0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (87)
  • R500+ (1,283)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Security and Persistence - Proceedings of the International Workshop on Computer Architectures to Support Security and... Security and Persistence - Proceedings of the International Workshop on Computer Architectures to Support Security and Persistence of Information 8-11 May 1990, Bremen, West Germany (Paperback, Softcover reprint of the original 1st ed. 1990)
John Rosenberg, J. Leslie Keedy
R1,455 Discovery Miles 14 550 Ships in 18 - 22 working days

During a short visit to Bremen in December 1989 John Rosenberg had several discussions with me about computer architecture. Although we had previously worked together for more than a decade in Australia we had not seen each other for over a year, following my move to Bremen in 1988. Meanwhile John was spending a year on study leave at the University of St. Andrews in Scotland with Professor Ron Morrison and his persistent programming research group. From our conversations it was quite clear that John was having a most fruitful time in St. Andrews and was gaining valuable new insights into the world of persistent programming. He was very keen to explore the significance of these insights for the MONADS Project, which we had been jOintly directing since the early 1980s. MONADS was not about persistent programming. In fact it had quite different origins, in the areas of software engineering and information protection. In an earlier stage of the project our ideas on these themes had led us into the world of computer architecture and even hardware deSign, in our attempts to provide an efficient base machine for our software ideas. The most important practical result of this phase of the project had been the development of the MONADS-PC, a mini computer which would be better compared with say a V tv< 11/750 than with a personal computer, despite its unfortunate name.

A Pathology of Computer Viruses (Paperback, Edition. ed.): David Ferbrache A Pathology of Computer Viruses (Paperback, Edition. ed.)
David Ferbrache
R1,424 Discovery Miles 14 240 Ships in 18 - 22 working days

The 1980's saw the advent of widespread (and potentially damaging) computer virus infection of both personal computer and mainframe systems. The computer security field has been comparatively slow to react to this emerging situation. It is only over the last two years that a significant body of knowledge on the operation, likely evolution and prevention of computer viruses has developed. A Pathology of Computer Viruses gives a detailed overview of the history of the computer virus and an in-depth technical review of the principles of computer virus and worm operation under DOS, Mac, UNIX and DEC operating systems. David Ferbrache considers the possible extension of the threat to the mainframe systems environment and suggests how the threat can be effectively combatted using an antiviral management plan. The author addresses the latest developments in "stealth" virus operations, specifically the trend for virus authors to adopt extensive camouflage and concealment techniques, which allow viruses to evade both existing anti-viral software and to avoid detection by direct observation of machine behaviour. A Pathology of Computer Viruses addresses a distinct need - that of the computer specialist and professional who needs a source reference work detailing all aspects of the computer virus threat.

Local Area Network Security - Workshop LANSEC '89. European Institute for System Security (E.I.S.S.) Karlsruhe, FRG, April... Local Area Network Security - Workshop LANSEC '89. European Institute for System Security (E.I.S.S.) Karlsruhe, FRG, April 3-6, 1989. Proceedings (Paperback, 1989 ed.)
Thomas A. Berson, Thomas Beth
R1,084 Discovery Miles 10 840 Ships in 18 - 22 working days
Digital Audio Watermarking Techniques and Technologies - Applications and Benchmarks (Hardcover, New): Nedeljko Cvejic, Tapio... Digital Audio Watermarking Techniques and Technologies - Applications and Benchmarks (Hardcover, New)
Nedeljko Cvejic, Tapio Seppanen
R4,579 Discovery Miles 45 790 Ships in 18 - 22 working days

This title discusses theoretical frameworks, recent research findings and practical applications which will benefit researchers and students in electrical engineering and information technology, as well as professionals working in digital audio.

Advances in Cryptology - EUROCRYPT '87 - Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam,... Advances in Cryptology - EUROCRYPT '87 - Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987 Proceedings (Paperback, 1988 ed.)
David Chaum, Wyn L. Price
R1,510 Discovery Miles 15 100 Ships in 18 - 22 working days

It is our pleasure to thank dl those uho contributed to nial\ing thew proceeding\ possible: the authors. progriimme committee. organihing committee, I4C.K otticfrh and directors, and all the attendees. We were all deeplq saddened nhen ne lemied th,it Tore Ilerle~tam. J member 01 the programme committee, had died unexpsctedl\ Thi\ olunie I\ dedicated to liim Amsterdum, the Netherlirnds London, Englund Junuur,, 1988 __~ ...~~~. ~ ~ ~ I. Advances in C'r>ptolog?: .A Report on C'RY t'TO Si. Allen Cirr\lio. k.d. L 04. Department of P.lectrica1 and ('omputcr Engineering, S'iiita Harhara 2. C'ryptography: Proceeding\. Burg keusrwiii lYX2 (I.ecturr biotr5 in C'omptitcr Scicncr: 149). I li- mas Beth, Ed. Springer-Verlag. 1983. 3. Advanccs in C'rytology: Proceedings cif C'KY'PTO S2, I),]\ id ('hauin. Ronald L KiLcsi. and Al~n I Sherman. Eds. Plenum NY. 1YX3. 4. Advances in C'ryptology: Proceeding5 of C'K)'f)l.O S3. D;i\id ('hiiuni, kd. I'Icnuiii XY. IY84. IV ~~~ ~ ~~~_.______ 5 4dbances in Crqptolog>: Proceeding, of C'RYP'TO X4 (Lecture Notes in Computer Science: 196). G.R. Blakley and Ua\ id ('haurn. Eda. Springer-Verlag, 19x5. 6. .Advances in CTptology: Proceeding\ of C'RYPTO X5 (Lecture Notes in C'oiiiputer Sc~encc: 2 IX). tlugh C. Williams. Ed. Springer-Vrrl:ig. 1986. 7. Advances in Cqptologq : Proceedings of C'RYP10 80 (Lecture h'cite\ in C'ornputer Scwncc: 263). A.hl Odlyzko. td. Springer-Verlag. 1987. 8. No proceedings were published for ECROCRYP7 X3. which w:i\ held in Udiiie Ital?.

Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks (Hardcover, 1st ed. 2022): Ikram Ali, Yong Chen, Mohammad... Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks (Hardcover, 1st ed. 2022)
Ikram Ali, Yong Chen, Mohammad Faisal, Meng Li
R3,989 R3,526 Discovery Miles 35 260 Save R463 (12%) Ships in 10 - 15 working days

This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a single logical step. To provide readers to study the schemes that securely and efficiently process a message and multiple messages in vehicle to vehicle and vehicle to infrastructure communications is the main benefit of this book. In addition, it can benefit researchers, engineers, and graduate students in the fields of security and privacy of VANETs, Internet of vehicles securty, wireless body area networks security, etc.

Advances in Cryptology - EUROCRYPT '85 - Proceedings of a Workshop on the Theory and Application of Cryptographic... Advances in Cryptology - EUROCRYPT '85 - Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques. Linz, Austria, April 9-11, 1985 (Paperback, 1986 ed.)
Franz Pichler
R1,379 Discovery Miles 13 790 Ships in 18 - 22 working days

The storage, routing and transmission of information, either in the form of digital data or of analog signals, plays a central role in modern society. To ensure that such information is protected from access by unauthorized persons is an important new challenge. The development of the theory and practical techniques needed to meet this challenge is the goal of current cryptological research. This research is highly varied and multidisciplinary. It is concerned with fundamental problems in mathematics and theoretical computer science as well as with the engineering aspects of complex information systems. Cryptology today ranks among the most active and interesting areas of research in both science and engineering. EUROCRYPT '85 maintained the tradition of the three previous workshops in this series (Paris 1984, Udine 1983, Burg Feuerstein 1982) with its emphasis on recent developments in cryptology, but also made a concerted effort to encompass more traditional topics in cryptology such as shift register theory and system theory. The many papers on these topics in this volume are witness to the success of this effort.

Datenschutz und Datensicherung im Wandel der Informationstechnologien - 1.GI-Fachtagung Munchen, 30. und 31. Oktober 1985... Datenschutz und Datensicherung im Wandel der Informationstechnologien - 1.GI-Fachtagung Munchen, 30. und 31. Oktober 1985 Proceedings (English, German, Paperback)
P. P. Spies
R1,749 Discovery Miles 17 490 Ships in 18 - 22 working days

Der Arbeitskreis "Datenschutz und Datensicherung" des Prasidiums der Gesellschaft fur In- formatik sieht es als seine Aufgabe an, Probleme des Datenschutzes und der Datensicherung aus der Sicht der Informatik zu behandeln. Er hat in diesem Rahmen grundsatzliche Aus- sagen zu diesen Themen unter besonderer Berucksichtigung der sich rasch entwickelnden In- formationstechnologien erarbeitet und zu Entwurfen fur Anderungen des Bundesdatenschutz- gesetzes Stellung genommen. Aus dieser Tatigkeit heraus entstand der Plan zur Durchfuh- rung einer Fachtagung mit dem Thema "Datenschutz und Datensicherung im Wandel der Informationstechnologien". Diese Tagung, deren Beitrage dieser Band enthalt, findet am 30. und 31. Oktober 1985 im Rahmen der SYSTEMS 85 statt. Sie soll die Datenschutz- und Datensicherungs-Probleme, die mit den wachsenden technologischen Moglichkeiten entstehen, aus der Sicht der Informa- tionstechnik beleuchten. Sie soll Methoden, Verfahren und Hilfsmittel aufzeigen, mit denen die Datenschutz- und Datensicherungs-Probleme konstruktiv einer Losung naher gebracht werden konnen. Sie soll Anwender von Rechensystemen und Kommunikationsnetzen, Juristen und Informatiker dazu anregen, gemeinsam uber Datenschutz- und Datensicherungs-Probleme nachzudenken und miteinander Losungen dieser Probleme zu erarbeiten.

Cryptography Apocalypse - Preparing for the Day When Quantum Computing Breaks Today's Crypto Edition 1 (Paperback): RA... Cryptography Apocalypse - Preparing for the Day When Quantum Computing Breaks Today's Crypto Edition 1 (Paperback)
RA Grimes
R764 R656 Discovery Miles 6 560 Save R108 (14%) Ships in 9 - 17 working days

Will your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized 'crackers' to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today's computer cryptography is a rock-solid way to safeguard everything from online passwords to the backbone of the entire internet. Unfortunately, many current cryptographic methods will soon be obsolete. In 2016, the National Institute of Standards and Technology (NIST) predicted that quantum computers will soon be able to break the most popular forms of public key cryptography. The encryption technologies we rely on every day--HTTPS, TLS, WiFi protection, VPNs, cryptocurrencies, PKI, digital certificates, smartcards, and most two-factor authentication--will be virtually useless. . . unless you prepare. Cryptography Apocalypse is a crucial resource for every IT and InfoSec professional for preparing for the coming quantum-computing revolution. Post-quantum crypto algorithms are already a reality, but implementation will take significant time and computing power. This practical guide helps IT leaders and implementers make the appropriate decisions today to meet the challenges of tomorrow. This important book: Gives a simple quantum mechanics primer Explains how quantum computing will break current cryptography Offers practical advice for preparing for a post-quantum world Presents the latest information on new cryptographic methods Describes the appropriate steps leaders must take to implement existing solutions to guard against quantum-computer security threats Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto is a must-have guide for anyone in the InfoSec world who needs to know if their security is ready for the day crypto break and how to fix it.

Forensic Discovery (Paperback): Daniel Farmer, Wietse Venema Forensic Discovery (Paperback)
Daniel Farmer, Wietse Venema
R1,156 Discovery Miles 11 560 Ships in 10 - 15 working days

"Don't look now, but your fingerprints are all over the cover of this book. Simply picking it up off the shelf to read the cover has left a trail of evidence that you were here.
"If you think book covers are bad, computers are worse. Every time you use a computer, you leave elephant-sized tracks all over it. As Dan and Wietse show, even people trying to be sneaky leave evidence all over, sometimes in surprising places.
"This book is about computer archeology. It's about finding out what might have been based on what is left behind. So pick up a tool and dig in. There's plenty to learn from these masters of computer security."
--Gary McGraw, Ph.D., CTO, Cigital, coauthor of "Exploiting Software" and "Building Secure Software"

"A wonderful book. Beyond its obvious uses, it also teaches a great deal about operating system internals."
--Steve Bellovin, coauthor of "Firewalls and Internet Security, Second Edition," and Columbia University professor

"A must-have reference book for anyone doing computer forensics. Dan and Wietse have done an excellent job of taking the guesswork out of a difficult topic."
--Brad Powell, chief security architect, Sun Microsystems, Inc.

"Farmer and Venema provide the essential guide to 'fossil' data. Not only do they clearly describe what you can find during a forensic investigation, they also provide research found nowhere else about how long data remains on disk and in memory. If you ever expect to look at an exploited system, I highly recommend reading this book."
--Rik Farrow, Consultant, author of "Internet Security for Home and Office"

"Farmer and Venema do for digital archaeology what Indiana Jones did for historicalarchaeology. "Forensic Discovery" unearths hidden treasures in enlightening and entertaining ways, showing how a time-centric approach to computer forensics reveals even the cleverest intruder."
--Richard Bejtlich, technical director, ManTech CFIA, and author of "The Tao of Network Security Monitoring"

"Farmer and Venema are 'hackers' of the old school: They delight in understanding computers at every level and finding new ways to apply existing information and tools to the solution of complex problems."
--Muffy Barkocy, Senior Web Developer, Shopping.com

"This book presents digital forensics from a unique perspective because it examines the systems that create digital evidence in addition to the techniques used to find it. I would recommend this book to anyone interested in learning more about digital evidence from UNIX systems."
--Brian Carrier, digital forensics researcher, and author of "File System Forensic Analysis"The Definitive Guide to Computer Forensics: Theory and Hands-On Practice

Computer forensics--the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators--is becoming ever more important as IT and law enforcement professionals face an epidemic in computer crime. In Forensic Discovery, two internationally recognized experts present a thorough and realistic guide to the subject.

Dan Farmer and Wietse Venema cover both theory and hands-on practice, introducing a powerful approach that can often recover evidence considered lost forever.

The authors draw on their extensive firsthand experience to cover everything from file systems, to memory and kernel hacks, to malware. They expose a widevariety of computer forensics myths that often stand in the way of success. Readers will find extensive examples from Solaris, FreeBSD, Linux, and Microsoft Windows, as well as practical guidance for writing one's own forensic tools. The authors are singularly well-qualified to write this book: They personally created some of the most popular security tools ever written, from the legendary SATAN network scanner to the powerful Coroner's Toolkit for analyzing UNIX break-ins.

After reading this book you will be able to Understand essential forensics concepts: volatility, layering, and trustGather the maximum amount of reliable evidence from a running systemRecover partially destroyed information--and make sense of itTimeline your system: understand what really happened whenUncover secret changes to everything from system utilities to kernel modulesAvoid cover-ups and evidence traps set by intrudersIdentify the digital footprints associated with suspicious activityUnderstand file systems from a forensic analyst's point of viewAnalyze malware--without giving it a chance to escapeCapture and examine the contents of main memory on running systems Walk through the unraveling of an intrusion, one step at a time

The book's companion Web site contains complete source and binary code for open source software discussed in the book, plus additional computer forensics case studies and resource links.

Advances of DNA Computing in Cryptography (Hardcover): Suyel Namasudra, Ganesh Chandra Deka Advances of DNA Computing in Cryptography (Hardcover)
Suyel Namasudra, Ganesh Chandra Deka
R3,933 Discovery Miles 39 330 Ships in 10 - 15 working days

This book discusses the current technologies of cryptography using DNA computing. Various chapters of the book will discuss the basic concepts of cryptography, steganography, basic concepts of DNA and DNA computing, approaches of DNA computing in cryptography, security attacks, practical implementaion of DNA computing, applications of DNA computing in the cloud computing environment, applications of DNA computing for big data, etc. It provides a judicious mix of concepts, solved examples and real life case studies.

Image Encryption - A Communication Perspective (Hardcover, New): Fathi E. Abd El-Samie, Hossam Eldin H.  Ahmed, Ibrahim F... Image Encryption - A Communication Perspective (Hardcover, New)
Fathi E. Abd El-Samie, Hossam Eldin H. Ahmed, Ibrahim F Elashry, Mai H. Shahieen, Osama S Faragallah, …
R4,240 Discovery Miles 42 400 Ships in 10 - 15 working days

Presenting encryption algorithms with diverse characteristics, Image Encryption: A Communication Perspective examines image encryption algorithms for the purpose of secure wireless communication. It considers two directions for image encryption: permutation-based approaches and substitution-based approaches. Covering the spectrum of image encryption principles and techniques, the book compares image encryption with permutation- and diffusion-based approaches. It explores number theory-based encryption algorithms such as the Data Encryption Standard, the Advanced Encryption Standard, and the RC6 algorithms. It not only details the strength of various encryption algorithms, but also describes their ability to work within the limitations of wireless communication systems. Since some ciphers were not designed for image encryption, the book explains how to modify these ciphers to work for image encryption. It also provides instruction on how to search for other approaches suitable for this task. To make this work comprehensive, the authors explore communication concepts concentrating on the orthogonal frequency division multiplexing (OFDM) system and present a simplified model for the OFDM communication system with its different implementations. Complete with simulation experiments and MATLAB (R) codes for most of the simulation experiments, this book will help you gain the understanding required to select the encryption method that best fulfills your application requirements.

Introduction to Cryptography (Hardcover): Sahadeo Padhye, Rajeev A. Sahu, Vishal Saraswat Introduction to Cryptography (Hardcover)
Sahadeo Padhye, Rajeev A. Sahu, Vishal Saraswat
R4,920 Discovery Miles 49 200 Ships in 10 - 15 working days

Electronic communication and financial transactions have assumed massive proportions today. But they come with high risks. Achieving cyber security has become a top priority, and has become one of the most crucial areas of study and research in IT. This book introduces readers to perhaps the most effective tool in achieving a secure environment, i.e. cryptography. This book offers more solved examples than most books on the subject, it includes state of the art topics and discusses the scope of future research.

Blockchain, Big Data and Machine Learning - Trends and Applications (Paperback): Neeraj Kumar, N. Gayathri, B. Balamurugan, Md... Blockchain, Big Data and Machine Learning - Trends and Applications (Paperback)
Neeraj Kumar, N. Gayathri, B. Balamurugan, Md Arafatur Rahman
R1,840 Discovery Miles 18 400 Ships in 10 - 15 working days

Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and experimental case studies related to real-time environment are covered as well. Aimed at Senior undergraduate students, researchers and professionals in computer science and engineering and electrical engineering, this book: Converges Blockchain, Big Data and Machine learning in one volume. Connects Blockchain technologies with the data centric applications such Big data and E-Health. Easy to understand examples on how to create your own blockchain supported by case studies of blockchain in different industries. Covers big data analytics examples using R. Includes lllustrative examples in python for blockchain creation.

Codebreaking - A Practical Guide (Paperback): Elonka Dunin, Klaus Schmeh Codebreaking - A Practical Guide (Paperback)
Elonka Dunin, Klaus Schmeh 1
R505 R464 Discovery Miles 4 640 Save R41 (8%) Ships in 9 - 17 working days

'The best book on codebreaking I have read', SIR DERMOT TURING 'Brings back the joy I felt when I first read about these things as a kid', PHIL ZIMMERMANN 'This is at last the single book on codebreaking that you must have. If you are not yet addicted to cryptography, this book will get you addicted. Read, enjoy, and test yourself on history's great still-unbroken messages!' JARED DIAMOND is the Pulitzer Prize-winning author of Guns, Germs, and Steel; Collapse; and other international bestsellers 'This is THE book about codebreaking. Very concise, very inclusive and easy to read', ED SCHEIDT 'Riveting', MIKE GODWIN 'Approachable and compelling', GLEN MIRANKER This practical guide to breaking codes and solving cryptograms by two world experts, Elonka Dunin and Klaus Schmeh, describes the most common encryption techniques along with methods to detect and break them. It fills a gap left by outdated or very basic-level books. This guide also covers many unsolved messages. The Zodiac Killer sent four encrypted messages to the police. One was solved; the other three were not. Beatrix Potter's diary and the Voynich Manuscript were both encrypted - to date, only one of the two has been deciphered. The breaking of the so-called Zimmerman Telegram during the First World War changed the course of history. Several encrypted wartime military messages remain unsolved to this day. Tens of thousands of other encrypted messages, ranging from simple notes created by children to encrypted postcards and diaries in people's attics, are known to exist. Breaking these cryptograms fascinates people all over the world, and often gives people insight into the lives of their ancestors. Geocachers, computer gamers and puzzle fans also require codebreaking skills. This is a book both for the growing number of enthusiasts obsessed with real-world mysteries, and also fans of more challenging puzzle books. Many people are obsessed with trying to solve famous crypto mysteries, including members of the Kryptos community (led by Elonka Dunin) trying to solve a decades-old cryptogram on a sculpture at the centre of CIA Headquarters; readers of the novels of Dan Brown as well as Elonka Dunin's The Mammoth Book of Secret Code Puzzles (UK)/The Mammoth Book of Secret Codes and Cryptograms (US); historians who regularly encounter encrypted documents; perplexed family members who discover an encrypted postcard or diary in an ancestor's effects; law-enforcement agents who are confronted by encrypted messages, which also happens more often than might be supposed; members of the American Cryptogram Association (ACA); geocachers (many caches involve a crypto puzzle); puzzle fans; and computer gamers (many games feature encryption puzzles). The book's focus is very much on breaking pencil-and-paper, or manual, encryption methods. Its focus is also largely on historical encryption. Although manual encryption has lost much of its importance due to computer technology, many people are still interested in deciphering messages of this kind.

Small Business Cyber Security - Your Customers Can Trust You...Right? (Paperback): Adam Anderson, Tom Gilkeson Small Business Cyber Security - Your Customers Can Trust You...Right? (Paperback)
Adam Anderson, Tom Gilkeson
R340 R318 Discovery Miles 3 180 Save R22 (6%) Ships in 18 - 22 working days
Noiseless Steganography - The Key to Covert Communications (Hardcover, New): Abdelrahman Desoky Noiseless Steganography - The Key to Covert Communications (Hardcover, New)
Abdelrahman Desoky
R3,943 Discovery Miles 39 430 Ships in 10 - 15 working days

Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These approaches often fail because they camouflage data as a detectable noise by altering digital images, audio files, text, etc. However, such alteration raises suspicion and makes the message discernible by detecting its noise. Addressing such shortcomings, Noiseless Steganography: The Key to Covert Communications introduces a novel Noiseless Steganography Paradigm (Nostega). Rather than hiding data in noise or producing noise, Nostega camouflages messages as well as their transmission in the form of unquestionable data in the generated steganographic cover. The book explains how to use Nostega to determine suitable domains capable of generating unsuspicious steganographic cover in which messages are embedded in the form of innocent data that is compatible with the chosen domain. It presents a number of Nostega-based methodologies, including but not limited to: A novel cover type that enables data to be hidden in plotted graphs A novel methodology that pursues popular games such as chess, checkers, crosswords, and dominoes to conceal messages Comprehensive coverage of linguistic steganography Several novel linguistic steganography methodologies based on Natural Language Processing and Computational Linguistic techniques such as: Education-Centric-Based, Summarization-Based, Natural Language Generation Based, Random-Series-Based, Email Headers Based, Automatic Joke Generation Based, List-Based, and Automatic Notes Generation Based The first book to provide comprehensive coverage of Linguistic Steganography, Graph Steganography, and Game Steganography, it discusses the implementation and steganalysis validation of ten Nostega-based methodologies. It describes how to establish covert channels by employing the selected domain to serve as justification for the interaction and delivery of the cover among the communicating parties. Instead of using contemporary steganography approaches to camouflage your data as noise that is assumed to look innocent, the text provides you with the tools to prevent your adversaries from suspecting the existence of covert communications altogether.

Complete Guide to Security and Privacy Metrics - Measuring Regulatory Compliance, Operational Resilience, and ROI (Hardcover):... Complete Guide to Security and Privacy Metrics - Measuring Regulatory Compliance, Operational Resilience, and ROI (Hardcover)
Debra S. Herrmann
R4,291 Discovery Miles 42 910 Ships in 10 - 15 working days

While it has become increasingly apparent that individuals and organizations need a security metrics program, it has been exceedingly difficult to define exactly what that means in a given situation. There are hundreds of metrics to choose from and an organization's mission, industry, and size will affect the nature and scope of the task as well as the metrics and combinations of metrics appropriate to accomplish it. Finding the correct formula for a specific scenario calls for a clear concise guide with which to navigate this sea of information. Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI defines more than 900 ready to use metrics that measure compliance, resiliency, and return on investment. The author explains what needs to be measured, why and how to measure it, and how to tie security and privacy metrics to business goals and objectives. The book addresses measuring compliance with current legislation, regulations, and standards in the US, EC, and Canada including Sarbanes-Oxley, HIPAA, and the Data Protection Act-UK. The metrics covered are scaled by information sensitivity, asset criticality, and risk, and aligned to correspond with different lateral and hierarchical functions within an organization. They are flexible in terms of measurement boundaries and can be implemented individually or in combination to assess a single security control, system, network, region, or the entire enterprise at any point in the security engineering lifecycle. The text includes numerous examples and sample reports to illustrate these concepts and stresses a complete assessment by evaluating the interaction and interdependence between physical, personnel, IT, and operational security controls. Bringing a wealth of complex information into comprehensible focus, this book is ideal for corporate officers, security managers, internal and independent auditors, and system developers and integrators.

Everyday Cryptography - Fundamental Principles and Applications (Paperback, 2nd Revised edition): Keith Martin Everyday Cryptography - Fundamental Principles and Applications (Paperback, 2nd Revised edition)
Keith Martin
R1,776 Discovery Miles 17 760 Ships in 9 - 17 working days

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the Internet, mobile phones, Wi-Fi networks, payment cards, Tor, and Bitcoin. This book is intended to be introductory, self-contained, and widely accessible. It is suitable as a first read on cryptography. Almost no prior knowledge of mathematics is required since the book deliberately avoids the details of the mathematics techniques underpinning cryptographic mechanisms. Instead our focus will be on what a normal user or practitioner of information security needs to know about cryptography in order to understand the design and use of everyday cryptographic applications. By focusing on the fundamental principles of modern cryptography rather than the technical details of current cryptographic technology, the main part this book is relatively timeless, and illustrates the application of these principles by considering a number of contemporary applications of cryptography. Following the revelations of former NSA contractor Edward Snowden, the book considers the wider societal impact of use of cryptography and strategies for addressing this. A reader of this book will not only be able to understand the everyday use of cryptography, but also be able to interpret future developments in this fascinating and crucially important area of technology.

Decentralized Applications (Paperback): Siraj Raval Decentralized Applications (Paperback)
Siraj Raval
R824 R707 Discovery Miles 7 070 Save R117 (14%) Ships in 18 - 22 working days

Take advantage of Bitcoin's underlying technology, the blockchain, to build massively scalable, decentralized applications known as dapps. In this practical guide, author Siraj Raval explains why dapps will become more widely used-and profitable-than today's most popular web apps. You'll learn how the blockchain's cryptographically stored ledger, scarce-asset model, and peer-to-peer (P2P) technology provide a more flexible, better-incentivized structure than current software models. Once you understand the theory behind dapps and what a thriving dapp ecosystem looks like, Raval shows you how to use existing tools to create a working dapp. You'll then take a deep dive into the OpenBazaar decentralized market, and examine two case studies of successful dapps currently in use. Learn advances in distributed-system technology that make distributed data, wealth, identity, computing, and bandwidth possible Build a Twitter clone with the Go language, distributed architecture, decentralized messaging app, and peer-to-peer data store Learn about OpenBazaar's decentralized market and its structure for supporting transactions Explore Lighthouse, a decentralized crowdfunding project that rivals sites such as Kickstarter and IndieGogo Take an in-depth look at La'Zooz, a P2P ridesharing app that transmits data directly between riders and drivers

A Practical Guide to Security Assessments (Hardcover, New): Sudhanshu Kairab A Practical Guide to Security Assessments (Hardcover, New)
Sudhanshu Kairab
R4,113 Discovery Miles 41 130 Ships in 10 - 15 working days

This book is a detailed methodology of performing a security assessment. The book emphasizes the approach of first understanding the business and then the technology that supports it. It focuses on fundamental process areas of security and provides a methodology for security practitioners to uncover security weaknesses in other existing business processes. With the emphasis on the business driving security, this book presents a standard methodology for performing a security assessment as well as the reasons for doing it that way. It also provides checklists for process-oriented areas of information security to provide detailed guidance that can be used in performing a security assessment.

IAPP CIPM Certified Information Privacy Manager St udy Guide (Paperback): Chapple IAPP CIPM Certified Information Privacy Manager St udy Guide (Paperback)
Chapple
R1,333 R1,082 Discovery Miles 10 820 Save R251 (19%) Ships in 9 - 17 working days

An essential resource for anyone preparing for the CIPM certification exam and a career in information privacy As cybersecurity and privacy become ever more important to the long-term viability and sustainability of enterprises in all sectors, employers and professionals are increasingly turning to IAPP's trusted and recognized Certified Information Privacy Manager qualification as a tried-and-tested indicator of information privacy management expertise. In IAPP CIPM Certified Information Privacy Manager Study Guide, a team of dedicated IT and privacy management professionals delivers an intuitive roadmap to preparing for the CIPM certification exam and for a new career in the field of information privacy. Make use of pre-assessments, the Exam Essentials feature, and chapter review questions with detailed explanations to gauge your progress and determine where you're proficient and where you need more practice. In the book, you'll find coverage of every domain tested on the CIPM exam and those required to succeed in your first--or your next--role in a privacy-related position. You'll learn to develop a privacy program and framework, as well as manage the full privacy program operational lifecycle, from assessing your organization's needs to responding to threats and queries. The book also includes: A head-start to obtaining an in-demand certification used across the information privacy industry Access to essential information required to qualify for exciting new career opportunities for those with a CIPM credential Access to the online Sybex learning environment, complete with two additional practice tests, chapter review questions, an online glossary, and hundreds of electronic flashcards for efficient studying An essential blueprint for success on the CIPM certification exam, IAPP CIPM Certified Information Privacy Manager Study Guide will also ensure you hit the ground running on your first day at a new information privacy-related job.

Sequential and Parallel Algorithms and Data Structures - The Basic Toolbox (Hardcover, 1st ed. 2019): Peter Sanders, Kurt... Sequential and Parallel Algorithms and Data Structures - The Basic Toolbox (Hardcover, 1st ed. 2019)
Peter Sanders, Kurt Mehlhorn, Martin Dietzfelbinger, Roman Dementiev
R1,440 Discovery Miles 14 400 Ships in 10 - 15 working days

This textbook is a concise introduction to the basic toolbox of structures that allow efficient organization and retrieval of data, key algorithms for problems on graphs, and generic techniques for modeling, understanding, and solving algorithmic problems. The authors aim for a balance between simplicity and efficiency, between theory and practice, and between classical results and the forefront of research. Individual chapters cover arrays and linked lists, hash tables and associative arrays, sorting and selection, priority queues, sorted sequences, graph representation, graph traversal, shortest paths, minimum spanning trees, optimization, collective communication and computation, and load balancing. The authors also discuss important issues such as algorithm engineering, memory hierarchies, algorithm libraries, and certifying algorithms. Moving beyond the sequential algorithms and data structures of the earlier related title, this book takes into account the paradigm shift towards the parallel processing required to solve modern performance-critical applications and how this impacts on the teaching of algorithms. The book is suitable for undergraduate and graduate students and professionals familiar with programming and basic mathematical language. Most chapters have the same basic structure: the authors discuss a problem as it occurs in a real-life situation, they illustrate the most important applications, and then they introduce simple solutions as informally as possible and as formally as necessary so the reader really understands the issues at hand. As they move to more advanced and optional issues, their approach gradually leads to a more mathematical treatment, including theorems and proofs. The book includes many examples, pictures, informal explanations, and exercises, and the implementation notes introduce clean, efficient implementations in languages such as C++ and Java.

Hacking the Hacker - Learn From the Experts Who Take Down Hackers (Paperback): RA Grimes Hacking the Hacker - Learn From the Experts Who Take Down Hackers (Paperback)
RA Grimes
R600 R534 Discovery Miles 5 340 Save R66 (11%) Ships in 9 - 17 working days

Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top. Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure. * Go deep into the world of white hat hacking to grasp just how critical cybersecurity is * Read the stories of some of the world's most renowned computer security experts * Learn how hackers do what they do no technical expertise necessary * Delve into social engineering, cryptography, penetration testing, network attacks, and more As a field, cybersecurity is large and multi-faceted yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.

Digital Identity (Paperback): Phil Windley Digital Identity (Paperback)
Phil Windley
R780 R684 Discovery Miles 6 840 Save R96 (12%) Ships in 18 - 22 working days

The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce.

Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. "Digital Identity" explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers.

Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for [email protected] and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view ofthe concepts, issues, and technologies behind identity management architecture.

How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Cryptocurrencies - An Essential…
Herbert Jones Hardcover R697 R626 Discovery Miles 6 260
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,321 R1,228 Discovery Miles 12 280
Simple Steps to Data Encryption - A…
Pete Loshin Paperback R682 Discovery Miles 6 820
Democratizing Cryptography - The Work of…
Rebecca Slayton Hardcover R2,941 Discovery Miles 29 410
Providing Sound Foundations for…
Oded Goldreich Hardcover R3,016 Discovery Miles 30 160
Conflicts, Crimes and Regulations in…
SY Laurent Hardcover R3,743 Discovery Miles 37 430
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R549 R503 Discovery Miles 5 030
Limitations and Future Applications of…
Neeraj Kumar, Alka Agrawal, … Hardcover R6,170 Discovery Miles 61 700
Cybersecurity in Smart Homes…
Khatoun Hardcover R3,483 Discovery Miles 34 830

 

Partners