0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (1)
  • R500 - R1,000 (1)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

It Mattered to Me - A tribute to the life and lessons of William Beeber, R.Ph. (Paperback): Jeffrey M Stamps It Mattered to Me - A tribute to the life and lessons of William Beeber, R.Ph. (Paperback)
Jeffrey M Stamps
R401 Discovery Miles 4 010 Ships in 18 - 22 working days

Benjamin Franklin once said, "Tell me and I forget, teach me and I may remember, involve me and I learn." Every good business mentor knows that the best way to train a mentee is to provide hands-on experience with all aspects of a business's operation. In It Mattered to Me, Jeff Stamps offers a host of entertaining stories about his unforgettable mentor, pharmacist William Beeber. The inimitable "Mr. Beeber" was passionate about the pharmacy profession, and though he practiced in a humble strip mall in Trotwood, Ohio, he played a leading role in developing the long-term care pharmacy industry into what it is today. Jeff recounts, in a humorous and colorful fashion, the many life and business lessons he learned from Mr. Beeber. Jeff's recollections span from his days as Mr. Beeber's eager, young pharmacy student intern to his years as a senior executive in the long-term care pharmacy industry. Throughout his career, Jeff applied the time-tested business principles he learned from Mr. Beeber, some of which included 'be prompt, be humble, be confident (not cocky), cultivate relationships, and strive to be an expert in every aspect of your business.' While training others, Jeff frequently told "Mr. Beeber stories," and this book is the result of his listeners' entreaties to "write those stories down " This engaging and easy-to-read tribute will make every reader long for a winsome, remarkable mentor like William Beeber.

The Schools of Ontario, 1876-1976 (Paperback): Robert M. Stamp The Schools of Ontario, 1876-1976 (Paperback)
Robert M. Stamp
R1,055 Discovery Miles 10 550 Ships in 18 - 22 working days
Information Security - Principles and Practice, Third Edition (Hardcover, 3rd Edition): M Stamp Information Security - Principles and Practice, Third Edition (Hardcover, 3rd Edition)
M Stamp
R4,030 Discovery Miles 40 300 Ships in 18 - 22 working days

Provides systematic guidance on meeting the information security challenges of the 21st century, featuring newly revised material throughout Information Security: Principles and Practice is the must-have book for students, instructors, and early-stage professionals alike. Author Mark Stamp provides clear, accessible, and accurate information on the four critical components of information security: cryptography, access control, security protocols, and software. Readers are provided with a wealth of real-world examples that clarify complex topics, highlight important security issues, and demonstrate effective methods and strategies for protecting the confidentiality and integrity of data. Fully revised and updated, the third edition of Information Security features a brand-new chapter on network security basics and expanded coverage of cross-site scripting (XSS) attacks, Stuxnet and other malware, the SSH protocol, secure software development, and security protocols. Fresh examples illustrate the Rivest-Shamir-Adleman (RSA) cryptosystem, Elliptic-curve cryptography (ECC), and hash functions based on bitcoin and blockchains. Updated problem sets, figures, tables, and graphs help readers develop a working knowledge of classic cryptosystems, symmetric and public key cryptography, cryptanalysis, simple authentication protocols, intrusion and malware detection systems, and more. Presenting a highly practical approach to information security, this popular textbook: Provides up-to-date coverage of the rapidly evolving field of information security Explains session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, GSM, and other authentication protocols Addresses access control techniques including authentication and authorization, ACLs and capabilities, and multilevel security and compartments Discusses software tools used for malware detection, digital rights management, and operating systems security Includes an instructor's solution manual, PowerPoint slides, lecture videos, and additional teaching resources Information Security: Principles and Practice, Third Edition is the perfect textbook for advanced undergraduate and graduate students in all Computer Science programs, and remains essential reading for professionals working in industrial or government security.

Applied Cryptanalysis - Breaking Ciphers in the Real World (Hardcover, New): M Stamp Applied Cryptanalysis - Breaking Ciphers in the Real World (Hardcover, New)
M Stamp
R2,967 Discovery Miles 29 670 Ships in 18 - 22 working days

A case-based approach to cryptanalysis that explains how and why attacks can happen

Applied Cryptanalysis focuses on practical attacks on real-world ciphers. Using detailed case studies, the authors demonstrate how modern cryptographic systems are broken, and they do so with a minimum of complex mathematics and technical jargon. All major classes of attacks are covered, providing IT professionals with the knowledge necessary for effective security implementation within their organizations. Each chapter concludes with a series of problems that enables the reader to practice and fine-tune their own cryptanalysis skills. Applied Cryptanalysis can serve as a textbook for a cryptanalysis course or for independent study.

The text is organized around four major themes:

Classic Crypto offers an overview of a few classical cryptosystems, introducing and illustrating the basic principles, concepts, and vocabulary. The authors then cover World War II cipher machines, specifically the German Enigma, Japanese Purple, and American Sigaba.

Symmetric Ciphers analyzes shift registers and correlation attacks, as well as attacks on three specific stream ciphers: ORYX, RC4 (as used in WEP), and PKZIP. In addition, block ciphers are studied: Hellman's Time-Memory Trade-Off attack is discussed and three specific block ciphers are analyzed in detail (CMEA, Akelarre, and FEAL).

Hash Functions presents hash function design, birthday attacks, and the "Nostradamus" attack. Then the MD4 attack is examined, which serves as a precursor for the authors' highly detailed analysis of the recent attack on MD5.

Public Key Crypto includes an overview of several public key cryptosystems including theknapsack, Diffie-Hellman, Arithmetica, RSA, Rabin cipher, NTRU, and ElGamal. Factoring and discrete log attacks are analyzed, and the recent timing attacks on RSA are discussed in detail.

Clear and concise, this practical case-based approach to cryptanalysis is a valuable and timely resource.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Comprehensive Biotechnology
Murray Moo- Young Hardcover R69,084 Discovery Miles 690 840
Diamond-Based Materials for Biomedical…
Roger Narayan Hardcover R3,788 Discovery Miles 37 880
Grandma Hattie's Ice Cream
Jowan Smith Hardcover R396 Discovery Miles 3 960
Knick Knack Paddy Whack Version 2.0
Nita Marie Clark Hardcover R580 R529 Discovery Miles 5 290
I Love You To The Moon And Back
Amelia Hepworth Board book R192 Discovery Miles 1 920
1 Smile, 10 Toes
Nelleke Verhoeff Board book R276 R256 Discovery Miles 2 560
Database Systems: The Complete Book…
Hector Garcia-Molina, Jeffrey Ullman, … Paperback R2,189 R1,762 Discovery Miles 17 620
Dala Puff Paint - 15 White (50ml)
R72 R61 Discovery Miles 610
Rough Computing - Theories, Technologies…
Aboul Ella Hassanien, Zbigniew Suraj, … Hardcover R4,566 Discovery Miles 45 660
Dala Raffia - Natural (50g)
R75 R63 Discovery Miles 630

 

Partners