0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (16)
  • R250 - R500 (92)
  • R500+ (1,401)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Cryptography & CompTIA A+ (Paperback): Solis Tech Cryptography & CompTIA A+ (Paperback)
Solis Tech
R246 Discovery Miles 2 460 Ships in 10 - 15 working days
The Encrypted Book of Passwords (Paperback, 2nd edition): Raef Meeuwisse The Encrypted Book of Passwords (Paperback, 2nd edition)
Raef Meeuwisse
R290 Discovery Miles 2 900 Ships in 10 - 15 working days
Secure Processors Part II - Intel SGX Security Analysis and MIT Sanctum Architecture (Paperback): Victor Costan, Ilia Lebedev,... Secure Processors Part II - Intel SGX Security Analysis and MIT Sanctum Architecture (Paperback)
Victor Costan, Ilia Lebedev, Srinivas Devadas
R1,983 Discovery Miles 19 830 Ships in 10 - 15 working days

This monograph is the second of a two-part survey and analysis of the state of the art in secure processor systems, with a specific focus on remote software attestation and software isolation. The first part established the taxonomy and prerequisite concepts relevant to an examination of the state of the art in trusted remote computation: attested software isolation containers (enclaves). This second part extends Part I's description of Intel's Software Guard Extensions (SGX), an available and documented enclave-capable system, with a rigorous security analysis of SGX as a system for trusted remote computation. This part documents the authors' concerns over the shortcomings of SGX as a secure system and introduces the MIT Sanctum processor developed by the authors: a system designed to offer stronger security guarantees, lend itself better to analysis and formal verification, and offer a more straightforward and complete threat model than the Intel system, all with an equivalent programming model. This two-part work advocates a principled, transparent, and well scrutinized approach to system design, and argues that practical guarantees of privacy and integrity for remote computation are achievable at a reasonable design cost and performance overhead. See also: Secure Processors Part I: Background, Taxonomy for Secure Enclaves and Intel SGX Architecture (ISBN 978-1-68083-300-3). Part I of this survey establishes the taxonomy and prerequisite concepts relevant to an examination of the state of the art in trusted remote computation: attested software isolation containers (enclaves).

Secure Processors Part I - Background, Taxonomy for Secure Enclaves and Intel SGX Architecture (Paperback): Victor-Vlad Costan,... Secure Processors Part I - Background, Taxonomy for Secure Enclaves and Intel SGX Architecture (Paperback)
Victor-Vlad Costan, Ilia Lebedev, Srinivas Devadas
R2,332 Discovery Miles 23 320 Ships in 10 - 15 working days

This monograph is the first in a two-part survey and analysis of the state of the art in secure processor systems, with a specific focus on remote software attestation and software isolation. It first examines the relevant concepts in computer architecture and cryptography, and then surveys attack vectors and existing processor systems claiming security for remote computation and/or software isolation. It examines, in detail, the modern isolation container (enclave) primitive as a means to minimize trusted software given practical trusted hardware and reasonable performance overhead. Specifically, this work examines the programming model and software design considerations of Intel's Software Guard Extensions (SGX), as it is an available and documented enclave-capable system. This work advocates a principled, transparent, and well-scrutinized approach to secure system design, and argues that practical guarantees of privacy and integrity for remote computation are achievable at a reasonable design cost and performance overhead. See also: Secure Processors Part II: Intel SGX Security Analysis and MIT Sanctum Architecture Part II (ISBN 978-1-68083-302-7). Part II of this survey a deep dive into the implementation and security evaluation of two modern enclave-capable secure processor systems: SGX and MIT's Sanctum. The complex but insufficient threat model employed by SGX motivates Sanctum, which achieves stronger security guarantees under software attacks with an equivalent programming model.

Time Delay Measurements of Key Generation Process on Smart Cards (Paperback): Penny Hill Press Inc Time Delay Measurements of Key Generation Process on Smart Cards (Paperback)
Penny Hill Press Inc; Naval Postgraduate School
R322 Discovery Miles 3 220 Ships in 10 - 15 working days
Cryptography & Hacking (Paperback): Solis Tech Cryptography & Hacking (Paperback)
Solis Tech
R493 Discovery Miles 4 930 Ships in 10 - 15 working days
Hacking for Beginners - The Complete Guide (Paperback): Tim Barnes Hacking for Beginners - The Complete Guide (Paperback)
Tim Barnes
R405 Discovery Miles 4 050 Ships in 10 - 15 working days
Journal of Cyber Security and Mobility (6-3) (Paperback): Ashutosh Dutta, Wojciech Mazurczyk Journal of Cyber Security and Mobility (6-3) (Paperback)
Ashutosh Dutta, Wojciech Mazurczyk; Neeli R. Prasad
R1,073 Discovery Miles 10 730 Ships in 10 - 15 working days
Automated Security Management (Paperback, Softcover reprint of the original 1st ed. 2013): Ehab Al-Shaer, Xinming Ou, Geoffrey... Automated Security Management (Paperback, Softcover reprint of the original 1st ed. 2013)
Ehab Al-Shaer, Xinming Ou, Geoffrey Xie
R2,058 Discovery Miles 20 580 Ships in 10 - 15 working days

In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Management presents a number of topics in the area of configuration automation. Early in the book, the chapter authors introduce modeling and validation of configurations based on high-level requirements and discuss how to manage the security risk as a result of configuration settings of network systems. Later chapters delve into the concept of configuration analysis and why it is important in ensuring the security and functionality of a properly configured system. The book concludes with ways to identify problems when things go wrong and more. A wide range of theoretical and practical content make this volume valuable for researchers and professionals who work with network systems.

GNU GSS Library - Generic Security Service (Paperback): Simon Josefsson GNU GSS Library - Generic Security Service (Paperback)
Simon Josefsson
R502 Discovery Miles 5 020 Ships in 10 - 15 working days
GnuTLS Reference Manual (Paperback): Simon Josefsson, Daiki Ueno, Carolin Latze GnuTLS Reference Manual (Paperback)
Simon Josefsson, Daiki Ueno, Carolin Latze
R838 Discovery Miles 8 380 Ships in 10 - 15 working days
Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Jung Hee Cheon, Tsuyoshi Takagi
R3,093 Discovery Miles 30 930 Ships in 10 - 15 working days

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.

Cyber Deception - Building the Scientific Foundation (Hardcover, 1st ed. 2016): Sushil Jajodia, V.S. Subrahmanian, Vipin... Cyber Deception - Building the Scientific Foundation (Hardcover, 1st ed. 2016)
Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup, Cliff Wang
R6,289 Discovery Miles 62 890 Ships in 10 - 15 working days

This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems. This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computer science research relating to cyber-security, or as a supplemental text for a regular graduate-level course on cyber-security.

Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings,... Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Martin Hirt, Adam Smith
R3,267 Discovery Miles 32 670 Ships in 10 - 15 working days

The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016. The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected from 113 submissions. The papers were organized in topical sections named: TCC test-of-time award; foundations; unconditional security; foundations of multi-party protocols; round complexity and efficiency of multi-party computation; differential privacy; delegation and IP; public-key encryption; obfuscation and multilinear maps; attribute-based encryption; functional encryption; secret sharing; new models.

Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings,... Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Martin Hirt, Adam Smith
R1,647 Discovery Miles 16 470 Ships in 10 - 15 working days

The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016. The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected from 113 submissions. The papers were organized in topical sections named: TCC test-of-time award; foundations; unconditional security; foundations of multi-party protocols; round complexity and efficiency of multi-party computation; differential privacy; delegation and IP; public-key encryption; obfuscation and multilinear maps; attribute-based encryption; functional encryption; secret sharing; new models.

Securing the Internet of Things (Paperback): Shancang Li, Li Da Xu Securing the Internet of Things (Paperback)
Shancang Li, Li Da Xu
R1,374 R1,291 Discovery Miles 12 910 Save R83 (6%) Ships in 12 - 17 working days

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.

Security and Usability (Paperback): Lorrie Cranor Security and Usability (Paperback)
Lorrie Cranor; Contributions by Simson Garfinkel
R1,247 R911 Discovery Miles 9 110 Save R336 (27%) Ships in 12 - 17 working days

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users.

Still, many people believe there is an inherent tradeoff between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless.

There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. "Security & Usability" is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computer

interaction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research.

"Security & Usability" groups 34 essays into six parts:

Realigning Usability and Security---with careful attention to user-centered design principles, security and usability can be synergistic.

Authentication Mechanisms-- techniques for identifying and authenticating computer users.

Secure Systems--how system software can deliver or destroy a secure user experience.

Privacy and Anonymity Systems--methods for allowing people to control the release of personal information.

Commercializing Usability: The Vendor Perspective--specific experiences of security and software vendors (e.g.,

IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability.

The Classics--groundbreaking papers that sparked the field of security and usability.

This book is expected to start an avalanche of discussion, new ideas, and further advances in this important field.

Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016,... Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Joseph K. Liu, Ron Steinfeld
R3,085 Discovery Miles 30 850 Ships in 10 - 15 working days

The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016. The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully reviewed and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital Forensics; Lightweight Security; Secure Batch Processing; Pseudo Random/One-Way Function; Cloud Storage Security; Password/QR Code Security; and Functional Encryption and Attribute-Based Cryptosystem. Part II (LNCS 9723) comprises topics such as Signature and Key Management; Public Key and Identity-Based Encryption; Searchable Encryption; Broadcast Encryption; Mathematical Primitives; Symmetric Cipher; Public Key and Identity-Based Encryption; Biometric Security; Digital Forensics; National Security Infrastructure; Mobile Security; Network Security; and Pseudo Random / One-Way Function.

Understanding Social Engineering Based Scams (Hardcover, 1st ed. 2016): Markus Jakobsson Understanding Social Engineering Based Scams (Hardcover, 1st ed. 2016)
Markus Jakobsson
R3,516 Discovery Miles 35 160 Ships in 10 - 15 working days

This book describes trends in email scams and offers tools and techniques to identify such trends. It also describes automated countermeasures based on an understanding of the type of persuasive methods used by scammers. It reviews both consumer-facing scams and enterprise scams, describing in-depth case studies relating to Craigslist scams and Business Email Compromise Scams. This book provides a good starting point for practitioners, decision makers and researchers in that it includes alternatives and complementary tools to the currently deployed email security tools, with a focus on understanding the metrics of scams. Both professionals working in security and advanced-level students interested in privacy or applications of computer science will find this book a useful reference.

Geometry, Algebra and Applications: From Mechanics to Cryptography (Hardcover, 1st ed. 2016): Marco Castrillon Lopez, Luis... Geometry, Algebra and Applications: From Mechanics to Cryptography (Hardcover, 1st ed. 2016)
Marco Castrillon Lopez, Luis Hernandez Encinas, Pedro Martinez Gadea, M* Eugenia Rosado Maria
R3,711 Discovery Miles 37 110 Ships in 10 - 15 working days

This volume collects contributions written by different experts in honor of Prof. Jaime Munoz Masque. It covers a wide variety of research topics, from differential geometry to algebra, but particularly focuses on the geometric formulation of variational calculus; geometric mechanics and field theories; symmetries and conservation laws of differential equations, and pseudo-Riemannian geometry of homogeneous spaces. It also discusses algebraic applications to cryptography and number theory. It offers state-of-the-art contributions in the context of current research trends. The final result is a challenging panoramic view of connecting problems that initially appear distant.

Digital Watermarking - Techniques and Trends (Hardcover, 1st ed. 2017): Mohammad Ali Nematollahi, Chalee Vorakulpipat, Hamurabi... Digital Watermarking - Techniques and Trends (Hardcover, 1st ed. 2017)
Mohammad Ali Nematollahi, Chalee Vorakulpipat, Hamurabi Gamboa Rosales
R3,772 Discovery Miles 37 720 Ships in 10 - 15 working days

This book presents the state-of-the-arts application of digital watermarking in audio, speech, image, video, 3D mesh graph, text, software, natural language, ontology, network stream, relational database, XML, and hardware IPs. It also presents new and recent algorithms in digital watermarking for copyright protection and discusses future trends in the field. Today, the illegal manipulation of genuine digital objects and products represents a considerable problem in the digital world. Offering an effective solution, digital watermarking can be applied to protect intellectual property, as well as fingerprinting, enhance the security and proof-of-authentication through unsecured channels.

Cryptographic Solutions for Secure Online Banking and Commerce (Hardcover): Kannan Balasubramanian, K. Mala, M. Rajakan Cryptographic Solutions for Secure Online Banking and Commerce (Hardcover)
Kannan Balasubramanian, K. Mala, M. Rajakan
R5,552 Discovery Miles 55 520 Ships in 10 - 15 working days

Technological advancements have led to many beneficial developments in the electronic world, especially in relation to online commerce. Unfortunately, these advancements have also created a prime hunting ground for hackers to obtain financially sensitive information and deterring these breaches in security has been difficult. Cryptographic Solutions for Secure Online Banking and Commerce discusses the challenges of providing security for online applications and transactions. Highlighting research on digital signatures, public key infrastructure, encryption algorithms, and digital certificates, as well as other e-commerce protocols, this book is an essential reference source for financial planners, academicians, researchers, advanced-level students, government officials, managers, and technology developers.

Hardware IP Security and Trust (Hardcover, 1st ed. 2017): Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor Hardware IP Security and Trust (Hardcover, 1st ed. 2017)
Prabhat Mishra, Swarup Bhunia, Mark Tehranipoor
R5,430 Discovery Miles 54 300 Ships in 10 - 15 working days

This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.

Blockchain & FinTech - A Comprehensive Blueprint to Understanding Blockchain & Financial Technology. 2 Books in 1. (Paperback):... Blockchain & FinTech - A Comprehensive Blueprint to Understanding Blockchain & Financial Technology. 2 Books in 1. (Paperback)
Richard Hayen
R596 Discovery Miles 5 960 Ships in 10 - 15 working days
Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security (Hardcover): Brij Gupta, Dharma P.... Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security (Hardcover)
Brij Gupta, Dharma P. Agrawal, Shingo Yamaguchi
R8,442 Discovery Miles 84 420 Ships in 10 - 15 working days

Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments. The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Official (ISC)2 CCSP CBK Reference…
a. Kraus Hardcover R1,390 Discovery Miles 13 900
Networks, Security and Complexity - The…
Sean P. Gorman Hardcover R2,846 Discovery Miles 28 460
Technology for Success - Computer…
Mark Ciampa, Jill West, … Paperback  (1)
R1,190 R1,070 Discovery Miles 10 700
Threat Hunting in the Cloud - Defending…
C Peiris Paperback R879 Discovery Miles 8 790
Cryptography - Theory and Practice
Douglas Robert Stinson, Maura Paterson Paperback R1,410 Discovery Miles 14 100
Cybersecurity and Third-Party Risk
GC Rasner Paperback R759 Discovery Miles 7 590
Hands-On Ethical Hacking and Network…
Rob Wilson Paperback R1,330 R1,188 Discovery Miles 11 880
Database Security
Melissa Zgola, Alfred Basta Paperback R1,158 R1,038 Discovery Miles 10 380
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,296 Discovery Miles 32 960
IT Security Governance Guidebook with…
Fred Cohen Hardcover R3,621 Discovery Miles 36 210

 

Partners