineers, Building Managers, Students, Researchers and Consultants interested in cybersecurity-attacks against facilities in the real world. Also for IT professionals getting involved in cybersecurity responsibilities.

Small Business Cyber Security - Your Customers Can Trust You...Right? (Paperback): Anderson, Tom Gilkeson Small Business Cyber Security - Your Customers Can Trust You...Right? (Paperback)
Anderson, Tom Gilkeson
R321 R265 Discovery Miles 2 650 Save R56 (17%) Ships in 7 - 11 working days
A Decade of Lattice Cryptography (Paperback): Chris Peikert A Decade of Lattice Cryptography (Paperback)
Chris Peikert
R2,329 Discovery Miles 23 290 Ships in 7 - 11 working days

Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn as the foundation for secure cryptographic systems. Attractive features of lattice cryptography include apparent resistance to quantum attacks (in contrast with most number-theoretic cryptography), high asymptotic efficiency and parallelism, security under worst-case intractability assumptions, and solutions to long-standing open problems in cryptography. This monograph surveys most of the major developments in lattice cryptography over the past ten years. The main focus is on the foundational short integer solution (SIS) and learning with errors (LWE) problems (and their more efficient ring-based variants), their provable hardness assuming the worst-case intractability of standard lattice problems, and their many cryptographic applications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Animal Biometrics - Techniques and…
Santosh Kumar, Sanjay Kumar Singh, … Hardcover R2,385 Discovery Miles 23 850
Practical Cryptology and Web Security
P.K. Yuen Paperback R2,035 R1,422 Discovery Miles 14 220
Studies in Complexity and Cryptography…
Oded Goldreich Paperback R2,232 Discovery Miles 22 320
2019 Standard Catalog of…
Mateo Marin Hardcover R903 R638 Discovery Miles 6 380
Management of Information Security
Michael Whitman, Herbert Mattord Paperback R937 R803 Discovery Miles 8 030
Mechanics of User Identification and…
Dobromir Todorov Hardcover R3,092 Discovery Miles 30 920
The Design of Rijndael - The Advanced…
Joan Daemen, Vincent Rijmen Hardcover R3,215 Discovery Miles 32 150
You CAN Stop Stupid - Stopping Losses…
Ira Winkler, Dr. Tracy Celaya Brown Paperback R778 R627 Discovery Miles 6 270
The Truth Machine - The Blockchain and…
Michael J. Casey, Paul Vigna Paperback  (1)
R399 R304 Discovery Miles 3 040
Tribe of Hackers Blue Team - Tribal…
Marcus J. Carey, Jennifer Jin Paperback R565 R467 Discovery Miles 4 670

 

Partners