0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (12)
  • R250 - R500 (86)
  • R500+ (1,344)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Encryption for Digital Content (Paperback, 2010 ed.): Aggelos Kiayias, Serdar Pehlivanoglu Encryption for Digital Content (Paperback, 2010 ed.)
Aggelos Kiayias, Serdar Pehlivanoglu
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques. Encryption for Digital Content details the subset cover framework (currently used in the AACS encryption of Blu-Ray disks), fingerprinting codes, traitor tracing schemes as well as related security models and attacks. It provides an extensive treatment of the complexity of the revocation problem for multi-receiver (subscriber) encryption mechanisms, as well as the complexity of the traceability problem. Pirate evolution type of attacks are covered in depth. This volume also illustrates the manner that attacks affect parameter selection, and how this impacts implementations. The authors gratefully acknowledge the support of the National Science Foundation under Grant No. 0447808.

Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012, Proceedings (Paperback, 2012 ed.)
David Pointcheval, Thomas Johansson
R1,662 Discovery Miles 16 620 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2012, held in Cambgridge, UK, in April 2012. The 41 papers, presented together with 2 invited talks, were carefully reviewed and selected from 195 submissions. The papers are organized in topical sections on index calculus, symmetric constructions, secure computation, protocols, lossy trapdoor functions, tools, symmetric cryptanalysis, fully homomorphic encryption, asymmetric cryptanalysis, efficient reductions, public-key schemes, security models, and lattices.

Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012.... Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings (Paperback, 2012)
Ronald Cramer
R1,632 Discovery Miles 16 320 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge.

Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland,... Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers (Paperback, 2012)
Tuomas Aura, Kimmo Jarvinen, Kaisa Nyberg
R1,522 Discovery Miles 15 220 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto University in Espoo, Finland in October 2010. The 13 full papers and 3 short papers presented were carefully reviewed and selected from 37 submissions. The volume also contains 1 full-paper length invited talk and 3 revised selected papers initially presented at the OWASP AppSec Research 2010 conference. The contributions cover the following topics: network security; monitoring and reputation; privacy; policy enforcement; cryptography and protocols.

Cyber Situational Awareness - Issues and Research (Paperback, 2010 ed.): Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang Cyber Situational Awareness - Issues and Research (Paperback, 2010 ed.)
Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive science, and decision science areas elab orate on the fundamental challenges facing the research community and identify promising solution paths. Today, when a security incident occurs, the top three questions security admin istrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the ?rst two questions form the core of Cyber Situational Awareness. Whether the last question can be satisfactorily answered is greatly de pendent upon the cyber situational awareness capability of an enterprise. A variety of computer and network security research topics (especially some sys tems security topics) belong to or touch the scope of Cyber Situational Awareness. However, the Cyber Situational Awareness capability of an enterprise is still very limited for several reasons: * Inaccurate and incomplete vulnerability analysis, intrusion detection, and foren sics. * Lack of capability to monitor certain microscopic system/attack behavior. * Limited capability to transform/fuse/distill information into cyber intelligence. * Limited capability to handle uncertainty. * Existing system designs are not very "friendly" to Cyber Situational Awareness.

Smart Card Research and Advanced Applications - 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium,... Smart Card Research and Advanced Applications - 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers (Paperback, 2011)
Emmanuel Prouff
R1,537 Discovery Miles 15 370 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 10th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications, CARDIS 2011, held in Leuven, Belgium, in September 2011. The 20 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on smart cards system security, invasive attacks, new algorithms and protocols, implementations and hardware security, non-invasive attacks, and Java card security.

Arithmetic of Finite Fields - 4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012, Proceedings... Arithmetic of Finite Fields - 4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012, Proceedings (Paperback, 2012 ed.)
Ferruh OEzbudak, Francisco Rodriguez-henriquez
R1,388 Discovery Miles 13 880 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th International Workshop on the Arithmetic of Finite Field, WAIFI 2012, held in Bochum, Germany, in July 2012. The 13 revised full papers and 4 invited talks presented were carefully reviewed and selected from 29 submissions. The papers are organized in topical sections on coding theory and code-based cryptography, Boolean functions, finite field arithmetic, equations and functions, and polynomial factorization and permutation polynomial.

Foundations and Practice of Security - 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised... Foundations and Practice of Security - 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers (Paperback, 2012)
Joaquin Garcia-Alfaro, Pascal Lafourcade
R1,882 Discovery Miles 18 820 Ships in 10 - 15 working days

This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresses, 2 short papers, and 5 ongoing research reports. The papers were carefully reviewed and selected from 30 submissions. The topics covered are pervasive security and threshold cryptography; encryption, cryptanalysis and automatic verification; and formal methodsin network security."

Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers... Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers (Paperback, 2011)
Liqun Chen, Moti Yung
R1,544 Discovery Miles 15 440 Ships in 10 - 15 working days

This book constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China, in December 2010.The 23 contributed papers presented together with nine invited talks from a workshop, titled "Asian Lounge on Trust, Security and Privacy" were carefully selected from 66 submissions. The papers are organized in seven topical sections on implentation technology, security analysis, cryptographic aspects, mobile trusted systems, hardware security, attestation, and software protection.

The Security Culture Playbook - An Executive Guide  To Reducing Risk and Developing Your Human Defense Layer (Hardcover): P.... The Security Culture Playbook - An Executive Guide To Reducing Risk and Developing Your Human Defense Layer (Hardcover)
P. Carpenter
R544 R504 Discovery Miles 5 040 Save R40 (7%) Ships in 12 - 19 working days

Mitigate human risk and bake security into your organization's culture from top to bottom with insights from leading experts in security awareness, behavior, and culture. The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer, two veteran cybersecurity strategists deliver experience-driven, actionable insights into how to transform your organization's security culture and reduce human risk at every level. This book exposes the gaps between how organizations have traditionally approached human risk and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization. The book offers: An expose of what security culture really is and how it can be measured A careful exploration of the 7 dimensions that comprise security culture Practical tools for managing your security culture program, such as the Security Culture Framework and the Security Culture Maturity Model Insights into building support within the executive team and Board of Directors for your culture management program Also including several revealing interviews from security culture thought leaders in a variety of industries, The Security Culture Playbook is an essential resource for cybersecurity professionals, risk and compliance managers, executives, board members, and other business leaders seeking to proactively manage and reduce risk.

Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings... Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings (Paperback, 2011)
Sushil Jajodia, Chandan Mazumdar
R1,553 Discovery Miles 15 530 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011.
The 20 revised full papers presented together with 4 short papers and 4 invited papers were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on access control and authorization, malwares and anomaly detection, crypto and steganographic systems, verification and analysis, wireless and mobile systems security, Web and network security.

Communications and Multimedia Security - 12th IFIP TC 6/TC 11 International Conference, CMS 2011, Ghent, Belgium, October... Communications and Multimedia Security - 12th IFIP TC 6/TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21, 2011, Proceedings (Paperback)
Bart De Decker, Jorn Lapon, Vincent Naessens, Andreas Uhl
R1,515 Discovery Miles 15 150 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2010, held in Ghent, Belgium, in October 2011. The 26 revised papers presented were carefully reviewed and selected from 52 submissions. The papers are organized in topical sections on usability, architecture and framework security, mobile identity management, secure hardware platforms, biometrics, multimedia security, network security and authentication.

Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16,... Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers (Paperback, 2012 ed.)
Svetla Petkova-Nikova, Andreas Pashalidis, Gunther Pernul
R1,890 Discovery Miles 18 900 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 8th European Workshop on Public Key Infrastructures, Services and Applications, EuroPKI 2011, held in Leuven, Belgium in September 2011 - co-located with the 16th European Symposium on Research in Computer Security, ESORICS 2011. The 10 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 27 submissions. The papers are organized in topical sections on authentication mechanisms, privacy preserving techniques, PKI and secure applications.

Security and Trust Management - 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected... Security and Trust Management - 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers (Paperback, 2011)
Jorge Cuellar, Javier Lopez, Gilles Barthe, Alexander Pretschner
R1,886 Discovery Miles 18 860 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, STM 2010, held in Athens, Greece, in September 2010.
The 17 revised full papers presented were carefully reviewed and selected from 40 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2010 encouraged submissions discussing the application and deployment of security technologies in practice.

Progress in Cryptology -- AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12,... Progress in Cryptology -- AFRICACRYPT 2012 - 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012, Proceedings (Paperback, 2012 ed.)
Aikaterini Mitrokotsa, Serge Vaudenay
R1,561 Discovery Miles 15 610 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Ifrane, Morocco, in July 2012. The 24 papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 56 submissions. They are organized in topical sections on signature schemes, stream ciphers, applications of information theory, block ciphers, network security protocols, public-key cryptography, cryptanalysis of hash functions, hash functions: design and implementation, algorithms for public-key cryptography, and cryptographic protocols.

Recent Advances in Intrusion Detection - 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011,... Recent Advances in Intrusion Detection - 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011, Proceedings (Paperback, 2011 ed.)
Robin Sommer, Davide Balzarotti, Gregor Maier
R1,556 Discovery Miles 15 560 Ships in 10 - 15 working days

This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments.

Foundations of Security Analysis and Design VI - FOSAD Tutorial Lectures (Paperback, 2011): Alessandro Aldini, Roberto Gorrieri Foundations of Security Analysis and Design VI - FOSAD Tutorial Lectures (Paperback, 2011)
Alessandro Aldini, Roberto Gorrieri
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a timely spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical open problems, and giving presentations about ongoing work in the field, in order to stimulate discussions and novel scientific collaborations. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2010 and August/September 2011. The topics covered in this book include privacy and data protection; security APIs; cryptographic verification by typing; model-driven security; noninterfer-quantitative information flow analysis; and risk analysis.

Studies in Complexity and Cryptography - Miscellanea on the Interplay between Randomness and Computation (Paperback): Oded... Studies in Complexity and Cryptography - Miscellanea on the Interplay between Randomness and Computation (Paperback)
Oded Goldreich
R2,710 Discovery Miles 27 100 Ships in 10 - 15 working days

This book presents a collection of 36 pieces of scientific work in the areas of complexity theory and foundations of cryptography: 20 research contributions, 13 survey articles, and 3 programmatic and reflective viewpoint statements. These so far formally unpublished pieces were written by Oded Goldreich, some in collaboration with other scientists.
The articles included in this book essentially reflect the topical scope of the scientific career of Oded Goldreich now spanning three decades. In particular the topics dealt with include average-case complexity, complexity of approximation, derandomization, expander graphs, hashing functions, locally testable codes, machines that take advice, NP-completeness, one-way functions, probabilistically checkable proofs, proofs of knowledge, property testing, pseudorandomness, randomness extractors, sampling, trapdoor permutations, zero-knowledge, and non-iterative zero-knowledge.
All in all, this potpourri of studies in complexity and cryptography constitutes a most valuable contribution to the field of theoretical computer science centered around the personal achievements and views of one of its outstanding representatives.

Sequences and Their Applications -- SETA 2012 - 7th International Conference, SETA 2012, Waterloo, ON, Canada, June 4-8, 2012.... Sequences and Their Applications -- SETA 2012 - 7th International Conference, SETA 2012, Waterloo, ON, Canada, June 4-8, 2012. Proceedings (Paperback)
Tor Helleseth, Jonathan Jedwab
R1,537 Discovery Miles 15 370 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Conference on Sequences and Their Applications, SETA 2012, held in Waterloo, Canada, in June 2012. The 28 full papers presented together with 2 invited papers in this volume were carefully reviewed and selected from 48 submissions. The papers are grouped in topical sections on perfect sequences; finite fields; boolean functions; Golomb 80th birthday session; linear complexity; frequency hopping; correlation of sequences; bounds on sequences, cryptography; aperiodic correlation; and Walsh transform.

Advances in Digital Forensics V - Fifth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA,... Advances in Digital Forensics V - Fifth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 26-28, 2009, Revised Selected Papers (Paperback, Previously published in hardcover)
Gilbert Peterson, Sujeet Shenoi
R2,886 Discovery Miles 28 860 Ships in 10 - 15 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance - investigations of security breaches yield valuable information that can be used to design more secure systems.

Advances in Digital Forensics V describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: themes and issues, forensic techniques, integrity and privacy, network forensics, forensic computing, investigative techniques, legal issues and evidence management.

This book is the fifth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-three edited papers from the Fifth Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2009.

Advances in Digital Forensics V is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

CASP+ Certification Kit Exam CAS-004 (Paperback): NH Tanner CASP+ Certification Kit Exam CAS-004 (Paperback)
NH Tanner
R2,033 R1,508 Discovery Miles 15 080 Save R525 (26%) Ships in 12 - 19 working days

Prepare for test success with this all-in-one CASP+ Certification Kit! The kit includes: CASP+ Study Guide: Exam CAS-004, Fourth Edition, builds on the popular Sybex Study Guide approach, providing 100% coverage of the CASP+ Exam CAS-004 objectives. The book contains clear and concise information on crucial security topics. It includes practical examples and insights drawn from real-world experience, as well as exam highlights and end-of-chapter review questions. The comprehensive study resource provides authoritative coverage of key exam topics, including: Security Architecture Security Operations Security Engineering and Cryptography Governance, Risk, and Compliance Because the exam focuses on practical applications of key security concepts, the book includes an appendix of additional hands-on labs. CASP+ Practice Tests: Exam CAS-004, Second Edition, provides hundreds of domain-by domain questions, covering the CASP+ objectives, PLUS two additional practice exams, for a total of 1,000 practice test questions. You'll also get one year of FREE access after activation to the Sybex interactive learning environment and online test bank. Let this book help you gain the confidence you need for taking the CASP+ Exam CAS-004 and prepare you for test success.

Coding and Cryptology - Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings (Paperback,... Coding and Cryptology - Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings (Paperback, Edition.)
Yeow Meng Chee, Zhenbo Guo, San Ling, Fengjing Shao, Yuansheng Tang, …
R1,524 Discovery Miles 15 240 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC 2011, held in Qingdao, China, May 30-June 3, 2011. The 19 revised full technical papers are contributed by the invited speakers of the workshop. The papers were carefully reviewed and cover a broad range of foundational and methodological as well as applicative issues in coding and cryptology, as well as related areas such as combinatorics.

Black-Box Models of Computation in Cryptology (Paperback, 2012): Tibor Jager Black-Box Models of Computation in Cryptology (Paperback, 2012)
Tibor Jager
R1,460 Discovery Miles 14 600 Ships in 10 - 15 working days

Generic group algorithms solve computational problems defined over algebraic groups without exploiting properties of a particular representation of group elements. This is modeled by treating the group as a black-box. The fact that a computational problem cannot be solved by a reasonably restricted class of algorithms may be seen as support towards the conjecture that the problem is also hard in the classical Turing machine model. Moreover, a lower complexity bound for certain algorithms is a helpful insight for the search for cryptanalytic algorithms. Tibor Jager addresses several fundamental questions concerning algebraic black-box models of computation: Are the generic group model and its variants a reasonable abstraction? What are the limitations of these models? Can we relax these models to bring them closer to the reality?

Expert SQL Server 2008 Encryption (Paperback, 1st ed.): Michael Coles, Rodney Landrum Expert SQL Server 2008 Encryption (Paperback, 1st ed.)
Michael Coles, Rodney Landrum
R1,218 R1,024 Discovery Miles 10 240 Save R194 (16%) Ships in 10 - 15 working days

Every day, organizations large and small fall victim to attacks on their data. Encryption provides a shield to help defend against intruders. Because of increasing pressure from government regulators, consumers, and the business community at large, the job descriptions of SQL DBAs and developers are expanding to include encryption. Expert SQL Server 2008 Encryption will show you how to efficiently implement SQL Server 2008 encryption functionality and features to secure your organizational data.Introduces encryption, guiding readers through its implementation in SQL Server Demonstrates advanced techniques such as the use of hardware security modules Covers all that a SQL Server database administrator needs to know about encryption What you'll learn Take advantage of hardware security modules via extensible key management Implement targeted encryption of individual columns Secure an entire database at once with Transparent Data Encryption Encrypt disk volumes using BitLocker encryption Effectively design and manage encryption as part of your total security solution Digitally sign documents stored in your database Who this book is for

The audience for this book includes SQL Server DBAs, SQL developers, and .NET developers who want to take advantage of the powerful encryption functionality available in SQL Server 2008. The features of SQL Server 2008 provide a powerful set of tools to secure your most sensitive data, helping protect it from theft. Table of Contents Introduction to Encryption Encryption Key Management Symmetric Encryption Asymmetric Encryption Extensible Key Management Transparent Data Encryption Hashing SQL CLR Cryptography Indexing Encrypted Data Encrypting Connections to SQL Server 2008 Regulatory Requirements

Security and Intelligent Information Systems - International Joint Confererence, SIIS 2011, Warsaw, Poland, June 13-14, 2011,... Security and Intelligent Information Systems - International Joint Confererence, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers (Paperback, 2012)
Pascal Bouvry, Mieczyslaw A. Klopotek, Franck Leprevost, Malgorzata Marciniak, Agnieszka Mykowiecka, …
R1,556 Discovery Miles 15 560 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the Joint Meeting of the 2nd Luxembourg-Polish Symposium on Security and Trust and the 19th International Conference Intelligent Information Systems, held as International Joint Confererence on Security and Intelligent Information Systems, SIIS 2011, in Warsaw, Poland, in June 2011. The 29 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 60 initial submissions during two rounds of selection and improvement. The papers are organized in the following three thematic tracks: security and trust, data mining and machine learning, and natural language processing.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Multiprocessor Execution of Logic…
Gopal Gupta Hardcover R4,497 Discovery Miles 44 970
Multi-point Interaction with Real and…
Federico Barbagli, Domenico Prattichizzo, … Hardcover R3,044 Discovery Miles 30 440
Informatics in Control, Automation and…
Oleg Gusikhin, Kurosh Madani, … Hardcover R7,551 Discovery Miles 75 510
Informatics in Control, Automation and…
Oleg Gusikhin, Kurosh Madani Hardcover R4,535 Discovery Miles 45 350
IEC 61131-3: Programming Industrial…
Karl-Heinz John, Michael Tiegelkamp Hardcover R4,600 Discovery Miles 46 000
Advanced Visual Basic 6 - Power…
Matthew Curland, Gary Clarke Paperback R1,349 Discovery Miles 13 490
Interfacing with C++ - Programming…
Jayantha Katupitiya, Kim Bentley Hardcover R1,728 Discovery Miles 17 280
Fundamentals of Algebraic Specification…
Hartmut Ehrig, Bernd Mahr Hardcover R1,612 Discovery Miles 16 120
Mechatronics '98
J. Adolfsson, J. Karlsen Hardcover R7,196 Discovery Miles 71 960
Visual Language Theory
Kim Marriott, Bernd Meyer Hardcover R3,101 Discovery Miles 31 010

 

Partners