Data encryption Books

153 products


  • Deep Learning Approaches for Security Threats in

    John Wiley & Sons Inc Deep Learning Approaches for Security Threats in

    15 in stock

    Book SynopsisDeep Learning Approaches for Security Threats in IoT Environments An expert discussion of the application of deep learning methods in the IoT security environment In Deep Learning Approaches for Security Threats in IoT Environments, a team of distinguished cybersecurity educators deliver an insightful and robust exploration of how to approach and measure the security of Internet-of-Things (IoT) systems and networks. In this book, readers will examine critical concepts in artificial intelligence (AI) and IoT, and apply effective strategies to help secure and protect IoT networks. The authors discuss supervised, semi-supervised, and unsupervised deep learning techniques, as well as reinforcement and federated learning methods for privacy preservation. This book applies deep learning approaches to IoT networks and solves the security problems that professionals frequently encounter when working in the field of IoT, as well as providing ways in which smart devices can solve cybersecurity iTable of ContentsAbout the Authors xv 1 Introducing Deep Learning for IoT Security 1 1.1 Introduction 1 1.2 Internet of Things (IoT) Architecture 1 1.2.1 Physical Layer 3 1.2.2 Network Layer 4 1.2.3 Application Layer 5 1.3 Internet of Things’ Vulnerabilities and Attacks 6 1.3.1 Passive Attacks 6 1.3.2 Active Attacks 7 1.4 Artificial Intelligence 11 1.5 Deep Learning 14 1.6 Taxonomy of Deep Learning Models 15 1.6.1 Supervision Criterion 15 1.6.1.1 Supervised Deep Learning 15 1.6.1.2 Unsupervised Deep Learning 17 1.6.1.3 Semi-Supervised Deep Learning 18 1.6.1.4 Deep Reinforcement Learning 19 1.6.2 Incrementality Criterion 19 1.6.2.1 Batch Learning 20 1.6.2.2 Online Learning 21 1.6.3 Generalization Criterion 21 1.6.3.1 Model-Based Learning 22 1.6.3.2 Instance-Based Learning 22 1.6.4 Centralization Criterion 22 1.7 Supplementary Materials 25 References 25 2 Deep Neural Networks 27 2.1 Introduction 27 2.2 From Biological Neurons to Artificial Neurons 28 2.2.1 Biological Neurons 28 2.2.2 Artificial Neurons 30 2.3 Artificial Neural Network 31 2.3.1 Input Layer 34 2.3.2 Hidden Layer 34 2.3.3 Output Layer 34 2.4 Activation Functions 35 2.4.1 Types of Activation 35 2.4.1.1 Binary Step Function 35 2.4.1.2 Linear Activation Function 36 2.4.1.3 Nonlinear Activation Functions 36 2.5 The Learning Process of ANN 40 2.5.1 Forward Propagation 41 2.5.2 Backpropagation (Gradient Descent) 42 2.6 Loss Functions 49 2.6.1 Regression Loss Functions 49 2.6.1.1 Mean Absolute Error (MAE) Loss 50 2.6.1.2 Mean Squared Error (MSE) Loss 50 2.6.1.3 Huber Loss 50 2.6.1.4 Mean Bias Error (MBE) Loss 51 2.6.1.5 Mean Squared Logarithmic Error (MSLE) 51 2.6.2 Classification Loss Functions 52 2.6.2.1 Binary Cross Entropy (BCE) Loss 52 2.6.2.2 Categorical Cross Entropy (CCE) Loss 52 2.6.2.3 Hinge Loss 53 2.6.2.4 Kullback–Leibler Divergence (KL) Loss 53 2.7 Supplementary Materials 53 References 54 3 Training Deep Neural Networks 55 3.1 Introduction 55 3.2 Gradient Descent Revisited 56 3.2.1 Gradient Descent 56 3.2.2 Stochastic Gradient Descent 57 3.2.3 Mini-batch Gradient Descent 59 3.3 Gradient Vanishing and Explosion 60 3.4 Gradient Clipping 61 3.5 Parameter Initialization 62 3.5.1 Zero Initialization 62 3.5.2 Random Initialization 63 3.5.3 Lecun Initialization 65 3.5.4 Xavier Initialization 65 3.5.5 Kaiming (He) Initialization 66 3.6 Faster Optimizers 67 3.6.1 Momentum Optimization 67 3.6.2 Nesterov Accelerated Gradient 69 3.6.3 AdaGrad 69 3.6.4 RMSProp 70 3.6.5 Adam Optimizer 70 3.7 Model Training Issues 71 3.7.1 Bias 72 3.7.2 Variance 72 3.7.3 Overfitting Issues 72 3.7.4 Underfitting Issues 73 3.7.5 Model Capacity 74 3.8 Supplementary Materials 74 References 75 4 Evaluating Deep Neural Networks 77 4.1 Introduction 77 4.2 Validation Dataset 78 4.3 Regularization Methods 79 4.3.1 Early Stopping 79 4.3.2 L1 and L2 Regularization 80 4.3.3 Dropout 81 4.3.4 Max-Norm Regularization 82 4.3.5 Data Augmentation 82 4.4 Cross-Validation 83 4.4.1 Hold-Out Cross-Validation 84 4.4.2 k-Folds Cross-Validation 85 4.4.3 Stratified k-Folds’ Cross-Validation 86 4.4.4 Repeated k-Folds’ Cross-Validation 87 4.4.5 Leave-One-Out Cross-Validation 88 4.4.6 Leave-p-Out Cross-Validation 89 4.4.7 Time Series Cross-Validation 90 4.4.8 Rolling Cross-Validation 90 4.4.9 Block Cross-Validation 90 4.5 Performance Metrics 92 4.5.1 Regression Metrics 92 4.5.1.1 Mean Absolute Error (MAE) 92 4.5.1.2 Root Mean Squared Error (RMSE) 93 4.5.1.3 Coefficient of Determination (R2) 93 4.5.1.4 Adjusted R2 94 4.5.2 Classification Metrics 94 4.5.2.1 Confusion Matrix 94 4.5.2.2 Accuracy 96 4.5.2.3 Precision 96 4.5.2.4 Recall 97 4.5.2.5 Precision–Recall Curve 97 4.5.2.6 F1-Score 97 4.5.2.7 Beta F1 Score 98 4.5.2.8 False Positive Rate (FPR) 98 4.5.2.9 Specificity 99 4.5.2.10 Receiving Operating Characteristics (ROC) Curve 99 4.6 Supplementary Materials 99 References 100 5 Convolutional Neural Networks 103 5.1 Introduction 103 5.2 Shift from Full Connected to Convolutional 104 5.3 Basic Architecture 106 5.3.1 The Cross-Correlation Operation 106 5.3.2 Convolution Operation 107 5.3.3 Receptive Field 108 5.3.4 Padding and Stride 109 5.3.4.1 Padding 109 5.3.4.2 Stride 111 5.4 Multiple Channels 113 5.4.1 Multi-Channel Inputs 113 5.4.2 Multi-Channel Output 114 5.4.3 Convolutional Kernel 1 × 1 115 5.5 Pooling Layers 116 5.5.1 Max Pooling 117 5.5.2 Average Pooling 117 5.6 Normalization Layers 119 5.6.1 Batch Normalization 119 5.6.2 Layer Normalization 122 5.6.3 Instance Normalization 124 5.6.4 Group Normalization 126 5.6.5 Weight Normalization 126 5.7 Convolutional Neural Networks (LeNet) 127 5.8 Case Studies 129 5.8.1 Handwritten Digit Classification (One Channel Input) 129 5.8.2 Dog vs. Cat Image Classification (Multi-Channel Input) 130 5.9 Supplementary Materials 130 References 130 6 Dive Into Convolutional Neural Networks 133 6.1 Introduction 133 6.2 One-Dimensional Convolutional Network 134 6.2.1 One-Dimensional Convolution 134 6.2.2 One-Dimensional Pooling 135 6.3 Three-Dimensional Convolutional Network 136 6.3.1 Three-Dimensional Convolution 136 6.3.2 Three-Dimensional Pooling 136 6.4 Transposed Convolution Layer 137 6.5 Atrous/Dilated Convolution 144 6.6 Separable Convolutions 145 6.6.1 Spatially Separable Convolutions 146 6.6.2 Depth-wise Separable (DS) Convolutions 148 6.7 Grouped Convolution 150 6.8 Shuffled Grouped Convolution 152 6.9 Supplementary Materials 154 References 154 7 Advanced Convolutional Neural Network 157 7.1 Introduction 157 7.2 AlexNet 158 7.3 Block-wise Convolutional Network (VGG) 159 7.4 Network in Network 160 7.5 Inception Networks 162 7.5.1 GoogLeNet 163 7.5.2 Inception Network v2 (Inception v2) 166 7.5.3 Inception Network v3 (Inception v3) 170 7.6 Residual Convolutional Networks 170 7.7 Dense Convolutional Networks 173 7.8 Temporal Convolutional Network 176 7.8.1 One-Dimensional Convolutional Network 177 7.8.2 Causal and Dilated Convolution 180 7.8.3 Residual Blocks 185 7.9 Supplementary Materials 188 References 188 8 Introducing Recurrent Neural Networks 189 8.1 Introduction 189 8.2 Recurrent Neural Networks 190 8.2.1 Recurrent Neurons 190 8.2.2 Memory Cell 192 8.2.3 Recurrent Neural Network 193 8.3 Different Categories of RNNs 194 8.3.1 One-to-One RNN 195 8.3.2 One-to-Many RNN 195 8.3.3 Many-to-One RNN 196 8.3.4 Many-to-Many RNN 197 8.4 Backpropagation Through Time 198 8.5 Challenges Facing Simple RNNs 202 8.5.1 Vanishing Gradient 202 8.5.2 Exploding Gradient 204 8.5.2.1 Truncated Backpropagation Through Time (TBPTT) 204 8.5.2.2 Penalty on the Recurrent Weights Whh205 8.5.2.3 Clipping Gradients 205 8.6 Case Study: Malware Detection 205 8.7 Supplementary Material 206 References 207 9 Dive Into Recurrent Neural Networks 209 9.1 Introduction 209 9.2 Long Short-Term Memory (LSTM) 210 9.2.1 LSTM Gates 211 9.2.2 Candidate Memory Cells 213 9.2.3 Memory Cell 214 9.2.4 Hidden State 216 9.3 LSTM with Peephole Connections 217 9.4 Gated Recurrent Units (GRU) 218 9.4.1 CRU Cell Gates 218 9.4.2 Candidate State 220 9.4.3 Hidden State 221 9.5 ConvLSTM 222 9.6 Unidirectional vs. Bidirectional Recurrent Network 223 9.7 Deep Recurrent Network 226 9.8 Insights 227 9.9 Case Study of Malware Detection 228 9.10 Supplementary Materials 229 References 229 10 Attention Neural Networks 231 10.1 Introduction 231 10.2 From Biological to Computerized Attention 232 10.2.1 Biological Attention 232 10.2.2 Queries, Keys, and Values 234 10.3 Attention Pooling: Nadaraya–Watson Kernel Regression 235 10.4 Attention-Scoring Functions 237 10.4.1 Masked Softmax Operation 239 10.4.2 Additive Attention (AA) 239 10.4.3 Scaled Dot-Product Attention 240 10.5 Multi-Head Attention (MHA) 240 10.6 Self-Attention Mechanism 242 10.6.1 Self-Attention (SA) Mechanism 242 10.6.2 Positional Encoding 244 10.7 Transformer Network 244 10.8 Supplementary Materials 247 References 247 11 Autoencoder Networks 249 11.1 Introduction 249 11.2 Introducing Autoencoders 250 11.2.1 Definition of Autoencoder 250 11.2.2 Structural Design 253 11.3 Convolutional Autoencoder 256 11.4 Denoising Autoencoder 258 11.5 Sparse Autoencoders 260 11.6 Contractive Autoencoders 262 11.7 Variational Autoencoders 263 11.8 Case Study 268 11.9 Supplementary Materials 269 References 269 12 Generative Adversarial Networks (GANs) 271 12.1 Introduction 271 12.2 Foundation of Generative Adversarial Network 272 12.3 Deep Convolutional GAN 279 12.4 Conditional GAN 281 12.5 Supplementary Materials 285 References 285 13 Dive Into Generative Adversarial Networks 287 13.1 Introduction 287 13.2 Wasserstein GAN 288 13.2.1 Distance Functions 289 13.2.2 Distance Function in GANs 291 13.2.3 Wasserstein Loss 293 13.3 Least-Squares GAN (LSGAN) 298 13.4 Auxiliary Classifier GAN (ACGAN) 300 13.5 Supplementary Materials 301 References 301 14 Disentangled Representation GANs 303 14.1 Introduction 303 14.2 Disentangled Representations 304 14.3 InfoGAN 306 14.4 StackedGAN 309 14.5 Supplementary Materials 316 References 316 15 Introducing Federated Learning for Internet of Things (IoT) 317 15.1 Introduction 317 15.2 Federated Learning in the Internet of Things 319 15.3 Taxonomic View of Federated Learning 322 15.3.1 Network Structure 322 15.3.1.1 Centralized Federated Learning 322 15.3.1.2 Decentralized Federated Learning 323 15.3.1.3 Hierarchical Federated Learning 324 15.3.2 Data Partition 325 15.3.3 Horizontal Federated Learning 326 15.3.4 Vertical Federated Learning 327 15.3.5 Federated Transfer Learning 328 15.4 Open-Source Frameworks 330 15.4.1 TensorFlow Federated 330 15.4.2 PySyft and PyGrid 331 15.4.3 FedML 331 15.4.4 LEAF 332 15.4.5 PaddleFL 332 15.4.6 Federated AI Technology Enabler (FATE) 333 15.4.7 OpenFL 333 15.4.8 IBM Federated Learning 333 15.4.9 NVIDIA Federated Learning Application Runtime Environment (NVIDIA FLARE) 334 15.4.10 Flower 334 15.4.11 Sherpa.ai 335 15.5 Supplementary Materials 335 References 335 16 Privacy-Preserved Federated Learning 337 16.1 Introduction 337 16.2 Statistical Challenges in Federated Learning 338 16.2.1 Nonindependent and Identically Distributed (Non-IID) Data 338 16.2.1.1 Class Imbalance 338 16.2.1.2 Distribution Imbalance 341 16.2.1.3 Size Imbalance 346 16.2.2 Model Heterogeneity 346 16.2.2.1 Extracting the Essence of a Subject 346 16.2.3 Block Cycles 348 16.3 Security Challenge in Federated Learning 348 16.3.1 Untargeted Attacks 349 16.3.2 Targeted Attacks 349 16.4 Privacy Challenges in Federated Learning 350 16.4.1 Secure Aggregation 351 16.4.1.1 Homomorphic Encryption (HE) 351 16.4.1.2 Secure Multiparty Computation 352 16.4.1.3 Blockchain 352 16.4.2 Perturbation Method 353 16.5 Supplementary Materials 355 References 355 Index 357

    15 in stock

    £95.40

  • How I Rob Banks

    John Wiley & Sons Inc How I Rob Banks

    1 in stock

    Book SynopsisTable of ContentsForeword xv Introduction xvii Chapter 1: What Is Social Engineering? 1 Chapter 2: 330 Cameras 4 Chapter 3: Expensive Doesn’t Mean Secure 7 Chapter 4: The Trolley Problem 12 Chapter 5: High (Street) Security 17 Chapter 6: The Psychology of Stairs 19 Chapter 7: The Broken Arm Ruse 21 Chapter 8: Crown Jewels Are Not Always Shiny 24 Chapter 9: This Is My Office Now 27 Chapter 10: How to Use a Pen to Hack Any Door 31 Chapter 11: My First Kidnapping 34 Chapter 12: I Needed a New Computer 40 Chapter 13: Building My Own Office 43 Chapter 14: Letter of Authority 47 Chapter 15: Astute Manager 49 Chapter 16: I Can’t Fly a Helicopter 51 Chapter 17: Doppelgangers Exist 54 Chapter 18: Stealing the Keychain 56 Chapter 19: It’s Dangerous to Go Alone. Take This! 59 Chapter 20: The Gold Bar 63 Chapter 21: Plush Carpets 68 Chapter 22: Clean(er) Access 71 Chapter 23: What We Do in the Shadows 73 Chapter 24: What Do I Know about Diamonds? 77 Chapter 25: How to Crack a Safe 80 Chapter 26: Find a Safe Space 88 Chapter 27: Well, That Was Unexpected 92 Chapter 28: Opening a Door on Security 95 Chapter 29: How to Tailgate an Opaque Door 98 Chapter 30: The Guard Who Was Too Polite 100 Chapter 31: The Swan Effect 102 Chapter 32: What’s in the Box? 105 Chapter 33: How to Bypass an Elevator Security System 107 Chapter 34: The Loading Bay 109 Chapter 35: The Escort 111 Chapter 36: The Staircase 114 Chapter 37: How to Bypass PIR Detectors 116 Chapter 38: ATMs 121 Chapter 39: Open Windows 124 Chapter 40: Security on a String Budget 127 Chapter 41: How to Bypass Padlocks 131 Chapter 42: Padlocked Gates 134 Chapter 43: The Security of Glass 138 Chapter 44: Trading Places 142 Chapter 45: How to Bypass Keypads 145 Chapter 46: E- Waste 148 Chapter 47: Fourteen Desktop PCs 151 Chapter 48: Spy Gadgets 155 Chapter 49: How to Steal Fingerprints 158 Chapter 50: Five Banks a Week 162 Chapter 51: Finding Out Too Much 165 Chapter 52: Needle in a Haystack 168 Chapter 53: Stealing a Purse and Keys 172 Chapter 54: How to Pick Locks 174 Chapter 55: The Porn Cupboard 179 Chapter 56: The Apartment Across the Way 182 Chapter 57: Magazine Shoot 186 Chapter 58: Double Trouble 189 Chapter 59: Fake ID 191 Chapter 60: Impersonation 195 Chapter 61: How Maglocks Work 199 Chapter 62: Personal Escort 202 Chapter 63: My Favorite Door 205 Chapter 64: Microwave Fences 208 Chapter 65: Discarded Passes 211 Chapter 66: Bypassing Speed Lanes 214 Chapter 67: The Case of the Angry Man 217 Chapter 68: Let’s Play Doctors 220 Chapter 69: That’s for Me! 225 Chapter 70: How to Use a Snickers Bar 231 Chapter 71: Taking the Bus to Work 233

    1 in stock

    £17.09

  • Guide to Network Defense and Countermeasures

    Cengage Learning, Inc Guide to Network Defense and Countermeasures

    1 in stock

    Book SynopsisTable of Contents1. Network Security Fundamentals. 2. TCP/IP. 3. Network Traffic Signatures. 4. Routing Fundamentals. 5. Cryptography. 6. Wireless Networking Fundamentals. 7. Understanding Wireless Network Security. 8. Intrusion Detection and Prevention System Concepts. 9. Firewall Concepts. 10. Firewall Design and Management. 11. VPN Concepts. 12. Internet and Web Security. 13. Security Policy Design and Implementation. 14. Ongoing Security Management. Appendix A: Security Resources.

    1 in stock

    £52.24

  • Guide to Computer Forensics and Investigations

    Guide to Computer Forensics and Investigations

    2 in stock

    Book SynopsisUpdated with the latest advances from the field, GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS, Fifth Edition combines all-encompassing topic coverage, authoritative information from seasoned experts, and real-world applications to deliver the most comprehensive forensics resource available. This proven author team's wide ranging areas of expertise mirror the breadth of coverage provided in the book, which focuses on techniques and practices for gathering and analyzing evidence used to solve crimes involving computers. While other books offer more of an overview of the field, this hands-on learning text provides clear instruction on the tools and techniques of the trade, introducing readers to every step of the computer forensics investigation-from lab set-up to testifying in court. It also details step-by-step guidance on how to use current forensics software and provides free demo downloads. Appropriate for learners new to the field, it is also an excellent refresher and technology

    2 in stock

    £223.01

  • Principles of Information Security

    Cengage Learning, Inc Principles of Information Security

    3 in stock

    Book SynopsisSpecifically oriented to the needs of information systems students, PRINCIPLES OF INFORMATION SECURITY, 5e delivers the latest technology and developments from the field. Taking a managerial approach, this bestseller teaches all the aspects of information security-not just the technical control perspective. It provides a broad review of the entire field of information security, background on many related elements, and enough detail to facilitate understanding of the topic. It covers the terminology of the field, the history of the discipline, and an overview of how to manage an information security program. Current and relevant, the fifth edition includes the latest practices, fresh examples, updated material on technical security controls, emerging legislative issues, new coverage of digital forensics, and hands-on application of ethical issues in IS security. It is the ultimate resource for future business decision-makers.Table of Contents1. Introduction to Information Security. 2. The Need for Security. 3. Legal, Ethical, and Professional Issues in Information Security. 4. Planning for Security. 5. Risk Management. 6. Security Technology: Firewalls, VPNs, and Wireless. 7. Security Technology: Intrusion Detection and Prevention Systems and Other Security Tools. 8. Cryptography. 9. Physical Security. 10. Implementing Information Security. 11. Security and Personnel. 12. Information Security Maintenance and eDiscovery.

    3 in stock

    £173.79

  • Introduction to Quantum Cryptography

    Cambridge University Press Introduction to Quantum Cryptography

    1 in stock

    Book SynopsisThis book provides a comprehensive introduction to quantum cryptography for advanced undergraduate and graduate students in computer science, physics, engineering and applied mathematics. Requiring no background in quantum computing, this title includes discussion of both background theory and key, modern applications of quantum cryptography.Trade Review'If you are intrigued by the prospects of quantum cryptography but not yet familiar with the formalism behind it, then this book is the perfect starting point for you. It playfully introduces the most important concepts in modern quantum cryptography, and at the same time gently but purposefully helps you discover the mathematical framework required to make formal statements.' Marco Tomamichel, National University of Singapore'Vidick and Wehner cover quantum cryptography in its full beauty and depth. Packed with enlightening examples and comprehensive exercises, this book will likely become an indispensable companion next time I hold lectures on the subject.' Renato Renner, ETH Zurich'Thomas Vidick and Stephanie Wehner take readers on an insightful exploration of the full landscape of quantum cryptography, skillfully weaving together theory and applications and providing pedagogical quizzes and exercises. The mathematical formalism is rigorous yet approachable, making this book an excellent introduction to this captivating area.' Anne Broadbent, University of OttawaTable of ContentsPreface; 1. Background material; 2. Quantum tools and a first protocol; 3. Quantum money; 4. The power of entanglement; 5. Quantifying information; 6. From imperfect information to (near) perfect security; 7. Distributing keys; 8. Quantum key distribution protocols; 9. Quantum cryptography using untrusted devices; 10. Quantum cryptography beyond key distribution; 11. Security from physical assumptions; 12. Further topics around encryption; 13. Delegated computation; References; Index.

    1 in stock

    £42.74

  • Principles of Information Security

    Cengage Learning, Inc Principles of Information Security

    1 in stock

    Book SynopsisMaster the latest technology and developments from the field with the book specifically oriented to the needs of information systems students like you -- PRINCIPLES OF INFORMATION SECURITY, 6E. Taking a managerial approach, this bestseller emphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview of the entire field of information security and related elements with the detail to ensure understanding. You review terms used in the field and a history of the discipline as you learn how to manage an information security program. Current and relevant, this edition highlights the latest practices with fresh examples that explore the impact of emerging technologies, such as the Internet of Things, Cloud Computing, and DevOps. Updates address technical security controls, emerging legislative issues, digital forensics, and ethical issues in IS security, making this the ideal IS resource for business decision makers.Table of Contents1. Introduction to Information Security. 2. The Need for Security. 3. Legal, Ethical, and Professional Issues in Information Security. 4. Planning for Security. 5. Risk Management. 6. Security Technology: Firewalls, VPNs, and Wireless. 7. Security Technology: Intrusion Detection and Prevention Systems and Other Security Tools. 8. Cryptography. 9. Physical Security. 10. Implementing Information Security. 11. Security and Personnel. 12. Information Security Maintenance and eDiscovery.

    1 in stock

    £70.29

  • Management of Information Security

    Cengage Learning, Inc Management of Information Security

    1 in stock

    Book SynopsisMANAGEMENT OF INFORMATION SECURITY, Sixth Edition prepares you to become an information security management practitioner able to secure systems and networks in a world where continuously emerging threats, ever-present attacks and the success of criminals illustrate the weaknesses in current information technologies. You'll develop both the information security skills and practical experience that organizations are looking for as they strive to ensure more secure computing environments. The text focuses on key executive and managerial aspects of information security. It also integrates coverage of CISSP and CISM throughout to effectively prepare you for certification. Reflecting the most recent developments in the field, it includes the latest information on NIST, ISO and security governance as well as emerging concerns like Ransomware, Cloud Computing and the Internet of Things.Table of ContentsUnit I: FOUNDATIONS OF INFORMATION SECURITY. 1. Introduction to Management of Information Security. 2. Compliance: Law and Ethics. Unit II: STRATEGIC INFORMATION SECURITY MANAGEMENT. 3. Governance and Strategic Planning for Security. 4. Information Security Policy. 5. Developing the Security Program. 6. Risk Management: Identifying and Assessing Risk. 7. Risk Management: Controlling Risk. Unit III: OPERATIONAL INFORMATION SECURITY MANAGEMENT. 8. Security Management Models. 9. Security Management Practices. 10. Planning for Contingencies. 11. Security Maintenance and the Management of Digital Forensics. 12. Protection Mechanisms.

    1 in stock

    £70.29

  • Guide to Computer Forensics and Investigations

    Guide to Computer Forensics and Investigations

    1 in stock

    Book SynopsisMaster the skills you need to conduct a successful digital investigation with Nelson/Phillips/Steuart's GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS, Sixth Edition--the most comprehensive forensics resource available. While other books offer just an overview of the field, this hands-on learning text provides clear instruction on the tools and techniques of the trade, walking you through every step of the computer forensics investigation--from lab setup to testifying in court. It also explains how to use current forensics software and provides free demo downloads. It includes the most up-to-date coverage available of Linux and Macintosh, virtual machine software such as VMware and Virtual Box, Android, mobile devices, handheld devices, cloud forensics, email, social media and the Internet of Anything. With its practical applications, you can immediately put what you learn into practice.Table of Contents1. Understanding the Digital Forensics Profession and Investigations. 2. The Investigator's Office and Laboratory. 3. Data Acquisition. 4. Processing Crime and Incident Scenes. 5. Working with Windows and CLI Systems. 6. Current Computer Forensics Tools. 7. Linux Boot Processes and File Systems. 8. Recovering Graphics Files. 9. Digital Forensics Analysis and Validation. 10. Virtual Machine Forensics, Live Acquisitions and Cloud Forensics. 11. Email and Social Media. 12. Mobile Device Forensics and the Internet of Anything. 13. Cloud Forensics. 14. Report Writing for High-Tech Investigations. 15. Expert Testimony in Digital Forensic Investigations. 16. Ethics for the Digital Forensic Examiner and Expert Witness. Appendix A: Digital Forensics Test References. Appendix B: Digital Forensics References. Appendix C: Digital Forensics Lab Considerations. Appendix D: Digital Forensics Alternative Tools and Methods.

    1 in stock

    £77.89

  • Cybersecurity AllinOne For Dummies

    John Wiley & Sons Inc Cybersecurity AllinOne For Dummies

    1 in stock

    Book SynopsisTable of ContentsBook 1: Cybersecurity Basics 5 Chapter 1: What Exactly Is Cybersecurity? 7 Chapter 2: Getting to Know Common Cyberattacks 23 Chapter 3: The Bad Guys You Must Defend Against 49 Book 2: Personal Cybersecurity 69 Chapter 1: Evaluating Your Current Cybersecurity Posture 71 Chapter 2: Enhancing Physical Security 93 Chapter 3: Cybersecurity Considerations When Working from Home 103 Chapter 4: Securing Your Accounts 113 Chapter 5: Passwords 131 Chapter 6: Preventing Social Engineering Attacks 147 Book 3: Securing a Business 169 Chapter 1: Securing Your Small Business 171 Chapter 2: Cybersecurity and Big Businesses 195 Chapter 3: Identifying a Security Breach 211 Chapter 4: Recovering from a Security Breach 229 Chapter 5: Backing Up 249 Chapter 6: Resetting Your Device 277 Chapter 7: Restoring from Backups 287 Book 4: Securing the Cloud 311 Chapter 1: Clouds Aren’t Bulletproof 313 Chapter 2: Getting Down to Business 333 Chapter 3: Developing Secure Software 349 Chapter 4: Restricting Access 377 Chapter 5: Implementing Zero Trust 407 Chapter 6: Using Cloud Security Services 429 Book 5: Testing Your Security 451 Chapter 1: Introduction to Vulnerability and Penetration Testing 453 Chapter 2: Cracking the Hacker Mindset 473 Chapter 3: Developing Your Security Testing Plan 485 Chapter 4: Hacking Methodology 497 Chapter 5: Information Gathering 507 Chapter 6: Social Engineering 513 Chapter 7: Physical Security 529 Book 6: Enhancing Cybersecurity Awareness 541 Chapter 1: Knowing How Security Awareness Programs Work 543 Chapter 2: Creating a Security Awareness Strategy 553 Chapter 3: Determining Culture and Business Drivers 559 Chapter 4: Choosing the Best Tools for the Job 573 Chapter 5: Measuring Performance 589 Chapter 6: Assembling Your Security Awareness Program 601 Chapter 7: Running Your Security Awareness Program 621 Chapter 8: Implementing Gamification 641 Index 655

    1 in stock

    £28.49

  • Decentralizing Finance

    John Wiley & Sons Inc Decentralizing Finance

    1 in stock

    Book SynopsisTable of ContentsAcknowledgmentsxiii Glossary xv Foreword xvii Introduction 1 I. 1 Who Am I? 2 I. 2 How This Book Is Organized 3 I. 3 Scope of This Book 4 I. 4 Disclaimers 5 I. 5 Corrections 5 Part I Crypto-native DeFi 7 1 What Is DeFi? 9 1.1 The Role of Intermediaries in TradFi 12 1.2 Definitions 13 1.3 Other Characteristics of DeFi 15 1.4 The DeFi Stack 16 1.5 Size of DeFi 18 1.6 Key Participants in DeFi 19 1.7 DeFi and FinTech 25 1.8 How Can I Try DeFi? 27 1.9 Where Does DeFi Meet TradFi? 28 1.10 What Are the Risks of DeFi? 30 1.11 Chapter Summary 31 2 Infrastructure and Instruments 33 2.1 The Infrastructure of DeFi 33 2.2 Basics of Blockchains 34 2.3 Bitcoin and Ethereum 38 2.4 Permissioned vs Public Blockchains 39 2.5 L1s and L2s 41 2.6 Accounts, Keys, Wallets, and Addresses 44 2.7 Transactions 46 2.8 Smart Contracts 48 2.9 Clients and Nodes 49 2.10 Block Explorers 50 2.11 Custody 50 2.12 Oracles 52 2.13 RegTech 52 2.14 Identity 52 2.15 Bridges 52 2.16 DeFi Instruments 53 2.17 Stablecoins 55 2.18 Derivatives 60 2.19 Chapter Summary 61 3 Activities and Applications 63 3.1 Trading / DEXs 63 3.2 Overcollateralized Lending / Borrowing 66 3.3 Governance / DAOs 70 3.4 Undercollateralized Lending 72 3.5 Investing 82 3.6 Payments 84 3.7 Insurance 89 3.8 Prediction Markets 91 3.9 Chapter Summary 92 4 Risks and Mitigation 95 4.1 Types of Losses 96 4.2 Basic Terminology 96 4.3 Endogenous DeFi Risks 97 4.4 Exogenous DeFi Risks 104 4.5 Chapter Summary 118 5 Regulation 121 5.1 Introduction 121 5.2 Global Nature of Crypto and DeFi 122 5.3 What Regulators Want 124 5.4 Are Tokens Securities? 125 5.5 The Travel Rule 126 5.6 Prudential Treatment of Crypto-asset Exposures 128 5.7 SSBs, United States and European Union 131 5.8 European Union – MiCA 136 5.9 United States 140 5.10 DeFi Specific Regulation 143 5.11 Chapter Summary 147 Part II DLT in Traditional Finance 151 6 Central Bank Digital Currencies 153 6.1 Introduction 153 6.2 Prologue: Libra 155 6.3 Role of the Central Bank 156 6.4 Structure of the Monetary System and a View Towards the Future 157 6.5 Central Bank Motivations and Considerations around CBDCs 158 6.6 Retail vs Wholesale CBDCs 159 6.7 Wholesale CBDCs 159 6.8 Case Study: Project mBridge 163 6.9 Retail CBDCs 165 6.10 Benefits and Risks of R-CBDCs 167 6.11 R-CBDC Design Choices 170 6.12 Types of R-CBDCs 174 6.13 Examples of R-CBDCs 177 6.14 Case Study: Nigerian eNaira 178 6.15 Case Study: United States 179 6.16 Case Study: eCNY 数字人民币 181 6.17 Chapter Summary 184 7 Asset Tokenization 187 7.1 What Is Asset Tokenization? 187 7.2 Benefits of Asset Tokenization 189 7.3 How is Tokenization Performed? 192 7.4 Considerations for Tokenization 193 7.5 DLT in Capital Markets 194 7.6 Asset Servicing 198 7.7 Chapter Summary 200 8 Deposit Tokens 203 8.1 What Are Deposit Tokens? 203 8.2 Benefits of Deposit Tokens 205 8.3 Deposit Token Projects 206 8.4 Chapter Summary 211 9 Institutional DeFi 213 9.1 Considerations for Institutions to Participate in DeFi 213 9.2 Institutional DeFi Examples 214 9.3 AMMs and FX 218 9.4 Considerations for AMMs and Tokenized Assets 220 9.5 Unified Ledger 221 9.6 Chapter Summary 222 10 Conclusion 225 10.1 The Crypto–Fiat Innovation Dialectic 226 10.2 Future Scenarios for DeFi: The Wild West, the Citadel, and the Bazaar 231 10.3 The Future of Money 236 Bibliography and Online Resources 241 Index 243

    1 in stock

    £18.69

  • CompTIA CySA Practice Tests

    John Wiley & Sons Inc CompTIA CySA Practice Tests

    1 in stock

    Book SynopsisThe best way to prep for the CS0-003 CySA+ certification exam and hone your practical cybersecurity skillset In the newly updated 3rd edition of the CompTIA CySA+ Practice Tests: Exam CS0-003, veteran information security experts and educators Mike Chapple and David Seidl deliver an effective and efficient collection of study resources for the challenging CompTIA Cybersecurity Analyst+ (CySA+) certification exam. In the book, you'll find 1000 practice questions, complete with answers and explanations, covering every domain tested by Exam CS0-003. You'll hone your skills in security operations, vulnerability management, incident response and management, and reporting and communication, improving your ability to detect and respond to malicious activity on the job and dramatically increasingly your chances of success on the CySA+ exam. You'll also get: Techniques for threat hunting and the collection of threat intelligenceStrategies for effective incident response processes and activities, ensuring you're able to react appropriately to cybersecurity incidents at workComplimentary access to Sybex's superior online test bank, including all the practice questions you need to review and test your knowledge before you walk into the exam room Perfect for anyone studying for the CompTIA CySA+ CS0-003 certification exam, CompTIA CySA+ Practice Tests: Exam CS0-003, Third Edition, will also benefit IT security practitioners looking to test and improve their skillset.Table of ContentsIntroduction xvii Chapter 1 Domain 1.0: Security Operations 1 Chapter 2 Domain 2.0: Vulnerability Management 67 Chapter 3 Domain 3.0: Incident Response and Management 167 Chapter 4 Reporting and Communication 207 Chapter 5 Practice Test 1 227 Chapter 6 Practice Test 2 253 Appendix Answers and Explanations 281 Chapter 1: Domain 1.0: Security Operations 282 Chapter 2: Domain 2.0: Vulnerability Management 309 Chapter 3: Domain 3.0: Incident Response and Management 345 Chapter 4: Reporting and Communication 361 Chapter 5: Practice Test 1 371 Chapter 6: Practice Test 2 380 Index 391

    1 in stock

    £27.99

  • CompTIA CySA Certification Kit

    John Wiley & Sons Inc CompTIA CySA Certification Kit

    2 in stock

    Book Synopsis

    2 in stock

    £48.75

  • IAPP CIPP  US Certified Information Privacy

    John Wiley & Sons IAPP CIPP US Certified Information Privacy

    1 in stock

    Book Synopsis

    1 in stock

    £40.38

  • Security Yearbook 2025

    John Wiley & Sons Security Yearbook 2025

    1 in stock

    Book Synopsis

    1 in stock

    £39.90

  • Taming the Hacking Storm A Framework for Defeatin

    John Wiley & Sons Taming the Hacking Storm A Framework for Defeatin

    15 in stock

    Book Synopsis

    15 in stock

    £24.80

  • Quantum Safe Cryptography Secure Your Business fo r the Quantum Era

    2 in stock

    £37.05

  • Codes and Ciphers  A History Of Cryptography

    15 in stock

    £18.04

  • Cybersecurity

    Cengage Learning, Inc Cybersecurity

    1 in stock

    Book SynopsisCYBERSECURITY: THE ESSENTIAL BODY OF KNOWLEDGE provides a comprehensive, trustworthy framework of practices for assuring information security. This book is organized to help readers understand how the various roles and functions within cybersecurity practice can be combined and leveraged to produce a secure organization.In this unique book, concepts are not presented as stagnant theory; instead, the content is interwoven in a real world adventure story that runs throughout. In the story, a fictional company experiences numerous pitfalls of cyber security and the reader is immersed in the everyday practice of securing the company through various characters' efforts. This approach grabs learners' attention and assists them in visualizing the application of the content to real-world issues that they will face in their professional life.Derived from the Department of Homeland Security's Essential Body of Knowledge (EBK) for IT Security, this book is an indispensable resource dedicated to uTrade ReviewSection I: BACKGROUND. 1. The Field of Cyber Security. 2. The DHS EBK Initiative. 3. Applying the EBK. Section II: EBK ROLES AND REQUIRED CAPABILITIES. 4. The Executive role. 5. The Functional role. 6. The Corollary role. Section II: THE 14 AREAS OF INFORMATION SECURITY. 7. Data Security. 8. Digital Forensics. 9. Enterprise Continuity. 10. Incident Management. 11. IT Security Training and Awareness. 12. IT Systems Operations and Maintenance. 13. Network and Telecommunications Security. 14. Personnel Security. 15. Physical and Environmental Security. 16. Procurement. 17. Regulatory and Standards Compliance. 18. Security Risk Management. 19. Strategic Security Management. 20. System and Application Security.Table of ContentsSection I: BACKGROUND. 1. The Field of Cyber Security. 2. The DHS EBK Initiative. 3. Applying the EBK. Section II: EBK ROLES AND REQUIRED CAPABILITIES. 4. The Executive role. 5. The Functional role. 6. The Corollary role. Section II: THE 14 AREAS OF INFORMATION SECURITY. 7. Data Security. 8. Digital Forensics. 9. Enterprise Continuity. 10. Incident Management. 11. IT Security Training and Awareness. 12. IT Systems Operations and Maintenance. 13. Network and Telecommunications Security. 14. Personnel Security. 15. Physical and Environmental Security. 16. Procurement. 17. Regulatory and Standards Compliance. 18. Security Risk Management. 19. Strategic Security Management. 20. System and Application Security.

    1 in stock

    £58.49

  • Primality Testing and Integer Factorization in PublicKey Cryptography 11 Advances in Information Security

    Springer Us Primality Testing and Integer Factorization in PublicKey Cryptography 11 Advances in Information Security

    1 in stock

    Book SynopsisIntended for advanced level students in computer science and mathematics, this key text, now in a brand new edition, provides a survey of recent progress in primality testing and integer factorization, with implications for factoring based public key cryptography.Trade ReviewFrom the reviews of the second edition:"The well-written and self-contained second edition ‘is designed for a professional audience composed of researchers practitioners in industry.’ In addition, ‘this book is also suitable as a secondary text for graduate-level students in computer science, mathematics, and engineering,’ as it contains about 300 problems. … Overall … ‘this monograph provides a survey of recent progress in Primality Testing and Integer Factorization, with implications in factoring-based Public Key Cryptography.’" (Hao Wang, ACM Computing Reviews, April, 2009)“This is the second edition of a book originally published in 2004. … I used it as a reference in preparing lectures for an advanced cryptography course for undergraduates, and it proved to be a wonderful source for a general description of the algorithms. … the book will be a valuable addition to any good reference library on cryptography and number theory … . It contains descriptions of all the main algorithms, together with explanations of the key ideas behind them.” (S. C. Coutinho, SIGACT News, April, 2012)Table of ContentsPreface to the Second Edition.- Preface to the First Edition.- Number-Theoretic Preliminaries.- Problems in Number Theory. Divisibility Properties. Euclid's Algorithm and Continued Fractions. Arithmetic Functions. Linear Congruences. Quadratic Congruences. Primitive Roots and Power Residues. Arithmetic of Elliptic Curves. Chapter Notes and Further Reading.- Primality Testing and Prime Generation.- Computing with Numbers and Curves. Riemann Zeta and Dirichlet L Functions. Rigorous Primality Tests. Compositeness and Pseudoprimality Tests. Lucas Pseudoprimality Test. Elliptic Curve Primality Tests. Superpolynomial-Time Tests. Polynomial-Time Tests. Primality Tests for Special Numbers. Prime Number Generation. Chapter Notes and Further Reading.- Integer Factorization and Discrete Logarithms.- Introduction. Simple Factoring Methods. Elliptic Curve Method (ECM). General Factoring Congruence. Continued FRACtion Method (CFRAC). Quadratic Sieve (QS). Number Field Sieve (NFS). Quantum Factoring Algorithm. Discrete Logarithms. kth Roots. Elliptic Curve Discrete Logarithms. Chapter Notes and Further Reading.- Number-Theoretic Cryptography.- Public-Key Cryptography. RSA Cryptosystem. Rabin Cryptography. Quadratic Residuosity Cryptography. Discrete Logarithm Cryptography. Elliptic Curve Cryptography. Zero-Knowledge Techniques. Deniable Authentication. Non-Factoring Based Cryptography. Chapter Notes and Further Reading.- Bibliography.- Index.- About the Author.

    1 in stock

    £123.25

  • Codes and Ciphers  A History Of Cryptography

    15 in stock

    £28.49

  • Democratizing Cryptography

    Morgan & Claypool Publishers Democratizing Cryptography

    15 in stock

    Book SynopsisWhile other books have documented the development of public key cryptograpy, this is the first to provide a comprehensive insiders’ perspective on the full impacts of public key cryptography, including six original chapters by nine distiguished scholars.

    15 in stock

    £62.10

  • A Brief Introduction to Web3

    APress A Brief Introduction to Web3

    1 in stock

    Book SynopsisJourney into the world of Web3-based application development, its related protocols, and its usage in developing decentralized applications. This book will explain how programmable blockchains are revolutionizing the world of web applications, which can be run on decentralized platforms or peer-to-peer networks like IPFS. You'll start with an introduction to decentralization with a focus on blockchain implementations like Ethereum and Bitcoin. You'll then learn to develop simple decentralized applications (dApps) using Solidity, the language used for developing apps with Ethereum as well as smart contracts, wallets, gateways and NFTs. This book also covers how security and scale are addressed by L2 networks for scaling Bitcoin and Ethereum blockchains.A Brief Introduction to Web3is your go-to guide for setting up simple Web3 applications using the Ethereum blockchain programming model. WhatYou Will LearnBuild NFT tokensExamine Web3 differs from Web2-based applicationsUnderstand theTable of ContentsChapter1. Introduction to DecentralizationChapter 2. BlockchainChapter 3.Solidity.Chapter 4. Wallets and Gateways.Chapter 5. Remix IDE.Chapter 6. Truffle.Chapter 7. IPFS and NFTsChapter 8. Hardhat.

    1 in stock

    £20.99

  • Still Searching for Satoshi

    APress Still Searching for Satoshi

    1 in stock

    Book SynopsisWe are at the threshold of a new area of the internet that promises to transform the way we engage financially and take the power of data and privacy back from big corporations and give it to the individual through decentralization. This is sometimes called Web 3.0. While Web 1.0 transformed information sharing and commerce and brought us giants like Google and Amazon and Web 2.0 unlocked the social potential of the internet and created Facebook, Twitter, and Snapchat, exactly what will come of Web 3.0 remains to be seen. It is indisputable that the seed of Web 3.0 is the technological, social, and economic innovations that came together in Bitcoin and the blockchain technology it created. But where the first web iterations were relatively straightforward to understand, the inner workings of Web 3.0 remain more opaque and shrouded in mystique. Current voices on Bitcoin and the blockchain revolution fall squarely into one of two camps; either technological experts who are all also invTable of ContentsIntroduction Part 1 - Genealogy of bitcoin technology The technological developments leading to bitcoin. This part is a technological history that reviews the technological developments that Bitcoin builds on. There are a few strands that developed more or less independently that combine into Bitcoin. Once they are explained it is possible to give a deeper explanation of how Bitcoin works. This understanding will inform the remaining parts of the book. Chapter 1: Cryptography The purpose of cryptography is to keep information private by preserving confidentiality, integrity and access to it. Public private key encryption Hashing Zero knowledge proof Chapter 2: Virtual Money In this chapter we will go into the history of electronic or virtual money before bitcoin. Digicash E gold Bitgold b Money Hash cash Chapter 3: Peer-to-peer technology The internet of today is a centralized type of computing working through a number of web servers that function in a hierarchy. Properties of p2p networks Discovering a peer Secure sharing File Sharing from Napster to BitTorrent Chapter 4: Proof of work An inherent problem with the networked world is that accessing and processing information is essentially free, which makes certain types of disruptive behavior easy, which we see in denial of service attacks, spam mail and robocalling. This brings new problems that did not exist when it cost significant money to send a letter, read a paper or book or make a phone call. DDoS Spam Money transactions Chapter 5: Public record Since the time of the code of Hammurabi, the purpose of a public record has been clear: to establish indisputable truth. While this is seemingly the opposite of the privacy and confidentiality entailed by cryptography it serves the purpose of making information shared and immutable. Historical technologies of public record The purpose of public records The accounting revolution and the development of ledgers, double entry bookkeeping to triple entry bookkeeping Chapter 6: Bitcoin From the previous chapters we are now able to piece together how bitcoin and the block chain works. Virtual money - The Bitcoin Encrypting for privacy - The Wallet Public record - The Blockchain Peer to peer network - The Miners Proof of work - Transactions (cryptographic proof and the consensus algorithm) Part 2 - Still searching for Satoshi - who is the historical Satoshi Nakamoto? Much writing about Bitcoin has focused on who the historical person or persons behind Satoshi Nakamoto is. This part will apply a historical critical perspective to this question and sift through the evidence in order to create a better understanding of what we can and cannot say about the identity of Satoshi Nakamoto. Chapter 7: Who dunnit? A review of previous identifications of the person behind Satoshi. This has previously taken the shape of investigative journalism in the style of true crime reporting Joshua Davis, The New Yorker 2011 Adam Penenberg, Fast Company 2011 Alec Liu, Vice 2013 John Markoff, New York Times 2013 Andy Greenberg, Forbes 2014 Leah McGrath Goodman, Newsweek 2014 Skye Grey, blog 2014 Dominic Frisby, Bitcoin the future of money 2014 Nathaniel Popper, New York Time 2015 Andy Greenberg, Gwern Branwen, Wired 2015 Sam Biddle, Gizmodo 2015 Izabella Kasminska, Financial Times 2016 Evan Ratliff, Wired 2019 Other sources - twitter, youtube, tv Chapter 8: Ad fontes-What do the sources say? By focusing on the sources we are able to extract a number of key characteristics to look for: Historical analysis - establishes a couple of key points for historical analysis The bitcoin whitepaper - the most crucial piece of evidence The forums - the p2p forum and later the bitcoin forum are sources where Satoshi discussed with peers about bitcoin The code - the code in itself may also contain clues The blockchain - the record of transactions also provides an insight into the origin of bitcoin Summary - what can the sources tell us? Chapter 9: Motives What were the motives behind the creation of bitcoin Ideology - what can be said about the ideology of the author based on extant sources? Why the synonym? - what could be the reason for the initial and continued secrecy surrounding the inventor? Summary - why did the inventor invent bitcoin and in this particular way? Chapter 10: The social network of early bitcoin Who were the people involved in the beginning of Bitcoin p2p forum communication Bitcoin forum communication Blockchain transactions Summary - what can we learn from looking at the bitcoin initial network Chapter 11: The usual suspects? Rather than pointing definitively to one or another suspect we will try to integrate the knowledge we have gained with the list of known suspects. An evaluation framework - developing an evaluation framework against which to measure the likelihood of any candidate being Satoshi Nakamoto Prime suspects - the suspects that have gained most attention · Hal Finney · Nick Szabo · Dorian Sakamoto · Craig Wright and David Kleiman · Paul Leroux Secondary suspects - suspects that have gained some attention · Vili Lehdonum and Michael Clear · Neal King, Vladimir Oksman, Charles Bry · Hal Finney, Nick Szabo and Adam Back · Shinichi Mochizuki · Ross Ulbricht · Adam Back · Gavin Andresen · Jed McCaleb · Elon Musk · Len Sassaman · Someone else A new primary suspect - as in the movie The Usual Suspects, careful analysis points towards a surprising suspect who is not in the primary field of suspects. Part 3 - Bitcoin in context How is bitcoin viewed in the wider context of human civilization? Bitcoin does not exist in a technological bubble addressing only technological issues. It is firmly situated in a web of themes that are and have been central to human civilization. This may account for its notoriety but needs to be put in context. Chapter 12: Money Since prehistoric times humans have engaged in exchange. This falls in a continuum from barter, through intermediaries as cowry shells, gold and silver coins to purely symbolic means of exchange. The history of money Medium of exchange Unit of account Standard of deferred payment Store of value Types of money · Commodity · Representative money · Fiat · Digital money · Deposits The politics of money Money as a bridge between domains of value Chapter 13: Ownership Proving that you own something has been a central feature of human societies for millenia and disputes have fueled more than its share of violence and conflict. Owners · Private · Public · Corporate · Communal Property · Tangible · Intangible Establishing and policing ownership · National · Transnational Chapter 14: Social organization Human societies have always been characterized by some sort of social organization. The different options have been debated since classical antiquity. This chapter will take a look at the space of social organization and narrow it down to the particular types associated with bitcoin and blockchain. An ancient discussion: Monarchy, Oligarchy and Democracy - and anarchy Centralization vs decentralization Types of social organization in human groups Open source Cypher punks Chapter 15: Religion A rarely debated issue are the religious aspects surrounding Bitcoin and the blockchain movement. But these aspects are nothing new when it comes to human cultures. Understanding this helps explain a lot of the seemingly strange behavior of bitcoin believers without claiming that Bitcoin is an actual religion. The prophet - Satoshi Nakamoto Sacred scriptures- The Bitcoin whitepaper and the forum posts Believers and heathens Cargo cults Millenarianism Part 4 - Blockchain and the future Where can blockchain technology be applied? Where, if anywhere, might we see cryptocurrencies and the blockchain in the future and how might it affect our lives? A case could be made that we are only in the beginning phases of the blockchain now, sometimes called Web3, where the worst of the teething problems are gone and the wild west ethos is receding. Where not to use blockchain - First let us consider a number of areas where blockchain is currently suggested that might not be particularly relevant. Parameters to be tweaked - Bitcoin was the first version of blockchain technology and certain choices were made. But subsequent and future blockchains need not make the same choices. We need to understand how this can be done in order to ascertain the future utility of the blockchain. Transaction speed Energy consumption Degree of centralization Public availability Mining rewards Banking - even though Bitcoin at its outset was antithetical to the banking industry there are particularly good use cases here. Payment - bitcoin may not in itself have been very successful as a payments solution so far but there is no reason why another cryptocurrency will not be. Current payment systems are slow and expensive compared to what the blockchain can offer. International payments Remittance Peer to peer payments Micropayments Certification - building on the ability to serve as a public record there are good reasons that a blockchain can serve as a public record for information about ownership NFTs Real estate Media Contracts - the ability to establish indisputable truth makes it possible to build contracts that automatically execute according to some logic. This can be used for escrow services and delivery of other services as well as insurance. Regulatory compliance - the immutability of the blockchain makes it good for a great number of use cases where fraud has previously been an issue Forensics - the public nature of the blockchain makes it a valuable tool for law enforcement, especially international law enforcement, which has already proven its worth in a number of high profile cases. Supply chain - the blockchain is well suited for keeping track of things movement across time and place. Health - keeping track of health trackers and personal health records could be done on a blockchain Government - in government there are also areas where blockchain may be useful Special purpose tokens Voting Identity Glossary Key concepts described

    1 in stock

    £38.24

  • Blockchain Essentials

    APress Blockchain Essentials

    3 in stock

    Book SynopsisThis book will teach you the core concepts of blockchain technology in a concise manner through straightforward, concrete examples using a range of programming languages, including Python and Solidity. The 50 programs presented in this book are all you need to gain a firm understanding of blockchain and how to implement it. The book begins with an introduction to the fundamentals of blockchain technology, followed by a review of its types, framework, applications and challenges. Moving ahead, you will learn basic blockchain programming with hash functions, authentication code, and Merkle trees. You will then dive into the basics of bitcoin, including wallets, digital keys, transactions, digital signatures, and more. This is followed by a crash course on Ethereum programming, its network, and ecosystem. As you progress through the book, you will also learn about Hyperledger and put your newly-gained knowledge to work through case studies and example applications. After reading this boTable of ContentsChapter 1: Introduction to Blockchain.- Chapter 2: Essentials of Blockchain Programming.- Chapter 3: The Bitcoin.- Chapter 4: Ethereum Blockchain.- Chapter 5: Hyperledger.- Chapter 6: Case Studies using Blockchain.- Chapter 7: Beyond Blockchain.

    3 in stock

    £42.49

  • Programming Bitcoin

    O'Reilly Media Programming Bitcoin

    7 in stock

    Book SynopsisDive into Bitcoin technology with this hands-on guide from one of the leading teachers on Bitcoin and Bitcoin programming. Author Jimmy Song shows Python programmers and developers how to program a Bitcoin library from scratch.

    7 in stock

    £47.99

  • HandsOn Smart Contract Development with Solidity

    O'Reilly Media HandsOn Smart Contract Development with Solidity

    3 in stock

    Book SynopsisReady to dive into smart contract development for the blockchain? With this practical guide, experienced engineers and beginners alike will quickly learn the entire process for building smart contracts for Ethereum—the open source blockchain-based distributed computing platform.

    3 in stock

    £39.74

  • Mastering Blockchain

    O'Reilly Media Mastering Blockchain

    7 in stock

    Book SynopsisThis detailed guide distills the complex, fast moving ideas behind blockchain into an easily digestible reference manual, showing what's really going on under the hood.

    7 in stock

    £47.99

  • Cyber Warfare and Cyber Terrorism

    IGI Global Cyber Warfare and Cyber Terrorism

    1 in stock

    Book SynopsisCyber Warfare and Cyber Terrorism provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems.

    1 in stock

    £123.00

  • Serious Cryptography: A Practical Introduction to

    No Starch Press,US Serious Cryptography: A Practical Introduction to

    2 in stock

    Book SynopsisSerious Cryptography is the much anticipated review of modern cryptography by cryptographer JP Aumasson. This is a book for readers who want to understand how cryptography works in today's world. The book is suitable for a wide audience, yet is filled with mathematical concepts and meaty discussions of how the various cryptographic mechanisms work. Chapters cover the notion of secure encryption, randomness, block ciphers and ciphers, hash functions and message authentication codes, public-key crypto including RSA, Diffie-Hellman, and elliptic curves, as well as TLS and post-quantum cryptography. Numerous code examples and real use cases throughout will help practitioners to understand the core concepts behind modern cryptography, as well as how to choose the best algorithm or protocol and ask the right questions of vendors. Aumasson discusses core concepts like computational security and forward secrecy, as well as strengths and limitations of cryptographic functionalities related toTrade Review“A superb introduction to modern encryption and cryptography. For those looking to quickly get up to speed on the topics, this makes for an excellent go-to guide.”—Ben Rothke, RSA Conference“It's really a love letter to cryptography.”—Nadim Kobeissi“For those who really want to understand how cryptography works, and who need to use it in practice, I thoroughly recommend Serious Cryptography.”—Martijn Grooten, Virus Bulletin“Impressive in its breadth...the state of the art in applied cryptography is distilled here in a mere 282 pages.”—Federico Lucifredi, The Hub“Aumasson successfully ensures that the reader has a strong understanding of cryptography’s core ideas... Serious Cryptography is a must read for anyone wanting to enter cryptographic engineering.”—Infosecurity Magazine“Each chapter not only explains concepts and key implementation details, but also highlights possible pitfalls, common mistakes, and finishes with a list of recommended materials.”—Artificial Truth"Jean-Philippe Aumasson's Serious Cryptography is a classic (and serious) introduction to the field."—Mary Branscombe, ZDNet"It's advanced but the best book I've ever read for PKI is Serious Cryptography by Aumasson. Probably don't want to start with it but if you get serious you'll want to read it."—Chris Sandvick, @ChrisSandvick"My favorite reference."—Colin O'Flynn, Circuit Cellar"For those wanting to go beyond the basics of cryptography in the blockchain, 'Serious Cryptography' by Jean-Philippe Aumasson is an invaluable resource."—Halborn SecurityTable of ContentsForeword by Matthew D. GreenPrefaceAbbreviationsChapter 1: EncryptionChapter 2: RandomnessChapter 3: Cryptographic SecurityChapter 4: Block CiphersChapter 5: Stream CiphersChapter 6: Hash FunctionsChapter 7: Keyed HashingChapter 8: Authenticated EncryptionChapter 9: Hard ProblemsChapter 10: RSAChapter 11: Diffie–HellmanChapter 12: Elliptic CurvesChapter 13: TLSChapter 14: Quantum and Post-QuantumIndex

    2 in stock

    £35.99

  • Spyware

    Nova Science Publishers Inc Spyware

    1 in stock

    Book SynopsisThe term ''spyware'' is not well defined. Generally it is used to refer to any software that is downloaded onto a person''s computer without their knowledge. Spyware may collect information about a computer user''s activities and transmit that information to someone else. It may change computer settings, or cause ''pop-up'' advertisements to appear (in that context, it is called ''adware''). Spyware may redirect a Web browser to a site different from what the user intended to visit, or change the user''s home page. A type of spyware called ''keylogging'' software records individual keystrokes, even if the author modifies or deletes what was written, or if the characters do not appear on the monitor. Thus, passwords, credit card numbers, and other personally identifiable information may be captured and relayed to unauthorised recipients. Some of these software programs have legitimate applications the computer user wants. They obtain the moniker ''spyware'' when they are installed surreptitiously, or perform additional functions of which the user is unaware. Users typically do not realise that spyware is on their computer. They may have unknowingly downloaded it from the Internet by clicking within a website, or it might have been included in an attachment to an electronic mail message (e-mail) or embedded in other software. According to a survey and tests conducted by America Online and the National Cyber Security Alliance, 80% of computers in the test group were infected by spyware or adware, and 89% of the users of those computers were unaware of it. The Federal Trade Commission (FTC) issued a consumer alert on spyware in October 2004. It provided a list of warning signs that might indicate that a computer is infected with spyware, and advice on what to do if it is. This new book helps shed light on this insidious nightmare created by members of the human race to wreck havoc on the remainder.

    1 in stock

    £52.49

  • Cryptography for Developers

    Syngress Media,U.S. Cryptography for Developers

    15 in stock

    Book SynopsisThe only guide for software developers who must learn and implement cryptography safely and cost effectively. Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.Table of ContentsIntroduction; ASN.1 Encodings; Random Numbers; Large Integer Arithmetic; Symmetric Key Ciphers; One-Way Hashes; Message Authentication Codes; Encrypted Authentication Modes; Public-Key Cryptography

    15 in stock

    £53.76

  • Street Coder

    Manning Publications Street Coder

    5 in stock

    Book SynopsisSoftware development isn't an "ivory tower" exercise.Street coders get the job done by prioritizing tasks, making quick decisions, and knowing which rules to break. Street Coder: Rules to break and how to break themis a programmer's survival guide, full of tips, tricks, and hacks that will make you a more efficient programmer. This book's rebel mindset challenges status quo thinking and exposes the important skills you need on the job. You'll learnthe crucial importance of algorithms and data structures, turn programming chores into programming pleasures, and shatter dogmatic principles keeping you from your full potential. Every new coder starts out with a lot of theory; the "streetsmarts" come with experience. To be successful, you need to know how toput theory into action, understand why "best practices" are the best, and know when to go rogue and break the unbreakable rules.Trade Review“An incredible book to learn the craft of software development through a new perspective: One thatis not fuelled by religion or blind following of best practices, but one that actively challenges best practices and thus requires you to think about their prosand cons.!” Sebastian Felling “This is like having a mentor in a book who is sharing all their mistakes and notes on what they've learned in a nice little package.“ Joseph Perenia “A fun, broad, anddeep conversation with an experienced programmer about coding, packed withpractical advice.” Adail Retamal “I wish I couldread this book several years ago, thus, I could have saved a lot of time.” XuYang “Contains the pragmatism an experienced software developer has gained over the years of being at the trenches (or streets as he prefers to call it).” Orlando MéndezMorales “Great book for thenew and used, self-taught, formally educated, and otherwise curious programmers doing dirt -aka street coders.” Robert Wilk

    5 in stock

    £37.99

  • Candidate Multilinear Maps

    Morgan & Claypool Publishers Candidate Multilinear Maps

    15 in stock

    Book SynopsisThe aim of cryptography is to design primitives and protocols that withstand adversarial behavior. Information theoretic cryptography, how-so-ever desirable, is extremely restrictive and most non-trivial cryptographic tasks are known to be information theoretically impossible. In order to realize sophisticated cryptographic primitives, we forgo information theoretic security and assume limitations on what can be efficiently computed. In other words we attempt to build secure systems conditioned on some computational intractability assumption such as factoring, discrete log, decisional Diffie-Hellman, learning with errors, and many more.In this work, based on the 2013 ACM Doctoral Dissertation Award-winning thesis, we put forth new plausible lattice-based constructions with properties that approximate the sought after multilinear maps. The multilinear analog of the decision Diffie-Hellman problem appears to be hard in our construction, and this allows for their use in cryptography. These constructions open doors to providing solutions to a number of important open problems.Table of Contents Introduction Survey of Applications Multilinear Maps and Graded Encoding Systems Preliminaries I: Lattices Preliminaries II: Algebraic Number Theory Background The New Encoding Schemes Security of Our Constructions Preliminaries III: Computation in a Number Field Survey of Lattice Cryptanalysis One-Round Key Exchange Generalizing Graded Encoding Systems Bibliography Author's Biography

    15 in stock

    £42.46

  • Candidate Multilinear Maps

    Morgan & Claypool Publishers Candidate Multilinear Maps

    15 in stock

    Book SynopsisThe aim of cryptography is to design primitives and protocols that withstand adversarial behavior. Information theoretic cryptography, how-so-ever desirable, is extremely restrictive and most non-trivial cryptographic tasks are known to be information theoretically impossible. In order to realize sophisticated cryptographic primitives, we forgo information theoretic security and assume limitations on what can be efficiently computed. In other words we attempt to build secure systems conditioned on some computational intractability assumption such as factoring, discrete log, decisional Diffie-Hellman, learning with errors, and many more.In this work, based on the 2013 ACM Doctoral Dissertation Award-winning thesis, we put forth new plausible lattice-based constructions with properties that approximate the sought after multilinear maps. The multilinear analog of the decision Diffie-Hellman problem appears to be hard in our construction, and this allows for their use in cryptography. These constructions open doors to providing solutions to a number of important open problems.Table of Contents Introduction Survey of Applications Multilinear Maps and Graded Encoding Systems Preliminaries I: Lattices Preliminaries II: Algebraic Number Theory Background The New Encoding Schemes Security of Our Constructions Preliminaries III: Computation in a Number Field Survey of Lattice Cryptanalysis One-Round Key Exchange Generalizing Graded Encoding Systems Bibliography Author's Biography

    15 in stock

    £60.00

  • Software Design X-Rays: Fix Technical Debt with

    Pragmatic Bookshelf Software Design X-Rays: Fix Technical Debt with

    2 in stock

    Book SynopsisAre you working on a codebase where cost overruns, death marches, and heroic fights with legacy code monsters are the norm? Battle these adversaries with novel ways to identify and prioritize technical debt, based on behavioral data from how developers work with code. And that's just for starters. Because good code involves social design, as well as technical design, you can find surprising dependencies between people and code to resolve coordination bottlenecks among teams. Best of all, the techniques build on behavioral data that you already have: your version-control system. Join the fight for better code! Use statistics and data science to uncover both problematic code and the behavioral patterns of the developers who build your software. This combination gives you insights you can't get from the code alone. Use these insights to prioritize refactoring needs, measure their effect, find implicit dependencies between different modules, and automatically create knowledge maps of your system based on actual code contributions. In a radical, much-needed change from common practice, guide organizational decisions with objective data by measuring how well your development teams align with the software architecture. Discover a comprehensive set of practical analysis techniques based on version-control data, where each point is illustrated with a case study from a real-world codebase. Because the techniques are language neutral, you can apply them to your own code no matter what programming language you use. Guide organizational decisions with objective data by measuring how well your development teams align with the software architecture. Apply research findings from social psychology to software development, ensuring you get the tools you need to coach your organization towards better code. If you're an experienced programmer, software architect, or technical manager, you'll get a new perspective that will change how you work with code. What You Need: You don't have to install anything to follow along in the book. TThe case studies in the book use well-known open source projects hosted on GitHub. You'll use CodeScene, a free software analysis tool for open source projects, for the case studies. We also discuss alternative tooling options where they exist.

    2 in stock

    £35.14

  • Python Tools For Scientists: An Introduction to

    No Starch Press,US Python Tools For Scientists: An Introduction to

    1 in stock

    Book SynopsisDoing Science With Python introduces readers to the most popular coding tools for scientific research, such as Anaconda, Spyder, Jupyter Notebooks, and JupyterLab, as well as dozens of important Python libraries for working with data, including NumPy, matplotlib, and pandas. No prior programming experience is required! You'll be guided through setting up a professional coding environment, then get a crash course on programming with Python, and explore the many tools and libraries ideal for working with data, designing visualisations, simulating natural events, and more.Trade Review"Python Tools for Scientists helps people get up and running in Python so that they can start solving their problems right away instead of being daunted by the dizzying array of tools available in the ecosystem. I wish something like this had been available when I first picked up Python as a scientist!" —James Bednar, Director of Custom Services, Anaconda, Inc.“Python has a wealth of scientific computing tools, so how do you decide which ones are right for you? This book cuts through the noise to help you deliver results." —Serdar Yegulalp, InfoWorld"The book [Python Tools for Scientists] by Lee Vaughan is a critical resource for anyone that is new to Python programming and intends to become a Python expert. It covers all of the critical topics in an easily understandable format and it goes deep enough to be helpful in navigating advanced topics. The book is also true to current Software Engineering standards and gives even new developers the tools to jump start their Python career."—Dr. Alec Yasinsac, Department of Computer Science, University of South Alabama"I wish there was a book like this when I started learning Python... [Python Tools for Scientists] is a practical, detailed, hands-on introduction to setting up a local Python workspace and getting started with the basics of Python programming. It was written for scientists, by a scientist who knows what the typical problems are when scientists and engineers start using Python tools in their everyday work. It also introduces the wide variety of packages that can be used in scientific programming and provides guidelines on when to use them. Matplotlib, numpy, and pandas are covered in much more detail - as they should be. The writing and the organization of the material are clear and easy to follow. I have been using Python for many years, but I know I will be using this book both in teaching and research."—Zoltán Sylvester, Senior Research Scientist, University of Texas at AustinTable of ContentsIntroductionPart 1: Setting up for ScienceChapter 1: Installing Anaconda and Launching NavigatorChapter 2: Keeping Organized with Conda EnvironmentsChapter 3: Simple Scripting in Jupyter Qt ConsoleChapter 4: Serious Scripting with SpyderChapter 5: Jupyter Notebook: An Interactive Journal for Computational ResearchChapter 6: JupyterLab: Your Center for SciencePart 2: Python PrimerChapter 7: Integers, Floats, and StringsChapter 8: VariablesChapter 9: The Container Data TypesChapter 10: Flow ControlChapter 11: Functions and ModulesChapter 12: Files and FoldersChapter 13: Object Oriented ProgrammingChapter 14: Documenting your WorkPart 3: The Scientific and Visualization LibrariesChapter 15: The Scientific LibrariesChapter 16: The InfoVis and SciVis Visualization LibrariesChapter 17: The GeoVis LibrariesPart 4: The Essential LibrariesChapter 18: Numpy: Numerical PythonChapter 19: Demystifying MatplotlibChapter 20: Pandas, Seaborn, and Scikit-learnChapter 21: Managing Dates and Times with Python and PandasAppendix A: Answers to the "Test your Knowledge" Challenges

    1 in stock

    £38.39

  • Codebreaking: A Practical Guide

    No Starch Press,US Codebreaking: A Practical Guide

    10 in stock

    Book SynopsisIf you liked Dan Brown’s Da Vinci Code—or want to solve similarly baffling cyphers yourself—this is the book for you! A thrilling exploration of history’s most vexing codes and ciphers that uses hands-on exercises to teach you the most popular historical encryption schemes and techniques for breaking them.Solve history’s most hidden secrets alongside expert codebreakers Elonka Dunin and Klaus Schmeh, as they guide you through the world of encrypted texts. With a focus on cracking real-world document encryptions—including some crime-based coded mysteries that remain unsolved—you’ll be introduced to the free computer software that professional cryptographers use, helping you build your skills with state-of-the art tools. You’ll also be inspired by thrilling success stories, like how the first three parts of Kryptos were broken. Each chapter introduces you to a specific cryptanalysis technique, and presents factual examples of text encrypted using that scheme—from modern postcards to 19-century newspaper ads, war-time telegrams, notes smuggled into prisons, and even entire books written in code. Along the way, you’ll work on NSA-developed challenges, detect and break a Caesar cipher, crack an encrypted journal from the movie The Prestige, and much more.You’ll learn: How to crack simple substitution, polyalphabetic, and transposition ciphers How to use free online cryptanalysis software, like CrypTool 2, to aid your analysis How to identify clues and patterns to figure out what encryption scheme is being used How to encrypt your own emails and secret messages Codebreaking is the most up-to-date resource on cryptanalysis published since World War II—essential for modern forensic codebreakers, and designed to help amateurs unlock some of history’s greatest mysteries.Trade Review“Codebreaking: A Practical Guide is quite the best book on codebreaking I have read: clear, engaging, and fun. A must for would-be recruits to GCHQ and the NSA!”—Sir Dermot Turing, author of Prof, the biography of his uncle, Alan Turing“Riveting. Dunin and Schmeh show us that we each have our own inner code-breaker yearning to be set free. Codebreaking isn’t just for super-geniuses with supercomputers; it’s something we were all born to do.”—Mike Godwin, creator of Godwin’s law and former general counsel for the Wikimedia Foundation“This is THE book about codebreaking. Very concise, very inclusive, and easy to read. Good references for those who would make codes, too, like Kryptos.”—Ed Scheidt, CIA“A compendium of historical cryptography. Approachable, accessible, this book brings back the joy I felt when I first read about these things as a kid.”—Phil Zimmermann, creator of PGP encryption and inductee into the Internet Hall of Fame“One of the most helpful guides outside the NSA to cracking ciphers. But even if you don’t become a codebreaker, this book is full of fascinating crypto lore.”—Steven Levy, New York Times best-selling author of Crypto, Hackers, and Facebook: The Inside Story“Another kind of Applied Cryptography.”—Whitfield Diffie, Turing Laureate and creator of public-key cryptography“This is the book of my dreams. Super-clear, super-fun guide for solving secret messages of all kinds.”—Jason Fagone, author of the best-selling book The Woman Who Smashed Codes“Kool dnoces a htrow era snootrac eht fo ynam.”—Suomynona Ecila“A wonderful mix of ciphers, both famous and little-known, solved and unsolved. Beginners will be hooked on exploring the world of secrets in cipher, and those who have already been introduced to the field will find much that is new.”—Craig Bauer, editor in chief of Cryptologia and author of Unsolved!: The History and Mystery of the World’s Greatest Ciphers“Cryptography? Ciphers? I thought this would be an easy book to put down. I was very wrong.”—Steve Meretzky, co-author with Douglas Adams of The Hitchhiker’s Guide to the Galaxy computer game"Fun, fascinating, and user friendly . . . Expertly written, organized and presented, [Codebreaking] is unreservedly recommended as a supplemental Code Breaking curriculum textbook."—Midwest Book ReviewTable of ContentsPrefaceChapter 1: How can I break an encrypted message? And other introductory questionsChapter 2: The Caesar cipherChapter 3: Simple substitution ciphersChapter 4: Simple substitution ciphers without spaces between words: PatristocratsChapter 5: Simple substitution ciphers in non-English languagesChapter 6: Homophonic ciphersChapter 7: Codes and nomenclatorsChapter 8: Polyalphabetic ciphersChapter 9: Complete columnar transposition ciphersChapter 10: Incomplete columnar transposition ciphersChapter 11: Turning grille transposition ciphersChapter 12: Digraph substitutionChapter 13: Abbreviation ciphersChapter 14: Dictionary codes and book ciphersChapter 15: Additional encryption methodsChapter 16: Solving ciphers with hill climbingChapter 17: What next?Appendix A: KryptosAppendix B: Useful language statisticsAppendix C: GlossaryAppendix D: Morse CodeAppendix E: Figure SourcesReferences

    10 in stock

    £23.99

  • Computer & Internet Security: A Hands-on Approach

    1 in stock

    £56.99

  • Cyber Security: The complete guide to cyber

    BCS Learning & Development Limited Cyber Security: The complete guide to cyber

    1 in stock

    Book SynopsisCyber security has never been more essential than it is today, it’s not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure. Cyber Security explains the fundamentals of information security, how to shape good organisational security practice, and how to recover effectively should the worst happen. Written in an accessible manner, Cyber Security provides practical guidance and actionable steps to better prepare your workplace and your home alike. This second edition has been updated to reflect the latest threats and vulnerabilities in the IT security landscape, and updates to standards, good practice guides and legislation. • A valuable guide to both current professionals at all levels and those wishing to embark on a cyber security profession • Offers practical guidance and actionable steps for individuals and businesses to protect themselves • Highly accessible and terminology is clearly explained and supported with current, real-world examplesTrade ReviewDavid Sutton's books provides well researched, comprehensive guide to the multifaceted, rapidly growing cyber domain. It serves as a valuable guide to both current professionals and those wishing to embark on a Cyber Security profession. An excellent read. -- Colonel John S Doody FBCS FCMI CITP ACISP MIOD, Director, Interlocutor Services LimitedA very comprehensive primer on cyber security covering issues, solutions and suggestions for further action. After reading this book anyone that worries about cyber security without necessarily wanting to become an expert will find themself much better informed and quite probably much more interested. -- Susan Perriam MBA MSc CMgr MBCS CISSP, Cyber Security ConsultantThis book manages to strike a perfect balance between technical breadth and depth. It includes enough detail to understand the broad range of concepts and techniques found in a complex industry, along with practical and real-life examples. This latest revision is packed with recent examples, scenarios, tools, and techniques that make it a fascinating read for both industry veterans and recent joiners alike. Highly recommended. -- Martin King FBCS CITP CISSP, Chief Technology Officer, IT TransformedThis book describes the eco system of cyber security and provides excellent go-to guides and considerations for people/teams dealing with both technical and non-technical security. Awareness and training are at the very heart of the book, successfully paralleled by descriptions of how our day-to-day information sharing and protection should take place safely. A useful and insightful read and highly recommended. -- Lesley-Anne Turner, Cyber Compliance, CDDO, Cabinet OfficeThe style and structure makes it an ideal book for students as it covers all the important topics, from the fundamentals of information security such as the CIA model, through to organisational issues (policies and disaster recovery), legal requirements and security standards. Terminology is clearly explained and supported with current, real-world examples. It is a most valuable resource. -- Richard Hind MSc MBCS FHEA, Tutor of Digital Technologies, York CollegeThis book gives a good insight into cyber security, with modern day examples and practical guidance on how to proactively mitigate against risks. This will definitely be a book I refer to frequently. -- Bianca Christian, Business Analyst, Young Business Analysts (YBA)On first reading this book, the biggest impression that greets the reader is that it’s NOT a technical reference book and is widely focused on the wider impact of cyber security on society as a whole. It is not just for technologists and treats a complex subject with just the right level of both technical and socioeconomic balance. Highly recommended. -- Adrian Winckles MBCS CITP CEng, Chair of BCS Cybercrime Forensics SG and OWASP Education CommitteeCyber Security 2e is a rich technical guide on cyber threats. Leaving no stone unturned, the first half touches on key examples and paints a clear picture of the current threat landscape that both individuals and organisations face, and the second half contains solutions. Sutton aptly spotlights a number of actions that anyone could be encouraged to practice for good personal and corporate security. -- Ester Masoapatali MBCS, Information Security Specialist, Partnerships Manager, CybSafeThis book is a fantastic resource for those breaking into the industry, or for non-security leaders who want to know more about the risks faced by their business. Written in an accessible manner, this second edition gives readers updated information and current examples showing the changing trends and tactics of attackers. -- Jim Wright, Managing Director, Principle DefenceThis book is for anyone who wants to understand and learn more about cybersecurity. It provides a foundation of cybersecurity knowledge as well as essential practical skills and techniques for entry and junior-level cybersecurity roles. It is also designed to help learners in building a promising and rewarding career pathway in the cybersecurity field. -- Dr Sherif El-Gendy FBCS, Information Security ExpertThis highly accessible second edition provides a thorough update to the world of cyber security in a non-technical manner; firstly clarifying cyber security issues and then focusing on cyber security solutions. If you are looking for a go-to reference that explains cyber security in plain language, this book is for you. -- Tim Clements FBCS CITP FIP CIPP/E CIPM CIPT, Purpose and MeansThis book demystifies what can, to many, be a rather bewildering topic, and it sets clear context and eloquently describes the landscape of threats and issues, and provides clear, actionable advice across key topics. A handy and well-written reference guide, and highly recommended reading! -- Paul Watts MBCS CITP FCIIS CISSP CISM, former CISO and Distinguished Analyst, Information Security ForumA thought-provoking and excellent read. Essential for cybersecurity practitioners working across numerous specialisations and at all levels of management. This blended use of theory and practical applications sets this book apart, complements industry-leading certifications and make it a must-read for anyone working within cyber. -- Gary Cocklin CITP CISSP, Senior Cyber Security Practitioner, UK Royal Air Force (RAF)This book is not just for cyber professionals, it’s for everyone. This book is easy to follow and clearly articulates what cyber is and why it matters. It provides insights into why cyber-attacks occur and offers practical and technical guidance for individuals and businesses to protect themselves. This will be my go-to resource for cyber security. -- Thando Jacobs, Business Analyst, Senior Leadership Team, Young Business Analysts (YBA)This book delivers a comprehensive overview of cyber security and is packed with numerous interesting, relevant examples to illustrate key points. Readers will gain insights on why they might be attacked and measures to protect against ever increasing cyber threats. Therefore I highly recommend this publication for individuals and organisations alike. -- Olu Odeniyi, Cyber Security, Information Security and Digital Transformation Advisor, Thought Leader and SpeakerEasy to follow, digestible and highly relevant for the world we live in today. Not just for cybersecurity professionals, business continuity practitioners will gain valuable insight as well as hints and tips on what cybersecurity aspects to consider when developing business continuity plans and response arrangements. -- Hilary Estall MBCI, IRCA BCMS Principal Auditor, Business Continuity Practitioner, Director Perpetual SolutionsTable of ContentsPreface 1. Introduction 2. The big issues 3. Cyber targets 4. Cyber vulnerabilities and impacts 5. Cyber threats 6. Risk management overview 7. Business continuity & disaster recovery 8. Basic cyber security steps 9. Organisational security steps 10. Awareness and training 11. Information sharing Bibliography Appendix A - Standards Appendix B - Good practice guidelines Appendix C - Cyber security law Appendix D - Cyber security training Appendix E - Links to other useful organisations

    1 in stock

    £28.49

  • Cybersecurity and Decision Makers: Data Security

    ISTE Ltd and John Wiley & Sons Inc Cybersecurity and Decision Makers: Data Security

    15 in stock

    Book SynopsisCyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization.Table of ContentsForeword xi Preface xiii Introduction xvii Chapter 1. An Increasingly Vulnerable World 1 1.1. The context 1 1.1.1. Technological disruptions and globalization 1 1.1.2. Data at the heart of industrial productivity 3 1.1.3. Cyberspace, an area without boundaries 3 1.1.4. IT resources 4 1.2. Cybercrime 4 1.2.1. The concept of cybercrime 4 1.2.2. Five types of threats 6 1.2.3. Five types of attackers 9 1.3. The cybersecurity market 15 1.3.1. The size of the market and its evolution 15 1.3.2. The market by sector of activity 15 1.3.3. Types of purchases and investments 16 1.3.4. Geographical distribution 17 1.4. Cyber incidents 17 1.4.1. The facts 17 1.4.2. Testimonials versus silence 24 1.4.3. Trends 25 1.4.4. Examples 27 1.5. Examples of particularly exposed sectors of activity 30 1.5.1. Cinema 30 1.5.2. Banks 31 1.5.3. Health 34 1.5.4. Tourism and business hotels 35 1.5.5. Critical national infrastructure 36 1.6. Responsibilities of officers and directors 37 Chapter 2. Corporate Governance and Digital Responsibility 39 2.1. Corporate governance and stakeholders 39 2.2. The shareholders 40 2.2.1. Valuation of the company 41 2.2.2. Cyber rating agencies 42 2.2.3. Insider trading 43 2.2.4. Activist shareholders 44 2.2.5. The stock exchange authorities 45 2.2.6. The annual report 45 2.3. The board of directors47 2.3.1. The facts 47 2.3.2. The four missions of the board of directors. 47 2.3.3. Civil and criminal liability 49 2.3.4. The board of directors and cybersecurity 50 2.3.5. The board of directors and data protection 53 2.3.6. The statutory auditors 54 2.3.7. The numerical responsibility of the board of directors 55 2.4. Customers and suppliers 56 2.5. Operational management 58 2.5.1. The impacts of digital transformation 58 2.5.2. The digital strategy 59 2.5.3. The consequences of poor digital performance 62 2.5.4. Cybersecurity 63 2.5.5. Merger and acquisition transactions 65 2.5.6. Governance and data protection, cybersecurity 66 Chapter 3. Risk Mapping 69 3.1. Cyber-risks 69 3.2. The context 71 3.3. Vulnerabilities 72 3.3.1. Fraud against the president 73 3.3.2. Supplier fraud 73 3.3.3. Other economic impacts 74 3.4. Legal risks 76 3.4.1. Class actions 76 3.4.2. Sanctions by the CNIL and the ICO 77 3.5. The objectives of risk mapping 78 3.6. The different methods of risk analysis 79 3.7. Risk assessment (identify) 81 3.7.1. The main actors 81 3.7.2. The steps 82 3.8. Protecting 83 3.9. Detecting 83 3.10. Reacting 84 3.11. Restoring 85 3.12. Decentralized mapping 85 3.12.1. The internal threat 85 3.12.2. Industrial risks 87 3.12.3. Suppliers, subcontractors and service providers 88 3.12.4. Connected objects 89 3.13. Insurance 94 3.14. Non-compliance risks and ethics 96 Chapter 4. Regulations 99 4.1. The context 99 4.1.1. Complaints filed with the CNIL 100 4.1.2. Vectaury 101 4.1.3. Optical Center 102 4.1.4. Dailymotion 103 4.2. The different international regulations (data protection) 103 4.2.1. The United States 104 4.2.2. China 104 4.2.3. Asia 105 4.2.4. Europe 105 4.3. Cybersecurity regulations, the NIS Directive 105 4.4. Sectoral regulations 106 4.4.1. The banking industry 106 4.4.2. Health 108 4.5. The General Data Protection Regulation (GDPR) 109 4.5.1. The foundations 110 4.5.2. Definition of personal data 110 4.5.3. The so-called “sensitive” data 111 4.5.4. The principles of the GDPR 112 4.5.5. The five actions to be in compliance with the GDPR 113 4.5.6. The processing register 113 4.5.7. The five actions to be carried out 113 4.5.8. Cookies 116 4.6. Consequences for the company and the board of directors 117 Chapter 5. Best Practices of the Board of Directors 119 5.1. Digital skills 120 5.2. Situational awareness 121 5.2.1. The main issues 121 5.2.2. Insurance 125 5.3. Internal governance 126 5.3.1. The CISO 126 5.3.2. The CISO and the company 127 5.3.3. Clarifying responsibilities 131 5.3.4. Streamlining the supplier portfolio 133 5.3.5. Security policies and procedures 134 5.3.6. The human being 137 5.4. Data protection 138 5.4.1. Emails 139 5.4.2. The tools 141 5.4.3. Double authentication: better, but not 100% reliable 142 5.5. Choosing your service providers 142 5.6. The budget 143 5.7. Cyberculture 144 5.8. The dashboard for officers and directors 145 Chapter 6. Resilience and Crisis Management 147 6.1. How to ensure resilience? 147 6.2. Definition of a CERT 149 6.3. Definition of a SOC 149 6.4. The role of ENISA 150 6.5. The business continuity plan 150 6.6. Crisis management 151 6.6.1. The preparation 151 6.6.2. Exiting the state of sideration 152 6.6.3. Ensuring business continuity 153 6.6.4. Story of the TV5 Monde attack 154 6.6.5. Management of the first few hours 159 6.7. Crisis simulation 163 Conclusion. The Digital Committee 165 Appendices 167 Appendix 1. Cybersecurity Dashboard 169 Appendix 2. Ensuring Cybersecurity in Practice and on a Daily Basis 173 Appendix 3. Tools to Identify, Protect, Detect, Train, React and Restore 175 Glossary 179 References 183 Index 187

    15 in stock

    £125.06

  • Cybersecurity in Humanities and Social Sciences:

    ISTE Ltd and John Wiley & Sons Inc Cybersecurity in Humanities and Social Sciences:

    1 in stock

    Book SynopsisThe humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology , law, information science, security studies, surveillance studies, strategic studies, polemology. There is, however, no actual cybersecurity studies. After two decades of scientific production on this subject, we thought it essential to take stock of the research methods that could be mobilized, imagined and invented by the researchers. The research methodology on the subject "cybersecurity" has, paradoxically, been the subject of relatively few publications to date. This dimension is essential. It is the initial phase by which any researcher, seasoned or young doctoral student, must pass, to define his subject of study, delimit the contours, ask the research questions, and choose the methods of treatment. It is this methodological dimension that our book proposes to treat. The questions the authors were asked to answer were: how can cybersecurity be defined? What disciplines in the humanities and social sciences are studying, and how, cybersecurity? What is the place of pluralism or interdisciplinarity? How are the research topics chosen, the questions defined? How, concretely, to study cybersecurity: tools, methods, theories, organization of research, research fields, data ...? How are discipline-specific theories useful for understanding and studying cybersecurity? Has cybersecurity had an impact on scientific theories?Table of ContentsIntroduction ixDaniel VENTRE, Hugo LOISEAU and Hartmut ADEN Chapter 1 The “Science” of Cybersecurity in the Human and Social Sciences: Issues and Reflections 1Hugo LOISEAU 1.1 Introduction 1 1.2 A method? 4 1.3 Data? 11 1.4 One or more definition(s)? 16 1.5 Conclusion 20 1.6 References 21 Chapter 2 Definitions, Typologies, Taxonomies and Ontologies of Cybersecurity 25Daniel VENTRE 2.1 Introduction 25 2.2 Definition 27 2.2.1 What is a definition? 27 2.2.2 Usefulness of definitions 29 2.2.3 Rules for constructing definitions 29 2.2.4 Definitions of cybersecurity 32 2.3 Typology 43 2.3.1 What is a typology? 44 2.3.2 Usefulness of typologies 44 2.3.3 Rules for the construction of typologies 45 2.3.4 Cybersecurity typologies 46 2.4 Taxonomy 48 2.4.1 What is a taxonomy? 48 2.4.2 Usefulness of taxonomy 49 2.4.3 Rules for the construction of taxonomies 49 2.4.4 Taxonomies of cybersecurity 50 2.5 Ontologies 51 2.5.1 What is ontology? 52 2.5.2 Usefulness of ontologies 53 2.5.3 Rules for construction of ontologies 53 2.5.4 Cybersecurity ontologies 54 2.6 Conclusion 56 2.7 References 57 Chapter 3 Cybersecurity and Data Protection – Research Strategies and Limitations in a Legal and Public Policy Perspective 67Hartmut ADEN 3.1 Introduction 67 3.2 Studying the complex relationship between cybersecurity and data protection: endangering privacy by combating cybercrime? 68 3.2.1 Potential tensions between cybersecurity and data protection 69 3.2.2 Potential synergies between cybersecurity and data protection 72 3.3 Methodological approaches and challenges for the study of cybersecurity – legal and public policy perspectives 74 3.3.1 Legal interpretation and comparison as methodological approaches to the study of cybersecurity 74 3.3.2 Public policy approaches to the study of cybersecurity 77 3.3.3 Transdisciplinary synergies between legal and public policy perspectives 78 3.4 Conclusion and outlook 80 3.5 References 81 Chapter 4 Researching State-sponsored Cyber-espionage 85Joseph FITSANAKIS 4.1 Defining cybersecurity and cyber-espionage 85 4.2 Taxonomies of cyber-threats 87 4.3 The structure of this chapter 88 4.4 The significance of state-sponsored cyber-espionage 90 4.5 Research themes in state-sponsored cyber-espionage 94 4.6 Theorizing state-sponsored cyber-espionage in the social sciences 98 4.7 Research methodologies into state-sponsored cyber-espionage 104 4.8 Intellectual precision and objectivity in state-sponsored cyber-espionage research 106 4.9 Detecting state actors in cyber-espionage research 110 4.10 Identifying specific state actors in cyber-espionage research 112 4.11 Conclusion: researching a transformational subject 116 4.12 References 118 Chapter 5 Moving from Uncertainty to Risk: The Case of Cyber Risk 123Michel DACOROGNA and Marie KRATZ 5.1 Introduction 123 5.2 The scientific approach to move from uncertainty to risk 124 5.3 Learning about the data: the exploratory phase 126 5.4 Data cleansing 128 5.5 Statistical exploration on the various variables of the dataset 130 5.6 Univariate modeling for the relevant variables 134 5.7 Multivariate and dynamic modeling 139 5.7.1 A fast-changing environment: time dependency 140 5.7.2 Causal relations 143 5.7.3 Models for prediction 147 5.8 Conclusion 149 5.9 Acknowledgments 151 5.10 References 151 Chapter 6 Qualitative Document Analysis for Cybersecurity and Information Warfare Research 153Brett VAN NIEKERK and Trishana RAMLUCKAN 6.1 Introduction 153 6.1.1 Previous research 154 6.2 Information warfare and cybersecurity 154 6.3 Researching information warfare and cybersecurity 156 6.4 Qualitative research methodologies for information warfare and cybersecurity 157 6.4.1 Clustering of documents 159 6.4.2 Clustering of words 159 6.4.3 Word frequencies and word clouds 159 6.4.4 Text search and word trees 159 6.4.5 Example use cases of qualitative document analysis 160 6.5 An analysis of national cybersecurity strategies 161 6.5.1 Selection process for the documents 161 6.5.2 Analysis 162 6.5.3 Discussion 167 6.6 An analysis of the alignment of South Africa’s Cybercrimes Bill to international legislation 169 6.6.1 Background to the documents 169 6.6.2 Analysis 170 6.6.3 Discussion 174 6.7 An analysis of the influence of classical military philosophy on seminal information warfare texts 176 6.8 Reflections on qualitative document analysis for information warfare and cybersecurity research 177 6.9 Conclusion 179 6.10 References 180 Chapter 7 Anti-feminist Cyber-violence as a Risk Factor: Analysis of Cybersecurity Issues for Feminist Activists in France 185Elena WALDISPUEHL 7.1 Introduction 185 7.2 Localization of an online field 187 7.2.1 Online ethnographic work and empathy 192 7.2.2 Cybersecurity issues of an online field 193 7.3 Online–offline continuum 194 7.4 Continuum between security and insecurity 199 7.5 Conclusion 204 7.6 References 205 List of Authors 211 Index 213

    1 in stock

    £125.06

  • Security and its Challenges in the 21st Century

    ISTE Ltd and John Wiley & Sons Inc Security and its Challenges in the 21st Century

    15 in stock

    Book SynopsisBy the year 2000, a balance was sought between security requirements and a respect for privacy, as well as for individual and collective freedoms. As we progress further into the 21st century, however, security is taking precedence within an increasingly controlled society.This shift is due to advances in innovative technologies and the investments made by commercial companies to drive constant technological progress. Despite the implementation of the General Data Protection Regulation (GDPR) within the EU in 2018 or 2020’s California Consumer Privacy Act (CCPA), regulatory bodies do not have the ability to fully manage the consequences presented by emerging technologies. Security and Its Challenges in the 21st Century provides students and researchers with an international legal and geopolitical analysis; it is also intended for those interested in societal development, artificial intelligence, smart cities and quantum cryptology.Table of ContentsIntroduction ix Chapter 1 Security: Actors and Rights 1 1.1 Numerous actors 1 1.1.1 Nation-states 1 1.1.2 Multinationals 3 1.1.3 The GAFAM 9 1.2 Rights and security 10 1.2.1 The law of armed conflict 10 1.2.2 Environmental law 16 Chapter 2 Interceptions 25 2.1 International interceptions 25 2.1.1 Interceptions in the 20th century 25 2.1.2 Interceptions in the 21st century 27 2.2 Interceptions in France 37 2.2.1 The 1991 law 38 2.2.2 The law of March 9, 2004 41 2.2.3 The 2015 Intelligence Act 42 2.2.4 Reform of the code of criminal procedure 52 Chapter 3 Geolocation and Video Protection 59 3.1 International standards for both geolocation and video protection/video surveillance 59 3.1.1 Comparative legal issues in the era of geolocalization 59 3.1.2 Belgian legislation on geolocation 61 3.1.3 Video surveillance/video protection 63 3.2 France 67 3.2.1 The legislative and regulatory framework 67 3.2.2 The case law just before the LOPPSI 2 and the Jean-Marc Philippe establishments 69 3.2.3 The entry into force of the LOPPSI 2 74 3.2.4 Jurisprudence after LOPPSI 2 74 3.2.5 Video protection and terrorism 88 Chapter 4 Biometrics or “the Second Circle” 89 4.1 Biometrics and international law 90 4.1.1 The United States: a historical outline 90 4.1.2 Standardization 93 4.1.3 The European Union and biometrics 94 4.2 France 98 4.2.1 Visa control 98 4.2.2 Passports 99 4.2.3 The TES database 101 4.2.4 Setting up Alicem 117 4.3 Facial recognition at the heart of globalization 119 Chapter 5 Personal Data in the United States and Europe 121 5.1 The United States and the protection of personal data in the European Union: Directive 95/46 122 5.1.1 Sensitive data 122 5.1.2 The right of access 123 5.1.3 Security 123 5.1.4 The directive of December 15, 1997, followed by the directive of July 12, 2002 and supplemented by the directive of November 25, 2009 124 5.1.5 Geolocalization 125 5.1.6 Cookies 125 5.2 The GDPR 126 5.2.1 Consent 127 5.2.2 Metadata and the “Privacy” bill 134 5.3 Cloud computing 138 5.3.1 Definition 138 5.3.2 The Safe Harbor Principles agreement 139 5.3.3 Privacy Shields 140 5.3.4 Two models 140 Chapter 6 Cybersecurity and Privacy 145 6.1 Cybersecurity itself 146 6.1.1 Cybersecurity in the United States 146 6.1.2 Cybersecurity in China 147 6.1.3 Cybersecurity in Japan 147 6.1.4 Cybersecurity and the European Union 148 6.1.5 Cybersecurity in the United Kingdom 149 6.1.6 Cybersecurity in France 149 6.1.7 The dangers of cyber-attacks 151 6.1.8 Two interesting cases 154 6.2 Cybersecurity and cryptology 158 6.2.1 Cryptology: the science of secrecy 158 6.2.2 Risks 161 6.3 PNR data 164 6.3.1 Element of definition 164 6.3.2 PNR data and nation-states 166 6.4 Smart cities 179 6.4.1 The development of standardization and certification 181 6.4.2 Strategies and CSIRTs 182 Chapter 7 Security Instruments in Texts Relating to Terrorism 185 7.1 Security instruments 185 7.1.1 The millimeter-wave scanner 185 7.1.2 The body camera 196 7.1.3 UAVs: a dual use – military and civilian 202 7.2 Standards in relation to terrorism 208 7.2.1 The law of 2014 209 7.2.2 The law strengthening internal security and the fight against terrorism 219 Chapter 8 Security and Democracy 225 8.1 Fake news 226 8.1.1 The definition 227 8.1.2 Obligations 227 8.2 Hate speech 237 8.2.1 The report 237 8.2.2 The proposed new mechanism 239 Conclusion 245 References 249 Index 251

    15 in stock

    £124.15

  • Archives in the Digital Age: Preservation and the

    ISTE Ltd and John Wiley & Sons Inc Archives in the Digital Age: Preservation and the

    15 in stock

    Book SynopsisArchiving has become an increasingly complex process. The challenge is no longer how to store the data but how to store it intelligently, in order to exploit it over time, while maintaining its integrity and authenticity. Digital technologies bring about major transformations, not only in terms of the types of documents that are transferred to and stored in archives, in the behaviors and practices of the humanities and social sciences (digital humanities), but also in terms of the volume of data and the technological capacity for managing and preserving archives (Big Data). Archives in The Digital Age focuses on the impact of these various digital transformations on archives, and examines how the right to memory and the information of future generations is confronted with the right to be forgotten; a digital prerogative that guarantees individuals their private lives and freedoms.Table of ContentsPreface ix Introduction xi Chapter 1. Digital Archives: Elements of Definition 1 1.1. Key concepts of digital archives 1 1.1.1. Archives 1 1.1.2. Archive management 2 1.1.3. Archival management tools 4 1.1.4. Digital archives 7 1.2. Electronic Records Management 7 1.2.1. ERM: elements of definition 7 1.2.2. ERM: implementation steps 10 1.3. Records management 18 1.3.1. Structure of standard 15489 19 1.3.2. Content of the standard 20 1.3.3. Design and implementation of an RM project according to the standard 22 1.3.4. MoReq: the added value of RM 25 1.4. EDRMS: merging ERM and RM 26 1.5. ECM: the overall data management strategy 27 1.6. Conclusion 30 Chapter 2. Digital Archiving: Methods and Strategies 31 2.1. Introduction 31 2.2. Digital archiving: elements of definition 31 2.3. Digital archiving: the essential standards 34 2.3.1. NF Z 42-013/ISO 14641 standard 36 2.3.2. NF 461: electronic archiving system 38 2.3.3. OAIS (ISO 14721): Open Archival Information System 39 2.3.4. ISO 19905 (PDF/A) 42 2.3.5. ISO 30300, ISO 30301 and ISO 30302 series of standards 44 2.3.6. ISO 23081 44 2.4. Methodology for setting up a digital archiving process 46 2.4.1. Qualifying and classifying information 46 2.4.2. Classification scheme 47 2.4.3. Retention schedule or retention standard 51 2.4.4. Metadata 52 2.4.5. Archiving processes and procedures 55 2.5. Archiving of audiovisual documents 58 2.5.1. Definition of audiovisual archives 58 2.5.2. Treatment of audiovisual archives 60 2.5.3. Migration of audiovisual documents 62 2.5.4. Digital archiving of audiovisual documents 63 2.6. Email archiving 65 2.6.1. Email archiving and legislation 66 2.6.2. Why archive emails? 67 2.7. Conclusion 69 Chapter 3. Archives in the Age of Digital Humanities 71 3.1. Introduction 71 3.2. History of the digital humanities 72 3.2.1. “Literary and Linguistic Computing”: 1940–1980 72 3.2.2. “Humanities computing”: 1980–1994 74 3.2.3. “Digital humanities”: since 1994 77 3.3. Definitions of the digital humanities 78 3.4. Archives in the age of the digital humanities 80 3.4.1. Digital archive platforms 81 3.4.2. Software managing digital archives 84 3.4.3. Digital humanities at the heart of long-term preservation 89 3.4.4. Digital humanities and the liberation of the humanities: access and accessibility 107 3.5. Conclusion 112 Chapter 4. Digital Archiving and Big Data 113 4.1. Introduction 113 4.2. Definition of Big Data 115 4.3. Big Data issues 119 4.4. Big Data: challenges and areas of application 120 4.5. Data archiving in the age of Big Data 122 4.5.1. Management and archiving of Big Data 122 4.5.2. Big Data technologies and tools 125 4.5.3. Blockchain, the future of digital archiving of Big Data 137 4.6. Conclusion 147 Chapter 5. Preservation of Archives versus the Right to be Forgotten 149 5.1. Introduction 149 5.2. Forgetting 150 5.3. The right to be forgotten 150 5.3.1. Limits to the right to be forgotten 150 5.3.2. European Directive on the protection of personal data 151 5.3.3. General Data Protection Regulation 153 5.3.4. The right to dereferencing: common criteria 156 5.4. Effectiveness of the right to be forgotten 156 5.4.1. Technical challenge of the effectiveness of the right to be forgotten 157 5.4.2. Legal challenge of the effectiveness of the right to be forgotten 160 5.5. The right to digital oblivion: a controversial subject 163 5.6. Public archives versus the right to be forgotten 165 5.6.1. Archives: exemptions from the right to be forgotten 167 5.6.2. Online publication of archives and finding aids containing personal data 168 5.6.3. Private digital archives and the right to be forgotten 171 5.6.4. Web archiving and the right to be forgotten 172 5.7. Google and the right to be forgotten 173 5.8. Conclusion 178 Conclusion 181 List of Acronyms 185 References 193 Index 207

    15 in stock

    £124.15

  • Conflicts, Crimes and Regulations in Cyberspace

    ISTE Ltd and John Wiley & Sons Inc Conflicts, Crimes and Regulations in Cyberspace

    15 in stock

    Book SynopsisThe study of cyberspace is relatively new within the field of social sciences, yet interest in the subject is significant. Conflicts, Crimes and Regulations in Cyberspace contributes to the scientific debate being brought to the fore by addressing international and methodological issues, through the use of case studies.This book presents cyberspace as a socio-technical system on an international level. It focuses on state and non-state actors, as well as the study of strategic concepts and norms. Unlike global studies, the socio-technical approach and “meso” scale facilitate the analysis of cyberspace in international relations. This is an area of both collaboration and conflict for which specific modes of regulation have appeared.Table of ContentsIntroduction Xi Sébastien-Yves Laurent Chapter 1 The United States, States And The False Claims Of The End Of The Global Internet 1 Sébastien-Yves Laurent 1.1 Introduction 1 1.2 The Creation Of The Internet And The Development Of Cyberspace By The United States 2 1.2.1 The First International Telecommunications Systems Developed By All States 3 1.2.2 The Creation And Development Of The Internet By The United States 3 1.2.3 International Management Controlled By The United States 4 1.2.4 A Sociotechnical System Bearing A Composite American Ideology 10 1.2.5 The False Recomposition Of The Global Sociotechnical System: The Global Summits On The Information Society 11 1.3 Cyberspace Transformed By The Arrival In Force Of States 13 1.3.1 State Intentions In “National Strategies”: A Global Approach 14 1.3.2 Russian–American Structural Disagreements On Information Security And Cybersecurity 16 1.3.3 Discussions On Cybersecurity: The Symbolic International Restoration Of The Coercive State 18 1.4 Praxis Of State Coercion In Cyberspace 20 1.4.1 Intelligence And Surveillance Activities In The Digital Environment 21 1.4.2 Non-Military Cyber Operations 24 1.4.3 Interstate Digital Conflicts, Secrecy And Coercive Diplomacy 26 1.5 The Fragmentation Of The Global Internet And The Digital Sovereignty Of States 29 1.5.1 Linguistic Balkanization: Digital Babel 29 1.5.2 Political Fragmentation: Alternative Internets 31 1.6 The Strong Constraint Of Interstate Cooperation For All States 33 1.6.1 Interstate Agreements On An Embryo Of International Law 33 1.6.2 State Dependence On International Cooperation For Cybersecurity 34 1.7 Conclusion 35 1.8 References 36 Chapter 2 Cybersecurity In America: The US National Security Apparatus And Cyber Conflict Management 43 Frédérick Gagnon and Alexis Rapin 2.1 Introduction 43 2.2 Societal And Institutional Dynamics 45 2.3 Organizational And Bureaucratic Dynamics 49 2.4 Individual Dynamics 53 2.5 Conclusion 57 2.6 References 58 Chapter 3 Separation Of Offensive And Defensive Functions: The Originality Of The French Cyberdefense Model Called Into Question? 63 Alix Desforges 3.1 Introduction 63 3.2 A Model Designed And Developed In Response To The Threats And Challenges Of The Early 2010s 66 3.2.1 An Organizational Model Apparently Based On Two Main Actors 66 3.2.2 The Commitment To A Strict Offensive/Defensive Separation 71 3.3 A Strict Separation Of Offensive And Defensive Functions And Missions: An Obstacle To Better Defense? 75 3.3.1 A Rapidly Changing Context: An Increasingly Significant Threat From The Most Advanced States 76 3.3.2 Limits That Have Become Obstacles To Accomplishing Cyberdefense Missions 78 3.3.3 An Institutionalized Rapprochement Of The Actors Of Defensive And Offensive Parts In The Name Of Cyberdefense Missions: From Mitigation To Obliteration? 82 3.4 Conclusion 85 3.5 References 86 Chapter 4 The Boundary Between Cybercrime And Cyberwar: An Uncertain No-Man’s Land 89 Marc Watin-Augouard 4.1 Introduction 89 4.2 The Field Of Cybercrime Up To The Limits Of The Glass Ceiling 91 4.2.1 The Field Of Cybercrime: An Attempt At Delimitation 92 4.2.2 Cybercrime, The “21st Century Crime” 95 4.2.3 Cyber Conflict At The Edge Of The Glass Ceiling 95 4.3 War In Cyberspace, Cyber In War 98 4.3.1 Cyber In War, A Daily Reality 98 4.3.2 Autonomous Warfare In The Cyber World: The Test Of The Law Of Armed Conflict 99 4.3.3 Digital Cyber Persuasion 102 4.4 Conclusion 104 4.5 References 105 Chapter 5 Cyberdefense, The Digital Dimension Of National Security 107 Bertrand Warusfel 5.1 Introduction 107 5.2 Cyberdefense In The Political And Legal Framework Of Digital Security 108 5.2.1 A Definition Of Cyberdefense 108 5.2.2 Linking Cyberdefense To National Security Strategy 109 5.3 The Emergence Of A Coherent Legal Regime For Cyberdefense 111 5.3.1 The Legal Basis Of The Permanent Cyberdefense Posture 111 5.3.2 Exceptional Instruments For Responding To A Crisis 112 5.4 Conclusion 115 5.5 References 116 Chapter 6 Omnipresence Without Omnipotence: The US Campaign Against Huawei In The 5G Era 117 Mark Corcoral 6.1 Introduction 117 6.2 The Unilateral American Offensive Against Huawei: A Disruptive Campaign Causing Significant Collateral Damage 119 6.2.1 Huawei: An “Unusual And Extraordinary” Threat To The United States’ Position In The International Order 120 6.2.2 A Political, Legal And Economic Offensive Against Huawei, Causing Significant Collateral Damage 122 6.3 The American Diplomatic Offensive: The Limits Of American Rhetorical Coercion Of Their Partners And Allies 128 6.3.1 Educating Rather Than Persuading: An Attempt To Rhetorically Coerce Partners And Allies 129 6.3.2 Successful Agenda Setting But Limited Rhetorical Coercion 131 6.3.3 American Rhetorical Coercion In The Special Relationship 134 6.4 The Anti-Huawei Offensive: A Barometer Of American Power? 137 6.5 References 139 Chapter 7 The Issue Of Personal And Sovereign Data In The Light Of An Emerging “International Law Of Intelligence” 147 Fabien Lafouasse 7.1 Introduction 147 7.2 The Legal Rules Invoked In The Collection Of Personal And Sovereign Data 150 7.2.1 Right To Privacy Versus General Communications Surveillance 150 7.2.2 Violation Of Territorial Sovereignty Versus Cyberespionage 153 7.3 Data Localization In The Light Of International Intelligence Law 156 7.3.1 Data Fluidity Versus Data Storage 156 7.3.2 Datasphere Versus International Intelligence Law 159 7.4 Conclusion 163 7.5 Appendix: The Quadrants Of Intelligence Law 164 7.6 Sources And References 165 7.6.1 Sources 165 7.6.2 References 166 Chapter 8 International Cybersecurity Cooperation 169 Guillaume Poupard 8.1 Current Attack Trends 169 8.2 The Multiple Paths Of International Cooperation 171 8.3 The Issue Of Attack Attribution 175 Chapter 9 Cyberdefense And Cybersecurity Regulations In The United States: From The Failure Of The “Comprehensive Policy” To The Success Of The Sectoral Approach 177 Adrien Manniez 9.1 Introduction 177 9.2 The Identification Of A New Threat And The Impact Of Cyber On How US Security And Defense Policies Are Designed 178 9.3 From The Impact Of Cyber On Policy To The Impact Of Politics On Cyber 181 9.4 From A Comprehensive Cyber Policy To A Sectoral Approach: The Success Of An Undeclared Regulatory Policy 190 9.5 Conclusion 195 9.6 References 196 List of Authors 199 Index 201

    15 in stock

    £124.15

  • Cybersecurity in Smart Homes: Architectures,

    ISTE Ltd Cybersecurity in Smart Homes: Architectures,

    15 in stock

    Book SynopsisSmart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A smart home is programmed to act autonomously to improve comfort levels, save energy and potentially ensure safety; the result is a better way of life. Innovative solutions continue to be developed by researchers and engineers and thus smart home technologies are constantly evolving. By the same token, cybercrime is also becoming more prevalent. Indeed, a smart home system is made up of connected devices that cybercriminals can infiltrate to access private information, commit cyber vandalism or infect devices using botnets. This book addresses cyber attacks such as sniffing, port scanning, address spoofing, session hijacking, ransomware and denial of service. It presents, analyzes and discusses the various aspects of cybersecurity as well as solutions proposed by the research community to counter the risks. Cybersecurity in Smart Homes is intended for people who wish to understand the architectures, protocols and different technologies used in smart homes.Table of ContentsChapter 1 Home Automation Solutions for SecureWSN 1 Corinna SCHMITT and Marvin WEBER 1.1 Introduction 2 1.2 Background 4 1.2.1 SecureWSN 4 1.2.2 Communication standards 8 1.2.3 The monitor-analyse-plan-execute-knowledge model 12 1.2.4 Hardware and libraries 14 1.3 Design decisions 15 1.3.1 Requirements 16 1.3.2 HAIFA architecture 18 1.3.3 WebMaDa integration 29 1.4 Implementation 30 1.4.1 CoMaDa integration 30 1.4.2 HAIFA’s ZigBee Gateway 48 1.4.3 WebMaDa integration 55 1.4.4 Uploading HA data to WebMaDa 56 1.4.5 Sending HA messages from WebMaDa to CoMaDa 59 1.4.6 WebMaDa’s frontend 62 1.5 Evaluation of HAIFA 64 1.5.1 Actuator interoperability (R1) 65 1.5.2 Rule-based automation (R2) 65 1.5.3 Node hardware interoperability (R3) 68 1.5.4 CoMaDa and WebMaDa management (R4) 68 1.6 Summary and conclusions 68 1.7 Acknowledgements 69 1.8 References 70 Chapter 2 Smart Home Device Security: A Survey of Smart Home Authentication Methods with a Focus on Mutual Authentication and Key Management Practices 75 Robinson RAJU and Melody MOH 2.1 Introduction 75 2.2 Smart home – introduction and technologies 77 2.2.1 Smart home – introduction 77 2.2.2 Smart home devices – categories 79 2.3 Smart home security 80 2.3.1 Threats 81 2.3.2 Vulnerabilities 82 2.3.3 IoT communication protocols 84 2.3.4 Enhancements to IoT communication protocols 86 2.3.5 IoT security architectures 87 2.4 Smart home authentication mechanisms 91 2.4.1 Stages of defining an authentication protocol for IoT 92 2.4.2 Taxonomy of authentication schemes for IoT 93 2.5 A primer on mutual authentication and key management terminologies 96 2.5.1 X.509 certificate 97 2.5.2 CoAP and DTLS 99 2.5.3 Tls 1.3 101 2.5.4 Key management fundamentals 102 2.6 Mutual authentication in smart home systems 104 2.6.1 Device and user onboarding 105 2.6.2 Flow of user authentication and authorization 106 2.6.3 Examples of mutual authentication schemes 107 2.7 Challenges and open research issues 112 2.8 Conclusion 113 2.9 References 114 Chapter 3 SRAM Physically Unclonable Functions for Smart Home IoT Telehealth Environments 125 Fayez GEBALI and Mohammad MAMUN 3.1 Introduction 126 3.2 Related literature 129 3.3 System design considerations 130 3.4 Silicon physically unclonable functions (PUF) 131 3.4.1 Mutual authentication and key exchange using PUF 132 3.4.2 Fuzzy extractor 133 3.5 Convolutional encoding and Viterbi decoding the SRAM words 133 3.6 CMOS SRAM PUF construction 136 3.6.1 SRAM PUF statistical model 138 3.6.2 Extracting the SRAM cell statistical parameters 141 3.6.3 Obtaining the golden SRAM PUF memory content 142 3.6.4 Bit error rate (BER) 142 3.6.5 Signal-to-noise ratio (SNR) for SRAM PUF 143 3.7 Algorithms for issuing CRP 144 3.7.1 Algorithm #1: single-challenge 144 3.7.2 Algorithm #2: repeated challenge 147 3.7.3 Algorithm #3: repeated challenge with bit selection 148 3.8 Security of PUF-based IoT devices 150 3.9 Conclusions 151 3.10 Acknowledgements 151 3.11 References 151 Chapter 4 IoT Network Security in Smart Homes 155 Manju LATA and Vikas KUMAR 4.1 Introduction 156 4.2 IoT and smart home security 159 4.3 IoT network security 164 4.4 Prevailing standards and initiatives 169 4.5 Conclusion 172 4.6 References 172 Chapter 5 IoT in a New Age of Unified and Zero-Trust Networks and Increased Privacy Protection 177 Sava ZXIVANOVICH, Branislav TODOROVIC, Jean Pierre LORRÉ, Darko TRIFUNOVIC, Adrian KOTELBA, Ramin SADRE and Axel LEGAY 5.1 Introduction 178 5.2 Internet of Things 179 5.3 IoT security and privacy challenges 182 5.3.1 Security challenges 183 5.3.2 Privacy challenges 184 5.4 Literature review 187 5.5 Security and privacy protection with a zero-trust approach 190 5.6 Case study: secure and private interactive intelligent conversational 193 5.6.1 LinTO technical characteristics 194 5.6.2 Use case 195 5.6.3 Use case mapping on the reference architecture 197 5.7 Discussion 197 5.8 Conclusion 198 5.9 Acknowledgements 199 5.10 References 199 Chapter 6 IOT, Deep Learning and Cybersecurity in Smart Homes: A Survey 203 Mirna ATIEH, Omar MOHAMMAD, Ali SABRA and Nehme RMAYTI 6.1 Introduction 203 6.2 Problems encountered 205 6.3 State of the art 207 6.3.1 IoT overview 207 6.3.2 History 208 6.3.3 Literature review 208 6.3.4 Advantages, disadvantages and challenges 209 6.4 IoT architecture 212 6.4.1 Sensing layer 213 6.4.2 Network layer 213 6.4.3 Service layer 213 6.4.4 Application–interface layer 213 6.5 IoT security 214 6.5.1 Security in the sensing layer 214 6.5.2 Security in the network layer 215 6.5.3 Security in the service layer 215 6.5.4 Security in the application–interface layer: 216 6.5.5 Cross-layer threats 216 6.5.6 Security attacks 216 6.5.7 Security requirements in IOT 218 6.5.8 Security solutions for IOT 219 6.6 Artificial intelligence, machine learning and deep learning 221 6.6.1 Artificial intelligence 222 6.6.2 Machine learning 222 6.6.3 Deep learning 224 6.6.4 Deep learning vs machine learning 225 6.7 Smart homes 227 6.7.1 Human activity recognition in smart homes 227 6.7.2 Neural network algorithm for human activity recognition 228 6.7.3 Deep neural networks used in human activity recognition 230 6.8 Anomaly detection in smart homes 233 6.8.1 What are anomalies? 233 6.8.2 Types of anomaly 233 6.8.3 Categories of anomaly detection techniques 233 6.8.4 Related work of anomaly detection in smart homes 234 6.9 Conclusion 237 6.10 References 238 Chapter 7 sTiki: A Mutual Authentication Protocol for Constrained Sensor Devices 245 Corinna SCHMITT, Severin SIFFERT and Burkhard STILLER 7.1 Introduction 246 7.2 Definitions and history of IoT 248 7.3 IoT-related security concerns 251 7.3.1 Security analysis guidelines 253 7.3.2 Security analysis by threat models 255 7.3.3 sTiki’s security expectations 256 7.4 Background knowledge for sTiki 258 7.4.1 Application dependencies for sTiki 258 7.4.2 Inspiring resource-efficient security protocols 260 7.5 The sTiki protocol 264 7.5.1 Design decisions taken 266 7.5.2 Implementation of sTiki’s components 267 7.6 sTiki’s evaluation 270 7.6.1 Secured communication between aggregator and server 271 7.6.2 Secured communication between collector and aggregator 275 7.6.3 Communication costs 276 7.6.4 Integration into an existing system 277 7.6.5 Comparison to existing approaches 278 7.7 Summary and conclusions 279 7.8 Acknowledgements 280 7.9 References 281 List of Authors 287 Index 289

    15 in stock

    £112.50

  • Asymmetric Cryptography: Primitives and Protocols

    ISTE Ltd Asymmetric Cryptography: Primitives and Protocols

    1 in stock

    Book SynopsisPublic key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves. Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange. After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation.Table of ContentsForeword xi David POINTCHEVAL Chapter 1 Public-Key Encryption and Security Notions 1 Nuttapong ATTRAPADUNG and Takahiro MATSUDA 1.1. Basic definitions for PKE 2 1.1.1. Basic notation 2 1.1.2. Public-key encryption 2 1.1.3. IND-CPA and IND-CCA security 2 1.1.4. Other basic security notions and relations 4 1.2. Basic PKE schemes 5 1.2.1. Game-based proofs 5 1.2.2. ElGamal encryption 6 1.2.3. Simplified CS encryption 8 1.2.4. Cramer–Shoup encryption 11 1.2.5. Other specific PKE schemes 14 1.3. Generic constructions for IND-CCA secure PKE 16 1.3.1. Hybrid encryption 17 1.3.2. Naor–Yung construction and extensions 19 1.3.3. Fujisaki–Okamoto and other transforms in the RO model 21 1.3.4. Other generic constructions for IND-CCA secure PKE 23 1.4. Advanced topics 25 1.4.1. Intermediate notions related to CCA 25 1.4.2. IND-CCA security in multi-user setting and tight security 26 1.4.3. Key-dependent message security 28 1.4.4. More topics on PKE 30 1.5. References 31 Chapter 2 Signatures and Security Notions 47 Marc FISCHLIN 2.1. Signature schemes 47 2.1.1. Definition 47 2.1.2. Examples of practical schemes 49 2.2. Unforgeability 51 2.2.1. Discussion 51 2.2.2. Existential unforgeability under chosen-message attacks 53 2.2.3. Unforgeability of practical schemes 54 2.3. Strong unforgeability 56 2.3.1. Discussion 56 2.3.2. Strong existential unforgeability under chosen-message attacks 57 2.3.3. Strong unforgeability of practical schemes 58 2.3.4. Building strongly unforgeable schemes 59 2.4. Summary 60 2.5. References 60 Chapter 3 Zero-Knowledge Proofs 63 Ivan VISCONTI 3.1. Introduction 63 3.2. Notation 64 3.3. Classical zero-knowledge proofs 64 3.3.1. Zero knowledge 65 3.4. How to build a zero-knowledge proof system 68 3.4.1 ZK proofs for all NP 70 3.4.2. Round complexity 71 3.5. Relaxed security in proof systems 72 3.5.1. Honest-verifier ZK 72 3.5.2. Witness hiding/indistinguishability 73 3.5.3. Σ-Protocols 74 3.6. Non-black-box zero knowledge 75 3.7. Advanced notions 75 3.7.1. Publicly verifiable zero knowledge 76 3.7.2. Concurrent ZK and more 77 3.7.3. ZK with stateless players 78 3.7.4. Delayed-input proof systems 79 3.8. Conclusion 80 3.9. References 80 Chapter 4 Secure Multiparty Computation 85 Yehuda LINDELL 4.1. Introduction 85 4.1.1. A note on terminology 87 4.2. Security of MPC 87 4.2.1. The definitional paradigm 87 4.2.2. Additional definitional parameters 89 4.2.3. Adversarial power 89 4.2.4. Modular sequential and concurrent composition 91 4.2.5. Important definitional implications 92 4.2.6. The ideal model and using MPC in practice 92 4.2.7. Any inputs are allowed 92 4.2.8. MPC secures the process, but not the output 92 4.3. Feasibility of MPC 93 4.4. Techniques 94 4.4.1. Shamir secret sharing 94 4.4.2. Honest-majority MPC with secret sharing 95 4.4.3. Private set intersection 97 4.4.4. Threshold cryptography 99 4.4.5. Dishonest-majority MPC 100 4.4.6. Efficient and practical MPC 100 4.5. MPC use cases 101 4.5.1. Boston wage gap (Lapets et al. 2018) 101 4.5.2. Advertising conversion (Ion et al. 2017) 101 4.5.3. MPC for cryptographic key protection (Unbound Security; Sepior; Curv) 101 4.5.4. Government collaboration (Sharemind) 102 4.5.5. Privacy-preserving analytics (Duality) 102 4.6. Discussion 102 4.7. References 103 Chapter 5 Pairing-Based Cryptography 107 Olivier BLAZY 5.1. Introduction 108 5.1.1. Notations 108 5.1.2. Generalities 108 5.2. One small step for man, one giant leap for cryptography 109 5.2.1. Opening Pandora’s box, demystifying the magic 110 5.2.2. A new world of assumptions 112 5.3. A new world of cryptographic protocols at your fingertips 116 5.3.1. Identity-based encryption made easy 117 5.3.2. Efficient deterministic compact signature 118 5.4. References 119 Chapter 6 Broadcast Encryption and Traitor Tracing 121 Duong HIEU PHAN 6.1. Introduction 121 6.2. Security notions for broadcast encryption and TT 123 6.3. Overview of broadcast encryption and TT 125 6.4. Tree-based methods 129 6.5. Code-based TT 132 6.6. Algebraic schemes 135 6.7. Lattice-based approach with post-quantum security 142 6.8. References 143 Chapter 7 Attribute-Based Encryption 151 Romain GAY 7.1. Introduction 151 7.2. Pairing groups 152 7.2.1. Cyclic groups 152 7.2.2. Pairing groups 152 7.3. Predicate encodings 153 7.3.1. Definition 153 7.3.2. Constructions 154 7.4. Attribute-based encryption 156 7.4.1. Definition 156 7.4.2. A modular construction 158 7.5. References 165 Chapter 8 Advanced Signatures 167 Olivier SANDERS 8.1. Introduction 167 8.2. Some constructions 169 8.2.1. The case of scalar messages 169 8.2.2. The case of non-scalar messages 171 8.3. Applications 173 8.3.1. Anonymous credentials 173 8.3.2. Group signatures 176 8.3.3. Direct anonymous attestations 180 8.4. References 184 Chapter 9 Key Exchange 187 Colin BOYD 9.1. Key exchange fundamentals 187 9.1.1. Key exchange parties 188 9.1.2. Key exchange messages 189 9.1.3. Key derivation functions 189 9.2. Unauthenticated key exchange 191 9.2.1. Formal definitions and security models 191 9.2.2. Constructions and examples 192 9.3. Authenticated key exchange 194 9.3.1. Non-interactive key exchange 195 9.3.2. AKE security models 196 9.3.3. Constructions and examples 200 9.4. Conclusion 206 9.5. References 207 Chapter 10 Password Authenticated Key Exchange: Protocols and Security Models 213 Stanislaw JARECKI 10.1. Introduction 213 10.2. First PAKE: EKE 215 10.3. Game-based model of PAKE security 218 10.3.1. The BPR security model 218 10.3.2. Implicit versus explicit authentication 221 10.3.3. Limitations of the BPR model 221 10.3.4. EKE instantiated with Diffie–Hellman KE 223 10.3.5. Implementing ideal cipher on arbitrary groups 224 10.4. Simulation-based model of PAKE security 225 10.4.1. The BMP security model 225 10.4.2. Advantages of BMP definition: arbitrary passwords, tight security 229 10.4.3. EKE using RO-derived one-time pad encryption 230 10.4.4. BMP model for PAKE with explicit authentication (pake-ea) 231 10.5. Universally composable model of PAKE security 232 10.6. PAKE protocols in the standard model 236 10.7. PAKE efficiency optimizations 239 10.8. Asymmetric PAKE: PAKE for the client-server setting 242 10.9. Threshold PAKE 244 10.10. References 246 Chapter 11 Verifiable Computation and Succinct Arguments for NP 257 Dario FIORE 11.1. Introduction 257 11.1.1. Background 258 11.2. Preliminaries 259 11.3. Verifiable computation 260 11.4. Constructing VC 261 11.4.1. VC for circuits in three steps 261 11.4.2. Succinct non-interactive arguments for non-deterministic computation 263 11.4.3. Verifiable computation from SNARG 264 11.5. A modular construction of SNARGs 264 11.5.1. Algebraic non-interactive linear proofs 265 11.5.2. Bilinear groups 267 11.5.3. SNARGs from algebraic NILPs with degree-2 verifiers using bilinear groups 269 11.6. Constructing algebraic NILPs for arithmetic circuits 271 11.6.1. Arithmetic circuits 271 11.6.2. Quadratic arithmetic programs 271 11.6.3. Algebraic NILP for QAPs 274 11.7. Conclusion 279 11.8. References 279 List of Authors 283 Index 285

    1 in stock

    £112.50

  • Cryptography: Breakthroughs in Research and

    Business Science Reference Cryptography: Breakthroughs in Research and

    1 in stock

    Book SynopsisAdvances in technology have provided numerous innovations that make people's daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks also increase. The field of cryptography has become a solution to this ever-increasing problem. Applying strategic algorithms to cryptic issues can help save time and energy in solving the expanding problems within this field.Cryptography: Breakthroughs in Research and Practice examines novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data. Highlighting a range of topics such as cyber security, threat detection, and encryption, this publication is an ideal reference source for academicians, graduate students, engineers, IT specialists, software engineers, security analysts, industry professionals, and researchers interested in expanding their knowledge of current trends and techniques within the cryptology field.

    1 in stock

    £340.85

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account