
ilość książek w kategorii: 5020
![]() |
Crime Prevention Technologies and Applications for Advancing Criminal Investigation
ISBN: 9781466617582 / Angielski / Twarda / 2012 / 350 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The tools of crime constantly evolve, and law enforcement and forensic investigators must understand advanced forensic techniques to ensure that the most complete evidence is brought to trial. Paramount also the need for investigators to ensure that evidence adheres to the boundaries of the legal system, a place where policy often lags behind new innovations. Crime Prevention Technologies and Applications for Advancing Criminal Investigation addresses the use of electronic devices and software for crime prevention, investigation, and the application of a broad spectrum of sciences to answer...
The tools of crime constantly evolve, and law enforcement and forensic investigators must understand advanced forensic techniques to ensure that the m...
|
cena:
999,40 |
![]() |
Ethical Impact of Technological Advancements and Applications in Society
ISBN: 9781466617735 / Angielski / Twarda / 2012 / 358 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In the modern era each new innovation poses its own special ethical dilemma. How can human society adapt to these new forms of expression, commerce, government, citizenship, and learning while holding onto its ethical and moral principles? Ethical Impact of Technological Advancements and Applications in Society explores the ethical challenges of these innovations, providing cutting-edge analysis of designs, developments, impacts, policies, theories, and methodologies related to ethical aspects of technology in society. It advances scholarship on both in established areas such as computer...
In the modern era each new innovation poses its own special ethical dilemma. How can human society adapt to these new forms of expression, commerce, g...
|
cena:
999,40 |
![]() |
Post-Quantum Cryptography Using Complexity
ISBN: 9781469959139 / Angielski / Miękka / 2009 / 144 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This is the version of Michael James de Mare's PhD thesis submitted to his Ph.D. defense in 2009. It includes the Dragonfire cipher and a primitive version of 3SAT-based cryptography. Subsequent research into 3SAT revealed the appropriate constants to make 3SAT-based cryptography work.
This is the version of Michael James de Mare's PhD thesis submitted to his Ph.D. defense in 2009. It includes the Dragonfire cipher and a primitive ve...
|
cena:
64,70 |
![]() |
E-Commerce Security: Advice from Experts
ISBN: 9781591402411 / Angielski / Twarda / 2003 / 196 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Provides insight and practical knowledge obtained from industry leaders regarding the overall successful management of e-commerce practices and solutions.
Provides insight and practical knowledge obtained from industry leaders regarding the overall successful management of e-commerce practices and soluti...
|
cena:
115,42 |
![]() |
Web and Information Security
ISBN: 9781591405887 / Angielski / Twarda / 2005 / 318 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Web and Information Security consists of a collection of papers written by leading experts in the field that describe state-of-the-art topics pertaining to Web and information systems security. In particular, security for the semantic Web, privacy, security policy management and emerging topics such as secure semantic grids and secure multimedia systems are also discussed. As well as covering basic concepts of Web and information system security, this book provides new insights into the semantic Web field and its related security challenges. Web and Information Security is valuable as a...
Web and Information Security consists of a collection of papers written by leading experts in the field that describe state-of-the-art topics pertaini...
|
cena:
458,84 |
![]() |
Web Semantics Ontology
ISBN: 9781591409052 / Angielski / Twarda / 2006 / 300 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Web Semantics & Ontology provides an excellent overview of current research and development activities, while covering an extensive range of topics including ontological modeling, enterprise systems, querying and knowledge discovery, and a wide range of applications. Each chapter contains a thorough study of the topic, systematic proposed work, and a comprehensive list of references. The theoretical and practical aspects of Web semantics and ontology development combine to bring a unique perspective to this book. Researchers, software developers, and IT students who want to enhance their...
Web Semantics & Ontology provides an excellent overview of current research and development activities, while covering an extensive range of topics in...
|
cena:
458,84 |
![]() |
Steganography
ISBN: 9781594576676 / Angielski / Miękka / 2005 / 120 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Steganography is a process which involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process which can be used for example by civil rights organizations in repressive states to communicate their message to the outside world without their own government being aware of it. Less virtuously it can be used by terrorists to communicate with one another without anyone else's knowledge. In both cases the objective is not to make it difficult to...
Steganography is a process which involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be se...
|
cena:
40,43 |
![]() |
Software Security Engineering: Design & Applications
ISBN: 9781614701286 / Angielski / Twarda / 2011 / 272 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Provides design guidelines on software security which can benefit practitioners, researchers, learners, and educators. This book discusses such topics as: systematic approaches to engineering; building and assuring software security throughout software lifecycle; software security based requirements engineering; and, design for software security.
Provides design guidelines on software security which can benefit practitioners, researchers, learners, and educators. This book discusses such topics...
|
cena:
499,52 |
![]() |
Strategies for Trusted Identities & Infrastructure in Cyberspace
ISBN: 9781614701743 / Angielski / Twarda / 2012 / 147 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Cyberspace provides a platform for innovation and prosperity and the means to improve general welfare around the globe. This book explores the national strategies for cyberspace policy review and trusted identities in cyberspace striving to enhance online choice, efficiency, security and privacy.
Cyberspace provides a platform for innovation and prosperity and the means to improve general welfare around the globe. This book explores the nationa...
|
cena:
661,14 |
![]() |
Digital Document Analysis & Processing
ISBN: 9781621003267 / Angielski / Twarda / 2012 / 356 str. Termin realizacji zamówienia: ok. 30 dni roboczych. One possible solution to the increased amount of paper generated by mankind over the years is to use the computer and its associated possibility of storing digital information. This book covers the main aspects of document analysis and processing, including digitisation, storage, thresholding, filtering, segmentation and automatic recognition.
One possible solution to the increased amount of paper generated by mankind over the years is to use the computer and its associated possibility of st...
|
cena:
999,09 |
![]() |
Cryptography: Protocols, Design & Applications
ISBN: 9781621007791 / Angielski / Twarda / 2013 / 242 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
1005,27 |
![]() |
The Hidden Corporation: A Data Management Security Novel
ISBN: 9781935504184 / Angielski / Miękka / 2011 / 192 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. If you wonder why good companies lose lots of personal information, and are not sure if your company is immune from this disaster, this insightful book shines a bright light on the hidden processes in most companies where data governance and information security are usually absent. These gaps are often the root cause of sensitive data loss. Follow cybersecurity specialist Nancy MacBaron who fights in the corporate trenches against criminal hackers intent on stealing her company's sensitive information, yet discovers hidden data security gaps in her corporation while investigating a... If you wonder why good companies lose lots of personal information, and are not sure if your company is immune from this disaster, this insightful ... |
cena:
73,03 |
![]() |
Complete Guide to Internet Privacy, Anonymity & Security
ISBN: 9783950309300 / Angielski / Miękka / 2011 / 306 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Millions of people have their identities stolen every year. This comprehensive and easy-to-read guide explains how to surf the Internet freely and get downloads without censorship or restriction, prevent identity theft and keep cyber-criminals from hacking into a computer, and stop search engines, social networking sites, and powerful Internet players from tracking and profiling users.
Millions of people have their identities stolen every year. This comprehensive and easy-to-read guide explains how to surf the Internet freely and get...
|
cena:
77,03 |
![]() |
Security for Mobility
ISBN: 9780863413377 / Angielski / Twarda / 2003 / 466 str. Termin realizacji zamówienia: ok. 30 dni roboczych. As the mobile phone becomes ubiquitous and the divisions between PCs, personal digital assistants, mobiles phones and other mobile devices becomes blurred, the security both of the information handled by these devices and the devices themselves becomes increasingly important. The book covers many aspects of security for mobility including current developments, underlying technologies, network security, mobile code issues, application security and the future.
As the mobile phone becomes ubiquitous and the divisions between PCs, personal digital assistants, mobiles phones and other mobile devices becomes blu...
|
cena:
568,25 |
![]() |
Error-Correcting Codes, Finite Geometries and Cryptography
ISBN: 9780821849569 / Angielski / Miękka / 2010 / 244 str. Termin realizacji zamówienia: ok. 30 dni roboczych. The volume features cutting-edge theoretical results on the Reed-Muller and Reed-Solomon codes, classical linear codes, codes from nets and block designs, LDPC codes, perfect quantum and orthogonal codes, iterative decoding, magnetic storage and digital memory devices, and MIMO channels. There are new contributions on privacy reconciliation, resilient functions, cryptographic hash functions, and new work on quantum coins. Related original work in finite geometries concerns two-weight codes coming from partial spreads, (0,1) matrices with forbidden configurations, AndrU embeddings, and...
The volume features cutting-edge theoretical results on the Reed-Muller and Reed-Solomon codes, classical linear codes, codes from nets and block desi...
|
cena:
563,24 |
![]() |
Applied Cryptology, Cryptographic Protocols, and Computer Security Models
ISBN: 9780821800416 / Angielski / Miękka / 1983 / 192 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
543,65 |
![]() |
Non-commutative Cryptography and Complexity of Group-theoretic Problems
ISBN: 9780821853603 / Angielski / Twarda / 2011 / 413 str. Termin realizacji zamówienia: ok. 30 dni roboczych. This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It explores how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It also shows that there is remarkable feedback from cryptography to combinatorial group theory because some of the problems motivated by cryptography appear to be new to group theory, and they open many interesting research avenues within group theory. In particular, a lot...
This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, ...
|
cena:
563,24 |
![]() |
Indexing Multimedia and Creative Works: The Problems of Meaning and Interpretation
ISBN: 9780754632542 / Angielski / Twarda / 2005 / 224 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Indexing and information retrieval work properly only if language and interpretation are shared by creator and user. This is more complex for non-verbal media. The authors of Indexing Multimedia and Creative Works explore these challenges against a background of different theories of language and communication, particularly semiotics, questioning the possibility of ideal multimedia indexing. After surveying traditional approaches to information retrieval (IR) and organization in relation to issues of meaning, particularly Panofskya s a levels of meaninga, Pauline Rafferty and Rob Hidderley...
Indexing and information retrieval work properly only if language and interpretation are shared by creator and user. This is more complex for non-verb...
|
cena:
710,17 |
![]() |
Visual Interface Design for Digital Cultural Heritage: A Guide to Rich-Prospect Browsing
ISBN: 9781409404224 / Angielski / Twarda / 2011 / 206 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Browsing for information is a significant part of most research activity, but many online collections hamper browsing with interfaces that are variants on a search box. Research shows that rich-prospect interfaces can offer an intuitive and highly flexible alternative environment for information browsing, assisting hypothesis formation and pattern-finding. This unique book offers a clear discussion of this form of interface design, including a theoretical basis for why it is important, and examples of how it can be done. It will be of interest to those working in the fields of library and...
Browsing for information is a significant part of most research activity, but many online collections hamper browsing with interfaces that are variant...
|
cena:
734,66 |
![]() |
Networks, Security and Complexity: The Role of Public Policy in Critical Infrastructure Protection
ISBN: 9781843769521 / Angielski / Twarda / 2005 / 160 str. Termin realizacji zamówienia: ok. 30 dni roboczych. In 1997, for his doctoral dissertation in public policy from George Mason University, Gorman (public policy, George Mason U.) began constructing a map of all the interdependent telecommunications and information technology networks, gas pipelines, railroad systems, and electric power lines in the US. After 9-11, he extended that effort to assist th
In 1997, for his doctoral dissertation in public policy from George Mason University, Gorman (public policy, George Mason U.) began constructing a map...
|
cena:
520,71 |