0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (16)
  • R250 - R500 (91)
  • R500+ (1,399)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Hacking University - Computer Hacking and Mobile Hacking 2 Manuscript Bundle: Essential Beginners Guide on How to Become an... Hacking University - Computer Hacking and Mobile Hacking 2 Manuscript Bundle: Essential Beginners Guide on How to Become an Amateur Hacker and Hacking Mobile Devices, Tablets, Game Consoles, and Apps. (Hacking, How to Hack, Hacking for Beginners, Computer, (Paperback)
Isaac D Cody
R510 Discovery Miles 5 100 Ships in 10 - 15 working days
Hacking University - Learn Python Computer Programming from Scratch & Precisely Learn How The Linux Operating Command Line... Hacking University - Learn Python Computer Programming from Scratch & Precisely Learn How The Linux Operating Command Line Works 2 Manuscript Bundle: The Ultimate Beginners Guide in Mastering Python and a Complete Step by Step Guide in Learning Linux (Paperback)
Isaac D Cody
R538 Discovery Miles 5 380 Ships in 10 - 15 working days
Leading Issues in Cyber Warfare and Security (Paperback): Julie Ryan Leading Issues in Cyber Warfare and Security (Paperback)
Julie Ryan
R819 Discovery Miles 8 190 Ships in 10 - 15 working days
Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA,... Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings (Paperback, 1st ed. 2016)
Kazue Sako
R2,916 Discovery Miles 29 160 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2016, CT-RSA 2016, held in San Francisco, CA, USA, in February/March 2016. The 26 papers presented in this volume were carefully reviewed and selected from 76 submissions. The focus of the track is on following subjects: secure key exchange schemes, authenticated encryption, searchable symmetric encryption, digital signatures with new functionality, secure multi party computation, how to verify procedures, side-channel attacks on elliptic curve cryptography, hardware attacks and security, structure-preserving signatures, lattice cryptography, cryptanalysis of symmetric key encryption, message authentication code and PRF-security, and security of public key encryption.

Quantum Computational Number Theory (Hardcover, 1st ed. 2015): Song Y. Yan Quantum Computational Number Theory (Hardcover, 1st ed. 2015)
Song Y. Yan
R3,870 Discovery Miles 38 700 Ships in 10 - 15 working days

This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems. Key problems include prime number generation, primality testing, integer factorization, discrete logarithms, elliptic curve arithmetic, conjecture and numerical verification. The author discusses quantum algorithms for solving the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP), and the Elliptic Curve Discrete Logarithm Problem (ECDLP) and for attacking IFP, DLP and ECDLP based cryptographic systems. Chapters also cover various other quantum algorithms for Pell's equation, principal ideal, unit group, class group, Gauss sums, prime counting function, Riemann's hypothesis and the BSD conjecture. Quantum Computational Number Theory is self-contained and intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the related fields. Number theorists, cryptographers and professionals working in quantum computing, cryptography and network security will find this book a valuable asset.

Cryptography & Comptia A+ (Paperback): Solis Tech Cryptography & Comptia A+ (Paperback)
Solis Tech
R427 Discovery Miles 4 270 Ships in 10 - 15 working days
Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography,... Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Chen-Mou Cheng, Kai-Min Chung, Giuseppe Persiano, Bo-Yin Yang
R2,940 Discovery Miles 29 400 Ships in 10 - 15 working days

The two-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March 2016. The 34 revised papers presented were carefully reviewed and selected from 143 submissions. They are organized in topical sections named: CCA security, functional encryption, identity-based encryption, signatures, cryptanalysis, leakage-resilient and circularly secure encryption, protocols, and primitives.

The Encrypted Pocketbook of Passwords (Paperback): Raef Meeuwisse The Encrypted Pocketbook of Passwords (Paperback)
Raef Meeuwisse
R165 Discovery Miles 1 650 Ships in 10 - 15 working days
Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography,... Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Chen-Mou Cheng, Kai-Min Chung, Giuseppe Persiano, Bo-Yin Yang
R2,916 Discovery Miles 29 160 Ships in 10 - 15 working days

The two-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March 2016. The 34 revised papers presented were carefully reviewed and selected from 143 submissions. They are organized in topical sections named: CCA security, functional encryption, identity-based encryption, signatures, cryptanalysis, leakage-resilient and circularly secure encryption, protocols, and primitives.

Malware + Robotics + Cryptography (Paperback): Solis Tech Malware + Robotics + Cryptography (Paperback)
Solis Tech
R481 Discovery Miles 4 810 Ships in 10 - 15 working days
Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II... Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Eyal Kushilevitz, Tal Malkin
R3,315 Discovery Miles 33 150 Ships in 10 - 15 working days

The two-volume set LNCS 9562 and LNCS 9563 constitutes the refereedproceedings of the 13th International Conference on Theory ofCryptography, TCC 2016, held in Tel Aviv, Israel, in January 2016. The 45 revised full papers presented were carefully reviewed andselected from 112 submissions. The papers are organized in topicalsections on obfuscation, differential privacy, LWR and LPN, public key encryption, signatures, and VRF, complexity of cryptographic primitives, multiparty computation, zero knowledge and PCP, oblivious RAM, ABE and IBE, and codes and interactive proofs. The volume also includes an invited talk on cryptographic assumptions.

Modern Cryptography Primer - Theoretical Foundations and Practical Applications (Paperback, Softcover reprint of the original... Modern Cryptography Primer - Theoretical Foundations and Practical Applications (Paperback, Softcover reprint of the original 1st ed. 2013)
Czeslaw Koscielny, Miroslaw Kurkowski, Marian Srebrny
R2,600 Discovery Miles 26 000 Ships in 10 - 15 working days

Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these areas, offering an understanding of the essential, most important, and most interesting ideas, based on the authors' teaching and research experience. After introducing the basic mathematical and computational complexity concepts, and some historical context, including the story of Enigma, the authors explain symmetric and asymmetric cryptography, electronic signatures and hash functions, PGP systems, public key infrastructures, cryptographic protocols, and applications in network security. In each case the text presents the key technologies, algorithms, and protocols, along with methods of design and analysis, while the content is characterized by a visual style and all algorithms are presented in readable pseudocode or using simple graphics and diagrams. The book is suitable for undergraduate and graduate courses in computer science and engineering, particularly in the area of networking, and it is also a suitable reference text for self-study by practitioners and researchers. The authors assume only basic elementary mathematical experience, the text covers the foundational mathematics and computational complexity theory.

Protocols and Procedures of Cryptography and Network Security (Hardcover): Stephen Mason Protocols and Procedures of Cryptography and Network Security (Hardcover)
Stephen Mason
R2,263 R1,974 Discovery Miles 19 740 Save R289 (13%) Ships in 10 - 15 working days
Computing Security & Cryptography Handbook (Hardcover): Stephen Mason Computing Security & Cryptography Handbook (Hardcover)
Stephen Mason
R2,865 R2,483 Discovery Miles 24 830 Save R382 (13%) Ships in 10 - 15 working days
Integrated Research in Steganography (Hardcover): Audrey Coon Integrated Research in Steganography (Hardcover)
Audrey Coon
R1,788 R1,572 Discovery Miles 15 720 Save R216 (12%) Ships in 10 - 15 working days
Encrypted Email - The History and Technology of Message Privacy (Paperback, 1st ed. 2015): Hilarie Orman Encrypted Email - The History and Technology of Message Privacy (Paperback, 1st ed. 2015)
Hilarie Orman
R1,792 Discovery Miles 17 920 Ships in 10 - 15 working days

This SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the challenges in standardization, usability, and trust that interfere with the user experience for software protection. Chapters address the origins of email encryption and why email encryption is rarely used despite the myriad of its benefits -- benefits that cannot be obtained in any other way. The construction of a secure message and its entwining with public key technology are covered. Other chapters address both independent standards for secure email and how they work. The final chapters include a discussion of getting started with encrypted email and how to live with it. Written by an expert in software security and computer tools, Encrypted Email: The History and Technology of Message Privacy is designed for researchers and professionals working in email security and encryption. Advanced-level students interested in security and networks will also find the content valuable.

Cyber Security - Everything an Executive Needs to Know (Hardcover): Phillip Ferraro Cyber Security - Everything an Executive Needs to Know (Hardcover)
Phillip Ferraro
R717 R590 Discovery Miles 5 900 Save R127 (18%) Ships in 10 - 15 working days
Cyber-Physical Attack Recovery Procedures - A Step-by-Step Preparation and Response Guide (Paperback, 1st ed.): Luis Ayala Cyber-Physical Attack Recovery Procedures - A Step-by-Step Preparation and Response Guide (Paperback, 1st ed.)
Luis Ayala
R2,523 Discovery Miles 25 230 Ships in 10 - 15 working days

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time-even from the other side of the planet. Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won't suspect it was a hacker-until you see a pattern. The building control system (BCS) will act "squirrelly" and you will know-it really is a cyber-physical attack. Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. Cyber-Physical Attack Recovery Procedures provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives. The book contains: A one-of-a-kind action plan describing how hackers attack building equipment, the extent of damage possible, and how to respond when a cyber-physical attack occurs. Detailed descriptions of cyber-physical attacks directed against SCADA systems or building controls, as well as cyber booby traps Invaluable appendices, including: Emergency Procedures, Team Staffing and Tasking, Alternate Site Procedures, a Documentation List, Software and Hardware Inventories, Vendor Contact Lists, External Support Agreements, and much more. What you'll learn Possible ways hackers can cause building equipment to fail. How to quickly assess the threat to his facilities in real time, how to stop a cyber-physical attack. How to restore equipment operation without doing any more damage. Who This Book Is For Architects, Engineers, Building Managers, Students, Researchers and Consultants interested in cybersecurity-attacks against facilities in the real world. Also for IT professionals getting involved in cybersecurity responsibilities.

Applications of Cryptography and Network Security (Hardcover): Stephen Mason Applications of Cryptography and Network Security (Hardcover)
Stephen Mason
R3,592 R3,100 Discovery Miles 31 000 Save R492 (14%) Ships in 10 - 15 working days
Cryptography - Cryptography Theory & Practice Made Easy! (Paperback): Solis Tech Cryptography - Cryptography Theory & Practice Made Easy! (Paperback)
Solis Tech
R247 Discovery Miles 2 470 Ships in 10 - 15 working days
Why Cryptography Should Not Rely on Physical Attack Complexity (Hardcover, 1st ed. 2015): Juliane Kramer Why Cryptography Should Not Rely on Physical Attack Complexity (Hardcover, 1st ed. 2015)
Juliane Kramer
R3,503 Discovery Miles 35 030 Ships in 10 - 15 working days

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two independent precise faults in a single pairing computation, it has not been taken seriously either. Based on these two attacks, the book demonstrates that the assessment of physical attack complexity is error-prone, and as such cryptography should not rely on it. Cryptographic technologies have to be protected against all physical attacks, whether they have already been successfully implemented or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is sufficiently understood.

Financial Cryptography and Data Security - FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico,... Financial Cryptography and Data Security - FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Michael Brenner, Nicolas Christin, Benjamin Johnson, Kurt Rohloff
R1,529 Discovery Miles 15 290 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of three workshops held at the 19th International Conference on Financial Cryptography and Data Security, FC 2015, in San Juan, Puerto Rico, in January 2015. The 22 full papers presented were carefully reviewed and selected from 39 submissions. They feature the outcome of the Second Workshop on Bitcoin Research, BITCOIN 2015, the Third Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2015, and the First Workshop on Wearable Security and Privacy, Wearable 2015.

A Decade of Lattice Cryptography (Paperback): Chris Peikert A Decade of Lattice Cryptography (Paperback)
Chris Peikert
R2,294 Discovery Miles 22 940 Ships in 10 - 15 working days

Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn as the foundation for secure cryptographic systems. Attractive features of lattice cryptography include apparent resistance to quantum attacks (in contrast with most number-theoretic cryptography), high asymptotic efficiency and parallelism, security under worst-case intractability assumptions, and solutions to long-standing open problems in cryptography. This monograph surveys most of the major developments in lattice cryptography over the past ten years. The main focus is on the foundational short integer solution (SIS) and learning with errors (LWE) problems (and their more efficient ring-based variants), their provable hardness assuming the worst-case intractability of standard lattice problems, and their many cryptographic applications.

Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers... Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Gregor Leander
R3,315 Discovery Miles 33 150 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Istanbul, Turkey, March 8-11, 2015. The 28 revised full papers presented were carefully reviewed and selected from 71 initial submissions. The papers are organized in topical sections on block cipher cryptanalysis; understanding attacks; implementation issues; more block cipher cryptanalysis; cryptanalysis of authenticated encryption schemes; proofs; design; lightweight; cryptanalysis of hash functions and stream ciphers; and mass surveillance.

Leakage Resilient Password Systems (Paperback, 2015 ed.): Yingjiu Li, Qiang Yan, Robert H. Deng Leakage Resilient Password Systems (Paperback, 2015 ed.)
Yingjiu Li, Qiang Yan, Robert H. Deng
R1,695 Discovery Miles 16 950 Ships in 10 - 15 working days

This book investigates tradeoff between security and usability in designing leakage resilient password systems (LRP) and introduces two practical LRP systems named Cover Pad and ShadowKey. It demonstrates that existing LRP systems are subject to both brute force attacks and statistical attacks and that these attacks cannot be effectively mitigated without sacrificing the usability of LRP systems. Quantitative analysis proves that a secure LRP system in practical settings imposes a considerable amount of cognitive workload unless certain secure channels are involved. The book introduces a secure and practical LRP system, named Cover Pad, for password entry on touch-screen mobile devices. Cover Pad leverages a temporary secure channel between a user and a touch screen which can be easily realized by placing a hand shielding gesture on the touch screen. The temporary secure channel is used to deliver a hidden message to the user for transforming each password symbol before entering it on the touch screen. A user study shows the impact of these testing conditions on the users' performance in practice. Finally, this book introduces a new LRP system named ShadowKey. Shadow Key is designed to achieve better usability for leakage resilient password entry. It leverages either a permanent secure channel, which naturally exists between a user and the display unit of certain mobile devices, or a temporary secure channel, which can be easily realized between a user and a touch screen with a hand-shielding gesture. The secure channel protects the mappings between original password symbols and associated random symbols. Unlike previous LRP system users, Shadow Key users do not need to remember anything except their passwords. Leakage Resilient Password Systems is designed for professionals working in the security industry. Advanced-level students studying computer science and electrical engineering will find this brief full of useful material.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Alice and Bob Learn Application Security
T Janca Paperback R885 Discovery Miles 8 850
IT Security Governance Guidebook with…
Fred Cohen Hardcover R3,621 Discovery Miles 36 210
Cryptography - Theory and Practice
Douglas Robert Stinson, Maura Paterson Paperback R1,410 Discovery Miles 14 100
Hacking Connected Cars - Tactics…
A. Knight Paperback R877 Discovery Miles 8 770
Digital Watermarking and Steganography…
Frank Y. Shih Hardcover R3,034 Discovery Miles 30 340
Threat Hunting in the Cloud - Defending…
C Peiris Paperback R879 Discovery Miles 8 790
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,296 Discovery Miles 32 960
The Political Economy and Feasibility of…
Spencer J. Pack Hardcover R2,851 Discovery Miles 28 510
Critical Incident Management
Alan B. Sterneckert Paperback R1,811 Discovery Miles 18 110
Handbook of Elliptic and Hyperelliptic…
Henri Cohen, Gerhard Frey, … Hardcover R6,370 Discovery Miles 63 700

 

Partners