0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (121)
  • R250 - R500 (230)
  • R500+ (761)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Advances in Cryptology - CRYPTO '92 - 12th Annual International Cryptology Conference, Santa Barbara, California, USA,... Advances in Cryptology - CRYPTO '92 - 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992. Proceedings (Paperback, 1993 ed.)
Ernest F. Brickell
R1,491 Discovery Miles 14 910 Ships in 18 - 22 working days

Crypto'92 took place on August 16-20, 1992. It was the twelfth in the series of annual cryptology conferences held on the beautiful campus of the University of California, Santa Barbara. Once again, it was sponsored by the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy. The conference ran smoothly, due to the diligent efforts of the g- eral chair, Spyros Magliveras of the University of Nebraska. One of the measures of the success of this series of conferences is represented by the ever increasing number of papers submitted. This year, there were 135 submissions to the c- ference, which represents a new record. Following the practice of recent program comm- tees, the papers received anonymous review. The program committee accepted 38 papers for presentation. In addition, there were two invited presentations, one by Miles Smid on the Digital Signature Standard, and one by Mike Fellows on presenting the concepts of cryptology to elementary-age students. These proceedings contains these 40 papers plus 3 papers that were presented at the Rump Session. I would like to thank all of the authors of the submitted papers and all of the speakers who presented papers. I would like to express my sincere appreciation to the work of the program committee: Ivan Damgard (Aarhus University, Denmark), Odd Goldreich (Technion, Israel), Burt Kaliski (RSA Data Security, USA), Joe Kilian (NEC, USA).

Advances in Cryptology - AUSCRYPT '92 - Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast,... Advances in Cryptology - AUSCRYPT '92 - Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992. Proceedings (Paperback, 1993 ed.)
Jennifer Seberry, Yuliang Zheng
R1,641 Discovery Miles 16 410 Ships in 18 - 22 working days

This book contains the proceedings of AUSCRYPT '92, an international conference on cryptologic research held on the Gold Coast, Australia, in December 1992. This is the third conference held outside the series of CRYPTO meetings held in Santa Barbara, California, each August and EUROCRYPT meetings held in European countries each northern spring. The first two were AUSCRYPT '90, held in Australia, and ASIACRYPT '91, held in Japan. The volume contains three invited papers and 44 contributed papers selected from 77 submissions. The articles cover all main topics in modern computer and communications security research.These include: - authentication - secret sharing - digital signatures - one-way hashing functions - design of block ciphers - cryptanalysis - cryptographic protocols - pseudo-random sequences and functions - public key cryptography.

The Stability Theory of Stream Ciphers (Paperback, 1991 ed.): Cunsheng Ding, Guozhen Xiao, Weijuan Shan The Stability Theory of Stream Ciphers (Paperback, 1991 ed.)
Cunsheng Ding, Guozhen Xiao, Weijuan Shan
R1,443 Discovery Miles 14 430 Ships in 18 - 22 working days

Secure message transmission is of extreme importance in today's information-based society. Stream encryption is a practically important means to this end. This monograph is devoted to a new aspect of stream ciphers, namely the stability theory of stream ciphers, with the purpose of developing bounds on complexity which can form part of the basis for a general theory of data security and of stabilizing stream-cipher systems. The approach adopted in this monograph is new. The topic is treated by introducing measure indexes on the security of stream ciphers, developing lower bounds on these indexes, and establishing connections among them. The treatment involves the stability of boolean functions, the stability of linear complexity of key streams, the period stability of key streams, and the stability of source codes. Misleading ideas about stream ciphers are exposed and new viewpoints presented. The numerous measure indexes and bounds on them that are introduced here, the approach based on spectrum techniques, andthe ten open problems presented will all be useful to the reader concerned with analyzing and designing stream ciphers for securing data.

Advances in Cryptology - CRYPTO '90 - Proceedings (Paperback, 1991 ed.): Alfred John Menezes, Scott A. Vanstone Advances in Cryptology - CRYPTO '90 - Proceedings (Paperback, 1991 ed.)
Alfred John Menezes, Scott A. Vanstone
R1,691 Discovery Miles 16 910 Ships in 18 - 22 working days

Crypto '90 marked the tenth anniversary of the Crypto conferences held at the University of California at Santa Barbara. The conference was held from August 11 to August 15, 1990 and was sponsored by the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Department of Computer Science of the University of California at Santa Barbara. 227 participants from twenty countries around the world. Crypto '90 attracted Roughly 35% of attendees were from academia, 45% from industry and 20% from government. The program was intended to provide a balance between the purely theoretical and the purely practical aspects of cryptography to meet the needs and diversified interests of these various groups. The overall organization of the conference was superbly handled by the general chairperson Sherry McMahan. All of the outstanding features of Crypto, which we have come to expect over the years, were again present and, in addition to all of this, she did a magnificent job in the preparation of the book of abstracts. This is a crucial part of the program and we owe her a great deal of thanks.

DarkMarket - How Hackers Became the New Mafia (Paperback): Misha Glenny DarkMarket - How Hackers Became the New Mafia (Paperback)
Misha Glenny 1
R537 R485 Discovery Miles 4 850 Save R52 (10%) Ships in 9 - 17 working days

We live our lives online - banking, shopping, working, dating - but have we become complacent? Who's got your money? We share our personal details, our thoughts and movements with a faceless screen, with no real idea what lies behind it. Who's got your identity? DarkMarket exposes the shocking truth about what lurks behind our computers: an underground crime network that invades our privacy and threatens our security on a daily basis. Who's got your life? Glenny tracks down the key players - including criminals, national and international security experts, police, crack addicts, the Saudi Royal Family, and most importantly, victims - to reveal the true scale of this new global threat. Shortlisted for the Orwell Prize 2012

Local Area Network Security - Workshop LANSEC '89. European Institute for System Security (E.I.S.S.) Karlsruhe, FRG, April... Local Area Network Security - Workshop LANSEC '89. European Institute for System Security (E.I.S.S.) Karlsruhe, FRG, April 3-6, 1989. Proceedings (Paperback, 1989 ed.)
Thomas A. Berson, Thomas Beth
R1,084 Discovery Miles 10 840 Ships in 18 - 22 working days
Advances in Cryptology - EUROCRYPT '87 - Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam,... Advances in Cryptology - EUROCRYPT '87 - Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987 Proceedings (Paperback, 1988 ed.)
David Chaum, Wyn L. Price
R1,510 Discovery Miles 15 100 Ships in 18 - 22 working days

It is our pleasure to thank dl those uho contributed to nial\ing thew proceeding\ possible: the authors. progriimme committee. organihing committee, I4C.K otticfrh and directors, and all the attendees. We were all deeplq saddened nhen ne lemied th,it Tore Ilerle~tam. J member 01 the programme committee, had died unexpsctedl\ Thi\ olunie I\ dedicated to liim Amsterdum, the Netherlirnds London, Englund Junuur,, 1988 __~ ...~~~. ~ ~ ~ I. Advances in C'r>ptolog?: .A Report on C'RY t'TO Si. Allen Cirr\lio. k.d. L 04. Department of P.lectrica1 and ('omputcr Engineering, S'iiita Harhara 2. C'ryptography: Proceeding\. Burg keusrwiii lYX2 (I.ecturr biotr5 in C'omptitcr Scicncr: 149). I li- mas Beth, Ed. Springer-Verlag. 1983. 3. Advanccs in C'rytology: Proceedings cif C'KY'PTO S2, I),]\ id ('hauin. Ronald L KiLcsi. and Al~n I Sherman. Eds. Plenum NY. 1YX3. 4. Advances in C'ryptology: Proceeding5 of C'K)'f)l.O S3. D;i\id ('hiiuni, kd. I'Icnuiii XY. IY84. IV ~~~ ~ ~~~_.______ 5 4dbances in Crqptolog>: Proceeding, of C'RYP'TO X4 (Lecture Notes in Computer Science: 196). G.R. Blakley and Ua\ id ('haurn. Eda. Springer-Verlag, 19x5. 6. .Advances in CTptology: Proceeding\ of C'RYPTO X5 (Lecture Notes in C'oiiiputer Sc~encc: 2 IX). tlugh C. Williams. Ed. Springer-Vrrl:ig. 1986. 7. Advances in Cqptologq : Proceedings of C'RYP10 80 (Lecture h'cite\ in C'ornputer Scwncc: 263). A.hl Odlyzko. td. Springer-Verlag. 1987. 8. No proceedings were published for ECROCRYP7 X3. which w:i\ held in Udiiie Ital?.

Information Privacy in the Evolving Healthcare Environment (Hardcover, 2nd edition): Linda Koontz Information Privacy in the Evolving Healthcare Environment (Hardcover, 2nd edition)
Linda Koontz
R3,372 Discovery Miles 33 720 Ships in 10 - 15 working days

Advances in health information technology (health IT) have the potential to improve the quality of healthcare, to increase the availability of health information for treatment, and to implement safeguards that cannot be applied easily or cost-effectively to paper-based health records. However, the digitization of health information is also raising new privacy risks and concerns. Sensitive health information in digital form is more easily aggregated, used, and shared. In addition, the rising cost of healthcare and the search for efficiency may create incentives to use the information in new ways. Research has consistently shown that while the public sees the potential value of health information exchange and technological advancements, it remains gravely concerned about the privacy of their sensitive health information. As a result, it is becoming increasingly clear that ensuring public trust will be critical to the successful implementation of nationwide health information exchange. The purpose of this second edition is two-fold: 1) to educate readers about privacy concepts and 2) highlight key privacy issues facing the nation and the healthcare community as it moves towards electronic health records and health information exchange. The first three chapters are descriptive in nature, defining privacy and distinguishing it from security, defining the complex legal landscape for health information privacy, and setting the stage for the following chapters by describing the current landscape of the evolving healthcare environment. The following chapters discuss specific privacy issues and challenges in detail. The book concludes with a chapter providing a view to the future of healthcare and the association privacy implications. This is an updated version of one of HIMSS' best-selling books on information privacy.

Advances in Cryptology - EUROCRYPT '85 - Proceedings of a Workshop on the Theory and Application of Cryptographic... Advances in Cryptology - EUROCRYPT '85 - Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques. Linz, Austria, April 9-11, 1985 (Paperback, 1986 ed.)
Franz Pichler
R1,379 Discovery Miles 13 790 Ships in 18 - 22 working days

The storage, routing and transmission of information, either in the form of digital data or of analog signals, plays a central role in modern society. To ensure that such information is protected from access by unauthorized persons is an important new challenge. The development of the theory and practical techniques needed to meet this challenge is the goal of current cryptological research. This research is highly varied and multidisciplinary. It is concerned with fundamental problems in mathematics and theoretical computer science as well as with the engineering aspects of complex information systems. Cryptology today ranks among the most active and interesting areas of research in both science and engineering. EUROCRYPT '85 maintained the tradition of the three previous workshops in this series (Paris 1984, Udine 1983, Burg Feuerstein 1982) with its emphasis on recent developments in cryptology, but also made a concerted effort to encompass more traditional topics in cryptology such as shift register theory and system theory. The many papers on these topics in this volume are witness to the success of this effort.

The Online World, What You Think You Know and What You Don't - 4 Critical Tools for Raising Kids in the Digital Age... The Online World, What You Think You Know and What You Don't - 4 Critical Tools for Raising Kids in the Digital Age (Paperback)
Rania Mankarious; Foreword by Laura Berman
R587 Discovery Miles 5 870 Ships in 9 - 17 working days
Audacity to Spy - How Government, Business & Hackers Rob Us of Privacy (Paperback): Catherine Nolan, Ashley M Wilson Audacity to Spy - How Government, Business & Hackers Rob Us of Privacy (Paperback)
Catherine Nolan, Ashley M Wilson
R467 R440 Discovery Miles 4 400 Save R27 (6%) Ships in 18 - 22 working days
The Handbook of Privacy Studies - An Interdisciplinary Introduction (Paperback, 0): Bart Sloot, Aviva Groot The Handbook of Privacy Studies - An Interdisciplinary Introduction (Paperback, 0)
Bart Sloot, Aviva Groot
R1,012 Discovery Miles 10 120 Ships in 10 - 15 working days

The Handbook of Privacy Studies is the first book in the world that brings together several disciplinary perspectives on privacy, such as the legal, ethical, medical, informatics and anthropological perspective. Privacy is in the news almost every day: mass surveillance by intelligence agencies, the use of social media data for commercial profit and political microtargeting, password hacks and identity theft, new data protection regimes, questionable reuse of medical data, and concerns about how algorithms shape the way we think and decide. This book offers interdisciplinary background information about these developments and explains how to understand and properly evaluate them. The book is set up for use in interdisciplinary educational programmes. Each chapter provides a structured analysis of the role of privacy within that discipline, its characteristics, themes and debates, as well as current challenges. Disciplinary approaches are presented in such a way that students and researchers from every scientific background can follow the argumentation and enrich their own understanding of privacy issues.

The Data Economy - Implications from Singapore (Hardcover): Sree Kumar, See-Kiong Ng, Sin Gee Teo, Warren Chik The Data Economy - Implications from Singapore (Hardcover)
Sree Kumar, See-Kiong Ng, Sin Gee Teo, Warren Chik
R1,803 Discovery Miles 18 030 Ships in 10 - 15 working days

"The data economy" is a term used by many, but properly understood by few. Even more so the concept of "big data". Both terms embody the notion of a digital world in which many transactions and data flows animate a virtual space. This is the unseen world in which technology has become the master, with the hand of the human less visible. In fact, however, it is human interaction in and around technology that makes data so pervasive and important - the ability of the human mind to extract, manipulate and shape data that gives meaning to it. This book outlines the findings and conclusions of a multidisciplinary team of data scientists, lawyers, and economists tasked with studying both the possibilities of exploiting the rich data sets made available from many human-technology interactions and the practical and legal limitations of trying to do so. It revolves around a core case study of Singapore's public transport system, using data from both the private company operating the contactless payment system (EZ-Link) and the government agency responsible for public transport infrastructure (Land Transport Authority). In analysing both the possibilities and the limitations of these data sets, the authors propose policy recommendations in terms of both the uses of large data sets and the legislation necessary to enable these uses while protecting the privacy of users.

We Have Root - Even More Advice from Schneier on Security (Paperback): B. Schneier We Have Root - Even More Advice from Schneier on Security (Paperback)
B. Schneier
R462 R421 Discovery Miles 4 210 Save R41 (9%) Ships in 9 - 17 working days

A collection of popular essays from security guru Bruce Schneier In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, the Internet of Things, elections, and more. Throughout, he challenges the status quo with a call for leaders, voters, and consumers to make better security and privacy decisions and investments. Bruce's writing has previously appeared in some of the world's best-known and most-respected publications, including The Atlantic, the Wall Street Journal, CNN, the New York Times, the Washington Post, Wired, and many others. And now you can enjoy his essays in one place--at your own speed and convenience. Timely security and privacy topics The impact of security and privacy on our world Perfect for fans of Bruce's blog and newsletter Lower price than his previous essay collections The essays are written for anyone who cares about the future and implications of security and privacy for society.

Internet of Things Security - Challenges, Advances, and Analytics (Hardcover): Chintan Patel, Nishant Doshi Internet of Things Security - Challenges, Advances, and Analytics (Hardcover)
Chintan Patel, Nishant Doshi
R4,925 Discovery Miles 49 250 Ships in 10 - 15 working days

Most of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become useless in the Internet of Things environment. Elliptic curve based cryptography emerges as a best solution for this problem because it provides higher security in smaller key size compare to RSA. This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication schemes using various security algorithms. It also includes a review of the math required for security and understanding Elliptic Curve Cryptography.

Privacy-Preserving Machine Learning (Paperback): Di Zhuang, G. Samaraweera, J Chang Privacy-Preserving Machine Learning (Paperback)
Di Zhuang, G. Samaraweera, J Chang
R1,485 Discovery Miles 14 850 Ships in 10 - 15 working days

Privacy-Preserving Machine Learning is a practical guide to keeping ML data anonymous and secure. You'll learn the core principles behind different privacy preservation technologies, and how to put theory into practice for your own machine learning. Complex privacy-enhancing technologies are demystified through real world use cases forfacial recognition, cloud data storage, and more. Alongside skills for technical implementation, you'll learn about current and future machine learning privacy challenges and how to adapt technologies to your specific needs. By the time you're done, you'll be able to create machine learning systems that preserve user privacy without sacrificing data quality and model performance. Large-scale scandals such as the Facebook Cambridge Analytic a data breach have made many users wary of sharing sensitive and personal information. Demand has surged among machine learning engineers for privacy-preserving techniques that can keep users private details secure without adversely affecting the performance of models.

The Politics of Data Transfer - Transatlantic Conflict and Cooperation over Data Privacy (Hardcover): Yuko Suda The Politics of Data Transfer - Transatlantic Conflict and Cooperation over Data Privacy (Hardcover)
Yuko Suda
R4,480 Discovery Miles 44 800 Ships in 10 - 15 working days

In this book, Yuko Suda examines the Safe Harbor debate, the passenger name record (PNR) dispute, and the Society for Worldwide Interbank Financial Transactions (SWIFT) affair to understand the transfer of personal data from the European Union (EU) to the United States. She argues that the Safe Harbor, PNR, and SWIFT agreements were made to mitigate the potentially negative effects that may arise from the beyond-the-border reach of EU data protection rules or US counterterrorism regulation. A close examination of these high-profile cases would reveal how beyond-the-border reach of one jurisdiction's regulation might affect another jurisdiction's policy and what responses the affected jurisdiction possibly makes to manage the effects of such extraterritorial regulation. The Politics of Data Transfer adds another dimension to the study of transatlantic data conflicts by assuming that the cases exemplify not only the politics of data privacy but also the politics of extraterritorial regulation. A welcome and timely collection uncovering the evolution of and prospects for the politics of data privacy in the digitalized and interconnected world.

Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data - 13th IFIP WG 9.2,... Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data - 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers (Hardcover, 1st ed. 2019)
Eleni Kosta, Jo Pierson, Daniel Slamanig, Simone Fischer-Hubner, Stephan Krenn
R1,937 R1,821 Discovery Miles 18 210 Save R116 (6%) Ships in 9 - 17 working days

This book contains selected papers presented at the 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Vienna, Austria, in August 2018. The 10 full papers included in this volume were carefully reviewed and selected from 27 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, historical, and psychological.

Modern Socio-Technical Perspectives on Privacy (Paperback, 1st ed. 2022): Bart P. Knijnenburg, Xinru Page, Pamela Wisniewski,... Modern Socio-Technical Perspectives on Privacy (Paperback, 1st ed. 2022)
Bart P. Knijnenburg, Xinru Page, Pamela Wisniewski, Heather Richter Lipford, Nicholas Proferes, …
R999 R678 Discovery Miles 6 780 Save R321 (32%) Ships in 9 - 17 working days

This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book's primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teachers can assign (parts of) the book for a "professional issues" course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academics who are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects.

A Beginner's Guide to Internet of Things Security - Attacks, Applications, Authentication, and Fundamentals (Hardcover):... A Beginner's Guide to Internet of Things Security - Attacks, Applications, Authentication, and Fundamentals (Hardcover)
Aakanksha Tewari, Brij B. Gupta
R1,857 Discovery Miles 18 570 Ships in 10 - 15 working days

A Beginner's Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.

Hello World - How  to be Human in the Age of the Machine (Paperback): Hannah Fry Hello World - How to be Human in the Age of the Machine (Paperback)
Hannah Fry 2
R341 R308 Discovery Miles 3 080 Save R33 (10%) Ships in 9 - 17 working days

_______________ 'One of the best books yet written on data and algorithms. . .deserves a place on the bestseller charts.' (The Times) You are accused of a crime. Who would you rather determined your fate - a human or an algorithm? An algorithm is more consistent and less prone to error of judgement. Yet a human can look you in the eye before passing sentence. Welcome to the age of the algorithm, the story of a not-too-distant future where machines rule supreme, making important decisions - in healthcare, transport, finance, security, what we watch, where we go even who we send to prison. So how much should we rely on them? What kind of future do we want? Hannah Fry takes us on a tour of the good, the bad and the downright ugly of the algorithms that surround us. In Hello World she lifts the lid on their inner workings, demonstrates their power, exposes their limitations, and examines whether they really are an improvement on the humans they are replacing. A BBC RADIO 4: BOOK OF THE WEEK SHORTLISTED FOR THE 2018 BAILLIE GIFFORD PRIZE AND 2018 ROYAL SOCIETY SCIENCE BOOK PRIZE

Secure, Resilient, and Agile Software Development (Hardcover): Mark Merkow Secure, Resilient, and Agile Software Development (Hardcover)
Mark Merkow
R2,261 Discovery Miles 22 610 Ships in 10 - 15 working days

A collection of best practices and effective implementation recommendations that are proven to work, Secure, Resilient, and Agile Software Development leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security for practical people. Written to aid your career as well as your organization, the book shows how to gain skills in secure and resilient software development and related tasks. The book explains how to integrate these development skills into your daily duties, thereby increasing your professional value to your company, your management, your community, and your industry. Secure, Resilient, and Agile Software Development was written for the following professionals: AppSec architects and program managers in information security organizations Enterprise architecture teams with application development focus Scrum teams DevOps teams Product owners and their managers Project managers Application security auditors With a detailed look at Agile and Scrum software development methodologies, this book explains how security controls need to change in light of an entirely new paradigm on how software is developed. It focuses on ways to educate everyone who has a hand in any software development project with appropriate and practical skills to Build Security In. After covering foundational and fundamental principles for secure application design, this book dives into concepts, techniques, and design goals to meet well-understood acceptance criteria on features an application must implement. It also explains how the design sprint is adapted for proper consideration of security as well as defensive programming techniques. The book concludes with a look at white box application analysis and sprint-based activities to improve the security and quality of software under development.

Forensic Discovery (Paperback): Daniel Farmer, Wietse Venema Forensic Discovery (Paperback)
Daniel Farmer, Wietse Venema
R1,156 Discovery Miles 11 560 Ships in 10 - 15 working days

"Don't look now, but your fingerprints are all over the cover of this book. Simply picking it up off the shelf to read the cover has left a trail of evidence that you were here.
"If you think book covers are bad, computers are worse. Every time you use a computer, you leave elephant-sized tracks all over it. As Dan and Wietse show, even people trying to be sneaky leave evidence all over, sometimes in surprising places.
"This book is about computer archeology. It's about finding out what might have been based on what is left behind. So pick up a tool and dig in. There's plenty to learn from these masters of computer security."
--Gary McGraw, Ph.D., CTO, Cigital, coauthor of "Exploiting Software" and "Building Secure Software"

"A wonderful book. Beyond its obvious uses, it also teaches a great deal about operating system internals."
--Steve Bellovin, coauthor of "Firewalls and Internet Security, Second Edition," and Columbia University professor

"A must-have reference book for anyone doing computer forensics. Dan and Wietse have done an excellent job of taking the guesswork out of a difficult topic."
--Brad Powell, chief security architect, Sun Microsystems, Inc.

"Farmer and Venema provide the essential guide to 'fossil' data. Not only do they clearly describe what you can find during a forensic investigation, they also provide research found nowhere else about how long data remains on disk and in memory. If you ever expect to look at an exploited system, I highly recommend reading this book."
--Rik Farrow, Consultant, author of "Internet Security for Home and Office"

"Farmer and Venema do for digital archaeology what Indiana Jones did for historicalarchaeology. "Forensic Discovery" unearths hidden treasures in enlightening and entertaining ways, showing how a time-centric approach to computer forensics reveals even the cleverest intruder."
--Richard Bejtlich, technical director, ManTech CFIA, and author of "The Tao of Network Security Monitoring"

"Farmer and Venema are 'hackers' of the old school: They delight in understanding computers at every level and finding new ways to apply existing information and tools to the solution of complex problems."
--Muffy Barkocy, Senior Web Developer, Shopping.com

"This book presents digital forensics from a unique perspective because it examines the systems that create digital evidence in addition to the techniques used to find it. I would recommend this book to anyone interested in learning more about digital evidence from UNIX systems."
--Brian Carrier, digital forensics researcher, and author of "File System Forensic Analysis"The Definitive Guide to Computer Forensics: Theory and Hands-On Practice

Computer forensics--the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators--is becoming ever more important as IT and law enforcement professionals face an epidemic in computer crime. In Forensic Discovery, two internationally recognized experts present a thorough and realistic guide to the subject.

Dan Farmer and Wietse Venema cover both theory and hands-on practice, introducing a powerful approach that can often recover evidence considered lost forever.

The authors draw on their extensive firsthand experience to cover everything from file systems, to memory and kernel hacks, to malware. They expose a widevariety of computer forensics myths that often stand in the way of success. Readers will find extensive examples from Solaris, FreeBSD, Linux, and Microsoft Windows, as well as practical guidance for writing one's own forensic tools. The authors are singularly well-qualified to write this book: They personally created some of the most popular security tools ever written, from the legendary SATAN network scanner to the powerful Coroner's Toolkit for analyzing UNIX break-ins.

After reading this book you will be able to Understand essential forensics concepts: volatility, layering, and trustGather the maximum amount of reliable evidence from a running systemRecover partially destroyed information--and make sense of itTimeline your system: understand what really happened whenUncover secret changes to everything from system utilities to kernel modulesAvoid cover-ups and evidence traps set by intrudersIdentify the digital footprints associated with suspicious activityUnderstand file systems from a forensic analyst's point of viewAnalyze malware--without giving it a chance to escapeCapture and examine the contents of main memory on running systems Walk through the unraveling of an intrusion, one step at a time

The book's companion Web site contains complete source and binary code for open source software discussed in the book, plus additional computer forensics case studies and resource links.

Google Hacking for Penetration Testers (Paperback, 3rd edition): Johnny Long, Bill Gardner, Justin Brown Google Hacking for Penetration Testers (Paperback, 3rd edition)
Johnny Long, Bill Gardner, Justin Brown
R1,273 Discovery Miles 12 730 Ships in 10 - 15 working days

Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Google to find this sensitive information and "self-police" their own organizations. You will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with Facebook, LinkedIn, and more for passive reconnaissance. This third edition includes completely updated content throughout and all new hacks such as Google scripting and using Google hacking with other search engines and APIs. Noted author Johnny Long, founder of Hackers for Charity, gives you all the tools you need to conduct the ultimate open source reconnaissance and penetration testing.

Digital Fluency - Understanding the Basics of Artificial Intelligence, Blockchain Technology, Quantum Computing, and Their... Digital Fluency - Understanding the Basics of Artificial Intelligence, Blockchain Technology, Quantum Computing, and Their Applications for Digital Transformation (Paperback, 1st ed.)
Volker Lang
R1,198 R1,001 Discovery Miles 10 010 Save R197 (16%) Ships in 18 - 22 working days

If you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers for digital transformation and innovation, Digital Fluency is your handy guide. The real-world applications of these cutting-edge technologies are expanding rapidly, and your daily life will continue to be affected by each of them. There is no better time than now to get started and become digitally fluent. You need not have previous knowledge of these versatile technologies, as author Volker Lang will expertly guide you through this digital age. He illustrates key concepts and applications in numerous practical examples and more than 48 catchy figures throughout Digital Fluency. The end of each chapter presents you with a helpful implementation checklist of central lessons before proceeding to the next. This book gets to the heart of digital buzzwords and concepts, and tells you what they truly mean. Breaking down topics such as automated driving and intelligent robotics powered by artificial intelligence, blockchain-based cryptocurrencies and smart contracts, drug development and optimization of financial investment portfolios by quantum computing, and more is imperative to being ready for what the future of industry holds. Whether your own digital transformation journey takes place within your private or public organization, your studies, or your individual household, Digital Fluency maps out a concrete digital action plan for all of your technology and innovation strategy needs. What You Will Learn Gain guidance in the digital age without requiring any previous knowledge about digital technologies and digital transformation Get acquainted with the most popular current and prospective applications of artificial intelligence, blockchain technology, and quantum computing across a wide range of industries including healthcare, financial services, and the automobile industry Become familiar with the digital innovation models of Amazon, Google, Microsoft, IBM, and other world-leading organizations Implement your own digital transformation successfully along the eight core dimensions of a concrete digital action plan Who This Book Is ForThought-leaders, business executives and industry strategists, management and strategy consultants, politicians and policy makers, entrepreneurs, financial analysts, investors and venture capitalists, students and research scientists, as well as general readers, who want to become digitally fluent.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Emerging Plant Growth Regulators in…
M. Naeem, Tariq Aftab Paperback R3,481 Discovery Miles 34 810
Climate Change 2001: Mitigation…
Bert Metz, Ogunlade Davidson, … Hardcover R5,522 Discovery Miles 55 220
Advances in Genetics, Volume 109
Gerald R Smith Hardcover R3,712 Discovery Miles 37 120
Swarm Intelligence and Bio-Inspired…
Xin-She Yang, Zhihua Cui, … Hardcover R2,276 Discovery Miles 22 760
NAGC Pre-K-Grade 12 Gifted Education…
Debbie Dailey, Alicia Cotabish, … Hardcover R4,520 Discovery Miles 45 200
Nanotechnology Tools for the Study of…
Satoko Yoshizawa Hardcover R3,681 Discovery Miles 36 810
Beyond Business - How Your Company Can…
Lonnie Gienger Hardcover R638 Discovery Miles 6 380
The End Of Eden - Wild Nature In The Age…
Adam Welz Paperback R595 R522 Discovery Miles 5 220
Genetic Steroid Disorders
Maria I. New, Bert O'Malley, … Paperback R4,022 Discovery Miles 40 220
Arsenic Mitigation in Rural Bangladesh…
Wardatul Akmam Hardcover R1,401 Discovery Miles 14 010

 

Partners