0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (87)
  • R500+ (1,270)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

The Politics of Privacy - Planning for Personal Data Systems as Powerful Technologies (Hardcover): James B. Rule, Etc The Politics of Privacy - Planning for Personal Data Systems as Powerful Technologies (Hardcover)
James B. Rule, Etc; Edited by James Rule
R1,725 Discovery Miles 17 250 Ships in 10 - 15 working days
Integrating Security and Software Engineering - Advances and Future Vision (Hardcover): Mouratidis Haralambos, Paolo Giorgini Integrating Security and Software Engineering - Advances and Future Vision (Hardcover)
Mouratidis Haralambos, Paolo Giorgini
R2,484 Discovery Miles 24 840 Ships in 18 - 22 working days

Integrating Security and Software Engineering: Advances and Future Vision provides the first step towards narrowing the gap between security and software engineering. This book introduces the field of secure software engineering, which is a branch of research investigating the integration of security concerns into software engineering practices. ""Integrating Security and Software Engineering: Advances and Future Vision"" discusses problems and challenges of considering security during the development of software systems, and also presents the predominant theoretical and practical approaches that integrate security and software engineering.

Forensic Computing (Hardcover, 2nd ed. 2007): Anthony Sammes, Brian Jenkinson Forensic Computing (Hardcover, 2nd ed. 2007)
Anthony Sammes, Brian Jenkinson
R2,729 Discovery Miles 27 290 Ships in 18 - 22 working days

In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how the contents of computer systems can be recovered, even when hidden or subverted by criminals. Equally important, they demonstrate how to insure that computer evidence is admissible in court. Updated to meet ACPO 2003 guidelines, Forensic Computing: A Practitioner's Guide offers: methods for recovering evidence information from computer systems; principles of password protection and data encryption; evaluation procedures used in circumventing a system's internal security safeguards, and full search and seizure protocols for experts and police officers.

Managing Catastrophic Loss of Sensitive Data - A Guide for IT and Security Professionals (Paperback): Constantine Photopoulos Managing Catastrophic Loss of Sensitive Data - A Guide for IT and Security Professionals (Paperback)
Constantine Photopoulos
R1,265 Discovery Miles 12 650 Ships in 10 - 15 working days

Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the appropriate recovery and notification steps when calamity strikes.
*Addresses a very topical subject of great concern to security, general IT and business management
*Provides a step-by-step approach to managing the consequences of and recovering from the loss of sensitive data.
*Gathers in a single place all information about this critical issue, including legal, public relations and regulatory issues

Secure Data Management in Decentralized Systems (Hardcover, 2007 ed.): Ting Yu, Sushil Jajodia Secure Data Management in Decentralized Systems (Hardcover, 2007 ed.)
Ting Yu, Sushil Jajodia
R4,264 Discovery Miles 42 640 Ships in 18 - 22 working days

The field of database security has expanded greatly, with the rapid development of global inter-networked infrastructure. Databases are no longer stand-alone systems accessible only to internal users of organizations. Today, businesses must allow selective access from different security domains. New data services emerge every day, bringing complex challenges to those whose job is to protect data security. The Internet and the web offer means for collecting and sharing data with unprecedented flexibility and convenience, presenting threats and challenges of their own. This book identifies and addresses these new challenges and more, offering solid advice for practitioners and researchers in industry.

Vulnerability Analysis and Defense for the Internet (Hardcover, 2008 ed.): Abhishek Singh Vulnerability Analysis and Defense for the Internet (Hardcover, 2008 ed.)
Abhishek Singh; Contributions by B Singh, H. Joseph
R2,794 Discovery Miles 27 940 Ships in 18 - 22 working days

Vulnerability analysis, also known as vulnerability assessment, is a process that defines, identifies, and classifies the security holes, or vulnerabilities, in a computer, network, or application. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use. Vulnerability Analysis and Defense for the Internet provides packet captures, flow charts and pseudo code, which enable a user to identify if an application/protocol is vulnerable. This edited volume also includes case studies that discuss the latest exploits.

Digital Watermarking and Steganography - Fundamentals and Techniques (Hardcover): Frank Y. Shih Digital Watermarking and Steganography - Fundamentals and Techniques (Hardcover)
Frank Y. Shih
R3,647 Discovery Miles 36 470 Ships in 10 - 15 working days

Every day millions of people capture, store, transmit, and manipulate digital data. Unfortunately free access digital multimedia communication also provides virtually unprecedented opportunities to pirate copyrighted material. Providing the theoretical background needed to develop and implement advanced techniques and algorithms, Digital Watermarking and Steganography-

- Demonstrates how to develop and implement methods to guarantee the authenticity of digital media

- Explains the categorization of digital watermarking techniques based on characteristics as well as applications

- Presents cutting-edge techniques such as the GA-based breaking algorithm on the frequency-domain steganalytic system.

The popularity of digital media continues to soar. The theoretical foundation presented within this valuable reference will facilitate the creation on new techniques and algorithms to combat present and potential threats against information security.

Digital Watermarking and Steganography (Hardcover, 2nd edition): Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich,... Digital Watermarking and Steganography (Hardcover, 2nd edition)
Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, Ton Kalker
R2,109 Discovery Miles 21 090 Ships in 10 - 15 working days

Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties to decipher the content that he has taken. The many techiniques of digital watermarking (embedding a code) and steganography (hiding information) continue to evolve as applications that necessitate them do the same. The authors of this second edition provide an update on the framework for applying these techniques that they provided researchers and professionals in the first well-received edition. Steganography and steganalysis (the art of detecting hidden information) have been added to a robust treatment of digital watermarking, as many in each field research and deal with the other. New material includes watermarking with side information, QIM, and dirty-paper codes. The revision and inclusion of new material by these influential authors has created a must-own book for anyone in this profession.
*This new edition now contains essential information on steganalysis and steganography
*New concepts and new applications including QIM introduced
*Digital watermark embedding is given a complete update with new processes and applications

Microsoft Vista for IT Security Professionals (Paperback): Anthony Piltzecker Microsoft Vista for IT Security Professionals (Paperback)
Anthony Piltzecker
R970 R919 Discovery Miles 9 190 Save R51 (5%) Ships in 10 - 15 working days

This book is designed for the professional system administrators who need to securely deploy Microsoft Vista in their networks. Readers will not only learn about the new security features of Vista, but they will learn how to safely integrate Vista with their existing wired and wireless network infrastructure and safely deploy with their existing applications and databases. The book begins with a discussion of Microsoft's Trustworthy Computing Initiative and Vista's development cycle, which was like none other in Microsoft's history. Expert authors will separate the hype from the reality of Vista s preparedness to withstand the 24 x 7 attacks it will face from malicious attackers as the world s #1 desktop operating system. The book has a companion CD which contains hundreds of working scripts and utilities to help administrators secure their environments.
. Microsoft Windows operating systems run more than 90% of the desktop PCs in the world and Vista is the first major Windows release in more than 5 years
. This is currently the only book on Windows Vista Security
. The companion CD contains hundreds of working scripts and utilities to help administrators secure their environments."

Grid Computing Security (Hardcover, 2007 ed.): Anirban Chakrabarti Grid Computing Security (Hardcover, 2007 ed.)
Anirban Chakrabarti
R1,450 Discovery Miles 14 500 Ships in 18 - 22 working days

Based on research and industry experience, this book structures the issues pertaining to grid computing security into three main categories: architecture-related, infrastructure-related, and management-related issues. It discusses all three categories in detail, presents existing solutions, standards, and products, and pinpoints their shortcomings and open questions. Together with a brief introduction into grid computing in general and underlying security technologies, this book offers the first concise and detailed introduction to this important area, targeting professionals in the grid industry as well as students.

Net-Centric Approaches to Intelligence and National Security (Hardcover, 2005 ed.): Roy Ladner, Frederick E. Petry Net-Centric Approaches to Intelligence and National Security (Hardcover, 2005 ed.)
Roy Ladner, Frederick E. Petry
R2,750 Discovery Miles 27 500 Ships in 18 - 22 working days

The development of net-centric approaches for intelligence and national security applications has become a major concern in many areas such as defense, intelligence and national and international law enforcement agencies. In this volume we consider the web architectures and recent developments that make n- centric approaches for intelligence and national security possible. These include developments in information integration and recent advances in web services including the concept of the semantic web. Discovery, analysis and management of web-available data pose a number of interesting challenges for research in w- based management systems. Intelligent agents and data mining are some of the techniques that can be employed. A number of specific systems that are net-centric based in various areas of military applications, intelligence and law enforcement are presented that utilize one or more of such techniques The opening chapter overviews the concepts related to ontologies which now form much of the basis of the possibility of sharing of information in the Semantic Web. In the next chapter an overview of Web Services and examples of the use of Web Services for net-centric operations as applied to meteorological and oceanographic (MetOc) data is presented and issues related to the Navy's use of MetOc Web Services are discussed. The third chapter focuses on metadata as conceived to support the concepts of a service-oriented architecture and, in particular, as it relates to the DoD Net-Centric Data Strategy and the NCES core services.

Chaos Synchronization and Cryptography for Secure Communications - Applications for Encryption (Hardcover, New): Santo Banerjee Chaos Synchronization and Cryptography for Secure Communications - Applications for Encryption (Hardcover, New)
Santo Banerjee
R4,683 Discovery Miles 46 830 Ships in 18 - 22 working days

Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption explores the combination of ordinary and time delayed systems and their applications in cryptographic encoding. This innovative publication presents a critical mass of the most sought after research, providing relevant theoretical frameworks and the latest empirical research findings in this area of study.

Foundations of Computer Security (Hardcover, 2006 ed.): David Salomon Foundations of Computer Security (Hardcover, 2006 ed.)
David Salomon
R1,686 Discovery Miles 16 860 Ships in 10 - 15 working days

Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its comprehensive treatment of all the major areas of computer security aims to give readers a complete foundation in the field of Computer Security. Exercises are given throughout the book and are intended to strengthening the readera (TM)s knowledge - answers are also provided.

Written in a clear, easy to understand style, aimed towards advanced undergraduates and non-experts who want to know about the security problems confronting them everyday. The technical level of the book is low and requires no mathematics, and only a basic concept of computers and computations. Foundations of Computer Security will be an invaluable tool for students and professionals alike.

Information Processing and Security Systems (Hardcover): Khalid Saeed, Jerzy Pejas Information Processing and Security Systems (Hardcover)
Khalid Saeed, Jerzy Pejas
R5,405 Discovery Miles 54 050 Ships in 18 - 22 working days

Information Processing and Security Systems is a collection of forty papers that were originally presented at an international multi-conference on Advanced Computer Systems (ACS) and Computer Information Systems and Industrial Management Applications (CISIM) held in Elk, Poland. This volume describes the latest developments in advanced computer systems and their applications within artificial intelligence, biometrics and information technology security. The volume also includes contributions on computational methods, algorithms and applications, computational science, education and industrial management applications.

Artificial Intelligence and Security in Computing Systems - 9th International Conference, ACS '2002 Miedzyzdroje, Poland... Artificial Intelligence and Security in Computing Systems - 9th International Conference, ACS '2002 Miedzyzdroje, Poland October 23-25, 2002 Proceedings (Hardcover, 2003 ed.)
Jerzy Soldek, Leszek Drobiazgiewicz
R4,179 Discovery Miles 41 790 Ships in 18 - 22 working days

Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies:

-Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments.
-Multiagent Systems include laboratory research on multiagent intelligent systems as well as upon their applications in transportation and information systems.
-Computer Security and Safety presents techniques and algorithms which will be of great interest to practitioners. In general, they focus on new cryptographic algorithms (including a symmetric key encryption scheme, hash functions, secret generation and sharing schemes, and secure data storage), a formal language for policy access control description and its implementation, and risk management methods (used for continuous analysis both in distributed network and software development projects).

Security with Noisy Data - On Private Biometrics, Secure Key Storage and Anti-Counterfeiting (Hardcover, Revised ed.): Pim... Security with Noisy Data - On Private Biometrics, Secure Key Storage and Anti-Counterfeiting (Hardcover, Revised ed.)
Pim Tuyls, Boris Skoric, Tom Kevenaar
R2,841 Discovery Miles 28 410 Ships in 18 - 22 working days

Noisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human beings, or physical structures, such as physical unclonable functions. This book examines how the presence of noise has an impact on information security, describes how it can be dealt with and possibly used to generate an advantage over traditional approaches, and provides a self-contained overview of the techniques and applications of security based on noisy data.

Security with Noisy Data thoroughly covers the theory of authentication based on noisy data and shows it in practice as a key tool for preventing counterfeiting. Part I discusses security primitives that allow noisy inputs, and Part II focuses on the practical applications of the methods discussed in the first part.

Key features:

a [ Contains algorithms to derive secure keys from noisy data, in particular from physical unclonable functions and biometrics - as well as the theory proving that those algorithms are secure

a [ Offers practical implementations of algorithms, including techniques that give insight into system security

a [ Includes an overview and detailed description of new applications made possible by using these new algorithms

a [ Discusses recent theoretical as well as application-oriented developments in the field, combining noisy data with cryptography

a [ Describes the foundations of the subject in a clear, accessible and reader-friendly style

a [ Presents the principles of key establishment and multiparty computation over noisy channels

a [ Provides a detailed overview of the building blocks of cryptography for noisy data and explains how these techniquescan be applied, (for example as anti-counterfeiting and key storage)

a [ Introduces privacy protected biometric systems, analyzes the theoretical and practical properties of PUFs and discusses PUF based systems

a [ Addresses biometrics and physical unclonable functions extensively

This comprehensive introduction offers an excellent foundation to graduate students and researchers entering the field, and will also benefit professionals needing to expand their knowledge. Readers will gain a well-rounded and broad understanding of the topic through the insight it provides into both theory and practice.

Pim Tuyls is a Principal Scientist at Philips Research and a Visiting Professor at the COSIC Department of the Katholieke Universiteit of Leuven, Dr Boris Skoric and Dr Tom Kevenaar are research scientists at Philips Research Laboratories, Eindhoven.

Securing Web Services - Practical Usage of Standards and Specifications (Hardcover): Panos Periorellis Securing Web Services - Practical Usage of Standards and Specifications (Hardcover)
Panos Periorellis
R4,610 Discovery Miles 46 100 Ships in 18 - 22 working days

'Securing Web Services' investigates the security-related specifications that encompass message level security, transactions, and identity management.

Certification and Security in Inter-Organizational E-Services - IFIP 18th World Computer Congress, August 22-27, 2004,... Certification and Security in Inter-Organizational E-Services - IFIP 18th World Computer Congress, August 22-27, 2004, Toulouse, France (Hardcover, 2005 ed.)
Enrico Nardelli, Maurizio Talamo
R1,490 Discovery Miles 14 900 Ships in 18 - 22 working days

Certification and Security in Inter-Organizational E-Services presents the proceedings of CSES 2004 - the 2nd International Workshop on Certification and Security in Inter-Organizational E-Services held within IFIP WCC in August 2004 in Toulouse, France. Certification and security share a common technological basis in the reliable and efficient monitoring of executed and running processes; they likewise depend on the same fundamental organizational and economic principles. As the range of services managed and accessed through communication networks grows throughout society, and given the legal value that is often attached to data treated or exchanged, it is critical to be able to certify the network transactions and ensure that the integrity of the involved computer-based systems is maintained.

This collection of papers documents several important developments, and offers real-life application experiences, research results and methodological proposals of direct interest to systems experts and users in governmental, industrial and academic communities.

Random Curves - Journeys of a Mathematician (Hardcover, 2008 ed.): Neal Koblitz Random Curves - Journeys of a Mathematician (Hardcover, 2008 ed.)
Neal Koblitz
R2,936 Discovery Miles 29 360 Ships in 18 - 22 working days

Neal Koblitz is a co-inventor of one of the two most popular forms of encryption and digital signature, and his autobiographical memoirs are collected in this volume. Besides his own personal career in mathematics and cryptography, Koblitz details his travels to the Soviet Union, Latin America, Vietnam and elsewhere; political activism; and academic controversies relating to math education, the C. P. Snow "two-culture" problem, and mistreatment of women in academia. These engaging stories fully capture the experiences of a student and later a scientist caught up in the tumultuous events of his generation.

Critical Infrastructure Protection V - 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP... Critical Infrastructure Protection V - 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Hanover, NH, USA, March 23-25, 2011, Revised Selected Papers (Hardcover)
Jonathan Butts, Sujeet Shenoi
R1,419 Discovery Miles 14 190 Ships in 18 - 22 working days

The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection V describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Themes and Issues, Control Systems Security, Infrastructure Security, and Infrastructure Modeling and Simulation. This book is the 5th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of 14 edited papers from the 5th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at Dartmouth College, Hanover, New Hampshire, USA in the spring of 2011. Critical Infrastructure Protection V is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Jonathan Butts is an Assistant Professor of Computer Science at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.

Certification and Security in E-Services - From E-Government to E-Business (Hardcover, 2003 ed.): Enrico Nardelli, Sabina... Certification and Security in E-Services - From E-Government to E-Business (Hardcover, 2003 ed.)
Enrico Nardelli, Sabina Posadziejewski, Maurizio Talamo
R2,812 Discovery Miles 28 120 Ships in 18 - 22 working days

This volume contains the final proceedings of the special stream on security in E-government and E-business. This stream has been an integral part of the IFIP World Computer Congress 2002, that has taken place from 26-29 August 2002 in Montreal, Canada. The stream consisted of three events: one tutorial and two workshops. The tutorial was devoted to the theme "An Architecture for Information Se curity Management," and was presented by Prof. Dr. Basie von Solms (Past chairman of IFIP TC 11) and Prof. Dr. Jan Eloff (Past chairman of IFIP TC 11 WG 11.2). Both are from Rand Afrikaans University -Standard Bank Academy for Information Technology, Johannesburg, South Africa. The main purpose of the tutorial was to present and discuss an Architecture for Informa tion Security Management and was specifically of value for people involved in, or who wanted to find out more about the management of information secu rity in a company. It provided a reference framework covering all three of the relevant levels or dimensions of Information Security Management. The theme of the first workshop was "E-Government and Security" and was chaired by Leon Strous, CISA (De Nederlandsche Bank NY, The Netherlands and chairman of IFIP TC 11) and by Sabina Posadziejewski, I.S.P., MBA (Al berta Innovation and Science, Edmonton, Canada)."

Theory and Practice of Cryptography Solutions for Secure Information Systems (Hardcover, New): Atilla Elci, Josef Pieprzyk,... Theory and Practice of Cryptography Solutions for Secure Information Systems (Hardcover, New)
Atilla Elci, Josef Pieprzyk, Alexander G. Chefranov, Mehmet A. Orgun, Huaxiong Wang, …
R5,047 Discovery Miles 50 470 Ships in 18 - 22 working days

Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.

Communications and Multimedia Security - 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18,... Communications and Multimedia Security - 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom (Hardcover, 2005 ed.)
David Chadwick, Bart Preneel
R2,812 Discovery Miles 28 120 Ships in 18 - 22 working days

Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields of Communications and Multimedia Security.

This state-of-the-art volume presents the proceedings of the Eighth Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, September 2004, in Windermere, UK. The papers presented here represent the very latest developments in security research from leading people in the field. The papers explore a wide variety of subjects including privacy protection and trust negotiation, mobile security, applied cryptography, and security of communication protocols. Of special interest are several papers which addressed security in the Microsoft .Net architecture, and the threats that builders of web service applications need to be aware of. The papers were a result of research sponsored by Microsoft at five European University research centers.

This collection will be important not only for multimedia security experts and researchers, but also for all teachers and administrators interested in communications security.

System-on-Chip Architectures and Implementations for Private-Key Data Encryption (Hardcover, 2003 ed.): Maire McLoone, John V.... System-on-Chip Architectures and Implementations for Private-Key Data Encryption (Hardcover, 2003 ed.)
Maire McLoone, John V. McCanny
R2,745 Discovery Miles 27 450 Ships in 18 - 22 working days

In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architectures for the DES and Rijndael symmetric key encryption algorithms are presented. The generic architectures can be utilised to rapidly and effortlessly generate system-on-chip cores, which support numerous application requirements, most importantly, different modes of operation and encryption and decryption capabilities. In addition, efficient silicon SHA-1, SHA-2 and HMAC hash algorithm architectures are described. A single-chip Internet Protocol Security (IPSec) architecture is also presented that comprises a generic Rijndael design and a highly efficient HMAC-SHA-1 implementation.

In the opinion of the authors, highly efficient hardware implementations of cryptographic algorithms are provided in this book. However, these are not hard-fast solutions. The aim of the book is to provide an excellent guide to the design and development process involved in the translation from encryption algorithm to silicon chip implementation.

Cryptography and Security Services - Mechanisms and Applications (Hardcover): Manuel Mogollon Cryptography and Security Services - Mechanisms and Applications (Hardcover)
Manuel Mogollon
R2,661 Discovery Miles 26 610 Ships in 18 - 22 working days

Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptography & Security Devices: Mechanisms & Applications addresses cryptography from the perspective of the security services and mechanisms available to implement these services: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and the confidentiality and integrity of security services. This book provides scholars and practitioners in the field of information assurance working knowledge of fundamental encryption algorithms and systems supported in information technology and secure communication networks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Felt
Willow Mullins Hardcover R4,638 Discovery Miles 46 380
Military Dress: Drafts of Mess Jackets…
A. S. Bridgland Hardcover R805 Discovery Miles 8 050
The Culture of Knitting
Joanne Turney Hardcover R3,670 Discovery Miles 36 700
The Boundary Element Method for Plate…
J.T. Katsikadelis Hardcover R3,246 R3,039 Discovery Miles 30 390
Multigrid
Ulrich Trottenberg, Cornelius W. Oosterlee, … Hardcover R2,249 Discovery Miles 22 490
Numerical Methods for Delay Differential…
Alfredo Bellen, Marino Zennaro Hardcover R5,214 Discovery Miles 52 140
Random Ordinary Differential Equations…
Xiaoying Han, Peter E. Kloeden Hardcover R4,012 Discovery Miles 40 120
Artificial Neural Networks - Learning…
Nicolaos Karayiannis, Anastasios N. Venetsanopoulos Hardcover R4,257 Discovery Miles 42 570
Pseudo-Regularly Varying Functions and…
Valerii V. Buldygin, Karl-Heinz Indlekofer, … Hardcover R3,189 Discovery Miles 31 890
The Beltrami Equation - A Geometric…
Vladimir Gutlyanskii, Vladimir Ryazanov, … Hardcover R4,045 Discovery Miles 40 450

 

Partners