
ilość książek w kategorii: 5012
![]() |
Basics of Contemporary Cryptography for It Practitioners
ISBN: 9789812564054 / Angielski / Twarda / 2005 / 208 str. Termin realizacji zamówienia: ok. 30 dni roboczych. The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques and facilities of contemporary cryptography, proving key results along the way. The contents of the first five chapters can be used for one-semester course.
The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conve...
|
cena:
401,61 |
![]() |
Security in Distributed and Networking Systems
ISBN: 9789812708076 / Angielski / Twarda / 2007 / 512 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Provides a treatment on security issues in distributed systems and network systems. This book includes security studies in a range of systems including peer-to-peer networks, distributed systems, Internet, wireless networks, Internet service, e-commerce, mobile and pervasive computing.
Provides a treatment on security issues in distributed systems and network systems. This book includes security studies in a range of systems includin...
|
cena:
783,64 |
![]() |
Secure Computer and Network Systems: Modeling, Analysis and Design
ISBN: 9780470023242 / Angielski / Twarda / 2008 / 354 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of computer and network applications. Yet, our dependence on computer and network systems has also exposed us to new risks, which threaten the security of, and present new challenges for protecting our assets and information on computer and network systems. The reliability of computer and network systems ultimately depends on security and quality of service (QoS) performance.
This book presents quantitative modeling and... Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by...
|
cena:
597,78 |
![]() |
Security and Software for Cybercafes
ISBN: 9781599049038 / Angielski / Twarda / 2008 / 360 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are traveling, to access Web mail and instant messages, read newspapers, and explore other resources of the Internet. Due to the important role Internet cafes play in facilitating access to information, there is a need for their systems to have well-installed software in order to ensure smooth service delivery.
Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are...
|
cena:
922,53 |
![]() |
Cryptographic Hardware and Embedded Systems - Ches 2007: 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings
ISBN: 9783540747345 / Angielski / Miękka / 2007 / 488 str. Termin realizacji zamówienia: ok. 22 dni roboczych. CHES2007, theninthworkshoponCryptographicHardwareandEmbeddedS- tems, was sponsored by the International Association for Cryptologic Research (IACR) and held in Vienna, Austria, September 10-13, 2007. The workshop - ceived 99 submissions from 24 countries, of which the Program Committee (39 members from 15 countries) selected 31 for presentation. For the ?rst time in the history of CHES, each submission was reviewed by at least four reviewers instead of three (and at least ?ve for submissions by PC members, those now being limited to two per member) and many submitted papers have received...
CHES2007, theninthworkshoponCryptographicHardwareandEmbeddedS- tems, was sponsored by the International Association for Cryptologic Research (IACR) an...
|
cena:
201,24 |
![]() |
Security in Wireless Mesh Networks
ISBN: 9780849382505 / Angielski / Twarda / 2008 / 552 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. To achieve these aims, security mechanisms are essential to ensure trusted on-going communications.
Security in Wireless Mesh Networks explores key security challenges set in diverse scenarios, as well as emerging standards that include... Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is ...
|
cena:
612,21 |
![]() |
Nearest Neighbor Search:: A Database Perspective
ISBN: 9780387229638 / Angielski / Twarda / 2004 / 170 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Modern applications are both data and computationally intensive and require the storage and manipulation of voluminous traditional (alphanumeric) and nontraditional data sets (images, text, geometric objects, time-series). Examples of such emerging application domains are: Geographical Information Systems (GIS), Multimedia Information Systems, CAD/CAM, Time-Series Analysis, Medical Information Sstems, On-Line Analytical Processing (OLAP), and Data Mining. These applications pose diverse requirements with respect to the information and the operations that need to be supported. From the... Modern applications are both data and computationally intensive and require the storage and manipulation of voluminous traditional (alphanumeric) a... |
cena:
402,53 |
![]() |
Shifting the Security Paradigm - The Risks of Information Assurance
ISBN: 9783836427395 / Angielski / Miękka / 2007 / 52 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. As the Department of Defense (DoD) moves to create decision superiority through the use of Network Centric Operations (NCO), decision-makers become increasingly exposed to data quality vulnerabilities that mimic integrity failures within the Information Assurance (IA) security program. This is a result of the current IA policies not having the controls needed to mitigate risks involving data quality (accuracy, relevance, timeliness, usability, completeness, brevity, and security) beyond the current list of limited security issues. Such narrowness of scope increases uncertainty among...
As the Department of Defense (DoD) moves to create decision superiority through the use of Network Centric Operations (NCO), decision-makers become ...
|
cena:
195,77 |
![]() |
VoIP Network Security and Forensic Models Using Patterns
ISBN: 9783836428132 / Angielski / Miękka / 2007 / 204 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Voice over Internet Protocol (VoIP) networks is becoming the most popular telephony system in the world. However, studies of the security of VoIP networks are still in their infancy. VoIP devices and networks are commonly attacked, and it is therefore necessary to analyze the threats against the converged network and the techniques that exist today to stop or mitigate these attacks. We also need to understand what evidence can be obtained from the VoIP system after an attack has occurred.
Many of these attacks occur in similar ways in different contexts or environments. Generic solutions to... Voice over Internet Protocol (VoIP) networks is becoming the most popular telephony system in the world. However, studies of the security of VoIP netw...
|
cena:
316,96 |
![]() |
Interactive Information Retrieval in Digital Environments
ISBN: 9781599042404 / Angielski / Twarda / 2008 / 378 str. Termin realizacji zamówienia: ok. 30 dni roboczych. The emergence of the Internet allows millions of people to use a variety of electronic information retrieval systems, such as: digital libraries, Web search engines, online databases, and online public access catalogs. Interactive Information Retrieval in Digital Environments provides theoretical framework in understanding the nature of information retrieval, and offers implications for the design and evolution of interactive information retrieval systems. Interactive Information Retrieval in Digital Environments includes the integration of existing frameworks on user-oriented information...
The emergence of the Internet allows millions of people to use a variety of electronic information retrieval systems, such as: digital libraries, Web ...
|
cena:
510,39 |
![]() |
Computer Security, Privacy, and Politics: Current Issues, Challenges, and Solutions
ISBN: 9781599048048 / Angielski / Twarda / 2008 / 358 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations and habits, with major political and social implications. Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions connects privacy and politics, offering a point-in-time review of recent developments of computer security, with a...
The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms,...
|
cena:
512,26 |
![]() |
Multimedia Forensics and Security
ISBN: 9781599048697 / Angielski / Twarda / 2008 / 418 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research and development agendas for researchers, organizations, and governments worldwide. "Multimedia Forensics and Security" provides an in-depth treatment of advancements in the emerging field of multimedia forensics and security by tackling challenging issues such as digital watermarking for copyright...
As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication network...
|
cena:
922,53 |
![]() |
Beyond Centralised Search Engines- An Agent-Based Filtering Framework
ISBN: 9783836412223 / Angielski / Miękka / 2007 / 312 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
316,96 |
![]() |
Securing Peer-to-Peer Video Conferences - From concepts to implementations
ISBN: 9783836452823 / Angielski / Miękka / 2007 / 168 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
316,96 |
![]() |
Beautiful Security: Leading Security Experts Explain How They Think
ISBN: 9780596527488 / Angielski / Miękka / 2009 / 302 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by exercising enormous creativity, and those defending against them must do the same.
Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology dem... |
cena:
164,92 |
![]() |
Handbook of Research on Information Security and Assurance
ISBN: 9781599048550 / Angielski / Twarda / 2008 / 586 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest protective measures and services to prevent cyber attacks. The Handbook of Research on Information Security and Assurance offers comprehensive definitions and explanations on topics such as firewalls, information warfare, encryption standards, and social...
While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities as...
|
cena:
1358,16 |
![]() |
Network Security: Know It All
ISBN: 9780123744630 / Angielski / Twarda / 2008 / 350 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security. Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the field's leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources. * Chapters contributed by recognized...
Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the fi...
|
cena:
293,81 |
![]() |
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
ISBN: 9780596514839 / Angielski / Miękka / 2008 / 314 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc security assessments, these recipes are repeatable, concise, and systematic-perfect for integrating into your regular test suite. Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in ... |
cena:
154,10 |
![]() |
It Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement
ISBN: 9781420086171 / Angielski / Twarda / 2008 / 305 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Information technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practices, focused auditing activities, a functioning system of internal control, and a close watch by the board s audit committee and CEO. Written as a contribution to the accounting and auditing professions as well as to IT practitioners, IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement links these two key business strategies and explains how to perform IT auditing in a comprehensive and strategic... Information technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practi... |
cena:
612,21 |
![]() |
Coastal Lagoons: Critical Habitats of Environmental Change
ISBN: 9781420088304 / Angielski / Twarda / 2010 / 568 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Dynamic and productive ecosystems, coastal lagoons play an important role in local economies and often bear the brunt of coastal development, agricultural, and urban waste, overuse from fisheries, aquaculture, transportation, energy production, and other human activities. The features that make coastal lagoons vital ecosystems underline the importance of sound management strategies for long-term environmental and resource sustainability. Written by an internationally renowned group of contributors, Coastal Lagoons: Critical Habitats of Environmental Change examines the... Dynamic and productive ecosystems, coastal lagoons play an important role in local economies and often bear the brunt of coastal development, agric... |
cena:
1004,03 |