0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (12)
  • R250 - R500 (86)
  • R500+ (1,344)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Computer & Internet Security - A Hands-on Approach (Paperback, 3rd ed.): Wenliang Du Computer & Internet Security - A Hands-on Approach (Paperback, 3rd ed.)
Wenliang Du
R1,762 Discovery Miles 17 620 Ships in 10 - 15 working days
Forensic Discovery (Paperback): Daniel Farmer, Wietse Venema Forensic Discovery (Paperback)
Daniel Farmer, Wietse Venema
R1,224 Discovery Miles 12 240 Ships in 12 - 19 working days

"Don't look now, but your fingerprints are all over the cover of this book. Simply picking it up off the shelf to read the cover has left a trail of evidence that you were here.
"If you think book covers are bad, computers are worse. Every time you use a computer, you leave elephant-sized tracks all over it. As Dan and Wietse show, even people trying to be sneaky leave evidence all over, sometimes in surprising places.
"This book is about computer archeology. It's about finding out what might have been based on what is left behind. So pick up a tool and dig in. There's plenty to learn from these masters of computer security."
--Gary McGraw, Ph.D., CTO, Cigital, coauthor of "Exploiting Software" and "Building Secure Software"

"A wonderful book. Beyond its obvious uses, it also teaches a great deal about operating system internals."
--Steve Bellovin, coauthor of "Firewalls and Internet Security, Second Edition," and Columbia University professor

"A must-have reference book for anyone doing computer forensics. Dan and Wietse have done an excellent job of taking the guesswork out of a difficult topic."
--Brad Powell, chief security architect, Sun Microsystems, Inc.

"Farmer and Venema provide the essential guide to 'fossil' data. Not only do they clearly describe what you can find during a forensic investigation, they also provide research found nowhere else about how long data remains on disk and in memory. If you ever expect to look at an exploited system, I highly recommend reading this book."
--Rik Farrow, Consultant, author of "Internet Security for Home and Office"

"Farmer and Venema do for digital archaeology what Indiana Jones did for historicalarchaeology. "Forensic Discovery" unearths hidden treasures in enlightening and entertaining ways, showing how a time-centric approach to computer forensics reveals even the cleverest intruder."
--Richard Bejtlich, technical director, ManTech CFIA, and author of "The Tao of Network Security Monitoring"

"Farmer and Venema are 'hackers' of the old school: They delight in understanding computers at every level and finding new ways to apply existing information and tools to the solution of complex problems."
--Muffy Barkocy, Senior Web Developer, Shopping.com

"This book presents digital forensics from a unique perspective because it examines the systems that create digital evidence in addition to the techniques used to find it. I would recommend this book to anyone interested in learning more about digital evidence from UNIX systems."
--Brian Carrier, digital forensics researcher, and author of "File System Forensic Analysis"The Definitive Guide to Computer Forensics: Theory and Hands-On Practice

Computer forensics--the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators--is becoming ever more important as IT and law enforcement professionals face an epidemic in computer crime. In Forensic Discovery, two internationally recognized experts present a thorough and realistic guide to the subject.

Dan Farmer and Wietse Venema cover both theory and hands-on practice, introducing a powerful approach that can often recover evidence considered lost forever.

The authors draw on their extensive firsthand experience to cover everything from file systems, to memory and kernel hacks, to malware. They expose a widevariety of computer forensics myths that often stand in the way of success. Readers will find extensive examples from Solaris, FreeBSD, Linux, and Microsoft Windows, as well as practical guidance for writing one's own forensic tools. The authors are singularly well-qualified to write this book: They personally created some of the most popular security tools ever written, from the legendary SATAN network scanner to the powerful Coroner's Toolkit for analyzing UNIX break-ins.

After reading this book you will be able to Understand essential forensics concepts: volatility, layering, and trustGather the maximum amount of reliable evidence from a running systemRecover partially destroyed information--and make sense of itTimeline your system: understand what really happened whenUncover secret changes to everything from system utilities to kernel modulesAvoid cover-ups and evidence traps set by intrudersIdentify the digital footprints associated with suspicious activityUnderstand file systems from a forensic analyst's point of viewAnalyze malware--without giving it a chance to escapeCapture and examine the contents of main memory on running systems Walk through the unraveling of an intrusion, one step at a time

The book's companion Web site contains complete source and binary code for open source software discussed in the book, plus additional computer forensics case studies and resource links.

Grokking Bitcoin (Paperback): Kalle Rosenbaum Grokking Bitcoin (Paperback)
Kalle Rosenbaum; Foreword by David A. Harding
R944 Discovery Miles 9 440 Ships in 12 - 19 working days

If you think Bitcoin is just an alternative currency for geeks, it's time to think again. Grokking Bitcoin opens up this powerful distributed ledger system, exploring the technology that enables applications both for Bitcoin-based financial transactions and using the blockchain for registering physical property ownership.

With this fully illustrated, easy-to-read guide, you'll finally understand how Bitcoin works, how you can use it, and why you can trust the blockchain.

Grokking Bitcoin explains why Bitcoin’s supporters trust it so deeply, and why you can too. This approachable book will introduce you to Bitcoin’s groundbreaking technology, which is the key to this world-changing system. This illustrated, easy-to-read guide prepares you for a new way of thinking with easy-to-follow diagrams and exercises. You’ll discover how Bitcoin mining works, how to accept Bitcoin, how to participate in the Bitcoin network, and how to set up a digital wallet.

Introduction to Cryptography (Hardcover): Sahadeo Padhye, Rajeev A. Sahu, Vishal Saraswat Introduction to Cryptography (Hardcover)
Sahadeo Padhye, Rajeev A. Sahu, Vishal Saraswat
R4,929 Discovery Miles 49 290 Ships in 12 - 19 working days

Electronic communication and financial transactions have assumed massive proportions today. But they come with high risks. Achieving cyber security has become a top priority, and has become one of the most crucial areas of study and research in IT. This book introduces readers to perhaps the most effective tool in achieving a secure environment, i.e. cryptography. This book offers more solved examples than most books on the subject, it includes state of the art topics and discusses the scope of future research.

Advances of DNA Computing in Cryptography (Hardcover): Suyel Namasudra, Ganesh Chandra Deka Advances of DNA Computing in Cryptography (Hardcover)
Suyel Namasudra, Ganesh Chandra Deka
R3,879 Discovery Miles 38 790 Ships in 12 - 19 working days

This book discusses the current technologies of cryptography using DNA computing. Various chapters of the book will discuss the basic concepts of cryptography, steganography, basic concepts of DNA and DNA computing, approaches of DNA computing in cryptography, security attacks, practical implementaion of DNA computing, applications of DNA computing in the cloud computing environment, applications of DNA computing for big data, etc. It provides a judicious mix of concepts, solved examples and real life case studies.

Image Encryption - A Communication Perspective (Hardcover, New): Fathi E. Abd El-Samie, Hossam Eldin H.  Ahmed, Ibrahim F... Image Encryption - A Communication Perspective (Hardcover, New)
Fathi E. Abd El-Samie, Hossam Eldin H. Ahmed, Ibrahim F Elashry, Mai H. Shahieen, Osama S Faragallah, …
R4,206 Discovery Miles 42 060 Ships in 12 - 19 working days

Presenting encryption algorithms with diverse characteristics, Image Encryption: A Communication Perspective examines image encryption algorithms for the purpose of secure wireless communication. It considers two directions for image encryption: permutation-based approaches and substitution-based approaches. Covering the spectrum of image encryption principles and techniques, the book compares image encryption with permutation- and diffusion-based approaches. It explores number theory-based encryption algorithms such as the Data Encryption Standard, the Advanced Encryption Standard, and the RC6 algorithms. It not only details the strength of various encryption algorithms, but also describes their ability to work within the limitations of wireless communication systems. Since some ciphers were not designed for image encryption, the book explains how to modify these ciphers to work for image encryption. It also provides instruction on how to search for other approaches suitable for this task. To make this work comprehensive, the authors explore communication concepts concentrating on the orthogonal frequency division multiplexing (OFDM) system and present a simplified model for the OFDM communication system with its different implementations. Complete with simulation experiments and MATLAB (R) codes for most of the simulation experiments, this book will help you gain the understanding required to select the encryption method that best fulfills your application requirements.

Blockchain and the Law - The Rule of Code (Paperback): Primavera de Filippi, Aaron Wright Blockchain and the Law - The Rule of Code (Paperback)
Primavera de Filippi, Aaron Wright
R553 Discovery Miles 5 530 Ships in 12 - 19 working days

"Blockchains will matter crucially; this book, beautifully and clearly written for a wide audience, powerfully demonstrates how." -Lawrence Lessig "Attempts to do for blockchain what the likes of Lawrence Lessig and Tim Wu did for the Internet and cyberspace-explain how a new technology will upend the current legal and social order... Blockchain and the Law is not just a theoretical guide. It's also a moral one." -Fortune Bitcoin has been hailed as an Internet marvel and decried as the preferred transaction vehicle for criminals. It has left nearly everyone without a computer science degree confused: how do you "mine" money from ones and zeros? The answer lies in a technology called blockchain. A general-purpose tool for creating secure, decentralized, peer-to-peer applications, blockchain technology has been compared to the Internet in both form and impact. Blockchains are being used to create "smart contracts," to expedite payments, to make financial instruments, to organize the exchange of data and information, and to facilitate interactions between humans and machines. But by cutting out the middlemen, they run the risk of undermining governmental authorities' ability to supervise activities in banking, commerce, and the law. As this essential book makes clear, the technology cannot be harnessed productively without new rules and new approaches to legal thinking. "If you...don't 'get' crypto, this is the book-length treatment for you." -Tyler Cowen, Marginal Revolution "De Filippi and Wright stress that because blockchain is essentially autonomous, it is inflexible, which leaves it vulnerable, once it has been set in motion, to the sort of unforeseen consequences that laws and regulations are best able to address." -James Ryerson, New York Times Book Review

Noiseless Steganography - The Key to Covert Communications (Hardcover, New): Abdelrahman Desoky Noiseless Steganography - The Key to Covert Communications (Hardcover, New)
Abdelrahman Desoky
R3,890 Discovery Miles 38 900 Ships in 12 - 19 working days

Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These approaches often fail because they camouflage data as a detectable noise by altering digital images, audio files, text, etc. However, such alteration raises suspicion and makes the message discernible by detecting its noise. Addressing such shortcomings, Noiseless Steganography: The Key to Covert Communications introduces a novel Noiseless Steganography Paradigm (Nostega). Rather than hiding data in noise or producing noise, Nostega camouflages messages as well as their transmission in the form of unquestionable data in the generated steganographic cover. The book explains how to use Nostega to determine suitable domains capable of generating unsuspicious steganographic cover in which messages are embedded in the form of innocent data that is compatible with the chosen domain. It presents a number of Nostega-based methodologies, including but not limited to: A novel cover type that enables data to be hidden in plotted graphs A novel methodology that pursues popular games such as chess, checkers, crosswords, and dominoes to conceal messages Comprehensive coverage of linguistic steganography Several novel linguistic steganography methodologies based on Natural Language Processing and Computational Linguistic techniques such as: Education-Centric-Based, Summarization-Based, Natural Language Generation Based, Random-Series-Based, Email Headers Based, Automatic Joke Generation Based, List-Based, and Automatic Notes Generation Based The first book to provide comprehensive coverage of Linguistic Steganography, Graph Steganography, and Game Steganography, it discusses the implementation and steganalysis validation of ten Nostega-based methodologies. It describes how to establish covert channels by employing the selected domain to serve as justification for the interaction and delivery of the cover among the communicating parties. Instead of using contemporary steganography approaches to camouflage your data as noise that is assumed to look innocent, the text provides you with the tools to prevent your adversaries from suspecting the existence of covert communications altogether.

Complete Guide to Security and Privacy Metrics - Measuring Regulatory Compliance, Operational Resilience, and ROI (Hardcover):... Complete Guide to Security and Privacy Metrics - Measuring Regulatory Compliance, Operational Resilience, and ROI (Hardcover)
Debra S. Herrmann
R4,259 Discovery Miles 42 590 Ships in 12 - 19 working days

While it has become increasingly apparent that individuals and organizations need a security metrics program, it has been exceedingly difficult to define exactly what that means in a given situation. There are hundreds of metrics to choose from and an organization's mission, industry, and size will affect the nature and scope of the task as well as the metrics and combinations of metrics appropriate to accomplish it. Finding the correct formula for a specific scenario calls for a clear concise guide with which to navigate this sea of information. Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI defines more than 900 ready to use metrics that measure compliance, resiliency, and return on investment. The author explains what needs to be measured, why and how to measure it, and how to tie security and privacy metrics to business goals and objectives. The book addresses measuring compliance with current legislation, regulations, and standards in the US, EC, and Canada including Sarbanes-Oxley, HIPAA, and the Data Protection Act-UK. The metrics covered are scaled by information sensitivity, asset criticality, and risk, and aligned to correspond with different lateral and hierarchical functions within an organization. They are flexible in terms of measurement boundaries and can be implemented individually or in combination to assess a single security control, system, network, region, or the entire enterprise at any point in the security engineering lifecycle. The text includes numerous examples and sample reports to illustrate these concepts and stresses a complete assessment by evaluating the interaction and interdependence between physical, personnel, IT, and operational security controls. Bringing a wealth of complex information into comprehensible focus, this book is ideal for corporate officers, security managers, internal and independent auditors, and system developers and integrators.

A Practical Guide to Security Assessments (Hardcover, New): Sudhanshu Kairab A Practical Guide to Security Assessments (Hardcover, New)
Sudhanshu Kairab
R4,071 Discovery Miles 40 710 Ships in 12 - 19 working days

This book is a detailed methodology of performing a security assessment. The book emphasizes the approach of first understanding the business and then the technology that supports it. It focuses on fundamental process areas of security and provides a methodology for security practitioners to uncover security weaknesses in other existing business processes. With the emphasis on the business driving security, this book presents a standard methodology for performing a security assessment as well as the reasons for doing it that way. It also provides checklists for process-oriented areas of information security to provide detailed guidance that can be used in performing a security assessment.

Cyber Security and Digital Forensics (Hardcover): MM Ghonge Cyber Security and Digital Forensics (Hardcover)
MM Ghonge
R5,376 Discovery Miles 53 760 Ships in 12 - 19 working days

CYBER SECURITY AND DIGITAL FORENSICS Cyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all of these changes. Current cyber threats are getting more complicated and advanced with the rapid evolution of adversarial techniques. Networked computing and portable electronic devices have broadened the role of digital forensics beyond traditional investigations into computer crime. The overall increase in the use of computers as a way of storing and retrieving high-security information requires appropriate security measures to protect the entire computing and communication scenario worldwide. Further, with the introduction of the internet and its underlying technology, facets of information security are becoming a primary concern to protect networks and cyber infrastructures from various threats. This groundbreaking new volume, written and edited by a wide range of professionals in this area, covers broad technical and socio-economic perspectives for the utilization of information and communication technologies and the development of practical solutions in cyber security and digital forensics. Not just for the professional working in the field, but also for the student or academic on the university level, this is a must-have for any library. Audience: Practitioners, consultants, engineers, academics, and other professionals working in the areas of cyber analysis, cyber security, homeland security, national defense, the protection of national critical infrastructures, cyber-crime, cyber vulnerabilities, cyber-attacks related to network systems, cyber threat reduction planning, and those who provide leadership in cyber security management both in public and private sectors

The Database Hacker's Handbook - Defending Database Servers (Paperback): D Litchfield The Database Hacker's Handbook - Defending Database Servers (Paperback)
D Litchfield
R981 R786 Discovery Miles 7 860 Save R195 (20%) Ships in 12 - 19 working days

Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling-and relentless.
In this essential follow-up to The Shellcoder's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. You'll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.
* Identify and plug the new holes in Oracle and Microsoft(r) SQL Server
* Learn the best defenses for IBM's DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers
* Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access
* Recognize vulnerabilities peculiar to each database
* Find out what the attackers already know
Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts, and programs available for download.

Internet-Security Aus Software-Sicht - Ein Leitfaden Zur Software-Erstellung Fur Sicherheitskritische Bereiche (German,... Internet-Security Aus Software-Sicht - Ein Leitfaden Zur Software-Erstellung Fur Sicherheitskritische Bereiche (German, Hardcover, 2008 ed.)
Walter Kriha, Roland Schmitz
R908 Discovery Miles 9 080 Ships in 10 - 15 working days

Die Praxis zeigt, dass bei der Entwicklung groAer, komplexer Softwaresysteme Sicherheitsaspekte oft gar nicht oder erst sehr spAt berA1/4cksichtigt werden. IT-Security-Spezialisten werden in die Entwicklung neuer Systeme oft nicht eingebunden, und Softwareentwicklern fehlt hAufig das Bewusstsein fA1/4r Sicherheitsprobleme und die nAtigen Detailkenntnisse, vorhandene LAsungen richtig einzusetzen. Hier setzt das Buch an und schlAgt eine BrA1/4cke von der Softwaresicht zu mehr netzwerkorientierten Aspekten der Internet-Security. Ziel der Autoren ist es, bei Entwicklern und Projektleitern ein grundlegendes Sicherheitsbewusstsein zu schaffen und ihnen einen Leitfaden fA1/4r den Bau sicherer verteilter Systeme an die Hand zu geben. Sicherheitsprobleme werden anhand konkreter Beispiele diskutiert und passende LAsungen aufgezeigt.

RC4 Stream Cipher and Its Variants (Paperback): Goutam Paul, Subhamoy Maitra RC4 Stream Cipher and Its Variants (Paperback)
Goutam Paul, Subhamoy Maitra
R2,047 Discovery Miles 20 470 Ships in 12 - 19 working days

RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. They also explore variants of RC4 and the eSTREAM finalist HC-128. After an introduction to the vast field of cryptology, the book reviews hardware and software stream ciphers and describes RC4. It presents a theoretical analysis of RC4 KSA, discussing biases of the permutation bytes toward secret key bytes and absolute values. The text explains how to reconstruct the secret key from known state information and analyzes the RC4 PRGA in detail, including a sketch of state recovery attacks. The book then describes three popular attacks on RC4: distinguishing attacks, Wired Equivalent Privacy (WEP) protocol attacks, and fault attacks. The authors also compare the advantages and disadvantages of several variants of RC4 and examine stream cipher HC-128, which is the next level of evolution after RC4 in the software stream cipher paradigm. The final chapter emphasizes the safe use of RC4. With open research problems in each chapter, this book offers a complete account of the most current research on RC4.

Digital Forensics (Paperback): A Arnes Digital Forensics (Paperback)
A Arnes
R1,954 Discovery Miles 19 540 Ships in 9 - 17 working days

The definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critical field Written by faculty members and associates of the world-renowned Norwegian Information Security Laboratory (NisLab) at the Norwegian University of Science and Technology (NTNU), this textbook takes a scientific approach to digital forensics ideally suited for university courses in digital forensics and information security. Each chapter was written by an accomplished expert in his or her field, many of them with extensive experience in law enforcement and industry. The author team comprises experts in digital forensics, cybercrime law, information security and related areas. Digital forensics is a key competency in meeting the growing risks of cybercrime, as well as for criminal investigation generally. Considering the astonishing pace at which new information technology and new ways of exploiting information technology is brought on line, researchers and practitioners regularly face new technical challenges, forcing them to continuously upgrade their investigatory skills. Designed to prepare the next generation to rise to those challenges, the material contained in Digital Forensics has been tested and refined by use in both graduate and undergraduate programs and subjected to formal evaluations for more than ten years. * Encompasses all aspects of the field, including methodological, scientific, technical and legal matters * Based on the latest research, it provides novel insights for students, including an informed look at the future of digital forensics * Includes test questions from actual exam sets, multiple choice questions suitable for online use and numerous visuals, illustrations and case example images * Features real-word examples and scenarios, including court cases and technical problems, as well as a rich library of academic references and references to online media Digital Forensics is an excellent introductory text for programs in computer science and computer engineering and for master degree programs in military and police education. It is also a valuable reference for legal practitioners, police officers, investigators, and forensic practitioners seeking to gain a deeper understanding of digital forensics and cybercrime.

Quantum Algorithms for Cryptographically Significant Boolean Functions - An IBMQ Experience (Paperback, 1st ed. 2021):... Quantum Algorithms for Cryptographically Significant Boolean Functions - An IBMQ Experience (Paperback, 1st ed. 2021)
Tharrmashastha SAPV, Debajyoti Bera, Arpita Maitra, Subhamoy Maitra
R1,769 Discovery Miles 17 690 Ships in 12 - 19 working days

This book is a timely report of the state-of-the-art analytical techniques in the domain of quantum algorithms related to Boolean functions. It bridges the gap between recent developments in the area and the hands-on analysis of the spectral properties of Boolean functions from a cryptologic viewpoint. Topics covered in the book include Qubit, Deutsch-Jozsa and Walsh spectrum, Grover's algorithm, Simon's algorithm and autocorrelation spectrum. The book aims at encouraging readers to design and implement practical algorithms related to Boolean functions. Apart from combinatorial techniques, this book considers implementing related programs in a quantum computer. Researchers, practitioners and educators will find this book valuable.

Small Business Cyber Security - Your Customers Can Trust You...Right? (Paperback): Adam Anderson, Tom Gilkeson Small Business Cyber Security - Your Customers Can Trust You...Right? (Paperback)
Adam Anderson, Tom Gilkeson
R369 R345 Discovery Miles 3 450 Save R24 (7%) Ships in 10 - 15 working days
Securing the Internet of Things (Paperback): Shancang Li, Li Da Xu Securing the Internet of Things (Paperback)
Shancang Li, Li Da Xu
R1,340 Discovery Miles 13 400 Ships in 12 - 19 working days

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.

Applied Cryptography - Protocols, Algorithms and Source Code in C 20th Anniversary Edition (Hardcover, 20th Anniversary... Applied Cryptography - Protocols, Algorithms and Source Code in C 20th Anniversary Edition (Hardcover, 20th Anniversary Edition)
B. Schneier
R1,696 R1,364 Discovery Miles 13 640 Save R332 (20%) Ships in 12 - 19 working days

From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure. "...the best introduction to cryptography I've ever seen...The book the National Security Agency wanted never to be published..." -Wired Magazine "...monumental ...fascinating ...comprehensive ...the definitive work on cryptography for computer programmers . .." -Dr. Dobb's Journal "...easily ranks as one of the most authoritative in its field." -PC Magazine The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security.

Assessing and Managing Security Risk in IT Systems - A Structured Methodology (Hardcover): John McCumber Assessing and Managing Security Risk in IT Systems - A Structured Methodology (Hardcover)
John McCumber
R2,314 Discovery Miles 23 140 Ships in 12 - 19 working days

Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. This book enables you to assess the security attributes of any information system and implement vastly improved security environments. Part I delivers an overview of information systems security, providing historical perspectives and explaining how to determine the value of information. This section offers the basic underpinnings of information security and concludes with an overview of the risk management process. Part II describes the McCumber Cube, providing the original paper from 1991 and detailing ways to accurately map information flow in computer and telecom systems. It also explains how to apply the methodology to individual system components and subsystems. Part III serves as a resource for analysts and security practitioners who want access to more detailed information on technical vulnerabilities and risk assessment analytics. McCumber details how information extracted from this resource can be applied to his assessment processes.

Group Theoretic Cryptography (Hardcover, New): Rainer Steinwandt, Maria Isabel Gonzalez Vasco Group Theoretic Cryptography (Hardcover, New)
Rainer Steinwandt, Maria Isabel Gonzalez Vasco
R3,413 Discovery Miles 34 130 Ships in 12 - 19 working days

Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the life sciences. Many cryptographic constructions exploit the computational hardness of group theoretical problems, and the area is viewed as a potential source of quantum-resilient cryptographic primitives for the future. Group Theoretic Cryptography supplies an ideal introduction to cryptography for those who are interested in group theory and want to learn about the possible interplays between the two fields. Assuming an undergraduate-level understanding of linear algebra and discrete mathematics, it details the specifics of using non-Abelian groups in the field of cryptography. Moreover, the book evidences how group theoretic techniques help us gain new insight into well known, seemingly unrelated, cryptographic constructions, such as DES. The book starts with brief overviews of the fundamentals of group theory, complexity theory, and cryptography. Part two is devoted to public-key encryption, including provable security guarantees, public-key encryption in the standard model, and public-key encryption using infinite groups. The third part of the book covers secret-key encryption. It examines block ciphers, like the Advanced Encryption Standard, and cryptographic hash functions and message authentication codes. The last part delves into a number of cryptographic applications which are nowadays as relevant as encryption-identification protocols, key establishment, and signature schemes are covered. The book supplies formal security analyses and highlights potential vulnerabilities for cryptographic constructions involving group theory. Summaries and references for further reading, as well as exercises, are included at the end of each chapter. Selected solutions for exercises are provided in the back of the book.

Introduction to Cryptography with Mathematical Foundations and Computer Implementations (Hardcover): Alexander Stanoyevitch Introduction to Cryptography with Mathematical Foundations and Computer Implementations (Hardcover)
Alexander Stanoyevitch
R3,190 Discovery Miles 31 900 Ships in 12 - 19 working days

From the exciting history of its development in ancient times to the present day, Introduction to Cryptography with Mathematical Foundations and Computer Implementations provides a focused tour of the central concepts of cryptography. Rather than present an encyclopedic treatment of topics in cryptography, it delineates cryptographic concepts in chronological order, developing the mathematics as needed.

Written in an engaging yet rigorous style, each chapter introduces important concepts with clear definitions and theorems. Numerous examples explain key points while figures and tables help illustrate more difficult or subtle concepts. Each chapter is punctuated with "Exercises for the Reader;" complete solutions for these are included in an appendix. Carefully crafted exercise sets are also provided at the end of each chapter, and detailed solutions to most odd-numbered exercises can be found in a designated appendix. The computer implementation section at the end of every chapter guides students through the process of writing their own programs. A supporting website provides an extensive set of sample programs as well as downloadable platform-independent applet pages for some core programs and algorithms.

As the reliance on cryptography by business, government, and industry continues and new technologies for transferring data become available, cryptography plays a permanent, important role in day-to-day operations. This self-contained sophomore-level text traces the evolution of the field, from its origins through present-day cryptosystems, including public key cryptography and elliptic curve cryptography.

Advances in Cryptology -  ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part I (Paperback, 1st ed. 2022)
Shweta Agrawal, Dongdai Lin
R3,466 Discovery Miles 34 660 Ships in 10 - 15 working days

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.

Advances in Cryptology -  ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part III (Paperback, 1st ed. 2022)
Shweta Agrawal, Dongdai Lin
R3,217 Discovery Miles 32 170 Ships in 10 - 15 working days

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.

Advances in Cryptology -  ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part IV (Paperback, 1st ed. 2022)
Shweta Agrawal, Dongdai Lin
R2,949 Discovery Miles 29 490 Ships in 10 - 15 working days

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Solving PDEs in Python - The FEniCS…
Hans Petter Langtangen, Anders Logg Hardcover R1,386 Discovery Miles 13 860
Performance and Dependability in Service…
Valeria Cardellini, Emiliano Casalicchio, … Hardcover R5,423 Discovery Miles 54 230
Open Source Software: New Horizons - 6th…
Par J A Gerfalk, Cornelia Boldyreff, … Hardcover R2,946 Discovery Miles 29 460
Securing the Internet of Things…
Information Reso Management Association Hardcover R11,203 Discovery Miles 112 030
Visual Knowledge Modeling for Semantic…
Hardcover R5,031 Discovery Miles 50 310
C# For Java Programmers
Harold Cabrera Paperback R836 Discovery Miles 8 360
FORTRAN 90 for Scientists and Engineers
Brian Hahn Paperback R1,440 Discovery Miles 14 400
Software Engineering: Specification…
Suad Alagi c Hardcover R2,465 Discovery Miles 24 650
Progressive Concepts for Semantic Web…
Hardcover R4,993 Discovery Miles 49 930
Semantic Web Services for Web Databases
Mourad Ouzzani, Athman Bouguettaya Hardcover R1,512 Discovery Miles 15 120

 

Partners