• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » książki  » Advances in Information Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946912]
• Literatura piękna
 [1852311]

  więcej...
• Turystyka
 [71421]
• Informatyka
 [150889]
• Komiksy
 [35717]
• Encyklopedie
 [23177]
• Dziecięca
 [617324]
• Hobby
 [138808]
• AudioBooki
 [1671]
• Literatura faktu
 [228371]
• Muzyka CD
 [400]
• Słowniki
 [2841]
• Inne
 [445428]
• Kalendarze
 [1545]
• Podręczniki
 [166819]
• Poradniki
 [480180]
• Religia
 [510412]
• Czasopisma
 [525]
• Sport
 [61271]
• Sztuka
 [242929]
• CD, DVD, Video
 [3371]
• Technologie
 [219258]
• Zdrowie
 [100961]
• Książkowe Klimaty
 [124]
• Zabawki
 [2341]
• Puzzle, gry
 [3766]
• Literatura w języku ukraińskim
 [255]
• Art. papiernicze i szkolne
 [7810]
Kategorie szczegółowe BISAC
 
Molecular Mechanisms of Metal Toxicity and Carcinogenesis

Xianglin Shi; Vince Castranova; Val Vallyathan
During the last two decades, chemical and cellular studies have contributed enormously to our understanding of metal-induced carcinogenesis, and many hypotheses on the role of metals in pathophysiological processes have been investigated. In addition, new techniques are available to shed light on the mechanism of carcinogenesis in molecular terms. This conference on Molecular Mechanisms of Metal Toxicity and Carcinogenesis in September 2000 focused on the latest research in molecular mechanisms of metal-induced toxicity and carcinogenesis. The conference promoted a multidisciplinary...
During the last two decades, chemical and cellular studies have contributed enormously to our understanding of metal-induced carcinogenesis, and many ...
cena: 602,40
 
Trusted Recovery and Defensive Information Warfare

Peng Liu; Sushil Jajodia; Liu Peng Liu
Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prevention, traditional information security research has focused little on the ability to survive successful attacks, which can seriously impair the integrity and availability of a system.
Trusted Recovery And Defensive Information Warfare uses database trusted recovery, as an example, to illustrate the principles of trusted recovery in defensive information warfare. Traditional database recovery mechanisms do not address trusted...
Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prev...
cena: 401,58
 
Operations Research/Management Science at Work

Erhan Kozan; Azuma Ohuchi; Erhan Kozan
The principle aim of this book, entitled "Operations ResearchlManagement Science at Work," is to provide a summary snapshot of recent research in and applications of Operations Research (OR)/ Management Science (MS) in the Asia-pacific region. The book emphasises research having potential industry interest, covering a wide range of topics from major fields of ORIMS in a systematic and coherent fashion and shows the elegance of their implementations. The book is intended to serve the needs of applied researchers who are interested in applications of ORIMS algorithms. The book includes...
The principle aim of this book, entitled "Operations ResearchlManagement Science at Work," is to provide a summary snapshot of recent research in and ...
cena: 602,40
 
Applications of Data Mining in Computer Security

Daniel Barbara; Sushil Jajodia; Daniel Barbara

Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences. From this perspective, it was just a matter of time for the discipline to reach the important area of computer security. Applications Of Data Mining In Computer Security presents a collection of research efforts on the use of data mining in computer security.

Data mining has been loosely defined as the process of...

Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, lo...

cena: 401,58
 
Secure Electronic Voting

Dimitris Gritzalis; Dimitris Gritzalis
Secure Electronic Voting is an edited volume, which includes chapters authored by leading experts in the field of security and voting systems. The chapters identify and describe the given capabilities and the strong limitations, as well as the current trends and future perspectives of electronic voting technologies, with emphasis in security and privacy. Secure Electronic Voting includes state-of-the-art material on existing and emerging electronic and Internet voting technologies, which may eventually lead to the development of adequately secure e-voting...
Secure Electronic Voting is an edited volume, which includes chapters authored by leading experts in the field of security and voting...
cena: 401,58
 
Disseminating Security Updates at Internet Scale

Jun Li; Peter Reiher; Gerald J. Popek

Disseminating Security Updates at Internet Scale describes a new system, "Revere," that addresses these problems. "Revere" builds large-scale, self-organizing and resilient overlay networks on top of the Internet to push security updates from dissemination centers to individual nodes. "Revere" also sets up repository servers for individual nodes to pull missed security updates. This book further discusses how to protect this push-and-pull dissemination procedure and how to secure "Revere" overlay networks, considering possible attacks and countermeasures....

Disseminating Security Updates at Internet Scale describes a new system, "Revere," that addresses these problems. "Revere" builds ...

cena: 401,58
 
Intrusion Detection in Distributed Systems: An Abstraction-Based Approach

Peng Ning; Ning Peng Ning; Xiaoyang Sean Wang
Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.
Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect...
cena: 200,77
 
Synchronizing E-Security

Godfried Williams
Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies. This book presents insights into the validity and credibility of current risk assessment methods that support electronic transactions in the global economy. Synchronizing E-Security focuses on a number of case studies of IT companies, within selected countries in West Africa, Europe, Asia and the United States. The foundation of this work is based on...
Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electro...
cena: 401,58
 
Economics of Information Security

L. Jean Camp; Stephen Lewis

Economics of Information Security applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security. Security, privacy and trusted computing are examined distinctly, using the tools of economics, and as elements of a larger dynamic system.

Economics of Information Security is designed for researchers and managers struggling to understand the risks in organizations dependent on secure networks. This book is also suitable for students in computer science, policy and...

Economics of Information Security applies economics not to generate breakthroughs in theoretical economics, but rather breakthroug...

cena: 602,40
 
DNA Computing Models

Zoya Ignatova; Israel Martinez-Perez

Sir Francis Crick would undoubtedly be at the front of the line ordering this fascinating book. Being one of the discoverers of DNA, he would be amazed at how his work has been applied to mankind's most important invention, the computer. DNA contains the genetic instructions for the biological development of cellular life forms or viruses. DNA computing uses DNA as a substrate for storing information, while molecular biological operations are used to manipulate this information.

DNA Computing Models begins with a comprehensive introduction to the field of DNA computing. This book...

Sir Francis Crick would undoubtedly be at the front of the line ordering this fascinating book. Being one of the discoverers of DNA, he would be am...

cena: 602,40
ilość książek w kategorii: 174
Pierwsza Podprzednia  4  5  6  Następna Ostatnia


Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia