Data encryption Books

203 products


  • Java Cryptography

    O'Reilly Media Java Cryptography

    Out of stock

    Book SynopsisCryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with. This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java Cryptography Architecture (JCA). Another set of classes, the Java Cryptography Extension (JCE), provides additional cryptographic functionality. This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards. The book is designed for moderately experienced Java programmers who want to learn how to build cryptography into their applications. No prior knowledge of cryptography is assumed. The book is peppered with useful examples, ranging from simple demonstrations in the first chapter to full-blown applications in later chapters. Topics include: * The Java Cryptography Architecture (JCA) * The Java Cryptography Extension (JCE) * Cryptographic providers * The Sun key management tools * Message digests, digital signatures, and certificates (X509v3) * Block and stream ciphers * Implementations of the ElGamal signature and cipher algorithms * A network talk application that encrypts all data sent over the network * An email application that encrypts its messages Covers JDK 1.2 and JCE 1.2.Table of ContentsPreface. 1. Introduction Secure Systems Cryptography Platform Security Astute Inequalities Hello, zoT1wy1njA0=! 2. Concepts Confidentiality Integrity Authentication Random Numbers Algorithms. 3. Architecture Alphabet Soup Concept Classes API and SPI Factory Methods Standard Names The Provider Architecture Key Management Summary. 4. Random Numbers SecureRandom Self-Seeding Keyboard Timing SeederDialog. 5. Key Management Keys Key Generators Key Translators Key Agreement The Identity Key Management Paradigm The KeyStore Key Management Paradigm. 6. Authentication Message Digests MACs Signatures Certificates. 7. Encryption Streams and Blocks Block Ciphers Algorithms javax.crypto.Cipher Cipher's Close Relatives Passphrase Encryption Inside Cipher Hybrid Systems. 8. Signed Applets Renegade HotJava Navigator Internet Explorer Summary. 9. Writing a Provider Getting Started Adding the ElGamal Classes ElGamal Generating Keys Signature Cipher. 10. SafeTalk Using SafeTalk Under the Hood. 11. CipherMail Using CipherMail Under the Hood. 12. Outside the Box Application Design Decompilers and Bytecode Obfuscation Endpoint Security File Security Network Security Summary A. BigInteger B. Base64 C. JAR D. Javakey E. Quick Reference Index

    Out of stock

    £26.99

  • Virtual Private Networks 2e

    O'Reilly Media Virtual Private Networks 2e

    Out of stock

    Book SynopsisHistorically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization? The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines -- connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution. This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and UNIX, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH). New features in the second edition include SSH, which is a popular VPN solution for UNIX systems, and an expanded description of the IPSec standard, for which several vendors have announced support. Topics include: How the VPN compares to other available networking technologies Introduction to encryption, firewalls, the IPSec standard, and other technologies that let VPNs work Point to Point Tunneling Protocol (PPTP) and LT2P The Altavista Tunnel The Cisco PIX Firewall Secure Shell (SSH) Maintenance and troubleshootingTable of ContentsPreface 1. Why Build a Virtual Private Network? What Does a VPN Do? Security Risks of the Internet How VPNs Solve Internet Security Issues VPN Solutions A Note on IP Address and Domain Name Conventions Used in This Book 2. Basic VPN Technologies Firewall Deployment Encryption and Authentication VPN Protocols Methodologies for Compromising VPNs Patents and Legal Ramifications 3. Wide Area, Remote Access, and the VPN General WAN, RAS, and VPN Concepts VPN Versus WAN VPN Versus RAS 4. Implementing Layer 2 Connections Differences Between PPTP, L2F, and L2TP How PPTP Works Features of PPTP 5. Configuring and Testing Layer 2 Connections Installing and Configuring PPTP on a Windows NT RAS Server Configuring PPTP for Dial-up Networking on a Windows NT Client Configuring PPTP for Dial-up Networking on a Windows or 98 Client Enabling PPTP on Remote Access Switches Making the Calls Troubleshooting Problems Using PPTP with Other Security Measures 6. Implementing the AltaVista Tunnel Advantages of the AltaVista Tunnel System AltaVista Tunnel Limitations How the AltaVista Tunnel Works VPNs and AltaVista 7. Configuring and Testing the AltaVista Tunnel Getting Busy Installing the AltaVista Tunnel Configuring the AltaVista Tunnel Extranet and Telecommuter Server Configuring the AltaVista Telecommuter Client Troubleshooting Problems 8. Creating a VPN with the Unix Secure Shell The SSH Software Building and Installing SSH SSH Components Creating a VPN with PPP and SSH Troubleshooting Problems A Performance Evaluation 9. The Cisco PIX Firewall The Cisco PIX Firewall The PIX in Action Configuring the PIX as a Gateway Configuring the Other VPN Capabilities 10. Managing and Maintaining Your VPN Choosing an ISP Solving VPN Problems Delivering Quality of Service Security Suggestions Keeping Yourself Up-to-Date 11. A VPN Scenario The Topology Central Office Large Branch Office Small Branch Offices Remote Access Users A Network Diagram A. Emerging Internet Technologies B. Resources, Online and Otherwise Index

    Out of stock

    £23.99

  • Building Internet Firewalls 2e

    O'Reilly Media Building Internet Firewalls 2e

    Out of stock

    Book SynopsisIn the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes: * Firewall technologies: packet filtering, proxying, network address translation, virtual private networks * Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls * Issues involved in a variety of new Internet services and protocols through a firewall * Email and News * Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo) * File transfer and sharing services such as NFS, Samba * Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000 * Real-time conferencing services such as ICQ and talk * Naming and directory services (e.g., DNS, NetBT, the Windows Browser) * Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); * Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) * Intermediary protocols (e. g., RPC, SMB, CORBA, IIOP) * Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server) The book's complete list of resources includes the location of many publicly available firewall construction tools.Table of ContentsPreface I. Network Security 1. Why Internet Firewalls? What Are You Trying to Protect? What Are You Trying to Protect Against? Who Do You Trust? How Can You Protect Your Site? What Is an Internet Firewall? Religious Arguments 2. Internet Services Secure Services and Safe Services The World Wide Web Electronic Mail and News File Transfer, File Sharing, and Printing Remote Access Real-Time Conferencing Services Naming and Directory Services Authentication and Auditing Services Administrative Services Databases Games 3. Security Strategies Least Privilege Defense in Depth Choke Point Weakest Link Fail-Safe Stance Universal Participation Diversity of Defense Simplicity Security Through Obscurity II. Building Firewalls 4. Packets and Protocols What Does a Packet Look Like? IP Protocols Above IP Protocols Below IP Application Layer Protocols IP Version 6 Non-IP Protocols Attacks Based on Low-Level Protocol Details 5. Firewall Technologies Some Firewall Definitions Packet Filtering Proxy Services Network Address Translation Virtual Private Networks 6. Firewall Architectures Single-Box Architectures Screened Host Architectures Screened Subnet Architectures Architectures with Multiple Screened Subnets Variations on Firewall Architectures Terminal Servers and Modem Pools Internal Firewalls 7. Firewall Design Define Your Needs Evaluate the Available Products Put Everything Together 8. Packet Filtering What Can You Do with Packet Filtering? Configuring a Packet Filtering Router What Does the Router Do with Packets? Packet Filtering Tips and Tricks Conventions for Packet Filtering Rules Filtering by Address Filtering by Service Choosing a Packet Filtering Router Packet Filtering Implementations for General-Purpose Computers Where to Do Packet Filtering What Rules Should You Use? Putting It All Together 9. Proxy Systems Why Proxying? How Proxying Works Proxy Server Terminology Proxying Without a Proxy Server Using SOCKS for Proxying Using the TIS Internet Firewall Toolkit for Proxying Using Microsoft Proxy Server What If You Can't Proxy? 10. Bastion Hosts General Principles Special Kinds of Bastion Hosts Choosing a Machine Choosing a Physical Location Locating Bastion Hosts on the Network Selecting Services Provided by a Bastion Host Disabling User Accounts on Bastion Hosts Building a Bastion Host Securing the Machine Disabling Nonrequired Services Operating the Bastion Host Protecting the Machine and Backups 11. Unix and Linux Bastion Hosts Which Version of Unix? Securing Unix Disabling Nonrequired Services Installing and Modifying Services Reconfiguring for Production Running a Security Audit 12. Windows NT and Windows 2000 Bastion Hosts Approaches to Building Windows NT Bastion Hosts Which Version of Windows NT? Securing Windows NT Disabling Nonrequired Services Installing and Modifying Services III. Internet Services 13. Internet Services and Firewalls Attacks Against Internet Services Evaluating the Risks of a Service Analyzing Other Protocols What Makes a Good Firewalled Service? Choosing Security-Critical Programs Controlling Unsafe Configurations 14. Intermediary Protocols Remote Procedure Call (RPC) Distributed Component Object Model (DCOM) NetBIOS over TCP/IP (NetBT) Common Internet File System (CIFS) and Server Message Block (SMB) Common Object Request Broker Architecture (CORBA) and Internet Inter-Orb Protocol (IIOP) ToolTalk Transport Layer Security (TLS) and Secure Socket Layer (SSL) The Generic Security Services API (GSSAPI) IPsec Remote Access Service (RAS) Point-to-Point Tunneling Protocol (PPTP) Layer 2 Transport Protocol (L2TP) 15. The World Wide Web HTTP Server Security HTTP Client Security HTTP Mobile Code and Web-Related Languages Cache Communication Protocols Push Technologies RealAudio and RealVideo Gopher and WAIS 16. Electronic Mail and News Electronic Mail Simple Mail Transfer Protocol (SMTP) Other Mail Transfer Protocols Microsoft Exchange Lotus Notes and Domino Post Office Protocol (POP) Internet Message Access Protocol (IMAP) Microsoft Messaging API (MAPI) Network News Transfer Protocol (NNTP) 17. File Transfer, File Sharing, and Printing File Transfer Protocol (FTP) Trivial File Transfer Protocol (TFTP) Network File System (NFS) File Sharing for Microsoft Networks Summary of Recommendations for File Sharing Printing Protocols Related Protocols 18. Remote Access to Hosts Terminal Access (Telnet) Remote Command Execution Remote Graphical Interfaces 19. Real-Time Conferencing Services Internet Relay Chat (IRC) ICQ talk Multimedia Protocols NetMeeting Multicast and the Multicast Backbone (MBONE) 20. Naming and Directory Services Domain Name System (DNS) Network Information Service (NIS) NetBIOS for TCP/IP Name Service and Windows Internet Name Service The Windows Browser Lightweight Directory Access Protocol (LDAP) Active Directory Information Lookup Services 21. Authentication and Auditing Services What Is Authentication? Passwords Authentication Mechanisms Modular Authentication for Unix Kerberos NTLM Domains Remote Authentication Dial-in User Service (RADIUS) TACACS and Friends Auth and identd 22. Administrative Services System Management Protocols Routing Protocols Protocols for Booting and Boot-Time Configuration ICMP and Network Diagnostics Network Time Protocol (NTP) File Synchronization Mostly Harmless Protocols 23. Databases and Games Databases Games 24. Two Sample Firewalls Screened Subnet Architecture Merged Routers and Bastion Host Using General-Purpose Hardware IV. Keeping Your Site Secure 25. Security Policies Your Security Policy Putting Together a Security Policy Getting Strategic and Policy Decisions Made What If You Can't Get a Security Policy? 26. Maintaining Firewalls Housekeeping Monitoring Your System Keeping up to Date How Long Does It Take? When Should You Start Over? 27. Responding to Security Incidents Responding to an Incident What to Do After an Incident Pursuing and Capturing the Intruder Planning Your Response Being Prepared V. Appendixes A. Resources B. Tools C. Cryptography Index

    Out of stock

    £47.99

  • Computer Security: A Bibliography with Indexes

    Nova Science Publishers Inc Computer Security: A Bibliography with Indexes

    Out of stock

    Book Synopsis

    Out of stock

    £55.99

  • Cyber Warfare and Cyber Terrorism

    IGI Global Cyber Warfare and Cyber Terrorism

    1 in stock

    Book SynopsisCyber Warfare and Cyber Terrorism provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems.

    1 in stock

    £123.00

  • Serious Cryptography: A Practical Introduction to

    No Starch Press,US Serious Cryptography: A Practical Introduction to

    2 in stock

    Book SynopsisSerious Cryptography is the much anticipated review of modern cryptography by cryptographer JP Aumasson. This is a book for readers who want to understand how cryptography works in today's world. The book is suitable for a wide audience, yet is filled with mathematical concepts and meaty discussions of how the various cryptographic mechanisms work. Chapters cover the notion of secure encryption, randomness, block ciphers and ciphers, hash functions and message authentication codes, public-key crypto including RSA, Diffie-Hellman, and elliptic curves, as well as TLS and post-quantum cryptography. Numerous code examples and real use cases throughout will help practitioners to understand the core concepts behind modern cryptography, as well as how to choose the best algorithm or protocol and ask the right questions of vendors. Aumasson discusses core concepts like computational security and forward secrecy, as well as strengths and limitations of cryptographic functionalities related toTrade Review“A superb introduction to modern encryption and cryptography. For those looking to quickly get up to speed on the topics, this makes for an excellent go-to guide.”—Ben Rothke, RSA Conference“It's really a love letter to cryptography.”—Nadim Kobeissi“For those who really want to understand how cryptography works, and who need to use it in practice, I thoroughly recommend Serious Cryptography.”—Martijn Grooten, Virus Bulletin“Impressive in its breadth...the state of the art in applied cryptography is distilled here in a mere 282 pages.”—Federico Lucifredi, The Hub“Aumasson successfully ensures that the reader has a strong understanding of cryptography’s core ideas... Serious Cryptography is a must read for anyone wanting to enter cryptographic engineering.”—Infosecurity Magazine“Each chapter not only explains concepts and key implementation details, but also highlights possible pitfalls, common mistakes, and finishes with a list of recommended materials.”—Artificial Truth"Jean-Philippe Aumasson's Serious Cryptography is a classic (and serious) introduction to the field."—Mary Branscombe, ZDNet"It's advanced but the best book I've ever read for PKI is Serious Cryptography by Aumasson. Probably don't want to start with it but if you get serious you'll want to read it."—Chris Sandvick, @ChrisSandvick"My favorite reference."—Colin O'Flynn, Circuit Cellar"For those wanting to go beyond the basics of cryptography in the blockchain, 'Serious Cryptography' by Jean-Philippe Aumasson is an invaluable resource."—Halborn SecurityTable of ContentsForeword by Matthew D. GreenPrefaceAbbreviationsChapter 1: EncryptionChapter 2: RandomnessChapter 3: Cryptographic SecurityChapter 4: Block CiphersChapter 5: Stream CiphersChapter 6: Hash FunctionsChapter 7: Keyed HashingChapter 8: Authenticated EncryptionChapter 9: Hard ProblemsChapter 10: RSAChapter 11: Diffie–HellmanChapter 12: Elliptic CurvesChapter 13: TLSChapter 14: Quantum and Post-QuantumIndex

    2 in stock

    £35.99

  • Spyware

    Nova Science Publishers Inc Spyware

    1 in stock

    Book SynopsisThe term ''spyware'' is not well defined. Generally it is used to refer to any software that is downloaded onto a person''s computer without their knowledge. Spyware may collect information about a computer user''s activities and transmit that information to someone else. It may change computer settings, or cause ''pop-up'' advertisements to appear (in that context, it is called ''adware''). Spyware may redirect a Web browser to a site different from what the user intended to visit, or change the user''s home page. A type of spyware called ''keylogging'' software records individual keystrokes, even if the author modifies or deletes what was written, or if the characters do not appear on the monitor. Thus, passwords, credit card numbers, and other personally identifiable information may be captured and relayed to unauthorised recipients. Some of these software programs have legitimate applications the computer user wants. They obtain the moniker ''spyware'' when they are installed surreptitiously, or perform additional functions of which the user is unaware. Users typically do not realise that spyware is on their computer. They may have unknowingly downloaded it from the Internet by clicking within a website, or it might have been included in an attachment to an electronic mail message (e-mail) or embedded in other software. According to a survey and tests conducted by America Online and the National Cyber Security Alliance, 80% of computers in the test group were infected by spyware or adware, and 89% of the users of those computers were unaware of it. The Federal Trade Commission (FTC) issued a consumer alert on spyware in October 2004. It provided a list of warning signs that might indicate that a computer is infected with spyware, and advice on what to do if it is. This new book helps shed light on this insidious nightmare created by members of the human race to wreck havoc on the remainder.

    1 in stock

    £52.49

  • Cybersecurity & Homeland Security

    Nova Science Publishers Inc Cybersecurity & Homeland Security

    Out of stock

    Book Synopsis

    Out of stock

    £52.49

  • Cryptography for Developers

    Syngress Media,U.S. Cryptography for Developers

    15 in stock

    Book SynopsisThe only guide for software developers who must learn and implement cryptography safely and cost effectively. Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand.Table of ContentsIntroduction; ASN.1 Encodings; Random Numbers; Large Integer Arithmetic; Symmetric Key Ciphers; One-Way Hashes; Message Authentication Codes; Encrypted Authentication Modes; Public-Key Cryptography

    15 in stock

    £53.76

  • Long-Term & Dynamical Aspects of Information

    Nova Science Publishers Inc Long-Term & Dynamical Aspects of Information

    Out of stock

    Book SynopsisThe first six papers deal with computer security technology that operates in rapidly changing environments and has to adapt to their shifting conditions. The technology or application envisaged in the second six operates or assumes a static outcome that can, for instance, be used forensically. The second half of the book contains a proposal to quantify the time scales on which IT security lives may be a major contribution of this volume. The authors identify three main axes. First, the time scale of practical relevance. It denominates approximately the middle of the time range during which the problem treated by the technology becomes imminent to the IS&T community, through the demands of the market. Second, the technological research and development (R&D) time scale. It is a forecast of when the technological solution will be "there". This means in effect the first of two milestones in technology evolution: a) when a technology has made the breakthrough to be in principle, ie: theoretically and economically applicable and viable, and b) when it is matured to reach prevalence in IS&T, ie: to become textbook standard. The second point in time hinges obviously on external factors not amenable to analysis within the discipline proper. Third, we have the event horizon of the technology in question. That deals with the issue of the sustainability of the solution: May it be surpassed by the skills of attackers using advances in other areas? Can it be foreseen that it will be overcome by even better solutions?

    Out of stock

    £129.74

  • Data Security: Laws & Safeguards

    Nova Science Publishers Inc Data Security: Laws & Safeguards

    Out of stock

    Book SynopsisData security breaches are being reported with increasing regularity. Within the past few years, numerous examples of data such as Social Security, bank account, credit card, and driver''s license numbers, as well as medical and student records and many other kinds of data have been compromised. This book presents current issues and laws related to this very important topic.

    Out of stock

    £38.24

  • Data Security Breaches: Context & Incident

    Nova Science Publishers Inc Data Security Breaches: Context & Incident

    Out of stock

    Book SynopsisPersonal data security breaches are being reported with increasing regularity. Within the past few years, numerous examples of data such as Social Security, bank account, credit card, and driver''s license numbers, as well as medical and student records have been compromised. A major reason for the increased awareness of these security breaches is a California law that requires notice of security breaches to the affected individuals. This law, implemented in July 2003, was the first of its kind in the nation. State data security breach notification laws require companies and other entities that have lost data to notify affected consumers. As of January 2007, 35 states have enacted legislation requiring companies or state agencies to disclose security breaches involving personal information. Congress is considering legislation to address personal data security breaches, following a series of high-profile data security breaches at major financial services firms, data brokers (including ChoicePoint and LexisNexis), and universities. In the past three years, multiple measures have been introduced, but to date, none have been enacted.

    Out of stock

    £38.24

  • Cybersecurity, Botnets, & Cyberterrorism

    Nova Science Publishers Inc Cybersecurity, Botnets, & Cyberterrorism

    Out of stock

    Book SynopsisCybercrime is becoming more organised and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent terrorist groups. The increased use of automated attack tools by cybercriminals has overwhelmed some current methodologies used for tracking Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are acknowledged openly in publications, could possibly attract cyberattacks to extort money, or damage the U.S. economy to affect national security. In April and May 2007, NATO and the United States sent computer security experts to Estonia to help that nation recover from cyberattacks directed against government computer systems, and to analyze the methods used and determine the source of the attacks.1 Some security experts suspect that political protestors may have rented the services of cybercriminals, possibly a large network of infected PCs, called a "botnet," to help disrupt the computer systems of the Estonian government. DOD officials have also indicated that similar cyberattacks from individuals and countries targeting economic, political, and military organisations may increase in the future. Cybercriminals have reportedly made alliances with drug traffickers in Afghanistan, the Middle East, and elsewhere where profitable illegal activities are used to support terrorist groups. In addition, designs for cybercrime botnets are becoming more sophisticated, and future botnet architectures may be more resistant to computer security countermeasures. This book discusses options now open to nation states, extremists, or terrorist groups for obtaining malicious technical services from cybercriminals to meet political or military objectives, and describes the possible effects of a co-ordinated cyberattack against the U.S. critical infrastructure.

    Out of stock

    £39.74

  • Street Coder

    Manning Publications Street Coder

    5 in stock

    Book SynopsisSoftware development isn't an "ivory tower" exercise.Street coders get the job done by prioritizing tasks, making quick decisions, and knowing which rules to break. Street Coder: Rules to break and how to break themis a programmer's survival guide, full of tips, tricks, and hacks that will make you a more efficient programmer. This book's rebel mindset challenges status quo thinking and exposes the important skills you need on the job. You'll learnthe crucial importance of algorithms and data structures, turn programming chores into programming pleasures, and shatter dogmatic principles keeping you from your full potential. Every new coder starts out with a lot of theory; the "streetsmarts" come with experience. To be successful, you need to know how toput theory into action, understand why "best practices" are the best, and know when to go rogue and break the unbreakable rules.Trade Review“An incredible book to learn the craft of software development through a new perspective: One thatis not fuelled by religion or blind following of best practices, but one that actively challenges best practices and thus requires you to think about their prosand cons.!” Sebastian Felling “This is like having a mentor in a book who is sharing all their mistakes and notes on what they've learned in a nice little package.“ Joseph Perenia “A fun, broad, anddeep conversation with an experienced programmer about coding, packed withpractical advice.” Adail Retamal “I wish I couldread this book several years ago, thus, I could have saved a lot of time.” XuYang “Contains the pragmatism an experienced software developer has gained over the years of being at the trenches (or streets as he prefers to call it).” Orlando MéndezMorales “Great book for thenew and used, self-taught, formally educated, and otherwise curious programmers doing dirt -aka street coders.” Robert Wilk

    5 in stock

    £37.99

  • Candidate Multilinear Maps

    Morgan & Claypool Publishers Candidate Multilinear Maps

    15 in stock

    Book SynopsisThe aim of cryptography is to design primitives and protocols that withstand adversarial behavior. Information theoretic cryptography, how-so-ever desirable, is extremely restrictive and most non-trivial cryptographic tasks are known to be information theoretically impossible. In order to realize sophisticated cryptographic primitives, we forgo information theoretic security and assume limitations on what can be efficiently computed. In other words we attempt to build secure systems conditioned on some computational intractability assumption such as factoring, discrete log, decisional Diffie-Hellman, learning with errors, and many more.In this work, based on the 2013 ACM Doctoral Dissertation Award-winning thesis, we put forth new plausible lattice-based constructions with properties that approximate the sought after multilinear maps. The multilinear analog of the decision Diffie-Hellman problem appears to be hard in our construction, and this allows for their use in cryptography. These constructions open doors to providing solutions to a number of important open problems.Table of Contents Introduction Survey of Applications Multilinear Maps and Graded Encoding Systems Preliminaries I: Lattices Preliminaries II: Algebraic Number Theory Background The New Encoding Schemes Security of Our Constructions Preliminaries III: Computation in a Number Field Survey of Lattice Cryptanalysis One-Round Key Exchange Generalizing Graded Encoding Systems Bibliography Author's Biography

    15 in stock

    £42.46

  • Candidate Multilinear Maps

    Morgan & Claypool Publishers Candidate Multilinear Maps

    15 in stock

    Book SynopsisThe aim of cryptography is to design primitives and protocols that withstand adversarial behavior. Information theoretic cryptography, how-so-ever desirable, is extremely restrictive and most non-trivial cryptographic tasks are known to be information theoretically impossible. In order to realize sophisticated cryptographic primitives, we forgo information theoretic security and assume limitations on what can be efficiently computed. In other words we attempt to build secure systems conditioned on some computational intractability assumption such as factoring, discrete log, decisional Diffie-Hellman, learning with errors, and many more.In this work, based on the 2013 ACM Doctoral Dissertation Award-winning thesis, we put forth new plausible lattice-based constructions with properties that approximate the sought after multilinear maps. The multilinear analog of the decision Diffie-Hellman problem appears to be hard in our construction, and this allows for their use in cryptography. These constructions open doors to providing solutions to a number of important open problems.Table of Contents Introduction Survey of Applications Multilinear Maps and Graded Encoding Systems Preliminaries I: Lattices Preliminaries II: Algebraic Number Theory Background The New Encoding Schemes Security of Our Constructions Preliminaries III: Computation in a Number Field Survey of Lattice Cryptanalysis One-Round Key Exchange Generalizing Graded Encoding Systems Bibliography Author's Biography

    15 in stock

    £60.00

  • Practical Cryptography

    Murphy & Moore Publishing Practical Cryptography

    Out of stock

    Book Synopsis

    Out of stock

    £108.11

  • Understanding Cryptography

    Larsen and Keller Education Understanding Cryptography

    Out of stock

    Book Synopsis

    Out of stock

    £105.34

  • Goodheart-Wilcox Publisher Security Essentials

    Out of stock

    Book Synopsis

    Out of stock

    £147.60

  • Introduction to Cryptography

    Willford Press Introduction to Cryptography

    Out of stock

    Book Synopsis

    Out of stock

    £100.49

  • Software Design X-Rays: Fix Technical Debt with

    Pragmatic Bookshelf Software Design X-Rays: Fix Technical Debt with

    2 in stock

    Book SynopsisAre you working on a codebase where cost overruns, death marches, and heroic fights with legacy code monsters are the norm? Battle these adversaries with novel ways to identify and prioritize technical debt, based on behavioral data from how developers work with code. And that's just for starters. Because good code involves social design, as well as technical design, you can find surprising dependencies between people and code to resolve coordination bottlenecks among teams. Best of all, the techniques build on behavioral data that you already have: your version-control system. Join the fight for better code! Use statistics and data science to uncover both problematic code and the behavioral patterns of the developers who build your software. This combination gives you insights you can't get from the code alone. Use these insights to prioritize refactoring needs, measure their effect, find implicit dependencies between different modules, and automatically create knowledge maps of your system based on actual code contributions. In a radical, much-needed change from common practice, guide organizational decisions with objective data by measuring how well your development teams align with the software architecture. Discover a comprehensive set of practical analysis techniques based on version-control data, where each point is illustrated with a case study from a real-world codebase. Because the techniques are language neutral, you can apply them to your own code no matter what programming language you use. Guide organizational decisions with objective data by measuring how well your development teams align with the software architecture. Apply research findings from social psychology to software development, ensuring you get the tools you need to coach your organization towards better code. If you're an experienced programmer, software architect, or technical manager, you'll get a new perspective that will change how you work with code. What You Need: You don't have to install anything to follow along in the book. TThe case studies in the book use well-known open source projects hosted on GitHub. You'll use CodeScene, a free software analysis tool for open source projects, for the case studies. We also discuss alternative tooling options where they exist.

    2 in stock

    £35.14

  • Python Tools For Scientists: An Introduction to

    No Starch Press,US Python Tools For Scientists: An Introduction to

    1 in stock

    Book SynopsisDoing Science With Python introduces readers to the most popular coding tools for scientific research, such as Anaconda, Spyder, Jupyter Notebooks, and JupyterLab, as well as dozens of important Python libraries for working with data, including NumPy, matplotlib, and pandas. No prior programming experience is required! You'll be guided through setting up a professional coding environment, then get a crash course on programming with Python, and explore the many tools and libraries ideal for working with data, designing visualisations, simulating natural events, and more.Trade Review"Python Tools for Scientists helps people get up and running in Python so that they can start solving their problems right away instead of being daunted by the dizzying array of tools available in the ecosystem. I wish something like this had been available when I first picked up Python as a scientist!" —James Bednar, Director of Custom Services, Anaconda, Inc.“Python has a wealth of scientific computing tools, so how do you decide which ones are right for you? This book cuts through the noise to help you deliver results." —Serdar Yegulalp, InfoWorld"The book [Python Tools for Scientists] by Lee Vaughan is a critical resource for anyone that is new to Python programming and intends to become a Python expert. It covers all of the critical topics in an easily understandable format and it goes deep enough to be helpful in navigating advanced topics. The book is also true to current Software Engineering standards and gives even new developers the tools to jump start their Python career."—Dr. Alec Yasinsac, Department of Computer Science, University of South Alabama"I wish there was a book like this when I started learning Python... [Python Tools for Scientists] is a practical, detailed, hands-on introduction to setting up a local Python workspace and getting started with the basics of Python programming. It was written for scientists, by a scientist who knows what the typical problems are when scientists and engineers start using Python tools in their everyday work. It also introduces the wide variety of packages that can be used in scientific programming and provides guidelines on when to use them. Matplotlib, numpy, and pandas are covered in much more detail - as they should be. The writing and the organization of the material are clear and easy to follow. I have been using Python for many years, but I know I will be using this book both in teaching and research."—Zoltán Sylvester, Senior Research Scientist, University of Texas at AustinTable of ContentsIntroductionPart 1: Setting up for ScienceChapter 1: Installing Anaconda and Launching NavigatorChapter 2: Keeping Organized with Conda EnvironmentsChapter 3: Simple Scripting in Jupyter Qt ConsoleChapter 4: Serious Scripting with SpyderChapter 5: Jupyter Notebook: An Interactive Journal for Computational ResearchChapter 6: JupyterLab: Your Center for SciencePart 2: Python PrimerChapter 7: Integers, Floats, and StringsChapter 8: VariablesChapter 9: The Container Data TypesChapter 10: Flow ControlChapter 11: Functions and ModulesChapter 12: Files and FoldersChapter 13: Object Oriented ProgrammingChapter 14: Documenting your WorkPart 3: The Scientific and Visualization LibrariesChapter 15: The Scientific LibrariesChapter 16: The InfoVis and SciVis Visualization LibrariesChapter 17: The GeoVis LibrariesPart 4: The Essential LibrariesChapter 18: Numpy: Numerical PythonChapter 19: Demystifying MatplotlibChapter 20: Pandas, Seaborn, and Scikit-learnChapter 21: Managing Dates and Times with Python and PandasAppendix A: Answers to the "Test your Knowledge" Challenges

    1 in stock

    £38.39

  • Codebreaking: A Practical Guide

    No Starch Press,US Codebreaking: A Practical Guide

    10 in stock

    Book SynopsisIf you liked Dan Brown’s Da Vinci Code—or want to solve similarly baffling cyphers yourself—this is the book for you! A thrilling exploration of history’s most vexing codes and ciphers that uses hands-on exercises to teach you the most popular historical encryption schemes and techniques for breaking them.Solve history’s most hidden secrets alongside expert codebreakers Elonka Dunin and Klaus Schmeh, as they guide you through the world of encrypted texts. With a focus on cracking real-world document encryptions—including some crime-based coded mysteries that remain unsolved—you’ll be introduced to the free computer software that professional cryptographers use, helping you build your skills with state-of-the art tools. You’ll also be inspired by thrilling success stories, like how the first three parts of Kryptos were broken. Each chapter introduces you to a specific cryptanalysis technique, and presents factual examples of text encrypted using that scheme—from modern postcards to 19-century newspaper ads, war-time telegrams, notes smuggled into prisons, and even entire books written in code. Along the way, you’ll work on NSA-developed challenges, detect and break a Caesar cipher, crack an encrypted journal from the movie The Prestige, and much more.You’ll learn: How to crack simple substitution, polyalphabetic, and transposition ciphers How to use free online cryptanalysis software, like CrypTool 2, to aid your analysis How to identify clues and patterns to figure out what encryption scheme is being used How to encrypt your own emails and secret messages Codebreaking is the most up-to-date resource on cryptanalysis published since World War II—essential for modern forensic codebreakers, and designed to help amateurs unlock some of history’s greatest mysteries.Trade Review“Codebreaking: A Practical Guide is quite the best book on codebreaking I have read: clear, engaging, and fun. A must for would-be recruits to GCHQ and the NSA!”—Sir Dermot Turing, author of Prof, the biography of his uncle, Alan Turing“Riveting. Dunin and Schmeh show us that we each have our own inner code-breaker yearning to be set free. Codebreaking isn’t just for super-geniuses with supercomputers; it’s something we were all born to do.”—Mike Godwin, creator of Godwin’s law and former general counsel for the Wikimedia Foundation“This is THE book about codebreaking. Very concise, very inclusive, and easy to read. Good references for those who would make codes, too, like Kryptos.”—Ed Scheidt, CIA“A compendium of historical cryptography. Approachable, accessible, this book brings back the joy I felt when I first read about these things as a kid.”—Phil Zimmermann, creator of PGP encryption and inductee into the Internet Hall of Fame“One of the most helpful guides outside the NSA to cracking ciphers. But even if you don’t become a codebreaker, this book is full of fascinating crypto lore.”—Steven Levy, New York Times best-selling author of Crypto, Hackers, and Facebook: The Inside Story“Another kind of Applied Cryptography.”—Whitfield Diffie, Turing Laureate and creator of public-key cryptography“This is the book of my dreams. Super-clear, super-fun guide for solving secret messages of all kinds.”—Jason Fagone, author of the best-selling book The Woman Who Smashed Codes“Kool dnoces a htrow era snootrac eht fo ynam.”—Suomynona Ecila“A wonderful mix of ciphers, both famous and little-known, solved and unsolved. Beginners will be hooked on exploring the world of secrets in cipher, and those who have already been introduced to the field will find much that is new.”—Craig Bauer, editor in chief of Cryptologia and author of Unsolved!: The History and Mystery of the World’s Greatest Ciphers“Cryptography? Ciphers? I thought this would be an easy book to put down. I was very wrong.”—Steve Meretzky, co-author with Douglas Adams of The Hitchhiker’s Guide to the Galaxy computer game"Fun, fascinating, and user friendly . . . Expertly written, organized and presented, [Codebreaking] is unreservedly recommended as a supplemental Code Breaking curriculum textbook."—Midwest Book ReviewTable of ContentsPrefaceChapter 1: How can I break an encrypted message? And other introductory questionsChapter 2: The Caesar cipherChapter 3: Simple substitution ciphersChapter 4: Simple substitution ciphers without spaces between words: PatristocratsChapter 5: Simple substitution ciphers in non-English languagesChapter 6: Homophonic ciphersChapter 7: Codes and nomenclatorsChapter 8: Polyalphabetic ciphersChapter 9: Complete columnar transposition ciphersChapter 10: Incomplete columnar transposition ciphersChapter 11: Turning grille transposition ciphersChapter 12: Digraph substitutionChapter 13: Abbreviation ciphersChapter 14: Dictionary codes and book ciphersChapter 15: Additional encryption methodsChapter 16: Solving ciphers with hill climbingChapter 17: What next?Appendix A: KryptosAppendix B: Useful language statisticsAppendix C: GlossaryAppendix D: Morse CodeAppendix E: Figure SourcesReferences

    10 in stock

    £23.99

  • Computer & Internet Security: A Hands-on Approach

    1 in stock

    £56.99

  • Cyber Security: The complete guide to cyber

    BCS Learning & Development Limited Cyber Security: The complete guide to cyber

    1 in stock

    Book SynopsisCyber security has never been more essential than it is today, it’s not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure. Cyber Security explains the fundamentals of information security, how to shape good organisational security practice, and how to recover effectively should the worst happen. Written in an accessible manner, Cyber Security provides practical guidance and actionable steps to better prepare your workplace and your home alike. This second edition has been updated to reflect the latest threats and vulnerabilities in the IT security landscape, and updates to standards, good practice guides and legislation. • A valuable guide to both current professionals at all levels and those wishing to embark on a cyber security profession • Offers practical guidance and actionable steps for individuals and businesses to protect themselves • Highly accessible and terminology is clearly explained and supported with current, real-world examplesTrade ReviewDavid Sutton's books provides well researched, comprehensive guide to the multifaceted, rapidly growing cyber domain. It serves as a valuable guide to both current professionals and those wishing to embark on a Cyber Security profession. An excellent read. -- Colonel John S Doody FBCS FCMI CITP ACISP MIOD, Director, Interlocutor Services LimitedA very comprehensive primer on cyber security covering issues, solutions and suggestions for further action. After reading this book anyone that worries about cyber security without necessarily wanting to become an expert will find themself much better informed and quite probably much more interested. -- Susan Perriam MBA MSc CMgr MBCS CISSP, Cyber Security ConsultantThis book manages to strike a perfect balance between technical breadth and depth. It includes enough detail to understand the broad range of concepts and techniques found in a complex industry, along with practical and real-life examples. This latest revision is packed with recent examples, scenarios, tools, and techniques that make it a fascinating read for both industry veterans and recent joiners alike. Highly recommended. -- Martin King FBCS CITP CISSP, Chief Technology Officer, IT TransformedThis book describes the eco system of cyber security and provides excellent go-to guides and considerations for people/teams dealing with both technical and non-technical security. Awareness and training are at the very heart of the book, successfully paralleled by descriptions of how our day-to-day information sharing and protection should take place safely. A useful and insightful read and highly recommended. -- Lesley-Anne Turner, Cyber Compliance, CDDO, Cabinet OfficeThe style and structure makes it an ideal book for students as it covers all the important topics, from the fundamentals of information security such as the CIA model, through to organisational issues (policies and disaster recovery), legal requirements and security standards. Terminology is clearly explained and supported with current, real-world examples. It is a most valuable resource. -- Richard Hind MSc MBCS FHEA, Tutor of Digital Technologies, York CollegeThis book gives a good insight into cyber security, with modern day examples and practical guidance on how to proactively mitigate against risks. This will definitely be a book I refer to frequently. -- Bianca Christian, Business Analyst, Young Business Analysts (YBA)On first reading this book, the biggest impression that greets the reader is that it’s NOT a technical reference book and is widely focused on the wider impact of cyber security on society as a whole. It is not just for technologists and treats a complex subject with just the right level of both technical and socioeconomic balance. Highly recommended. -- Adrian Winckles MBCS CITP CEng, Chair of BCS Cybercrime Forensics SG and OWASP Education CommitteeCyber Security 2e is a rich technical guide on cyber threats. Leaving no stone unturned, the first half touches on key examples and paints a clear picture of the current threat landscape that both individuals and organisations face, and the second half contains solutions. Sutton aptly spotlights a number of actions that anyone could be encouraged to practice for good personal and corporate security. -- Ester Masoapatali MBCS, Information Security Specialist, Partnerships Manager, CybSafeThis book is a fantastic resource for those breaking into the industry, or for non-security leaders who want to know more about the risks faced by their business. Written in an accessible manner, this second edition gives readers updated information and current examples showing the changing trends and tactics of attackers. -- Jim Wright, Managing Director, Principle DefenceThis book is for anyone who wants to understand and learn more about cybersecurity. It provides a foundation of cybersecurity knowledge as well as essential practical skills and techniques for entry and junior-level cybersecurity roles. It is also designed to help learners in building a promising and rewarding career pathway in the cybersecurity field. -- Dr Sherif El-Gendy FBCS, Information Security ExpertThis highly accessible second edition provides a thorough update to the world of cyber security in a non-technical manner; firstly clarifying cyber security issues and then focusing on cyber security solutions. If you are looking for a go-to reference that explains cyber security in plain language, this book is for you. -- Tim Clements FBCS CITP FIP CIPP/E CIPM CIPT, Purpose and MeansThis book demystifies what can, to many, be a rather bewildering topic, and it sets clear context and eloquently describes the landscape of threats and issues, and provides clear, actionable advice across key topics. A handy and well-written reference guide, and highly recommended reading! -- Paul Watts MBCS CITP FCIIS CISSP CISM, former CISO and Distinguished Analyst, Information Security ForumA thought-provoking and excellent read. Essential for cybersecurity practitioners working across numerous specialisations and at all levels of management. This blended use of theory and practical applications sets this book apart, complements industry-leading certifications and make it a must-read for anyone working within cyber. -- Gary Cocklin CITP CISSP, Senior Cyber Security Practitioner, UK Royal Air Force (RAF)This book is not just for cyber professionals, it’s for everyone. This book is easy to follow and clearly articulates what cyber is and why it matters. It provides insights into why cyber-attacks occur and offers practical and technical guidance for individuals and businesses to protect themselves. This will be my go-to resource for cyber security. -- Thando Jacobs, Business Analyst, Senior Leadership Team, Young Business Analysts (YBA)This book delivers a comprehensive overview of cyber security and is packed with numerous interesting, relevant examples to illustrate key points. Readers will gain insights on why they might be attacked and measures to protect against ever increasing cyber threats. Therefore I highly recommend this publication for individuals and organisations alike. -- Olu Odeniyi, Cyber Security, Information Security and Digital Transformation Advisor, Thought Leader and SpeakerEasy to follow, digestible and highly relevant for the world we live in today. Not just for cybersecurity professionals, business continuity practitioners will gain valuable insight as well as hints and tips on what cybersecurity aspects to consider when developing business continuity plans and response arrangements. -- Hilary Estall MBCI, IRCA BCMS Principal Auditor, Business Continuity Practitioner, Director Perpetual SolutionsTable of ContentsPreface 1. Introduction 2. The big issues 3. Cyber targets 4. Cyber vulnerabilities and impacts 5. Cyber threats 6. Risk management overview 7. Business continuity & disaster recovery 8. Basic cyber security steps 9. Organisational security steps 10. Awareness and training 11. Information sharing Bibliography Appendix A - Standards Appendix B - Good practice guidelines Appendix C - Cyber security law Appendix D - Cyber security training Appendix E - Links to other useful organisations

    1 in stock

    £28.49

  • Security and Privacy in the Digital Era

    ISTE Ltd and John Wiley & Sons Inc Security and Privacy in the Digital Era

    Out of stock

    Book Synopsis"The state, that must eradicate all feelings of insecurity, even potential ones, has been caught in a spiral of exception, suspicion and oppression that may lead to a complete disappearance of liberties."—Mireille Delmas Marty, Libertés et sûreté dans un monde dangereux, 2010 This book will examine the security/freedom duo in space and time with regards to electronic communications and technologies used in social control. It will follow a diachronic path from the relative balance between philosophy and human rights, very dear to Western civilization (at the end of the 20th Century), to the current situation, where there seems to be less freedom in terms of security to the point that some scholars have wondered whether privacy should be redefined in this era. The actors involved (the Western states, digital firms, human rights organizations etc.) have seen their roles impact the legal and political science fields.Table of ContentsIntroduction vii Part 1 Technology and Human Rights 1 Chapter 1. The Ideology of Human Rights 3 1.1. Constitutional Texts 3 1.2. Some texts have an international scope 8 1.3. European texts 16 Chapter 2. Protection of Personal Data 29 2.1. Convention 108 29 2.2. United Nations General Assembly Resolution 45/95 on December 14, 1990 31 2.3. Sources of EU law 32 Chapter 3. Telecommunication Interception 39 3.1. Jurisprudence of the EHCR 39 3.2. Interceptions in the United States 45 3.3. European states and interceptions 50 3.4. Interception controls 61 Chapter 4. Biometrics and Videosurveillance 69 4.1. Biometrics 69 4.2. Videosurveillance 80 Part 2 The Era of Surveillance and Control 89 Chapter 5. The Sources of Law in the Field of Security Illustrate This Change 91 5.1. The USA 91 5.2. The United Kingdom 95 5.3. France 99 Chapter 6. Interceptions 113 6.1. The United States of America 113 6.2. France 126 Chapter 7. Other Methods of Surveillance 135 7.1. Biometrics 135 7.2. Passenger name record 147 7.3. Data and files 151 7.4. New technologies; geolocation, body scanners, and drones are increasingly used 155 Part 3 Between Security and Freedom 179 Chapter 8. Towards Compromise 181 8.1. Legal measures have been taken in order to protect some fundamental freedoms 181 8.2. European jurisprudence 191 8.3. The monitoring continues to develop in the communications sector 223 Conclusion 241 Bibliography 249 Index 251

    Out of stock

    £125.06

  • Cybersecurity and Decision Makers: Data Security

    ISTE Ltd and John Wiley & Sons Inc Cybersecurity and Decision Makers: Data Security

    15 in stock

    Book SynopsisCyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization.Table of ContentsForeword xi Preface xiii Introduction xvii Chapter 1. An Increasingly Vulnerable World 1 1.1. The context 1 1.1.1. Technological disruptions and globalization 1 1.1.2. Data at the heart of industrial productivity 3 1.1.3. Cyberspace, an area without boundaries 3 1.1.4. IT resources 4 1.2. Cybercrime 4 1.2.1. The concept of cybercrime 4 1.2.2. Five types of threats 6 1.2.3. Five types of attackers 9 1.3. The cybersecurity market 15 1.3.1. The size of the market and its evolution 15 1.3.2. The market by sector of activity 15 1.3.3. Types of purchases and investments 16 1.3.4. Geographical distribution 17 1.4. Cyber incidents 17 1.4.1. The facts 17 1.4.2. Testimonials versus silence 24 1.4.3. Trends 25 1.4.4. Examples 27 1.5. Examples of particularly exposed sectors of activity 30 1.5.1. Cinema 30 1.5.2. Banks 31 1.5.3. Health 34 1.5.4. Tourism and business hotels 35 1.5.5. Critical national infrastructure 36 1.6. Responsibilities of officers and directors 37 Chapter 2. Corporate Governance and Digital Responsibility 39 2.1. Corporate governance and stakeholders 39 2.2. The shareholders 40 2.2.1. Valuation of the company 41 2.2.2. Cyber rating agencies 42 2.2.3. Insider trading 43 2.2.4. Activist shareholders 44 2.2.5. The stock exchange authorities 45 2.2.6. The annual report 45 2.3. The board of directors47 2.3.1. The facts 47 2.3.2. The four missions of the board of directors. 47 2.3.3. Civil and criminal liability 49 2.3.4. The board of directors and cybersecurity 50 2.3.5. The board of directors and data protection 53 2.3.6. The statutory auditors 54 2.3.7. The numerical responsibility of the board of directors 55 2.4. Customers and suppliers 56 2.5. Operational management 58 2.5.1. The impacts of digital transformation 58 2.5.2. The digital strategy 59 2.5.3. The consequences of poor digital performance 62 2.5.4. Cybersecurity 63 2.5.5. Merger and acquisition transactions 65 2.5.6. Governance and data protection, cybersecurity 66 Chapter 3. Risk Mapping 69 3.1. Cyber-risks 69 3.2. The context 71 3.3. Vulnerabilities 72 3.3.1. Fraud against the president 73 3.3.2. Supplier fraud 73 3.3.3. Other economic impacts 74 3.4. Legal risks 76 3.4.1. Class actions 76 3.4.2. Sanctions by the CNIL and the ICO 77 3.5. The objectives of risk mapping 78 3.6. The different methods of risk analysis 79 3.7. Risk assessment (identify) 81 3.7.1. The main actors 81 3.7.2. The steps 82 3.8. Protecting 83 3.9. Detecting 83 3.10. Reacting 84 3.11. Restoring 85 3.12. Decentralized mapping 85 3.12.1. The internal threat 85 3.12.2. Industrial risks 87 3.12.3. Suppliers, subcontractors and service providers 88 3.12.4. Connected objects 89 3.13. Insurance 94 3.14. Non-compliance risks and ethics 96 Chapter 4. Regulations 99 4.1. The context 99 4.1.1. Complaints filed with the CNIL 100 4.1.2. Vectaury 101 4.1.3. Optical Center 102 4.1.4. Dailymotion 103 4.2. The different international regulations (data protection) 103 4.2.1. The United States 104 4.2.2. China 104 4.2.3. Asia 105 4.2.4. Europe 105 4.3. Cybersecurity regulations, the NIS Directive 105 4.4. Sectoral regulations 106 4.4.1. The banking industry 106 4.4.2. Health 108 4.5. The General Data Protection Regulation (GDPR) 109 4.5.1. The foundations 110 4.5.2. Definition of personal data 110 4.5.3. The so-called “sensitive” data 111 4.5.4. The principles of the GDPR 112 4.5.5. The five actions to be in compliance with the GDPR 113 4.5.6. The processing register 113 4.5.7. The five actions to be carried out 113 4.5.8. Cookies 116 4.6. Consequences for the company and the board of directors 117 Chapter 5. Best Practices of the Board of Directors 119 5.1. Digital skills 120 5.2. Situational awareness 121 5.2.1. The main issues 121 5.2.2. Insurance 125 5.3. Internal governance 126 5.3.1. The CISO 126 5.3.2. The CISO and the company 127 5.3.3. Clarifying responsibilities 131 5.3.4. Streamlining the supplier portfolio 133 5.3.5. Security policies and procedures 134 5.3.6. The human being 137 5.4. Data protection 138 5.4.1. Emails 139 5.4.2. The tools 141 5.4.3. Double authentication: better, but not 100% reliable 142 5.5. Choosing your service providers 142 5.6. The budget 143 5.7. Cyberculture 144 5.8. The dashboard for officers and directors 145 Chapter 6. Resilience and Crisis Management 147 6.1. How to ensure resilience? 147 6.2. Definition of a CERT 149 6.3. Definition of a SOC 149 6.4. The role of ENISA 150 6.5. The business continuity plan 150 6.6. Crisis management 151 6.6.1. The preparation 151 6.6.2. Exiting the state of sideration 152 6.6.3. Ensuring business continuity 153 6.6.4. Story of the TV5 Monde attack 154 6.6.5. Management of the first few hours 159 6.7. Crisis simulation 163 Conclusion. The Digital Committee 165 Appendices 167 Appendix 1. Cybersecurity Dashboard 169 Appendix 2. Ensuring Cybersecurity in Practice and on a Daily Basis 173 Appendix 3. Tools to Identify, Protect, Detect, Train, React and Restore 175 Glossary 179 References 183 Index 187

    15 in stock

    £125.06

  • Cybersecurity in Humanities and Social Sciences:

    ISTE Ltd and John Wiley & Sons Inc Cybersecurity in Humanities and Social Sciences:

    1 in stock

    Book SynopsisThe humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology , law, information science, security studies, surveillance studies, strategic studies, polemology. There is, however, no actual cybersecurity studies. After two decades of scientific production on this subject, we thought it essential to take stock of the research methods that could be mobilized, imagined and invented by the researchers. The research methodology on the subject "cybersecurity" has, paradoxically, been the subject of relatively few publications to date. This dimension is essential. It is the initial phase by which any researcher, seasoned or young doctoral student, must pass, to define his subject of study, delimit the contours, ask the research questions, and choose the methods of treatment. It is this methodological dimension that our book proposes to treat. The questions the authors were asked to answer were: how can cybersecurity be defined? What disciplines in the humanities and social sciences are studying, and how, cybersecurity? What is the place of pluralism or interdisciplinarity? How are the research topics chosen, the questions defined? How, concretely, to study cybersecurity: tools, methods, theories, organization of research, research fields, data ...? How are discipline-specific theories useful for understanding and studying cybersecurity? Has cybersecurity had an impact on scientific theories?Table of ContentsIntroduction ixDaniel VENTRE, Hugo LOISEAU and Hartmut ADEN Chapter 1 The “Science” of Cybersecurity in the Human and Social Sciences: Issues and Reflections 1Hugo LOISEAU 1.1 Introduction 1 1.2 A method? 4 1.3 Data? 11 1.4 One or more definition(s)? 16 1.5 Conclusion 20 1.6 References 21 Chapter 2 Definitions, Typologies, Taxonomies and Ontologies of Cybersecurity 25Daniel VENTRE 2.1 Introduction 25 2.2 Definition 27 2.2.1 What is a definition? 27 2.2.2 Usefulness of definitions 29 2.2.3 Rules for constructing definitions 29 2.2.4 Definitions of cybersecurity 32 2.3 Typology 43 2.3.1 What is a typology? 44 2.3.2 Usefulness of typologies 44 2.3.3 Rules for the construction of typologies 45 2.3.4 Cybersecurity typologies 46 2.4 Taxonomy 48 2.4.1 What is a taxonomy? 48 2.4.2 Usefulness of taxonomy 49 2.4.3 Rules for the construction of taxonomies 49 2.4.4 Taxonomies of cybersecurity 50 2.5 Ontologies 51 2.5.1 What is ontology? 52 2.5.2 Usefulness of ontologies 53 2.5.3 Rules for construction of ontologies 53 2.5.4 Cybersecurity ontologies 54 2.6 Conclusion 56 2.7 References 57 Chapter 3 Cybersecurity and Data Protection – Research Strategies and Limitations in a Legal and Public Policy Perspective 67Hartmut ADEN 3.1 Introduction 67 3.2 Studying the complex relationship between cybersecurity and data protection: endangering privacy by combating cybercrime? 68 3.2.1 Potential tensions between cybersecurity and data protection 69 3.2.2 Potential synergies between cybersecurity and data protection 72 3.3 Methodological approaches and challenges for the study of cybersecurity – legal and public policy perspectives 74 3.3.1 Legal interpretation and comparison as methodological approaches to the study of cybersecurity 74 3.3.2 Public policy approaches to the study of cybersecurity 77 3.3.3 Transdisciplinary synergies between legal and public policy perspectives 78 3.4 Conclusion and outlook 80 3.5 References 81 Chapter 4 Researching State-sponsored Cyber-espionage 85Joseph FITSANAKIS 4.1 Defining cybersecurity and cyber-espionage 85 4.2 Taxonomies of cyber-threats 87 4.3 The structure of this chapter 88 4.4 The significance of state-sponsored cyber-espionage 90 4.5 Research themes in state-sponsored cyber-espionage 94 4.6 Theorizing state-sponsored cyber-espionage in the social sciences 98 4.7 Research methodologies into state-sponsored cyber-espionage 104 4.8 Intellectual precision and objectivity in state-sponsored cyber-espionage research 106 4.9 Detecting state actors in cyber-espionage research 110 4.10 Identifying specific state actors in cyber-espionage research 112 4.11 Conclusion: researching a transformational subject 116 4.12 References 118 Chapter 5 Moving from Uncertainty to Risk: The Case of Cyber Risk 123Michel DACOROGNA and Marie KRATZ 5.1 Introduction 123 5.2 The scientific approach to move from uncertainty to risk 124 5.3 Learning about the data: the exploratory phase 126 5.4 Data cleansing 128 5.5 Statistical exploration on the various variables of the dataset 130 5.6 Univariate modeling for the relevant variables 134 5.7 Multivariate and dynamic modeling 139 5.7.1 A fast-changing environment: time dependency 140 5.7.2 Causal relations 143 5.7.3 Models for prediction 147 5.8 Conclusion 149 5.9 Acknowledgments 151 5.10 References 151 Chapter 6 Qualitative Document Analysis for Cybersecurity and Information Warfare Research 153Brett VAN NIEKERK and Trishana RAMLUCKAN 6.1 Introduction 153 6.1.1 Previous research 154 6.2 Information warfare and cybersecurity 154 6.3 Researching information warfare and cybersecurity 156 6.4 Qualitative research methodologies for information warfare and cybersecurity 157 6.4.1 Clustering of documents 159 6.4.2 Clustering of words 159 6.4.3 Word frequencies and word clouds 159 6.4.4 Text search and word trees 159 6.4.5 Example use cases of qualitative document analysis 160 6.5 An analysis of national cybersecurity strategies 161 6.5.1 Selection process for the documents 161 6.5.2 Analysis 162 6.5.3 Discussion 167 6.6 An analysis of the alignment of South Africa’s Cybercrimes Bill to international legislation 169 6.6.1 Background to the documents 169 6.6.2 Analysis 170 6.6.3 Discussion 174 6.7 An analysis of the influence of classical military philosophy on seminal information warfare texts 176 6.8 Reflections on qualitative document analysis for information warfare and cybersecurity research 177 6.9 Conclusion 179 6.10 References 180 Chapter 7 Anti-feminist Cyber-violence as a Risk Factor: Analysis of Cybersecurity Issues for Feminist Activists in France 185Elena WALDISPUEHL 7.1 Introduction 185 7.2 Localization of an online field 187 7.2.1 Online ethnographic work and empathy 192 7.2.2 Cybersecurity issues of an online field 193 7.3 Online–offline continuum 194 7.4 Continuum between security and insecurity 199 7.5 Conclusion 204 7.6 References 205 List of Authors 211 Index 213

    1 in stock

    £125.06

  • Security and its Challenges in the 21st Century

    ISTE Ltd and John Wiley & Sons Inc Security and its Challenges in the 21st Century

    15 in stock

    Book SynopsisBy the year 2000, a balance was sought between security requirements and a respect for privacy, as well as for individual and collective freedoms. As we progress further into the 21st century, however, security is taking precedence within an increasingly controlled society.This shift is due to advances in innovative technologies and the investments made by commercial companies to drive constant technological progress. Despite the implementation of the General Data Protection Regulation (GDPR) within the EU in 2018 or 2020’s California Consumer Privacy Act (CCPA), regulatory bodies do not have the ability to fully manage the consequences presented by emerging technologies. Security and Its Challenges in the 21st Century provides students and researchers with an international legal and geopolitical analysis; it is also intended for those interested in societal development, artificial intelligence, smart cities and quantum cryptology.Table of ContentsIntroduction ix Chapter 1 Security: Actors and Rights 1 1.1 Numerous actors 1 1.1.1 Nation-states 1 1.1.2 Multinationals 3 1.1.3 The GAFAM 9 1.2 Rights and security 10 1.2.1 The law of armed conflict 10 1.2.2 Environmental law 16 Chapter 2 Interceptions 25 2.1 International interceptions 25 2.1.1 Interceptions in the 20th century 25 2.1.2 Interceptions in the 21st century 27 2.2 Interceptions in France 37 2.2.1 The 1991 law 38 2.2.2 The law of March 9, 2004 41 2.2.3 The 2015 Intelligence Act 42 2.2.4 Reform of the code of criminal procedure 52 Chapter 3 Geolocation and Video Protection 59 3.1 International standards for both geolocation and video protection/video surveillance 59 3.1.1 Comparative legal issues in the era of geolocalization 59 3.1.2 Belgian legislation on geolocation 61 3.1.3 Video surveillance/video protection 63 3.2 France 67 3.2.1 The legislative and regulatory framework 67 3.2.2 The case law just before the LOPPSI 2 and the Jean-Marc Philippe establishments 69 3.2.3 The entry into force of the LOPPSI 2 74 3.2.4 Jurisprudence after LOPPSI 2 74 3.2.5 Video protection and terrorism 88 Chapter 4 Biometrics or “the Second Circle” 89 4.1 Biometrics and international law 90 4.1.1 The United States: a historical outline 90 4.1.2 Standardization 93 4.1.3 The European Union and biometrics 94 4.2 France 98 4.2.1 Visa control 98 4.2.2 Passports 99 4.2.3 The TES database 101 4.2.4 Setting up Alicem 117 4.3 Facial recognition at the heart of globalization 119 Chapter 5 Personal Data in the United States and Europe 121 5.1 The United States and the protection of personal data in the European Union: Directive 95/46 122 5.1.1 Sensitive data 122 5.1.2 The right of access 123 5.1.3 Security 123 5.1.4 The directive of December 15, 1997, followed by the directive of July 12, 2002 and supplemented by the directive of November 25, 2009 124 5.1.5 Geolocalization 125 5.1.6 Cookies 125 5.2 The GDPR 126 5.2.1 Consent 127 5.2.2 Metadata and the “Privacy” bill 134 5.3 Cloud computing 138 5.3.1 Definition 138 5.3.2 The Safe Harbor Principles agreement 139 5.3.3 Privacy Shields 140 5.3.4 Two models 140 Chapter 6 Cybersecurity and Privacy 145 6.1 Cybersecurity itself 146 6.1.1 Cybersecurity in the United States 146 6.1.2 Cybersecurity in China 147 6.1.3 Cybersecurity in Japan 147 6.1.4 Cybersecurity and the European Union 148 6.1.5 Cybersecurity in the United Kingdom 149 6.1.6 Cybersecurity in France 149 6.1.7 The dangers of cyber-attacks 151 6.1.8 Two interesting cases 154 6.2 Cybersecurity and cryptology 158 6.2.1 Cryptology: the science of secrecy 158 6.2.2 Risks 161 6.3 PNR data 164 6.3.1 Element of definition 164 6.3.2 PNR data and nation-states 166 6.4 Smart cities 179 6.4.1 The development of standardization and certification 181 6.4.2 Strategies and CSIRTs 182 Chapter 7 Security Instruments in Texts Relating to Terrorism 185 7.1 Security instruments 185 7.1.1 The millimeter-wave scanner 185 7.1.2 The body camera 196 7.1.3 UAVs: a dual use – military and civilian 202 7.2 Standards in relation to terrorism 208 7.2.1 The law of 2014 209 7.2.2 The law strengthening internal security and the fight against terrorism 219 Chapter 8 Security and Democracy 225 8.1 Fake news 226 8.1.1 The definition 227 8.1.2 Obligations 227 8.2 Hate speech 237 8.2.1 The report 237 8.2.2 The proposed new mechanism 239 Conclusion 245 References 249 Index 251

    15 in stock

    £124.15

  • Archives in the Digital Age: Preservation and the

    ISTE Ltd and John Wiley & Sons Inc Archives in the Digital Age: Preservation and the

    15 in stock

    Book SynopsisArchiving has become an increasingly complex process. The challenge is no longer how to store the data but how to store it intelligently, in order to exploit it over time, while maintaining its integrity and authenticity. Digital technologies bring about major transformations, not only in terms of the types of documents that are transferred to and stored in archives, in the behaviors and practices of the humanities and social sciences (digital humanities), but also in terms of the volume of data and the technological capacity for managing and preserving archives (Big Data). Archives in The Digital Age focuses on the impact of these various digital transformations on archives, and examines how the right to memory and the information of future generations is confronted with the right to be forgotten; a digital prerogative that guarantees individuals their private lives and freedoms.Table of ContentsPreface ix Introduction xi Chapter 1. Digital Archives: Elements of Definition 1 1.1. Key concepts of digital archives 1 1.1.1. Archives 1 1.1.2. Archive management 2 1.1.3. Archival management tools 4 1.1.4. Digital archives 7 1.2. Electronic Records Management 7 1.2.1. ERM: elements of definition 7 1.2.2. ERM: implementation steps 10 1.3. Records management 18 1.3.1. Structure of standard 15489 19 1.3.2. Content of the standard 20 1.3.3. Design and implementation of an RM project according to the standard 22 1.3.4. MoReq: the added value of RM 25 1.4. EDRMS: merging ERM and RM 26 1.5. ECM: the overall data management strategy 27 1.6. Conclusion 30 Chapter 2. Digital Archiving: Methods and Strategies 31 2.1. Introduction 31 2.2. Digital archiving: elements of definition 31 2.3. Digital archiving: the essential standards 34 2.3.1. NF Z 42-013/ISO 14641 standard 36 2.3.2. NF 461: electronic archiving system 38 2.3.3. OAIS (ISO 14721): Open Archival Information System 39 2.3.4. ISO 19905 (PDF/A) 42 2.3.5. ISO 30300, ISO 30301 and ISO 30302 series of standards 44 2.3.6. ISO 23081 44 2.4. Methodology for setting up a digital archiving process 46 2.4.1. Qualifying and classifying information 46 2.4.2. Classification scheme 47 2.4.3. Retention schedule or retention standard 51 2.4.4. Metadata 52 2.4.5. Archiving processes and procedures 55 2.5. Archiving of audiovisual documents 58 2.5.1. Definition of audiovisual archives 58 2.5.2. Treatment of audiovisual archives 60 2.5.3. Migration of audiovisual documents 62 2.5.4. Digital archiving of audiovisual documents 63 2.6. Email archiving 65 2.6.1. Email archiving and legislation 66 2.6.2. Why archive emails? 67 2.7. Conclusion 69 Chapter 3. Archives in the Age of Digital Humanities 71 3.1. Introduction 71 3.2. History of the digital humanities 72 3.2.1. “Literary and Linguistic Computing”: 1940–1980 72 3.2.2. “Humanities computing”: 1980–1994 74 3.2.3. “Digital humanities”: since 1994 77 3.3. Definitions of the digital humanities 78 3.4. Archives in the age of the digital humanities 80 3.4.1. Digital archive platforms 81 3.4.2. Software managing digital archives 84 3.4.3. Digital humanities at the heart of long-term preservation 89 3.4.4. Digital humanities and the liberation of the humanities: access and accessibility 107 3.5. Conclusion 112 Chapter 4. Digital Archiving and Big Data 113 4.1. Introduction 113 4.2. Definition of Big Data 115 4.3. Big Data issues 119 4.4. Big Data: challenges and areas of application 120 4.5. Data archiving in the age of Big Data 122 4.5.1. Management and archiving of Big Data 122 4.5.2. Big Data technologies and tools 125 4.5.3. Blockchain, the future of digital archiving of Big Data 137 4.6. Conclusion 147 Chapter 5. Preservation of Archives versus the Right to be Forgotten 149 5.1. Introduction 149 5.2. Forgetting 150 5.3. The right to be forgotten 150 5.3.1. Limits to the right to be forgotten 150 5.3.2. European Directive on the protection of personal data 151 5.3.3. General Data Protection Regulation 153 5.3.4. The right to dereferencing: common criteria 156 5.4. Effectiveness of the right to be forgotten 156 5.4.1. Technical challenge of the effectiveness of the right to be forgotten 157 5.4.2. Legal challenge of the effectiveness of the right to be forgotten 160 5.5. The right to digital oblivion: a controversial subject 163 5.6. Public archives versus the right to be forgotten 165 5.6.1. Archives: exemptions from the right to be forgotten 167 5.6.2. Online publication of archives and finding aids containing personal data 168 5.6.3. Private digital archives and the right to be forgotten 171 5.6.4. Web archiving and the right to be forgotten 172 5.7. Google and the right to be forgotten 173 5.8. Conclusion 178 Conclusion 181 List of Acronyms 185 References 193 Index 207

    15 in stock

    £124.15

  • Conflicts, Crimes and Regulations in Cyberspace

    ISTE Ltd and John Wiley & Sons Inc Conflicts, Crimes and Regulations in Cyberspace

    15 in stock

    Book SynopsisThe study of cyberspace is relatively new within the field of social sciences, yet interest in the subject is significant. Conflicts, Crimes and Regulations in Cyberspace contributes to the scientific debate being brought to the fore by addressing international and methodological issues, through the use of case studies.This book presents cyberspace as a socio-technical system on an international level. It focuses on state and non-state actors, as well as the study of strategic concepts and norms. Unlike global studies, the socio-technical approach and “meso” scale facilitate the analysis of cyberspace in international relations. This is an area of both collaboration and conflict for which specific modes of regulation have appeared.Table of ContentsIntroduction Xi Sébastien-Yves Laurent Chapter 1 The United States, States And The False Claims Of The End Of The Global Internet 1 Sébastien-Yves Laurent 1.1 Introduction 1 1.2 The Creation Of The Internet And The Development Of Cyberspace By The United States 2 1.2.1 The First International Telecommunications Systems Developed By All States 3 1.2.2 The Creation And Development Of The Internet By The United States 3 1.2.3 International Management Controlled By The United States 4 1.2.4 A Sociotechnical System Bearing A Composite American Ideology 10 1.2.5 The False Recomposition Of The Global Sociotechnical System: The Global Summits On The Information Society 11 1.3 Cyberspace Transformed By The Arrival In Force Of States 13 1.3.1 State Intentions In “National Strategies”: A Global Approach 14 1.3.2 Russian–American Structural Disagreements On Information Security And Cybersecurity 16 1.3.3 Discussions On Cybersecurity: The Symbolic International Restoration Of The Coercive State 18 1.4 Praxis Of State Coercion In Cyberspace 20 1.4.1 Intelligence And Surveillance Activities In The Digital Environment 21 1.4.2 Non-Military Cyber Operations 24 1.4.3 Interstate Digital Conflicts, Secrecy And Coercive Diplomacy 26 1.5 The Fragmentation Of The Global Internet And The Digital Sovereignty Of States 29 1.5.1 Linguistic Balkanization: Digital Babel 29 1.5.2 Political Fragmentation: Alternative Internets 31 1.6 The Strong Constraint Of Interstate Cooperation For All States 33 1.6.1 Interstate Agreements On An Embryo Of International Law 33 1.6.2 State Dependence On International Cooperation For Cybersecurity 34 1.7 Conclusion 35 1.8 References 36 Chapter 2 Cybersecurity In America: The US National Security Apparatus And Cyber Conflict Management 43 Frédérick Gagnon and Alexis Rapin 2.1 Introduction 43 2.2 Societal And Institutional Dynamics 45 2.3 Organizational And Bureaucratic Dynamics 49 2.4 Individual Dynamics 53 2.5 Conclusion 57 2.6 References 58 Chapter 3 Separation Of Offensive And Defensive Functions: The Originality Of The French Cyberdefense Model Called Into Question? 63 Alix Desforges 3.1 Introduction 63 3.2 A Model Designed And Developed In Response To The Threats And Challenges Of The Early 2010s 66 3.2.1 An Organizational Model Apparently Based On Two Main Actors 66 3.2.2 The Commitment To A Strict Offensive/Defensive Separation 71 3.3 A Strict Separation Of Offensive And Defensive Functions And Missions: An Obstacle To Better Defense? 75 3.3.1 A Rapidly Changing Context: An Increasingly Significant Threat From The Most Advanced States 76 3.3.2 Limits That Have Become Obstacles To Accomplishing Cyberdefense Missions 78 3.3.3 An Institutionalized Rapprochement Of The Actors Of Defensive And Offensive Parts In The Name Of Cyberdefense Missions: From Mitigation To Obliteration? 82 3.4 Conclusion 85 3.5 References 86 Chapter 4 The Boundary Between Cybercrime And Cyberwar: An Uncertain No-Man’s Land 89 Marc Watin-Augouard 4.1 Introduction 89 4.2 The Field Of Cybercrime Up To The Limits Of The Glass Ceiling 91 4.2.1 The Field Of Cybercrime: An Attempt At Delimitation 92 4.2.2 Cybercrime, The “21st Century Crime” 95 4.2.3 Cyber Conflict At The Edge Of The Glass Ceiling 95 4.3 War In Cyberspace, Cyber In War 98 4.3.1 Cyber In War, A Daily Reality 98 4.3.2 Autonomous Warfare In The Cyber World: The Test Of The Law Of Armed Conflict 99 4.3.3 Digital Cyber Persuasion 102 4.4 Conclusion 104 4.5 References 105 Chapter 5 Cyberdefense, The Digital Dimension Of National Security 107 Bertrand Warusfel 5.1 Introduction 107 5.2 Cyberdefense In The Political And Legal Framework Of Digital Security 108 5.2.1 A Definition Of Cyberdefense 108 5.2.2 Linking Cyberdefense To National Security Strategy 109 5.3 The Emergence Of A Coherent Legal Regime For Cyberdefense 111 5.3.1 The Legal Basis Of The Permanent Cyberdefense Posture 111 5.3.2 Exceptional Instruments For Responding To A Crisis 112 5.4 Conclusion 115 5.5 References 116 Chapter 6 Omnipresence Without Omnipotence: The US Campaign Against Huawei In The 5G Era 117 Mark Corcoral 6.1 Introduction 117 6.2 The Unilateral American Offensive Against Huawei: A Disruptive Campaign Causing Significant Collateral Damage 119 6.2.1 Huawei: An “Unusual And Extraordinary” Threat To The United States’ Position In The International Order 120 6.2.2 A Political, Legal And Economic Offensive Against Huawei, Causing Significant Collateral Damage 122 6.3 The American Diplomatic Offensive: The Limits Of American Rhetorical Coercion Of Their Partners And Allies 128 6.3.1 Educating Rather Than Persuading: An Attempt To Rhetorically Coerce Partners And Allies 129 6.3.2 Successful Agenda Setting But Limited Rhetorical Coercion 131 6.3.3 American Rhetorical Coercion In The Special Relationship 134 6.4 The Anti-Huawei Offensive: A Barometer Of American Power? 137 6.5 References 139 Chapter 7 The Issue Of Personal And Sovereign Data In The Light Of An Emerging “International Law Of Intelligence” 147 Fabien Lafouasse 7.1 Introduction 147 7.2 The Legal Rules Invoked In The Collection Of Personal And Sovereign Data 150 7.2.1 Right To Privacy Versus General Communications Surveillance 150 7.2.2 Violation Of Territorial Sovereignty Versus Cyberespionage 153 7.3 Data Localization In The Light Of International Intelligence Law 156 7.3.1 Data Fluidity Versus Data Storage 156 7.3.2 Datasphere Versus International Intelligence Law 159 7.4 Conclusion 163 7.5 Appendix: The Quadrants Of Intelligence Law 164 7.6 Sources And References 165 7.6.1 Sources 165 7.6.2 References 166 Chapter 8 International Cybersecurity Cooperation 169 Guillaume Poupard 8.1 Current Attack Trends 169 8.2 The Multiple Paths Of International Cooperation 171 8.3 The Issue Of Attack Attribution 175 Chapter 9 Cyberdefense And Cybersecurity Regulations In The United States: From The Failure Of The “Comprehensive Policy” To The Success Of The Sectoral Approach 177 Adrien Manniez 9.1 Introduction 177 9.2 The Identification Of A New Threat And The Impact Of Cyber On How US Security And Defense Policies Are Designed 178 9.3 From The Impact Of Cyber On Policy To The Impact Of Politics On Cyber 181 9.4 From A Comprehensive Cyber Policy To A Sectoral Approach: The Success Of An Undeclared Regulatory Policy 190 9.5 Conclusion 195 9.6 References 196 List of Authors 199 Index 201

    15 in stock

    £124.15

  • Multimedia Security 1: Authentication and Data

    ISTE Ltd Multimedia Security 1: Authentication and Data

    Out of stock

    Book SynopsisToday, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics.It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today’s "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it.Multimedia Security 1 analyzes the issues of the authentication of multimedia data, code and the embedding of hidden data, both from the point of view of defense and attack. Regarding the embedding of hidden data, it also covers invisibility, color, tracing and 3D data, as well as the detection of hidden messages in an image by steganalysis.Table of ContentsForeword by Gildas Avoine xi Foreword by Cédric Richard xiii Preface xvilliam PUECH Chapter 1 How to Reconstruct the History of a Digital Image, and of Its Alterations 1Quentin BAMMEY, Miguel COLOM, Thibaud EHRET, Marina GARDELLA, Rafael GROMPONE, Jean-Michel MOREL, Tina NIKOUKHAH and Denis PERRAUD 1.1 Introduction 2 1.1.1 General context 2 1.1.2 Criminal background 3 1.1.3 Issues for law enforcement 4 1.1.4 Current methods and tools of law enforcement 5 1.1.5 Outline of this chapter 5 1.2 Describing the image processing chain 8 1.2.1 Raw image acquisition 8 1.2.2 Demosaicing 8 1.2.3 Color correction 10 1.2.4 JPEG compression 11 1.3 Traces left on noise by image manipulation 11 1.3.1 Non-parametric estimation of noise in images 11 1.3.2 Transformation of noise in the processing chain 13 1.3.3 Forgery detection through noise analysis 15 1.4 Demosaicing and its traces 18 1.4.1 Forgery detection through demosaicing analysis 19 1.4.2 Detecting the position of the Bayer matrix 20 1.4.3 Limits of detection demosaicing 23 1.5 JPEG compression, its traces and the detection of its alterations 23 1.5.1 The JPEG compression algorithm 23 1.5.2 Grid detection 25 1.5.3 Detecting the quantization matrix 27 1.5.4 Beyond indicators, making decisions with a statistical model 28 1.6 Internal similarities and manipulations 31 1.7 Direct detection of image manipulation 33 1.8 Conclusion 34 1.9 References 35 Chapter 2 Deep Neural Network Attacks and Defense: The Case of Image Classification 41Hanwei ZHANG, Teddy FURON, Laurent AMSALEG and Yannis AVRITHIS 2.1 Introduction 41 2.1.1 A bit of history and vocabulary 42 2.1.2 Machine learning 44 2.1.3 The classification of images by deep neural networks 46 2.1.4 Deep Dreams 48 2.2 Adversarial images: definition 49 2.3 Attacks: making adversarial images 51 2.3.1 About white box 52 2.3.2 Black or gray box 62 2.4 Defenses 64 2.4.1 Reactive defenses 64 2.4.2 Proactive defenses 66 2.4.3 Obfuscation technique 67 2.4.4 Defenses: conclusion 68 2.5 Conclusion 68 2.6 References 69 Chapter 3 Codes and Watermarks 77Pascal LEFEVRE, Philippe CARRE and Philippe GABORIT 3.1 Introduction 77 3.2 Study framework: robust watermarking 78 3.3 Index modulation 81 3.3.1 LQIM: insertion 81 3.3.2 LQIM: detection 82 3.4 Error-correcting codes approach 82 3.4.1 Generalities 84 3.4.2 Codes by concatenation 86 3.4.3 Hamming codes 88 3.4.4 BCH codes 90 3.4.5 RS codes 93 3.5 Contradictory objectives of watermarking: the impact of codes 96 3.6 Latest developments in the use of correction codes for watermarking 98 3.7 Illustration of the influence of the type of code, according to the attacks 102 3.7.1 JPEG compression 103 3.7.2 Additive Gaussian noise 106 3.7.3 Saturation 106 3.8 Using the rank metric 108 3.8.1 Rank metric correcting codes 109 3.8.2 Code by rank metric: a robust watermarking method for image cropping 113 3.9 Conclusion 121 3.10 References 121 Chapter 4 Invisibility 129Pascal LEFEVRE, Philippe CARRE and David ALLEYSSON 4.1 Introduction 129 4.2 Color watermarking: an approach history? 131 4.2.1 Vector quantization in the RGB space 132 4.2.2 Choosing a color direction 133 4.3 Quaternionic context for watermarking color images 135 4.3.1 Quaternions and color images 135 4.3.2 Quaternionic Fourier transforms 137 4.4 Psychovisual approach to color watermarking 139 4.4.1 Neurogeometry and perception 139 4.4.2 Photoreceptor model and trichromatic vision 141 4.4.3 Model approximation 144 4.4.4 Parameters of the model 145 4.4.5 Application to watermarking color images 146 4.4.6 Conversions 147 4.4.7 Psychovisual algorithm for color images 148 4.4.8 Experimental validation of the psychovisual approach for color watermarking 151 4.5 Conclusion 155 4.6 References 157 Chapter 5 Steganography: Embedding Data Into Multimedia Content 161Patrick BAS, Remi COGRANNE and Marc CHAUMONT 5.1 Introduction and theoretical foundations 162 5.2 Fundamental principles 163 5.2.1 Maximization of the size of the embedded message 163 5.2.2 Message encoding 165 5.2.3 Detectability minimization 166 5.3 Digital image steganography: basic methods 168 5.3.1 LSB substitution and matching 168 5.3.2 Adaptive embedding methods 169 5.4 Advanced principles in steganography 172 5.4.1 Synchronization of modifications 173 5.4.2 Batch steganography 175 5.4.3 Steganography of color images 177 5.4.4 Use of side information 178 5.4.5 Steganography mimicking a statistical model 180 5.4.6 Adversarial steganography 182 5.5 Conclusion 186 5.6 References 186 Chapter 6 Traitor Tracing 189Teddy FURON 6.1 Introduction 189 6.1.1 The contribution of the cryptography community 190 6.1.2 Multimedia content 191 6.1.3 Error probabilities 192 6.1.4 Collusion strategy 192 6.2 The original Tardos code 194 6.2.1 Constructing the code 195 6.2.2 The collusion strategy and its impact on the pirated series 195 6.2.3 Accusation with a simple decoder 197 6.2.4 Study of the Tardos code-Škori´c original 199 6.2.5 Advantages 202 6.2.6 The problems 204 6.3 Tardos and his successors 205 6.3.1 Length of the code 205 6.3.2 Other criteria 205 6.3.3 Extensions 207 6.4 Research of better score functions 208 6.4.1 The optimal score function 208 6.4.2 The theory of the compound communication channel 209 6.4.3 Adaptive score functions 211 6.4.4 Comparison 213 6.5 How to find a better threshold 213 6.6 Conclusion 215 6.7 References 216 Chapter 7 3D Watermarking 219Sebastien BEUGNON, Vincent ITIER and William PUECH 7.1 Introduction 220 7.2 Preliminaries 221 7.2.1 Digital watermarking 221 7.2.2 3D objects 222 7.3 Synchronization 224 7.3.1 Traversal scheduling 224 7.3.2 Patch scheduling 224 7.3.3 Scheduling based on graphs 225 7.4 3D data hiding 230 7.4.1 Transformed domains 231 7.4.2 Spatial domain 231 7.4.3 Other domains 232 7.5 Presentation of a high-capacity data hiding method 233 7.5.1 Embedding of the message 234 7.5.2 Causality issue 235 7.6 Improvements 236 7.6.1 Error-correcting codes 236 7.6.2 Statistical arithmetic coding 236 7.6.3 Partitioning and acceleration structures 237 7.7 Experimental results 238 7.8 Trends in high-capacity 3D data hiding 240 7.8.1 Steganalysis 240 7.8.2 Security analysis 241 7.8.3 3D printing 242 7.9 Conclusion 242 7.10 References 243 Chapter 8 Steganalysis: Detection of Hidden Data in Multimedia Content 247Remi COGRANNE, Marc CHAUMONT and Patrick BAS 8.1 Introduction, challenges and constraints 247 8.1.1 The different aims of steganalysis 248 8.1.2 Different methods to carry out steganalysis 249 8.2 Incompatible signature detection 250 8.3 Detection using statistical methods 252 8.3.1 Statistical test of χ2 252 8.3.2 Likelihood-ratio test 256 8.3.3 LSB match detection 261 8.4 Supervised learning detection 263 8.4.1 Extraction of characteristics in the spatial domain 264 8.4.2 Learning how to detect with features 269 8.5 Detection by deep neural networks 270 8.5.1 Foundation of a deep neural network 271 8.5.2 The preprocessing module 272 8.6 Current avenues of research 279 8.6.1 The problem of Cover-Source mismatch 279 8.6.2 The problem with steganalysis in real life 279 8.6.3 Reliable steganalysis 280 8.6.4 Steganalysis of color images 280 8.6.5 Taking into account the adaptivity of steganography 281 8.6.6 Grouped steganalysis (batch steganalysis) 281 8.6.7 Universal steganalysis 282 8.7 Conclusion 283 8.8 References 283 List of Authors 289 Index 293

    Out of stock

    £124.15

  • Cybersecurity in Smart Homes: Architectures,

    ISTE Ltd Cybersecurity in Smart Homes: Architectures,

    15 in stock

    Book SynopsisSmart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A smart home is programmed to act autonomously to improve comfort levels, save energy and potentially ensure safety; the result is a better way of life. Innovative solutions continue to be developed by researchers and engineers and thus smart home technologies are constantly evolving. By the same token, cybercrime is also becoming more prevalent. Indeed, a smart home system is made up of connected devices that cybercriminals can infiltrate to access private information, commit cyber vandalism or infect devices using botnets. This book addresses cyber attacks such as sniffing, port scanning, address spoofing, session hijacking, ransomware and denial of service. It presents, analyzes and discusses the various aspects of cybersecurity as well as solutions proposed by the research community to counter the risks. Cybersecurity in Smart Homes is intended for people who wish to understand the architectures, protocols and different technologies used in smart homes.Table of ContentsChapter 1 Home Automation Solutions for SecureWSN 1 Corinna SCHMITT and Marvin WEBER 1.1 Introduction 2 1.2 Background 4 1.2.1 SecureWSN 4 1.2.2 Communication standards 8 1.2.3 The monitor-analyse-plan-execute-knowledge model 12 1.2.4 Hardware and libraries 14 1.3 Design decisions 15 1.3.1 Requirements 16 1.3.2 HAIFA architecture 18 1.3.3 WebMaDa integration 29 1.4 Implementation 30 1.4.1 CoMaDa integration 30 1.4.2 HAIFA’s ZigBee Gateway 48 1.4.3 WebMaDa integration 55 1.4.4 Uploading HA data to WebMaDa 56 1.4.5 Sending HA messages from WebMaDa to CoMaDa 59 1.4.6 WebMaDa’s frontend 62 1.5 Evaluation of HAIFA 64 1.5.1 Actuator interoperability (R1) 65 1.5.2 Rule-based automation (R2) 65 1.5.3 Node hardware interoperability (R3) 68 1.5.4 CoMaDa and WebMaDa management (R4) 68 1.6 Summary and conclusions 68 1.7 Acknowledgements 69 1.8 References 70 Chapter 2 Smart Home Device Security: A Survey of Smart Home Authentication Methods with a Focus on Mutual Authentication and Key Management Practices 75 Robinson RAJU and Melody MOH 2.1 Introduction 75 2.2 Smart home – introduction and technologies 77 2.2.1 Smart home – introduction 77 2.2.2 Smart home devices – categories 79 2.3 Smart home security 80 2.3.1 Threats 81 2.3.2 Vulnerabilities 82 2.3.3 IoT communication protocols 84 2.3.4 Enhancements to IoT communication protocols 86 2.3.5 IoT security architectures 87 2.4 Smart home authentication mechanisms 91 2.4.1 Stages of defining an authentication protocol for IoT 92 2.4.2 Taxonomy of authentication schemes for IoT 93 2.5 A primer on mutual authentication and key management terminologies 96 2.5.1 X.509 certificate 97 2.5.2 CoAP and DTLS 99 2.5.3 Tls 1.3 101 2.5.4 Key management fundamentals 102 2.6 Mutual authentication in smart home systems 104 2.6.1 Device and user onboarding 105 2.6.2 Flow of user authentication and authorization 106 2.6.3 Examples of mutual authentication schemes 107 2.7 Challenges and open research issues 112 2.8 Conclusion 113 2.9 References 114 Chapter 3 SRAM Physically Unclonable Functions for Smart Home IoT Telehealth Environments 125 Fayez GEBALI and Mohammad MAMUN 3.1 Introduction 126 3.2 Related literature 129 3.3 System design considerations 130 3.4 Silicon physically unclonable functions (PUF) 131 3.4.1 Mutual authentication and key exchange using PUF 132 3.4.2 Fuzzy extractor 133 3.5 Convolutional encoding and Viterbi decoding the SRAM words 133 3.6 CMOS SRAM PUF construction 136 3.6.1 SRAM PUF statistical model 138 3.6.2 Extracting the SRAM cell statistical parameters 141 3.6.3 Obtaining the golden SRAM PUF memory content 142 3.6.4 Bit error rate (BER) 142 3.6.5 Signal-to-noise ratio (SNR) for SRAM PUF 143 3.7 Algorithms for issuing CRP 144 3.7.1 Algorithm #1: single-challenge 144 3.7.2 Algorithm #2: repeated challenge 147 3.7.3 Algorithm #3: repeated challenge with bit selection 148 3.8 Security of PUF-based IoT devices 150 3.9 Conclusions 151 3.10 Acknowledgements 151 3.11 References 151 Chapter 4 IoT Network Security in Smart Homes 155 Manju LATA and Vikas KUMAR 4.1 Introduction 156 4.2 IoT and smart home security 159 4.3 IoT network security 164 4.4 Prevailing standards and initiatives 169 4.5 Conclusion 172 4.6 References 172 Chapter 5 IoT in a New Age of Unified and Zero-Trust Networks and Increased Privacy Protection 177 Sava ZXIVANOVICH, Branislav TODOROVIC, Jean Pierre LORRÉ, Darko TRIFUNOVIC, Adrian KOTELBA, Ramin SADRE and Axel LEGAY 5.1 Introduction 178 5.2 Internet of Things 179 5.3 IoT security and privacy challenges 182 5.3.1 Security challenges 183 5.3.2 Privacy challenges 184 5.4 Literature review 187 5.5 Security and privacy protection with a zero-trust approach 190 5.6 Case study: secure and private interactive intelligent conversational 193 5.6.1 LinTO technical characteristics 194 5.6.2 Use case 195 5.6.3 Use case mapping on the reference architecture 197 5.7 Discussion 197 5.8 Conclusion 198 5.9 Acknowledgements 199 5.10 References 199 Chapter 6 IOT, Deep Learning and Cybersecurity in Smart Homes: A Survey 203 Mirna ATIEH, Omar MOHAMMAD, Ali SABRA and Nehme RMAYTI 6.1 Introduction 203 6.2 Problems encountered 205 6.3 State of the art 207 6.3.1 IoT overview 207 6.3.2 History 208 6.3.3 Literature review 208 6.3.4 Advantages, disadvantages and challenges 209 6.4 IoT architecture 212 6.4.1 Sensing layer 213 6.4.2 Network layer 213 6.4.3 Service layer 213 6.4.4 Application–interface layer 213 6.5 IoT security 214 6.5.1 Security in the sensing layer 214 6.5.2 Security in the network layer 215 6.5.3 Security in the service layer 215 6.5.4 Security in the application–interface layer: 216 6.5.5 Cross-layer threats 216 6.5.6 Security attacks 216 6.5.7 Security requirements in IOT 218 6.5.8 Security solutions for IOT 219 6.6 Artificial intelligence, machine learning and deep learning 221 6.6.1 Artificial intelligence 222 6.6.2 Machine learning 222 6.6.3 Deep learning 224 6.6.4 Deep learning vs machine learning 225 6.7 Smart homes 227 6.7.1 Human activity recognition in smart homes 227 6.7.2 Neural network algorithm for human activity recognition 228 6.7.3 Deep neural networks used in human activity recognition 230 6.8 Anomaly detection in smart homes 233 6.8.1 What are anomalies? 233 6.8.2 Types of anomaly 233 6.8.3 Categories of anomaly detection techniques 233 6.8.4 Related work of anomaly detection in smart homes 234 6.9 Conclusion 237 6.10 References 238 Chapter 7 sTiki: A Mutual Authentication Protocol for Constrained Sensor Devices 245 Corinna SCHMITT, Severin SIFFERT and Burkhard STILLER 7.1 Introduction 246 7.2 Definitions and history of IoT 248 7.3 IoT-related security concerns 251 7.3.1 Security analysis guidelines 253 7.3.2 Security analysis by threat models 255 7.3.3 sTiki’s security expectations 256 7.4 Background knowledge for sTiki 258 7.4.1 Application dependencies for sTiki 258 7.4.2 Inspiring resource-efficient security protocols 260 7.5 The sTiki protocol 264 7.5.1 Design decisions taken 266 7.5.2 Implementation of sTiki’s components 267 7.6 sTiki’s evaluation 270 7.6.1 Secured communication between aggregator and server 271 7.6.2 Secured communication between collector and aggregator 275 7.6.3 Communication costs 276 7.6.4 Integration into an existing system 277 7.6.5 Comparison to existing approaches 278 7.7 Summary and conclusions 279 7.8 Acknowledgements 280 7.9 References 281 List of Authors 287 Index 289

    15 in stock

    £112.50

  • Asymmetric Cryptography: Primitives and Protocols

    ISTE Ltd Asymmetric Cryptography: Primitives and Protocols

    1 in stock

    Book SynopsisPublic key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves. Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what "secure" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange. After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation.Table of ContentsForeword xi David POINTCHEVAL Chapter 1 Public-Key Encryption and Security Notions 1 Nuttapong ATTRAPADUNG and Takahiro MATSUDA 1.1. Basic definitions for PKE 2 1.1.1. Basic notation 2 1.1.2. Public-key encryption 2 1.1.3. IND-CPA and IND-CCA security 2 1.1.4. Other basic security notions and relations 4 1.2. Basic PKE schemes 5 1.2.1. Game-based proofs 5 1.2.2. ElGamal encryption 6 1.2.3. Simplified CS encryption 8 1.2.4. Cramer–Shoup encryption 11 1.2.5. Other specific PKE schemes 14 1.3. Generic constructions for IND-CCA secure PKE 16 1.3.1. Hybrid encryption 17 1.3.2. Naor–Yung construction and extensions 19 1.3.3. Fujisaki–Okamoto and other transforms in the RO model 21 1.3.4. Other generic constructions for IND-CCA secure PKE 23 1.4. Advanced topics 25 1.4.1. Intermediate notions related to CCA 25 1.4.2. IND-CCA security in multi-user setting and tight security 26 1.4.3. Key-dependent message security 28 1.4.4. More topics on PKE 30 1.5. References 31 Chapter 2 Signatures and Security Notions 47 Marc FISCHLIN 2.1. Signature schemes 47 2.1.1. Definition 47 2.1.2. Examples of practical schemes 49 2.2. Unforgeability 51 2.2.1. Discussion 51 2.2.2. Existential unforgeability under chosen-message attacks 53 2.2.3. Unforgeability of practical schemes 54 2.3. Strong unforgeability 56 2.3.1. Discussion 56 2.3.2. Strong existential unforgeability under chosen-message attacks 57 2.3.3. Strong unforgeability of practical schemes 58 2.3.4. Building strongly unforgeable schemes 59 2.4. Summary 60 2.5. References 60 Chapter 3 Zero-Knowledge Proofs 63 Ivan VISCONTI 3.1. Introduction 63 3.2. Notation 64 3.3. Classical zero-knowledge proofs 64 3.3.1. Zero knowledge 65 3.4. How to build a zero-knowledge proof system 68 3.4.1 ZK proofs for all NP 70 3.4.2. Round complexity 71 3.5. Relaxed security in proof systems 72 3.5.1. Honest-verifier ZK 72 3.5.2. Witness hiding/indistinguishability 73 3.5.3. Σ-Protocols 74 3.6. Non-black-box zero knowledge 75 3.7. Advanced notions 75 3.7.1. Publicly verifiable zero knowledge 76 3.7.2. Concurrent ZK and more 77 3.7.3. ZK with stateless players 78 3.7.4. Delayed-input proof systems 79 3.8. Conclusion 80 3.9. References 80 Chapter 4 Secure Multiparty Computation 85 Yehuda LINDELL 4.1. Introduction 85 4.1.1. A note on terminology 87 4.2. Security of MPC 87 4.2.1. The definitional paradigm 87 4.2.2. Additional definitional parameters 89 4.2.3. Adversarial power 89 4.2.4. Modular sequential and concurrent composition 91 4.2.5. Important definitional implications 92 4.2.6. The ideal model and using MPC in practice 92 4.2.7. Any inputs are allowed 92 4.2.8. MPC secures the process, but not the output 92 4.3. Feasibility of MPC 93 4.4. Techniques 94 4.4.1. Shamir secret sharing 94 4.4.2. Honest-majority MPC with secret sharing 95 4.4.3. Private set intersection 97 4.4.4. Threshold cryptography 99 4.4.5. Dishonest-majority MPC 100 4.4.6. Efficient and practical MPC 100 4.5. MPC use cases 101 4.5.1. Boston wage gap (Lapets et al. 2018) 101 4.5.2. Advertising conversion (Ion et al. 2017) 101 4.5.3. MPC for cryptographic key protection (Unbound Security; Sepior; Curv) 101 4.5.4. Government collaboration (Sharemind) 102 4.5.5. Privacy-preserving analytics (Duality) 102 4.6. Discussion 102 4.7. References 103 Chapter 5 Pairing-Based Cryptography 107 Olivier BLAZY 5.1. Introduction 108 5.1.1. Notations 108 5.1.2. Generalities 108 5.2. One small step for man, one giant leap for cryptography 109 5.2.1. Opening Pandora’s box, demystifying the magic 110 5.2.2. A new world of assumptions 112 5.3. A new world of cryptographic protocols at your fingertips 116 5.3.1. Identity-based encryption made easy 117 5.3.2. Efficient deterministic compact signature 118 5.4. References 119 Chapter 6 Broadcast Encryption and Traitor Tracing 121 Duong HIEU PHAN 6.1. Introduction 121 6.2. Security notions for broadcast encryption and TT 123 6.3. Overview of broadcast encryption and TT 125 6.4. Tree-based methods 129 6.5. Code-based TT 132 6.6. Algebraic schemes 135 6.7. Lattice-based approach with post-quantum security 142 6.8. References 143 Chapter 7 Attribute-Based Encryption 151 Romain GAY 7.1. Introduction 151 7.2. Pairing groups 152 7.2.1. Cyclic groups 152 7.2.2. Pairing groups 152 7.3. Predicate encodings 153 7.3.1. Definition 153 7.3.2. Constructions 154 7.4. Attribute-based encryption 156 7.4.1. Definition 156 7.4.2. A modular construction 158 7.5. References 165 Chapter 8 Advanced Signatures 167 Olivier SANDERS 8.1. Introduction 167 8.2. Some constructions 169 8.2.1. The case of scalar messages 169 8.2.2. The case of non-scalar messages 171 8.3. Applications 173 8.3.1. Anonymous credentials 173 8.3.2. Group signatures 176 8.3.3. Direct anonymous attestations 180 8.4. References 184 Chapter 9 Key Exchange 187 Colin BOYD 9.1. Key exchange fundamentals 187 9.1.1. Key exchange parties 188 9.1.2. Key exchange messages 189 9.1.3. Key derivation functions 189 9.2. Unauthenticated key exchange 191 9.2.1. Formal definitions and security models 191 9.2.2. Constructions and examples 192 9.3. Authenticated key exchange 194 9.3.1. Non-interactive key exchange 195 9.3.2. AKE security models 196 9.3.3. Constructions and examples 200 9.4. Conclusion 206 9.5. References 207 Chapter 10 Password Authenticated Key Exchange: Protocols and Security Models 213 Stanislaw JARECKI 10.1. Introduction 213 10.2. First PAKE: EKE 215 10.3. Game-based model of PAKE security 218 10.3.1. The BPR security model 218 10.3.2. Implicit versus explicit authentication 221 10.3.3. Limitations of the BPR model 221 10.3.4. EKE instantiated with Diffie–Hellman KE 223 10.3.5. Implementing ideal cipher on arbitrary groups 224 10.4. Simulation-based model of PAKE security 225 10.4.1. The BMP security model 225 10.4.2. Advantages of BMP definition: arbitrary passwords, tight security 229 10.4.3. EKE using RO-derived one-time pad encryption 230 10.4.4. BMP model for PAKE with explicit authentication (pake-ea) 231 10.5. Universally composable model of PAKE security 232 10.6. PAKE protocols in the standard model 236 10.7. PAKE efficiency optimizations 239 10.8. Asymmetric PAKE: PAKE for the client-server setting 242 10.9. Threshold PAKE 244 10.10. References 246 Chapter 11 Verifiable Computation and Succinct Arguments for NP 257 Dario FIORE 11.1. Introduction 257 11.1.1. Background 258 11.2. Preliminaries 259 11.3. Verifiable computation 260 11.4. Constructing VC 261 11.4.1. VC for circuits in three steps 261 11.4.2. Succinct non-interactive arguments for non-deterministic computation 263 11.4.3. Verifiable computation from SNARG 264 11.5. A modular construction of SNARGs 264 11.5.1. Algebraic non-interactive linear proofs 265 11.5.2. Bilinear groups 267 11.5.3. SNARGs from algebraic NILPs with degree-2 verifiers using bilinear groups 269 11.6. Constructing algebraic NILPs for arithmetic circuits 271 11.6.1. Arithmetic circuits 271 11.6.2. Quadratic arithmetic programs 271 11.6.3. Algebraic NILP for QAPs 274 11.7. Conclusion 279 11.8. References 279 List of Authors 283 Index 285

    1 in stock

    £112.50

  • Cryptography: Breakthroughs in Research and

    Business Science Reference Cryptography: Breakthroughs in Research and

    1 in stock

    Book SynopsisAdvances in technology have provided numerous innovations that make people's daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks also increase. The field of cryptography has become a solution to this ever-increasing problem. Applying strategic algorithms to cryptic issues can help save time and energy in solving the expanding problems within this field.Cryptography: Breakthroughs in Research and Practice examines novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data. Highlighting a range of topics such as cyber security, threat detection, and encryption, this publication is an ideal reference source for academicians, graduate students, engineers, IT specialists, software engineers, security analysts, industry professionals, and researchers interested in expanding their knowledge of current trends and techniques within the cryptology field.

    1 in stock

    £340.85

  • Rethinking the Regulation of Cryptoassets:

    Edward Elgar Publishing Ltd Rethinking the Regulation of Cryptoassets:

    15 in stock

    Book SynopsisThis thought-provoking book challenges the way we think about the regulation of cryptoassets based on cryptographic consensus technology. Bringing a timely new perspective, Syren Johnstone critiques the application of a financial regulation narrative to cryptoassets, questions the assumptions on which it is based, and considers its impact on industry development.Providing new insights into the dynamics of oversight regulation, Johnstone argues that the financial narrative stifles the 'New Prospect' for the formation of novel commercial relationships and institutional arrangements. The book asks whether regulations developed in the 20th century remain appropriate to apply to a technology emerging in the 21st, suggesting it is time to think about how to regulate for ecosystem development. Johnstone concludes with proposals for reform, positing a new framework that facilitates industry aspirations while remaining sustainable and compatible with regulatory objectives.Rethinking the Regulation of Cryptoassets will be an invaluable read for policy makers, regulators and technologists looking for a deeper understanding of the issues surrounding cryptoasset regulation and possible alternative approaches. It will also be of interest to scholars and students researching the intersection of law, technology, regulation and finance.Trade Review‘Prof. Johnstone’s book on the regulation of cryptoassets forces us to think twice about the way we try to regulate the digital economy. He challenges the habit of the regulators to push new disruptive ideas and instruments into old frames and concepts, and invites them to move out of their comfort zone. Rethinking the Regulation of Cryptoassets is a complete account of the challenges we face in developing a crypto-economy and proposes a coherent and sustainable regulatory framework that ensures both market efficiency and technological relevance.’ -- Eva Kaili, Chair of the STOA Committee, Rapporteur of the Blockchain Resolution of the European Parliament, Brussels‘Cryptographic consensus technology presents extraordinary market opportunities but also raises a host of vexing regulatory challenges. Rethinking the Regulation of Cryptoassets maps this complex terrain and charts a way forward, offering a novel approach to the regulatory enterprise to protect against abuses while fostering innovation. Johnstone brings considerable legal, financial, and technological sophistication to the task, and his analysis is at once rigorous and accessible. This book will become essential reading on the future of cryptoassets.’ -- Christopher Bruner, University of Georgia School of Law, US‘The crypto industry moves fast and requires regulatory frameworks that can cater to that pace. Prof. Johnstone brings forward a number of ideas that are worth reflecting on as crypto assets are definitely here to stay.’ -- Henri Arslanian, Global Crypto Leader and Partner, PwC‘Johnstone provides a refreshing way to think about the regulatory limits of applying the standard financial narrative to a technology that is globally programmable but locally valuable. His DBA (Determined-By-Architecture) framework may help align regulation with the borderless possibilities of mathematics.’ -- Pindar Wong, Chairman, VeriFi (Hong Kong) LtdTable of ContentsContents: About the author Foreword Preface Why cryptoasset regulation needs rethinking: an introduction PART I THE INITIAL JOURNEY Acquiring the tradition 2 Cypher fundamentals 3 Responses from the centre PART II THE PRIMARY ISSUES 4 Applying securities laws to cryptoassets 5 Regulatory building blocks and other concerns 6 Complexities in a developing technology PART III THE SECONDARY MARKET 7 An emerging market 8 Cryptoexchange models 9 The concept of an exchange 10 Regulatory concerns PART IV INFLUENCES AND CONSIDERATIONS 11 The ordering of progress 12 Ecosystem development 13 Incrementalism and paradigms PART V FUTURE DIRECTIONS 14 Responding to change 15 Proposals for policy development 16 The origin of cryptocommunity Suggested readings Postscript Index

    15 in stock

    £109.00

  • Essential Cryptography for JavaScript Developers:

    Packt Publishing Limited Essential Cryptography for JavaScript Developers:

    Out of stock

    Book SynopsisDiscover how to take advantage of common cryptographic operations to build safer apps that respect users' privacy with the help of examples in JavaScript for Node.js and browsersKey Features Understand how to implement common cryptographic operations in your code with practical examples Learn about picking modern safe algorithms, which libraries you should rely on, and how to use them correctly Build modern and secure applications that respect your users' privacy with cryptography Book DescriptionIf you're a software developer, this book will give you an introduction to cryptography, helping you understand how to make the most of it for your applications. The book contains extensive code samples in JavaScript, both for Node.js and for frontend apps running in a web browser, although the core concepts can be used by developers working with any programming language and framework. With a purely hands-on approach that is focused on sharing actionable knowledge, you'll learn about the common categories of cryptographic operations that you can leverage in all apps you're developing, including hashing, encryption with symmetric, asymmetric and hybrid ciphers, and digital signatures. You'll learn when to use these operations and how to choose and implement the most popular algorithms to perform them, including SHA-2, Argon2, AES, ChaCha20-Poly1305, RSA, and Elliptic Curve Cryptography. Later, you'll learn how to deal with password and key management. All code in this book is written in JavaScript and designed to run in Node.js or as part of frontend apps for web browsers. By the end of this book, you'll be able to build solutions that leverage cryptography to protect user privacy, offer better security against an expanding and more complex threat landscape, help meet data protection requirements, and unlock new opportunities.What you will learn Write JavaScript code that uses cryptography running within a Node.js environment for the server-side or in frontend applications for web browsers Use modern, safe hashing functions for calculating digests and key derivation, including SHA-2 and Argon2 Practice encrypting messages and files with a symmetric key using AES and ChaCha20-Poly1305 Use asymmetric and hybrid encryption, leveraging RSA and Elliptic Curve Cryptography with ECDH and ECIES Calculate and verify digital signatures using RSA and ECDSA/EdDSA Manage passwords and encryption keys safely Who this book is forThis cryptography book is an introductory guide for software developers who don't necessarily have a background in cryptography but are interested in learning how to integrate it in their solutions, correctly and safely. You'll need to have at least intermediate-level knowledge of building apps with JavaScript and familiarity with Node.js to make the most of this book.Table of ContentsTable of Contents Cryptography for Developers Dealing with Binary and Random Data File and Password Hashing with Node.js Symmetric Encryption in Node.js Using Asymmetric and Hybrid Encryption in Node.js Digital Signatures with Node.js and Trust Introduction to Cryptography in the Browser Performing Common Cryptographic Operations in the Browser

    Out of stock

    £999.99

  • The Political Economy and Feasibility of Bitcoin

    Edward Elgar Publishing Ltd The Political Economy and Feasibility of Bitcoin

    15 in stock

    Book SynopsisIn The Political Economy and Feasibility of Bitcoin and Cryptocurrencies Spencer J. Pack brings his authority as a scholar and advisor to this study of bitcoin and cryptocurrencies from the perspective of the history of economic thought. Major theorists analyzed in depth include Aristotle, Smith, Law, Marx, Keynes, Rothbard and Hayek, and the book draws extensively upon the ideas of Schumpeter, Galbraith and Sraffa.The book argues for reconceptualization of the basic microeconomic categories into rental, sale and financial asset prices along with a reconsideration of Keynes’ general theory to his special theory and Rothbard’s relationship to Rousseau. The author posits that intense theoretical and practical struggles will continue over who should control the quantity of money, the cause of the capitalist economy’s instability, and who or what is more dangerous: concentrated centers of private wealth and private enterprises or the contemporary state. He concludes that in terms of the quality of money, the cryptocurrency community is probably correct, with new forms of money potentially being better than sovereign fiat currency.The book’s relevance will appeal to members of the history of economic thought community, economic theorists, and political science and political theory scholars as well as to policy makers and members of the cryptocurrency community.Trade Review‘At a time when the history of economic thought is unfortunately neglected, it is refreshing to see this book in which Spencer Pack deals brilliantly with a critical contemporaneous and practical issue from the perspective of the history of economic thought. The analysis fills a big gap in the literature on bitcoin and cryptocurrencies.’ -- Imad Moosa, RMIT, AustraliaTable of ContentsContents: Preface PART I ESSENTIAL FOUNDATIONS: BEFORE THE FRENCH REVOLUTION 1. Introduction to The Political Economy and Feasibility of Bitcoin and Cryptocurrencies 2. Aristotle’s (384–322 BCE) seminal contributions to the economics tradition 3. Adam Smith (1723–1790) on money 4. John Law (1671–1729): the financial engineer as social engineer PART II SOME ESSENTIAL DEBATES AND DEVELOPMENTS IN THE MODERN ERA 5. Marx’s (1818–1883) monetary theory: mainstream conservative theory; yet radical, revolutionary challenge 6. Keynes (1883–1946): monetary theorist as capitalism’s saviour – the key issues PART III BLOWBACK 7. The surprising rise of libertarianism and the libertarian response: starring Murray Rothbard (1926–1995) – What Has Government Done to Our Money? 8. On the road again: Friedrich A. Hayek’s (1899–1992) Denationalisation of Money PART IV CURRENT ISSUES ON THE POLITICAL ECONOMY OF BITCOINS AND CRYPTOCURRENCIES 9. Issues raised by bitcoins and cryptocurrencies for monetary theory 10. Issues raised by monetary theory concerning bitcoins and cryptocurrencie References Index

    15 in stock

    £94.00

  • Improving your C# Skills: Solve modern challenges

    Packt Publishing Limited Improving your C# Skills: Solve modern challenges

    2 in stock

    Book SynopsisConquer complex and interesting programming challenges by building robust and concurrent applications with caches, cryptography, and parallel programming.Key Features Understand how to use .NET frameworks like the Task Parallel Library (TPL)and CryptoAPI Develop a containerized application based on microservices architecture Gain insights into memory management techniques in .NET Core Book DescriptionThis Learning Path shows you how to create high performing applications and solve programming challenges using a wide range of C# features. You’ll begin by learning how to identify the bottlenecks in writing programs, highlight common performance pitfalls, and apply strategies to detect and resolve these issues early. You'll also study the importance of micro-services architecture for building fast applications and implementing resiliency and security in .NET Core. Then, you'll study the importance of defining and testing boundaries, abstracting away third-party code, and working with different types of test double, such as spies, mocks, and fakes. In addition to describing programming trade-offs, this Learning Path will also help you build a useful toolkit of techniques, including value caching, statistical analysis, and geometric algorithms. This Learning Path includes content from the following Packt products: C# 7 and .NET Core 2.0 High Performance by Ovais Mehboob Ahmed Khan Practical Test-Driven Development using C# 7 by John Callaway, Clayton Hunt The Modern C# Challenge by Rod Stephens What you will learn Measure application performance using BenchmarkDotNet Leverage the Task Parallel Library (TPL) and Parallel Language Integrated Query (PLINQ)library to perform asynchronous operations Modify a legacy application to make it testable Use LINQ and PLINQ to search directories for files matching patterns Find areas of polygons using geometric operations Randomize arrays and lists with extension methods Use cryptographic techniques to encrypt and decrypt strings and files Who this book is forIf you want to improve the speed of your code and optimize the performance of your applications, or are simply looking for a practical resource on test driven development, this is the ideal Learning Path for you. Some familiarity with C# and .NET will be beneficial.Table of ContentsTable of Contents What's New in .NET Core 2 and C# 7? Understanding .NET Core Internals and Measuring Performance Multithreading and Asynchronous Programming in .NET Core Securing and Implementing Resilience in .NET Core Applications Why TDD is Important Setting Up the .NET Test Environment Setting Up a JavaScript Environment What to Know Before Getting Started Tabula Rasa Testing JavaScript Applications Exploring Integrations Changes in Requirements The Legacy Problem Unraveling a Mess Geometry Randomization Files and Directories Advanced C# and .NET Features Cryptography

    2 in stock

    £37.99

  • Transforming Information Security: Optimizing

    Emerald Publishing Limited Transforming Information Security: Optimizing

    15 in stock

    Book SynopsisThe information security industry is undergoing a major change, forced by the rise of end-to-end encryption, encryption that cannot be intercepted, transport protocol stack evolution, "zero trust networks", and distributed computing. While we understand the logical connections between these trends, there is little analysis of all of these trends in combination. Examination of all five trends uncovers opportunities that not only improve the state of information security and the general posture, but also lead to resource reductions necessary for information security to be sustainable. In this exciting new book from security expert Kathleen M. Moriarty, the examination of all five trends uncovers opportunities to change the state of information security. Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores emerging trends in both information security and transport protocol evolution, going beyond simply pointing out today's problems to providing solutions for the future of our product space.Table of ContentsChapter 1. Interconnected TrendsChapter 2. Board Level Program Evaluation and Guidance Chapter 3. Architect a Secure Network with Less Chapter 4. Encryption Chapter 5. Transport Evolution: The Encrypted Stack Chapter 6. Authentication and Authorization Chapter 7. The End Point Chapter 8. Incident Prevention, Detection, and Response Chapter 9. Looking Forward

    15 in stock

    £43.69

  • CSS in easy steps

    In Easy Steps Limited CSS in easy steps

    1 in stock

    Book SynopsisCSS in easy steps, 4th edition begins by explaining how Cascading Style Sheets (CSS) can determine the presentation of elements within HTML documents. Examples show how style sheet rules can control content position and appearance, and provide dynamic effects with animation, transformations, and transitions. You will also learn how to design responsive web pages that look great viewed on any device. Each chapter builds your knowledge of style sheets. By the end of this book you will have gained a sound understanding of CSS and be able to create your own exciting interactive web pages.CSS in easy steps, 4th edition contains examples that provide clear syntax-highlighted code showing how to selectively style elements of an HTML document and how to endow elements with interactive functionality, to illustrate each aspect of CSS. CSS in easy steps, 4th edition has an easy-to-follow style that will appeal to anyone who wants to begin creating stylish web pages. It will appeal to programmers who want to quickly learn the latest style sheet techniques, and to the student who is studying website design at school or college, and to those seeking a career in web development who need a thorough understanding of CSS.

    1 in stock

    £11.39

  • Networks, Security and Complexity: The Role of

    Edward Elgar Publishing Ltd Networks, Security and Complexity: The Role of

    15 in stock

    Book SynopsisThe end of the 20th century witnessed an information revolution that introduced a host of new economic efficiencies. This economic change was underpinned by rapidly growing networks of infrastructure that have become increasingly complex. In this new era of global security we are now forced to ask whether our private efficiencies have led to public vulnerabilities, and if so, how do we make ourselves secure without hampering the economy. In order to answer these questions, Sean Gorman provides a framework for how vulnerabilities are identified and cost-effectively mitigated, as well as how resiliency and continuity of infrastructures can be increased. Networks, Security and Complexity goes on to address specific concerns such as determining criticality and interdependency, the most effective means of allocating scarce resources for defense, and whether diversity is a viable strategy. The author provides the economic, policy, and physics background to the issues of infrastructure security, along with tools for taking first steps in tackling these security dilemmas. He includes case studies of infrastructure failures and vulnerabilities, an analysis of threats to US infrastructure, and a review of the economics and geography of agglomeration and efficiency. This critical and controversial book will garner much attention and spark an important dialogue. Policymakers, security professionals, infrastructure operators, academics, and readers following homeland security issues will find this volume of great interest.Trade Review'The world is growing more interconnected every day, spun with fiber optic cable, electric power lines, transportation and water networks. Gorman provides a detailed analysis of the pattern of telecommunications networks and their interrelationships with other infrastructure. The work is truly interdisciplinary in scope, and provides planners, policy makers, security analysts, and infrastructure managers and educators in all of these fields with an invaluable resource in terms of a rich database, a methodology, and process for assembling, analyzing and portraying information on key infrastructure assets. This work emphasizes space and place in understanding interconnectivity of physical infrastructure, integrating policy and geography as well as providing an important complement to engineering approaches to interconnected infrastructure. He presents the readers with a broad set of questions and how they can be addressed about threats, risk and vulnerability and policy options for their reduction. This is a rare book of its kind, and joins a growing literature on how complexity is a key factor in understanding and setting policies for the services upon which our society depends.' -- Rae Zimmerman, New York University, US'The concepts of Critical Infrastructure Protection are radically redefining the relationship between the public and private sectors in terms of both our national and economic security. Networks, Security and Complexity is a worthy contribution in defining and advancing many of these concepts. The author is among the vanguard of rising young scholars who will assist this nation in thinking through the significant security challenges faced in the age of information and asymmetric threat.' -- John A. McCarthy, George Mason University School of Law, US'This volume on complex networks opens surprising perspectives for the interested reader, either a scientist or a policymaker. It describes and analyzes in a convincing way the significance of critical infrastructures, be it internet or transport connections. Due insight into the existence and emergence of such infrastructures is a prerequisite for an effective security policy. This study presents a model-based, operational framework for identifying critical domains in dynamic networks. The various concepts are illustrated by means of empirical case examples.' -- Peter Nijkamp, VU University Amsterdam, The NetherlandsTable of ContentsContents: 1. Setting the Stage 2. Private Efficiencies and Public Vulnerabilities 3. Is There a Threat? 4. Literature Review of Conceptual Framework 5. The Vulnerability of Networks and the Resurrection of Distance 6. Packets and Power: The Interdependency of Infrastructure 7. Allocating Scarce Resources for Network Protection 8. Diversity as Defense 9. Conclusion References Appendix Index

    15 in stock

    £90.00

  • Criptomoneda: La guía definitiva para el comercio

    1 in stock

    £17.06

  • The Genesis of Digital Gold: A Comprehensive Look

    1 in stock

    £10.44

  • Public-Key Cryptography – PKC 2019: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I

    Springer Nature Switzerland AG Public-Key Cryptography – PKC 2019: 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I

    1 in stock

    Book SynopsisThe two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.​Table of ContentsCryptographic Protocols.- Digital Signatures.- Zero-Knowledge.- Identity-Based Encryption.- Fundamental Primitives.- Public Key Encryptions.- Functional Encryption.-Obfuscation Based Cryptography.- Re- Encryption Schemes.- Post Quantum Cryptography.

    1 in stock

    £62.99

  • Sequential and Parallel Algorithms and Data

    Springer Nature Switzerland AG Sequential and Parallel Algorithms and Data

    15 in stock

    Book SynopsisThis textbook is a concise introduction to the basic toolbox of structures that allow efficient organization and retrieval of data, key algorithms for problems on graphs, and generic techniques for modeling, understanding, and solving algorithmic problems. The authors aim for a balance between simplicity and efficiency, between theory and practice, and between classical results and the forefront of research. Individual chapters cover arrays and linked lists, hash tables and associative arrays, sorting and selection, priority queues, sorted sequences, graph representation, graph traversal, shortest paths, minimum spanning trees, optimization, collective communication and computation, and load balancing. The authors also discuss important issues such as algorithm engineering, memory hierarchies, algorithm libraries, and certifying algorithms. Moving beyond the sequential algorithms and data structures of the earlier related title, this book takes into account the paradigm shift towards the parallel processing required to solve modern performance-critical applications and how this impacts on the teaching of algorithms. The book is suitable for undergraduate and graduate students and professionals familiar with programming and basic mathematical language. Most chapters have the same basic structure: the authors discuss a problem as it occurs in a real-life situation, they illustrate the most important applications, and then they introduce simple solutions as informally as possible and as formally as necessary so the reader really understands the issues at hand. As they move to more advanced and optional issues, their approach gradually leads to a more mathematical treatment, including theorems and proofs. The book includes many examples, pictures, informal explanations, and exercises, and the implementation notes introduce clean, efficient implementations in languages such as C++ and Java.Trade Review“The style of the book is accessible and is suitable for a wide range of audiences, from mathematicians and computer scientists to researchers from other fields who would like to use parallelised approaches in their research.” (Irina Ioana Mohorianu, zbMATH 1445.68003, 2020)Table of ContentsAppetizer: Integer Arithmetic.- Introduction.- Representing Sequences by Arrays and Linked Lists.- Hash Tables and Associative Arrays.- Sorting and Selection.- Priority Queues.- Sorted Sequences.- Graph Representation.- Graph Traversal.- Shortest Paths.- Minimum Spanning Trees.- Generic Approaches to Optimization.- Collective Communication and Computation.- Load Balancing.- App. A, Mathematical Background.- App. B, Computer Architecture Aspects.- App. C, Support for Parallelism in C++.- App. D, The Message Passing Interface (MPI).- App. E, List of Commercial Products, Trademarks and Licenses.

    15 in stock

    £39.99

  • Quantum Key Distribution: An Introduction with

    Springer Nature Switzerland AG Quantum Key Distribution: An Introduction with

    1 in stock

    Book SynopsisThis textbook introduces the non-specialist reader to the concepts of quantum key distribution and presents an overview of state-of-the-art quantum communication protocols and applications. The field of quantum cryptography has advanced rapidly in the previous years, not least because with the age of quantum computing drawing closer, traditional encryption methods are at risk.The textbook presents the necessary mathematical tools without assuming much background, making it accessible to readers without experience in quantum information theory. In particular, the topic of classical and quantum entropies is presented in great detail. Furthermore, the author discusses the different types of quantum key distribution protocols and explains several tools for proving the security of these protocols. In addition, a number of applications of quantum key distribution are discussed, demonstrating its value to state-of-the-art cryptography and communication. This book leads the reader through the mathematical background with a variety of worked-out examples and exercises. It is primarily targeted at graduate students and advanced undergraduates in theoretical physics. The presented material is largely self-contained and only basic knowledge in quantum mechanics and linear algebra is required.Table of Contents

    1 in stock

    £31.34

  • Blockchain, Artificial Intelligence, and the

    Springer Nature Switzerland AG Blockchain, Artificial Intelligence, and the

    1 in stock

    Book SynopsisThis book provides basic concepts and deep knowledge about various security mechanisms that can be implemented in IoT through Blockchain technology. This book aids readers in gaining insight and knowledge about providing security and solutions to different challenges in IoT using Blockchain technology. This book primarily focuses on challenges to addressing the integration of the IoT with Blockchain with respect to potential benefits for IoT. This book gives descriptive analysis of Blockchain integrated with IoT applications and platforms for the development of IoT solutions along with possible topologies to that integration. Several application examples are included in a variety of industries. Table of Contents1) A comprehensive Survey on Blockchain and Cryptocurrency Technologies: Approaches, Challenges and Opportunities2) Intelligent Traffic Management with Prioritized Scheduling System3) Data Mining based Metrics for the Systematic Evaluation of Software Project Management Methodologies4) Blockchain Technology Applications for Next Generation5) An Automated System to Ensure High-Availability Deployment of IoT Devices6) Blockchain based IoT Architecture for Software Defined Networking7) Blockchain Technology use cases in Health Care Management: State of Art Framework and Performance Evaluation8) Secure Vehicular Communication using Blockchain Technology9) BLOCK CHAINS TECHNOLOGY IN HEALTH CARE10) Blockchain utilization in Crowdsensing, Cyber Physical Systems, Cloud Computing, Edge Computing & Social Network11) Blockchain for the Industrial IoT Applications12) Blockchain-Based IOT Architecture

    1 in stock

    £37.49

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account