0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (1)
  • R500 - R1,000 (2)
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

We Have Root - Even More Advice from Schneier on Security (Paperback): B. Schneier We Have Root - Even More Advice from Schneier on Security (Paperback)
B. Schneier
R501 R390 Discovery Miles 3 900 Save R111 (22%) Ships in 12 - 17 working days

A collection of popular essays from security guru Bruce Schneier In his latest collection of essays, security expert Bruce Schneier tackles a range of cybersecurity, privacy, and real-world security issues ripped from the headlines. Essays cover the ever-expanding role of technology in national security, war, transportation, the Internet of Things, elections, and more. Throughout, he challenges the status quo with a call for leaders, voters, and consumers to make better security and privacy decisions and investments. Bruce's writing has previously appeared in some of the world's best-known and most-respected publications, including The Atlantic, the Wall Street Journal, CNN, the New York Times, the Washington Post, Wired, and many others. And now you can enjoy his essays in one place--at your own speed and convenience. Timely security and privacy topics The impact of security and privacy on our world Perfect for fans of Bruce's blog and newsletter Lower price than his previous essay collections The essays are written for anyone who cares about the future and implications of security and privacy for society.

Secrets and Lies - Digital Security in a Networked World 15th Anniversary Edition (Hardcover, 15th Anniversary Edition): B.... Secrets and Lies - Digital Security in a Networked World 15th Anniversary Edition (Hardcover, 15th Anniversary Edition)
B. Schneier
R841 R596 Discovery Miles 5 960 Save R245 (29%) Ships in 12 - 17 working days

This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. A much-touted section: Schneier's tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far-reaching praise from both the technical and business community. Praise for Secrets and Lies "This is a business issue, not a technical one, and executives can no longer leave such decisions to techies. That's why Secrets and Lies belongs in every manager's library."-Business Week "Startlingly lively...a jewel box of little surprises you can actually use."-Fortune "Secrets is a comprehensive, well-written work on a topic few business leaders can afford to neglect."-Business 2.0 "Instead of talking algorithms to geeky programmers, [Schneier] offers a primer in practical computer security aimed at those shopping, communicating or doing business online-almost everyone, in other words."-The Economist "Schneier...peppers the book with lively anecdotes and aphorisms, making it unusually accessible."-Los Angeles Times With a new and compelling Introduction by the author, this premium edition will become a keepsake for security enthusiasts of every stripe.

Liars and Outliers: Enabling the Trust that Societ y Needs to Thrive (Hardcover): B. Schneier Liars and Outliers: Enabling the Trust that Societ y Needs to Thrive (Hardcover)
B. Schneier
R629 R507 Discovery Miles 5 070 Save R122 (19%) Ships in 7 - 13 working days

In today's hyper-connected society, understanding the mechanisms of trust is crucial. Issues of trust are critical to solving problems as diverse as corporate responsibility, global warming, and the political system. In this insightful and entertaining book, Schneier weaves together ideas from across the social and biological sciences to explain how society induces trust. He shows the unique role of trust in facilitating and stabilizing human society. He discusses why and how trust has evolved, why it works the way it does, and the ways the information society is changing everything.

Applied Cryptography - Protocols, Algorithms and Source Code 2e (Paperback, 2nd ed): B. Schneier Applied Cryptography - Protocols, Algorithms and Source Code 2e (Paperback, 2nd ed)
B. Schneier 1
R1,489 R1,145 Discovery Miles 11 450 Save R344 (23%) Ships in 7 - 13 working days

". . .the best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted never to be published. . . ." -Wired Magazine

". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal

". . .easily ranks as one of the most authoritative in its field." -PC Magazine

". . .the bible of code hackers." -The Millennium Whole Earth Catalog

This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

What's new in the Second Edition?
* New information on the Clipper Chip, including ways to defeat the key escrow mechanism
* New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher
* The latest protocols for digital signatures, authentication, secure elections, digital cash, and more
* More detailed information on key management and cryptographic implementations

Applied Cryptography - Protocols, Algorithms and Source Code in C 20th Anniversary Edition (Hardcover, 20th Anniversary... Applied Cryptography - Protocols, Algorithms and Source Code in C 20th Anniversary Edition (Hardcover, 20th Anniversary Edition)
B. Schneier
R1,745 R1,334 Discovery Miles 13 340 Save R411 (24%) Ships in 7 - 13 working days

From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure. "...the best introduction to cryptography I've ever seen...The book the National Security Agency wanted never to be published..." -Wired Magazine "...monumental ...fascinating ...comprehensive ...the definitive work on cryptography for computer programmers . .." -Dr. Dobb's Journal "...easily ranks as one of the most authoritative in its field." -PC Magazine The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Sony PlayStation 5 DualSense Wireless…
 (2)
R1,599 R1,479 Discovery Miles 14 790
Patrice Motsepe - An Appetite For…
Janet Smith Paperback R300 R240 Discovery Miles 2 400
LocknLock Pet Food Container (180ml)
R47 Discovery Miles 470
Sony PlayStation 5 Pulse 3D Wireless…
R1,999 R1,899 Discovery Miles 18 990
Bostik Double-Sided Tape (18mm x 10m…
 (1)
R24 R22 Discovery Miles 220
LocknLock Pet Dry Food Container (1.6L)
R91 Discovery Miles 910
Simba ABC Elephant Ring Rattle
 (3)
R66 Discovery Miles 660
Swiss Miele Vacuum Bags (4 x Bags | 2 x…
 (8)
R199 R166 Discovery Miles 1 660
Too Beautiful To Break
Tessa Bailey Paperback R280 R224 Discovery Miles 2 240
Snookums Baby Honey Dummies (6 Months)
R70 R59 Discovery Miles 590

 

Partners