• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Yi Mu - książki

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2950560]
• Literatura piękna
 [1849509]

  więcej...
• Turystyka
 [71097]
• Informatyka
 [151150]
• Komiksy
 [35848]
• Encyklopedie
 [23178]
• Dziecięca
 [617388]
• Hobby
 [139064]
• AudioBooki
 [1657]
• Literatura faktu
 [228597]
• Muzyka CD
 [383]
• Słowniki
 [2855]
• Inne
 [445295]
• Kalendarze
 [1464]
• Podręczniki
 [167547]
• Poradniki
 [480102]
• Religia
 [510749]
• Czasopisma
 [516]
• Sport
 [61293]
• Sztuka
 [243352]
• CD, DVD, Video
 [3414]
• Technologie
 [219456]
• Zdrowie
 [101002]
• Książkowe Klimaty
 [124]
• Zabawki
 [2311]
• Puzzle, gry
 [3459]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8079]
Kategorie szczegółowe BISAC
 Information and Communication Security: Second International Conference, Icics'99 Sydney, Australia, November 9-11, 1999 Proceedings Varadharajan, Vijay 9783540666820 Springer
Information and Communication Security: Second International Conference, Icics'99 Sydney, Australia, November 9-11, 1999 Proceedings

Varadharajan, Vijay
ICICS 99, the Second International Conference on Information and C- munication Security, was held in Sydney, Australia, 9-11 November 1999. The conference was sponsored by the Distributed System and Network Security - search Unit, University of Western Sydney, Nepean, the Australian Computer Society, IEEE Computer Chapter (NSW), and Harvey World Travel. I am g- teful to all these organizations for their support of the conference. The conference brought together researchers, designers, implementors and users of information security systems and technologies. A range of aspects was addressed...
ICICS 99, the Second International Conference on Information and C- munication Security, was held in Sydney, Australia, 9-11 November 1999. The confer...
cena: 201,24
 Information Security and Privacy: Second Australasian Conference, Acisp '97, Sydney, Nsw, Australia, July 7-9, 1997 Proceedings Varadharajan, Vijav 9783540632320 Springer
Information Security and Privacy: Second Australasian Conference, Acisp '97, Sydney, Nsw, Australia, July 7-9, 1997 Proceedings

Varadharajan, Vijav
This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997.
The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications.
This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NS...
cena: 201,24
 Information Security and Privacy: 17th Australasian Conference, Acisp 2012, Wollongong, Nsw, Australia, July 9-11, 2012. Proceedings Susilo, Willy 9783642314476 Springer
Information Security and Privacy: 17th Australasian Conference, Acisp 2012, Wollongong, Nsw, Australia, July 9-11, 2012. Proceedings

Susilo, Willy
This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography.
This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong...
cena: 201,24
 Network and System Security: 6th International Conference, Nss 2012, Wuyishan, Fujian, China, November 21-23, Proceedings Xu, Li 9783642346002 Springer
Network and System Security: 6th International Conference, Nss 2012, Wuyishan, Fujian, China, November 21-23, Proceedings

Xu, Li
This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control.
This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian,...
cena: 201,24
 Information Security and Privacy: 19th Australasian Conference, Acisp 2014, Wollongong, Nsw, Australia, July 7-9, 2014. Proceedings Susilo, Willy 9783319083438 Springer
Information Security and Privacy: 19th Australasian Conference, Acisp 2014, Wollongong, Nsw, Australia, July 7-9, 2014. Proceedings

Susilo, Willy
This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in Wollongong, NSW, Australia, in July 2014. The 26 revised full papers and 6 short papers presented in this volume were carefully selected from 91 submissions. The papers are organized in topical sections on cryptanalysis; cryptographic protocols; fine-grain cryptographic protocols; key exchange, fundamentals, lattices and homomorphic encryption, and applications.
This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in...
cena: 201,24


Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia