0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (79)
  • R250 - R500 (116)
  • R500+ (1,465)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Network Security For Dummies (Paperback): Chey Cobb Network Security For Dummies (Paperback)
Chey Cobb
R667 R490 Discovery Miles 4 900 Save R177 (27%) Ships in 10 - 15 working days

* This hands-on, do-it-yourself guide to securing and auditing a network offers immediate solutions to critical security problems for small- to medium-sized businesses
* Each part of the book begins with basics that can be quickly implemented and then moves on to more complex security mechanisms a company may consider as it grows
* Presents numerous checklists and exercises for performing network security audits
* Includes real-world examples and practical tips for implementing cost-effective security measures
* Companion Web site includes forms and checklists along with links to useful sites and downloads for recommended security tools

Integer Algorithms In Cryptology And Information Assurance (Hardcover): Boris S Verkhovsky Integer Algorithms In Cryptology And Information Assurance (Hardcover)
Boris S Verkhovsky
R2,913 Discovery Miles 29 130 Ships in 10 - 15 working days

Integer Algorithms in Cryptology and Information Assurance is a collection of the author's own innovative approaches in algorithms and protocols for secret and reliable communication. It concentrates on the "what" and "how" behind implementing the proposed cryptographic algorithms rather than on formal proofs of "why" these algorithms work.The book consists of five parts (in 28 chapters) and describes the author's research results in:This text contains innovative cryptographic algorithms; computationally efficient algorithms for information assurance; new methods to solve the classical problem of integer factorization, which plays a key role in cryptanalysis; and numerous illustrative examples and tables that facilitate the understanding of the proposed algorithms.The fundamental ideas contained within are not based on temporary advances in technology, which might become obsolete in several years. The problems addressed in the book have their own intrinsic computational complexities, and the ideas and methods described in the book will remain important for years to come.

CSS in easy steps (Paperback, 4th ed.): Mike McGrath CSS in easy steps (Paperback, 4th ed.)
Mike McGrath
R326 R304 Discovery Miles 3 040 Save R22 (7%) Ships in 10 - 15 working days
Multi-application Smart Cards - Technology and Applications (Hardcover): Mike Hendry Multi-application Smart Cards - Technology and Applications (Hardcover)
Mike Hendry
R2,348 Discovery Miles 23 480 Ships in 10 - 15 working days

Multi-application smart cards have yet to realise their enormous potential, partly because few people understand the technology, market, and behavioural issues involved. Here, Mike Hendry sets out to fill this knowledge gap with a comprehensive and accessible guide. Following a review of the state-of-the-art in smart card technology, the book describes the business requirements of each smart-card-using sector, and the systems required to support multiple applications. Implementation aspects, including security, are treated in detail and numerous international case studies cover identity, telecoms, banking and transportation applications. Lessons are drawn from these studies to help deliver more successful projects in the future. Invaluable for users and integrators specifying, evaluating and integrating multi-application systems, the book will also be useful to terminal, card and system designers; network, IT and security managers; and software specialists.

Information Security Practice and Experience - 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012,... Information Security Practice and Experience - 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012, Proceedings (Paperback, 2012)
Mark D. Ryan, Ben Smyth, Guilin Wang
R1,774 R1,494 Discovery Miles 14 940 Save R280 (16%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC 2012, held in Hangzhou, China, in April 2012. The 20 revised full papers presented together with 7 work-in-progress papers were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on digital signatures, public key cryptography, cryptanalysis, differential attacks, oblivious transfer, internet security, key management, applied cryptography, pins, fundamentals, fault attacks, and key recovery.

Transactions on Data Hiding and Multimedia Security VII (Paperback, 2012): Yun Qing Shi Transactions on Data Hiding and Multimedia Security VII (Paperback, 2012)
Yun Qing Shi
R1,747 R1,458 Discovery Miles 14 580 Save R289 (17%) Ships in 10 - 15 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. The 7 papers included in this issue deal with the following topics: protection of digital videos, secure watermarking, tamper detection, and steganography.

Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA,... Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012, Proceedings (Paperback, 2012)
Orr Dunkelman
R1,777 R1,498 Discovery Miles 14 980 Save R279 (16%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2012, CT-RSA 2012, held in San Francisco, CA, USA, in February/March 2012. The 26 revised full papers presented were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and secure multiparty computation.

Information Security Applications - 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised... Information Security Applications - 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers (Paperback, 2012)
Souhwan Jung, Moti Yung
R1,646 R1,380 Discovery Miles 13 800 Save R266 (16%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 12th International Workshop on Information Security Applications, WISA 2011, held in Jeju Island, Korea, in August 2011. The 21 revised full papers presented were carefully reviewed and selected from 74 submissions. The workshop serves as a forum for new results from the academic research community as well as from the industry; the papers are focusing on all technical and practical aspects of cryptographic and non-cryptographic security applications.

Financial Cryptography and Data Security - 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March... Financial Cryptography and Data Security - 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers (Paperback, 2012)
George Danezis
R1,768 R1,481 Discovery Miles 14 810 Save R287 (16%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Financial Cryptography and Data Security, FC 2011, held in Gros Islet, St. Lucia, in February/March 2011. The 16 revised full papers and 10 revised short papers presented were carefully reviewed and selected from 65 initial submissions. The papers cover all aspects of securing transactions and systems and feature current research focusing on fundamental and applied real-world deployments on all aspects surrounding commerce security; as well as on systems security and inter-disciplinary efforts.

Transactions on Data Hiding and Multimedia Security VI (Paperback, 2011): Yun Q. Shi Transactions on Data Hiding and Multimedia Security VI (Paperback, 2011)
Yun Q. Shi
R1,631 R1,364 Discovery Miles 13 640 Save R267 (16%) Ships in 10 - 15 working days

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of multimedia security. This journal, LNCS Transactions on Data Hiding and Multimedia Security, aims to be a forum for all researchers in these emerging fields, publishing both original and archival research results. This issue consists mainly of a special section on content protection and forensics including four papers. The additional paper deals with histogram-based image hashing for searching content-preserving copies.

Security Awareness - Applying Practical Security in Your World (Paperback, 5th edition): Mark Ciampa Security Awareness - Applying Practical Security in Your World (Paperback, 5th edition)
Mark Ciampa
R747 R642 Discovery Miles 6 420 Save R105 (14%) Ships in 15 - 25 working days

Designed to provide you with the knowledge needed to protect computers and networks from increasingly sophisticated attacks, SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fifth Edition continues to present the same straightforward, practical information that has made previous editions so popular. For most computer users, practical computer security poses some daunting challenges: What type of attacks will antivirus software prevent? How do I set up a firewall? How can I test my computer to be sure that attackers cannot reach it through the Internet? When and how should I install Windows patches? This text is designed to help you understand the answers to these questions through a series of real-life user experiences. In addition, hands-on projects and case projects give you the opportunity to test your knowledge and apply what you have learned. SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fifth Edition contains up-to-date information on relevant topics such as protecting mobile devices and wireless local area networks.

NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, NC-Pro, WCNS, and SUNSET 2011, Held at NETWORKING 2011,... NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, NC-Pro, WCNS, and SUNSET 2011, Held at NETWORKING 2011, Valencia, Spain, May 13, 2011, Revised Selected Papers (Paperback)
Vicente Casares-Giner, Pietro Manzoni, Ana Pont
R1,516 R1,281 Discovery Miles 12 810 Save R235 (16%) Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of four workshops colocated with NETWORKING 2011, held in Valencia, Spain, in May 2011: the Workshop on Performance Evaluation of Cognitive Radio Networks: From Theory to Reality, PE-CRN 2011, the Network Coding Applications and Protocols Workshop, NC-Pro 2011, the Workshop on Wireless Cooperative Network Security, WCNS 2011, and the Workshop on Sustainable Networking, SUNSET 2011. The 28 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers cover a wide range of topics addressing the main research efforts in the fields of network coding, sustainable networking, security in wireless cooperative networks, and performance evaluation of cognitive radio networks.

Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 13-15, 2010,... Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 13-15, 2010, Proceedings (Paperback, 2010 ed.)
Marc Joye, Atsuko Miyaji, Akira Otsuka
R2,127 R1,727 Discovery Miles 17 270 Save R400 (19%) Ships in 10 - 15 working days

The4thInternationalConferenceonPairing-BasedCryptography(Pairing2010) was held in Yamanaka Hot Spring, Japan, during December 13-15, 2010. It was jointly co-organized by the National Institute of Advanced Industrial Science and Technology (AIST), Japan, and the Japan Advanced Institute of Science and Technology (JAIST). The goal of Pairing 2010 was to bring together leading researchersand pr- titioners from academia and industry, all concerned with problems related to pairing-based cryptography. We hope that this conference enhanced com- nication among specialists from various research areas and promoted creative interdisciplinary collaboration. Theconferencereceived64submissionsfrom17countries,outofwhich25- pers from 13 countries were accepted for publication in these proceedings. At least three Program Committee (PC) members reviewed each submitted paper, while submissions co-authored by a PC member were submitted to the more stringent evaluation of ?ve PC members. In addition to the PC members, many externalreviewersjoinedthereviewprocessintheirparticularareasofexpertise. We were fortunate to have this energetic team of experts, and are deeply gra- ful to all of them for their hard work, which included a very active discussion phase. The paper submission, review and discussion processes were e?ectively and e?ciently made possible by the Web-based system iChair. Furthermore,theconferencefeaturedthreeinvitedspeakers:JensGrothfrom University College London, Joseph H. Silverman from Brown University, and Gene Tsudik from University of California at Irvine, whose lectures on cutti- edge research areas- "Pairing-Based Non-interactive Zero-Knowledge Proofs," "A Survey of Local and Global Pairings on Elliptic Curves and Abelian Va- eties," and "Some Security Topics with Possible Applications for Pairing-Based Cryptography," respectively- contributed in a signi?cant part to the richness of the program.

Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009.... Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers (Paperback, Edition.)
Feng Bao, Moti Yung, Dongdai Lin, Jiwu Jing
R2,025 R1,698 Discovery Miles 16 980 Save R327 (16%) Ships in 10 - 15 working days

The5thChinaInternationalConferenceonInformationSecurityandCryptology (Inscrypt 2009) was co-organized by the State Key Laboratory of Information SecurityandbytheChineseAssociationforCryptologicResearchincooperation with the International Association for Cryptologic Research (IACR). The c- ference was held in Beijing, China, in the middle of December, and was further sponsored by the Institute of Software, the Graduate University of the Chinese Academy of Sciences and the National Natural Science Foundations of China. The conference is a leading annual international event in the area of cryptog- phy and information security taking place in China. The scienti?c program of the conference covered all areas of current research in the ?eld, with sessions on central areas of cryptographic research and on many important areas of - formation security. The conference continues to get the support of the entire international community, re?ecting on the fact that the research areas covered byInscryptareimportantto moderncomputing,whereincreasedsecurity,trust, safety and reliability are required. The international Program Committee of Inscrypt 2009 received a total of 147 submissions from more than 20 countries and regions, from which only 32 submissions were selected for presentation, 22 of which in the regular papers track and 10 submissions in the short papers track. All anonymous submissions were reviewed by experts in the relevant areas and based on their ranking, te- nical remarks and strict selection criteria the papers were chosen for the various tracks. The selection to both tracks was a highly competitive process.

Art of Software Security Assessment, The - Identifying and Preventing Software Vulnerabilities (Paperback): Mark Dowd, John... Art of Software Security Assessment, The - Identifying and Preventing Software Vulnerabilities (Paperback)
Mark Dowd, John McDonald, Justin Schuh
R1,805 R1,445 Discovery Miles 14 450 Save R360 (20%) Ships in 10 - 15 working days

"There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude." -Halvar Flake, CEO and head of research, SABRE Security GmbH The Definitive Insider's Guide to Auditing Software Security "This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written." The authors are leading security consultants and researchers who have personally uncovered vulnerabilities in applications ranging from sendmail to Microsoft Exchange, Check Point VPN to Internet Explorer. Drawing on their extraordinary experience, they introduce a start-to-finish methodology for "ripping apart" applications to reveal even the most subtle and well-hidden security flaws. "The Art of Software Security Assessment" covers the full spectrum of software vulnerabilities in both UNIX/Linux and Windows environments. It demonstrates how to audit security in applications of all sizes and functions, including network and Web software. Moreover, it teaches using extensive examples of real code "drawn from past flaws in many of the industry's highest-profile applications." Coverage includes - Code auditing: theory, practice, proven methodologies, and secrets of the trade - Bridging the gap between secure software design and post-implementation review - Performing architectural assessment: design review, threat modeling, and operational review - Identifying vulnerabilities related to memory management, data types, and malformed data - UNIX/Linux assessment: privileges, files, and processes - Windows-specific issues, including objects and the filesystem - Auditinginterprocess communication, synchronization, and state - Evaluating network software: IP stacks, firewalls, and common application protocols - Auditing Web applications and technologies This book is an unprecedented resource for everyone who must deliver secure software or assure the safety of existing software: consultants, security specialists, developers, QA staff, testers, and administrators alike. Contents ABOUT THE AUTHORS xv PREFACE xvii ACKNOWLEDGMENTS xxi I Introduction to Software Security Assessment 1 SOFTWARE VULNERABILITY FUNDAMENTALS 3 2 DESIGN REVIEW 25 3 OPERATIONAL REVIEW 67 4 APPLICATION REVIEW PROCESS 91 II Software Vulnerabilities 5 MEMORY CORRUPTION 167 6 C LANGUAGE ISSUES 203 7 PROGRAM BUILDING BLOCKS 297 8 STRINGS ANDMETACHARACTERS 387 9 UNIX I: PRIVILEGES AND FILES 459 10 UNIX II: PROCESSES 559 11 WINDOWS I: OBJECTS AND THE FILE SYSTEM 625 12 WINDOWS II: INTERPROCESS COMMUNICATION 685 13 SYNCHRONIZATION AND STATE 755 III Software Vulnerabilities in Practice 14 NETWORK PROTOCOLS 829 15 FIREWALLS 891 16 NETWORK APPLICATION PROTOCOLS 921 17 WEB APPLICATIONS 1007 18 WEB TECHNOLOGIES 1083 BIBLIOGRAPHY 1125 INDEX 1129

SSH, the Secure Shell - The Definitive Guide (Paperback, 2nd Revised edition): Daniel Barrett, Richard Silverman, Robert G.... SSH, the Secure Shell - The Definitive Guide (Paperback, 2nd Revised edition)
Daniel Barrett, Richard Silverman, Robert G. Byrnes
R955 R760 Discovery Miles 7 600 Save R195 (20%) Ships in 10 - 15 working days

Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.

Everything you want to know about SSH is in our second edition of "SSH, The Secure Shell: The Definitive Guide," This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution.

How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration.

Written for a wide, technical audience, "SSH, The Secure Shell: The Definitive Guide" covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, ourindispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks.

No matter where or how you're shipping information, "SSH, The Secure Shell: The Definitive Guide" will show you how to do it securely.

Quantum Cryptography and Secret-Key Distillation (Hardcover): Gilles van Assche Quantum Cryptography and Secret-Key Distillation (Hardcover)
Gilles van Assche
R2,133 Discovery Miles 21 330 Ships in 10 - 15 working days

Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This self-contained text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secret-key distillation. The book starts with an overview chapter, progressing to classical cryptography, information theory (classical and quantum), and applications of quantum cryptography. The discussion moves to secret-key distillation, privacy amplification and reconciliation techniques, concluding with the security principles of quantum cryptography. The author explains the physical implementation and security of these systems, enabling engineers to gauge the suitability of quantum cryptography for securing transmission in their particular application. With its blend of fundamental theory, implementation techniques, and details of recent protocols, this book will be of interest to graduate students, researchers, and practitioners in electrical engineering, physics, and computer science.

Advances of DNA Computing in Cryptography (Hardcover): Suyel Namasudra, Ganesh Chandra Deka Advances of DNA Computing in Cryptography (Hardcover)
Suyel Namasudra, Ganesh Chandra Deka
R2,918 Discovery Miles 29 180 Ships in 10 - 15 working days

This book discusses the current technologies of cryptography using DNA computing. Various chapters of the book will discuss the basic concepts of cryptography, steganography, basic concepts of DNA and DNA computing, approaches of DNA computing in cryptography, security attacks, practical implementaion of DNA computing, applications of DNA computing in the cloud computing environment, applications of DNA computing for big data, etc. It provides a judicious mix of concepts, solved examples and real life case studies.

Biometrics - Identity Verification in a Networked World (Paperback): Samir Nanavati, Michael Thieme, Raj Nanavati Biometrics - Identity Verification in a Networked World (Paperback)
Samir Nanavati, Michael Thieme, Raj Nanavati
R955 R641 Discovery Miles 6 410 Save R314 (33%) Ships in 10 - 15 working days

An insight into the biometric industry and the steps for successful deployment
Biometrics technologies verify identity through characteristics such as fingerprints, voices, and faces. By providing increased security and convenience, biometrics have begun to see widespread deployment in network, e-commerce, and retail applications. This book provides in-depth analysis of biometrics as a solution for authenticating employees and customers. Leading authority, Samir Nanavati explores privacy, security, accuracy, system design, user perceptions, and lessons learned in biometric deployments. He also assesses the real-world strengths and weaknesses of leading biometric technologies: finger-scan, iris-scan, facial-scan, voice-scan, and signature-scan. This accessible book is a necessary step in understanding and implementing biometrics.
Demystifies the complex world of optical networks for IT and business managers
Over the past few years, the cost of fiber optic networking has decreased, making it the best solution for providing virtually unlimited bandwidth for corporate LANs and WANs, metropolitan networks, Internet access, and broadband to the home. The only strategic book on optical networking technologies written from a real-world business perspective, Optical Networking demystifies complex fiber technologies for managers, and details the practical business benefits an optical network can offer. Debra Cameron explores established and emerging markets for optical networks as well as the enabling technologies, applications, network architectures, key deployment issues, and cost considerations. She also provides in-depth case studies of optical networks now in use in the United States and abroad.

Distributed Systems Security - Issues, Processes and Solutions (Hardcover): Abhijit Belapurkar, Anirban Chakrabarti, Harigopal... Distributed Systems Security - Issues, Processes and Solutions (Hardcover)
Abhijit Belapurkar, Anirban Chakrabarti, Harigopal Ponnapalli, Niranjan Varadarajan, Srinivas Padmanabhuni, …
R1,859 Discovery Miles 18 590 Ships in 10 - 15 working days

How to solve security issues and problems arising in distributed systems.

Security is one of the leading concerns in developing dependable distributed systems of today, since the integration of different components in a distributed manner creates new security problems and issues. Service oriented architectures, the Web, grid computing and virtualization - form the backbone of today's distributed systems. A lens to security issues in distributed systems is best provided via deeper exploration of security concerns and solutions in these technologies.

"Distributed Systems Security" provides a holistic insight into current security issues, processes, and solutions, and maps out future directions in the context of today's distributed systems. This insight is elucidated by modeling of modern day distributed systems using a four-tier logical model -host layer, infrastructure layer, application layer, and service layer (bottom to top). The authors provide an in-depth coverage of security threats and issues across these tiers. Additionally the authors describe the approaches required for efficient security engineering, alongside exploring how existing solutions can be leveraged or enhanced to proactively meet the dynamic needs of security for the next-generation distributed systems. The practical issues thereof are reinforced via practical case studies.

"Distributed Systems Security: "

Presents an overview of distributed systems security issues, including threats, trends, standards and solutions.Discusses threats and vulnerabilities in different layers namely the host, infrastructure, application, and service layer to provide a holistic and practical, contemporary view of enterprise architectures.Provides practical insights into developing current-day distributed systems security using realistic case studies.

This book will be of invaluable interest to software engineers, developers, network professionals and technical/enterprise architects working in the field of distributed systems security. Managers and CIOs, researchers and advanced students will also find this book insightful.

Topics in Cryptology -- CT-RSA 2004 - The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA,... Topics in Cryptology -- CT-RSA 2004 - The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings (Paperback, 2004 ed.)
Tatsuaki Okamoto
R2,309 R2,043 Discovery Miles 20 430 Save R266 (12%) Ships in 10 - 15 working days

The Cryptographers' Track (CT-RSA) is a research conference within the RSA conference, the largest, regularly staged computer security event. CT-RSA 2004 was the fourth year of the Cryptographers' Track, and it is now an established venue for presenting practical research results related to cryptography and data security. The conference received 77 submissions, and the program committee sel- ted 28 of these for presentation. The program committee worked very hard to evaluate the papers with respect to quality, originality, and relevance to cryp- graphy. Each paper was reviewed by at least three program committee members. Extended abstracts of the revised versions of these papers are in these proc- dings. The program also included two invited lectures by Dan Boneh and Silvio Micali. I am extremely grateful to the program committee members for their en- mous investment of time and e?ort in the di?cult and delicate process of review and selection. Many of them attended the program committee meeting during the Crypto 2003 conference at the University of California, Santa Barbara.

Computer Security and Penetration Testing (Paperback, 2nd edition): Alfred Basta, Nadine Basta, Mary Brown, PhD, CISSP, CISA Computer Security and Penetration Testing (Paperback, 2nd edition)
Alfred Basta, Nadine Basta, Mary Brown, PhD, CISSP, CISA
R1,134 R957 Discovery Miles 9 570 Save R177 (16%) Ships in 15 - 25 working days

Delivering up-to-the-minute coverage, COMPUTER SECURITY AND PENETRATION TESTING, Second Edition offers readers of all backgrounds and experience levels a well-researched and engaging introduction to the fascinating realm of network security. Spotlighting the latest threats and vulnerabilities, this cutting-edge text is packed with real-world examples that showcase today's most important and relevant security topics. It addresses how and why people attack computers and networks--equipping readers with the knowledge and techniques to successfully combat hackers. This edition also includes new emphasis on ethics and legal issues. The world of information security is changing every day - readers are provided with a clear differentiation between hacking myths and hacking facts. Straightforward in its approach, this comprehensive resource teaches the skills needed to go from hoping a system is secure to knowing that it is.

Applied Cryptography - Protocols, Algorithms, and Source Code in C (Paperback, 2nd Edition): Bruce Schneier Applied Cryptography - Protocols, Algorithms, and Source Code in C (Paperback, 2nd Edition)
Bruce Schneier 1
R1,252 R876 Discovery Miles 8 760 Save R376 (30%) Ships in 10 - 15 working days

". . .the best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted never to be published. . . ." -Wired Magazine

". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal

". . .easily ranks as one of the most authoritative in its field." -PC Magazine

". . .the bible of code hackers." -The Millennium Whole Earth Catalog

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

What's new in the Second Edition?
* New information on the Clipper Chip, including ways to defeat the key escrow mechanism
* New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
* The latest protocols for digital signatures, authentication, secure elections, digital cash, and more
* More detailed information on key management and cryptographic implementations

Cybersecurity - The Essential Body Of Knowledge (Paperback, New edition): Dan Shoemaker Cybersecurity - The Essential Body Of Knowledge (Paperback, New edition)
Dan Shoemaker
R1,041 R883 Discovery Miles 8 830 Save R158 (15%) Ships in 15 - 25 working days

CYBERSECURITY: THE ESSENTIAL BODY OF KNOWLEDGE provides a comprehensive, trustworthy framework of practices for assuring information security. This book is organized to help readers understand how the various roles and functions within cybersecurity practice can be combined and leveraged to produce a secure organization. In this unique book, concepts are not presented as stagnant theory; instead, the content is interwoven in a real world adventure story that runs throughout. In the story, a fictional company experiences numerous pitfalls of cyber security and the reader is immersed in the everyday practice of securing the company through various characters' efforts. This approach grabs learners' attention and assists them in visualizing the application of the content to real-world issues that they will face in their professional life. Derived from the Department of Homeland Security's Essential Body of Knowledge (EBK) for IT Security, this book is an indispensable resource dedicated to understanding the framework, roles, and competencies involved with information security.

Kryptografie fur Dummies (German, Paperback): Hans Werner Lang Kryptografie fur Dummies (German, Paperback)
Hans Werner Lang
R613 R567 Discovery Miles 5 670 Save R46 (8%) Ships in 10 - 15 working days

Die Kommunikation ber das Internet ist quasi ffentlich: Dritte k nnen Nachrichten mitlesen, abfangen oder f lschen. Genauso kann ein Sender einer Nachricht behaupten, diese nie gesendet zu haben, und ein Empf nger kann behaupten, eine Nachricht nie erhalten zu haben. Abhilfe schafft die Kryptografie. Sie erm glicht nicht nur die Verschl sselung von Nachrichten, sondern auch digitale Unterschriften, die Authentifizierung und die Anonymisierung von Kommunikationspartnern. Das hier vorliegende Buch ist eine Einf hrung in die Kryptografie f r Studierende - von der symmetrischen ber die asymmetrische Verschl sselung bis hin zu Hash-Funktionen. Umfassend, keinesfalls oberfl chlich, aber ohne Vorwissen verst ndlich.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Practical Cryptology and Web Security
P.K. Yuen Paperback R2,035 R1,422 Discovery Miles 14 220
You CAN Stop Stupid - Stopping Losses…
Ira Winkler, Dr. Tracy Celaya Brown Paperback R778 R627 Discovery Miles 6 270
The Truth Machine - The Blockchain and…
Michael J. Casey, Paul Vigna Paperback  (1)
R399 R304 Discovery Miles 3 040
Kryptowahrungen fur Dummies
Krijn Soeteman Paperback R378 Discovery Miles 3 780
Tribe of Hackers Blue Team - Tribal…
Marcus J. Carey, Jennifer Jin Paperback R565 R467 Discovery Miles 4 670
Management of Information Security
Michael Whitman, Herbert Mattord Paperback R937 R803 Discovery Miles 8 030
The Mathematics of Secrets…
Joshua Holden Paperback R464 R379 Discovery Miles 3 790
The Art of Intrusion - The Real Stories…
Kevin D. Mitnick, William L Simon Paperback R321 R246 Discovery Miles 2 460
Tribe of Hackers Red Team - Tribal…
Marcus J. Carey, Jennifer Jin Paperback R496 R371 Discovery Miles 3 710
The Shellcoder's Handbook - Discovering…
Chris Anley, John Heasman, … Paperback R964 R627 Discovery Miles 6 270

 

Partners