
ilość książek w kategorii: 5019
![]() |
Ubiquitous Health and Medical Informatics: The Ubiquity 2.0 Trend and Beyond
ISBN: 9781615207770 / Angielski / Twarda / 2010 / 730 str. Termin realizacji zamówienia: ok. 30 dni roboczych. "This book is specific to the field of medical informatics and ubiquitous health care and highlights the use of new trends based on the new initiatives of Web 2.0"--Provided by publisher.
"This book is specific to the field of medical informatics and ubiquitous health care and highlights the use of new trends based on the new initiative...
|
cena:
1252,79 |
![]() |
Smart Grid Security: An End-To-End View of Security in the New Electrical Grid
ISBN: 9781439855874 / Angielski / Twarda / 2011 / 328 str. Termin realizacji zamówienia: ok. 22 dni roboczych. The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is a vital concern not only for cyber-security practitioners, engineers, policy makers, and utility executives, but also for the media and consumers. Smart Grid Security: An End-to-End View of Security in the New Electrical Grid explores the important techniques, challenges, and forces that will shape how we achieve a secure twenty-first century electric grid.
The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is a vital concern not only for...
|
cena:
759,15 |
![]() |
Starting, Strengthening and Managing Institutional Repositories: A How-To-Do-It Manual
ISBN: 9781555706890 / Angielski / Miękka / 2010 / 168 str. Termin realizacji zamówienia: ok. 30 dni roboczych. From planning to promoting and everything in between, this new How-To-Do-It Manual fills the need for a book focused on managing your institutional repository (IR). The author covers every aspect of IR development in detail, and the book's clear adn logical organization makes it valuable as a cover-to-cover read or for consulting as a reference. Following an in-depth look into IR uses, benefits, and management practices, there is start-to-finish guidance covering: the librarian's role in IR implementation; planning, budgeting, and staffing; commercial and open source platforms; policy...
From planning to promoting and everything in between, this new How-To-Do-It Manual fills the need for a book focused on managing your institutional re...
|
cena:
377,13 |
![]() |
Rc4 Stream Cipher and Its Variants
ISBN: 9781439831359 / Angielski / Twarda / 2011 / 311 str. Termin realizacji zamówienia: ok. 22 dni roboczych. RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. They also explore variants of RC4 and the eSTREAM finalist HC-128. After an introduction to the vast field of cryptology, the book reviews hardware and software stream ciphers and describes RC4. It presents a theoretical analysis of RC4 KSA, discussing biases of the permutation bytes toward secret key bytes and absolute... RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive experti... |
cena:
881,59 |
![]() |
Cyber-Security and Threat Politics: US Efforts to Secure the Information Age
ISBN: 9780415429818 / Angielski / Twarda / 2007 / 192 str. Termin realizacji zamówienia: ok. 22 dni roboczych. This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US. Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat... This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in ... |
cena:
734,66 |
![]() |
Lattice Basis Reduction: An Introduction to the LLL Algorithm and Its Applications
ISBN: 9781439807026 / Angielski / Twarda / 2011 / 332 str. Termin realizacji zamówienia: ok. 22 dni roboczych. First developed in the early 1980s by Lenstra, Lenstra, and Lovasz, the LLL algorithm was originally used to provide a polynomial-time algorithm for factoring polynomials with rational coefficients. It very quickly became an essential tool in integer linear programming problems and was later adapted for use in cryptanalysis. This book provides an introduction to the theory and applications of lattice basis reduction and the LLL algorithm. With numerous examples and suggested exercises, the text discusses various applications of lattice basis reduction to cryptography, number theory,... First developed in the early 1980s by Lenstra, Lenstra, and Lovasz, the LLL algorithm was originally used to provide a polynomial-time algorithm fo... |
cena:
612,21 |
![]() |
New Technologies for Digital Crime and Forensics: Devices, Applications, and Software
ISBN: 9781609605155 / Angielski / Twarda / 2011 / 374 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. New Technologies for Digital Crime and Forensics: Devices, Applications, and Software provides theories, methods, and studies on digital crime prevention and investigation, which are useful to a broad range of researchers and communities. This field is under constant evolution as the nature of digital crime continues to change and new methods for tracking and preventing digital attacks are developed.
New Technologies for Digital Crime and Forensics: Devices, Applications, and Software provides theories, methods, and studies on digital crime prevent...
|
cena:
922,53 |
![]() |
Securing Strats in Linux Platforms and Applications
ISBN: 9780763791896 / Angielski / Miękka / 2010 / 512 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Security Strategies In Linux Platforms And Applications Covers Every Major Aspect Of Security On A Linux System. Written By An Industry Expert, This Book Is Divided Into Three Natural Parts To Illustrate Key Concepts In The Field. It Opens With A Discussion On The Risks, Threats, And Vulnerabilities Associated With Linux As An Operating System Using Examples From Red Hat Enterprise Linux And Ubuntu. Part 2 Discusses How To Take Advantage Of The Layers Of Security Available To Linux--User And Group...
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Security Strategies In Linux Platforms And Applications Cov...
|
cena:
545,52 |
![]() |
Business Continuity: Best Practices - World-Class Business Continuity Managemen
ISBN: 9781931332224 / Angielski / Miękka / 2005 / 294 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book is a guide to implementation of World-Class Business Continuity Management within an enterprise. It may be used as a step-by-step guide by those new to Business Continuity Management or dipped into by the more seasoned professional for ideas and updates on specific topics. There is no absolute "right way" to perform business continuity management - although there are plenty of wrong ways. Business Continuity is not rocket science: it is applied common sense. Yes, experience helps, but it is no mystic art. This book makes the processes transparent and provide the reader with...
This book is a guide to implementation of World-Class Business Continuity Management within an enterprise. It may be used as a step-by-step guide by t...
|
cena:
388,38 |
![]() |
Emergency Notification
ISBN: 9780313365874 / Angielski / Twarda / 2010 / 210 str. Termin realizacji zamówienia: ok. 30 dni roboczych. To grasp the importance of emergency notification, imagine this scenario: A shooter is on the loose at a college campus. Chaos reigns. To contain the situation, campus personnel need to communicate immediately and efficiently, not only with the students, faculty, and staff, but also the local police, federal law enforcement, and media. Effective emergency notification makes things "right," it allows the right message to reach the right people at the right time--facilitating the right response. "Emergency Notification" explains how. This book offers must-know information for business... To grasp the importance of emergency notification, imagine this scenario: A shooter is on the loose at a college campus. Chaos reigns. To contain t... |
cena:
216,53 |
![]() |
I Found It on the Internet: Coming of Age Online
ISBN: 9780838910665 / Angielski / Miękka / 2010 / 248 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Today's teens immerse themselves in the world of technology as never before. But texting, tweeting, chatting, blogging, and other social networking largely occur in a free-for-all environment of unbridled access; quality takes a backseat to quantity. To help librarians, educators, and parents step in to guide teens' decision making, Frances Jacobson Harris offers a thoroughly updated edition of her classic book, including Advice on how to help young people make good decisions, especially in such thorny areas as music and media sharingTools for formulating information and communication...
Today's teens immerse themselves in the world of technology as never before. But texting, tweeting, chatting, blogging, and other social networking la...
|
cena:
190,75 |
![]() |
Staying Safe at School
ISBN: 9781439858288 / Angielski / Miękka / 2011 / 158 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Now more than ever before, today s schools are hazard zones. Students are vulnerable to attack from other students and random individuals who may appear to be harmless on the surface or who may be sending out warning signals. Either way, to save their lives or protect themselves from injury, they must be prepared. Now in its second edition, Staying Safe at School is a guidebook that every parent and school administrator should make available to students. Concise and practical, this book will show teenagers how to:
Now more than ever before, today s schools are hazard zones. Students are vulnerable to attack from other students and random individuals who may a... |
cena:
156,68 |
![]() |
Thinking of...Backing Up Data In Your Business? Ask the Smart Questions
ISBN: 9781907453045 / Angielski / Miękka / 2010 / 128 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Although backup and recovery seems as simple as copying bits from point to point, it is far more challenging to implement properly when considering the details involved. This book captures the decades of backup and storage experience that Gareth Fraser-King and Guy Bunker have in the industry and make them ideally suited to provide the insights and questions you should be asking of your backup vendor or provider.Pat Hanavan, Vice President, Symantec Corporation
Although backup and recovery seems as simple as copying bits from point to point, it is far more challenging to implement properly when considering th...
|
cena:
109,21 |
![]() |
Digital Signatures: A Survey of Law and Practice in the European Union
ISBN: 9781855734692 / Angielski / Miękka / 1999 / 466 str. Termin realizacji zamówienia: ok. 30 dni roboczych. With the explosion of e-commerce, and especially the use of the internet for business transactions, the "paperless office" should surely already have become a reality. Its progress has, however, been impede by tha lack of sufficient information security and a workable legal framework. So where are we now? Can we really trust electronic business transactions to be reliable, provable and enforceable, even on an international basis? Find the answers in this ground-breaking study undertaken for the European Commission. Carried out by the Interdisciplinary Centre for law and Information...
With the explosion of e-commerce, and especially the use of the internet for business transactions, the "paperless office" should surely already have ...
|
cena:
979,55 |
![]() |
Organizing Information: From the Shelf to the Web
ISBN: 9781856045780 / Angielski / Miękka / 2007 / 256 str. Termin realizacji zamówienia: ok. 30 dni roboczych. LIS professionals will have to be conversant with all the tools and techniques for organizing information in different domains - from traditional library shelf to full-scale digital libraries. This text covers the organization of the entire spectrum of information, and the principles, tools and techniques needed to do this effectively.
LIS professionals will have to be conversant with all the tools and techniques for organizing information in different domains - from traditional libr...
|
cena:
293,62 |
![]() |
Digitale Signaturen
ISBN: 9783540423515 / Angielski / Twarda / 2001 / 280 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Digitale Signaturen basieren auf kryptographischen Algorithmen. Nationale Gesetze zielen auf die beweisrechtliche Gleichstellung digitaler/elektronischer Signaturen mit handschriftlichen Unterschriften. Die Falschungssicherheit digitaler Signaturen ist dabei eine wesentliche Voraussetzung. Im Buch werden die bekannten Verfahren der Gultigkeitsprufung digitaler Signaturen vorgestellt, Probleme analysiert und neue Losungsansatze vorgeschlagen. Dabei werden die Vorgaben des Signaturgesetzes und X.509 berucksichtigt. Die Theorie uber Abgabe und Zugang von Erklarungen des BGB wird dem Verfahren...
Digitale Signaturen basieren auf kryptographischen Algorithmen. Nationale Gesetze zielen auf die beweisrechtliche Gleichstellung digitaler/elektronisc...
|
cena:
263,32 |
![]() |
Police Reform in China
ISBN: 9781439819692 / Angielski / Twarda / 2011 / 416 str. Termin realizacji zamówienia: ok. 22 dni roboczych. An investigation of policing reform in China, this text offers an insider's perspective through the use of empirical data from the Chinese police, as well as legal literature. It documents the day-to-day operations of the Chinese police and presents an evidence-based assessment of the impact of reforms on the society.
An investigation of policing reform in China, this text offers an insider's perspective through the use of empirical data from the Chinese police, as ...
|
cena:
710,17 |
![]() |
Computational Number Theory
ISBN: 9781439866153 / Angielski / Twarda / 2013 / 614 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Developed from the author s popular graduate-level course, Computational Number Theory presents a complete treatment of number-theoretic algorithms. Avoiding advanced algebra, this self-contained text is designed for advanced undergraduate and beginning graduate students in engineering. It is also suitable for researchers new to the field and practitioners of cryptography in industry. Requiring no prior experience with number theory or sophisticated algebraic tools, the book covers many computational aspects of number theory and highlights important and... Developed from the author s popular graduate-level course, Computational Number Theory presents a complete treatment of number-the... |
cena:
587,73 |
![]() |
Communication and Cyberspace
ISBN: 9781572733947 / Angielski Termin realizacji zamówienia: ok. 30 dni roboczych. A study of communication in the electronic environment known as cyberspace. It features essays on theoretical contexts, discussion and research on cybernetworks and cyberspaces, studies of new senses of space and navigation (cybernautics) and explorations of cybercommunication and cyberculture.
A study of communication in the electronic environment known as cyberspace. It features essays on theoretical contexts, discussion and research on cyb...
|
cena:
141,98 |
![]() |
Honeypots: A New Paradigm to Information Security
ISBN: 9781578087082 / Angielski / Twarda / 2011 / 340 str. Termin realizacji zamówienia: ok. 22 dni roboczych. A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses honeypots from a variety of perspectives. Case studies enhance the practical understanding of the subject along with strong theoretical foundation. The book covers the latest technology in information security and honeypots, including honeytokens, honeynets and honeyfarms. Topics include denial of service, virus, worms, phishing, and elaborates on virtual honeypots and forensics. Practical implementations as well as current state of research are discussed. A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses honeypots from a variety of perspectives. Ca... |
cena:
881,59 |