• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Information Theory

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]

  więcej...
• Turystyka
 [52246]
• Informatyka
 [151406]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Information Theory

ilość książek w kategorii: 3033

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Cryptographics: Exploiting Graphics Cards for Security Cook, Debra 9781441939647 Springer
Cryptographics: Exploiting Graphics Cards for Security

ISBN: 9781441939647 / Angielski / Miękka / 140 str.

ISBN: 9781441939647/Angielski/Miękka/140 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Debra Cook; Angelos Keromytis

Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes.

CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. As the processing power of GPUs increases, research involving the use of GPUs...

Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficult...

cena: 407,25

 Computer Viruses and Malware John Aycock 9781441940162 Not Avail
Computer Viruses and Malware

ISBN: 9781441940162 / Angielski / Miękka / 228 str.

ISBN: 9781441940162/Angielski/Miękka/228 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John Aycock

Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare.

Computer Viruses and Malware...

Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger...

cena: 529,44

 Multivariate Public Key Cryptosystems Jintai Ding Jason E. Gower Dieter S. Schmidt 9781441940773 Not Avail
Multivariate Public Key Cryptosystems

ISBN: 9781441940773 / Angielski / Miękka / 260 str.

ISBN: 9781441940773/Angielski/Miękka/260 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jintai Ding; Jason E. Gower; Dieter S. Schmidt

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC will become a necessary alternative.

Multivariate Public Key Cryptosystems systematically presents the subject matter for a broad audience. The first chapter is an introduction to the basic ideas and early development of both...

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly be...

cena: 488,71

 Malware Detection Mihai Christodorescu Somesh Jha Douglas Maughan 9781441940957 Not Avail
Malware Detection

ISBN: 9781441940957 / Angielski / Miękka / 312 str.

ISBN: 9781441940957/Angielski/Miękka/312 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mihai Christodorescu; Somesh Jha; Douglas Maughan

Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Given the deleterious affects of malware on our cyber infrastructure, identifying malicious programs is an important goal. Unfortunately, malware detectors have...

Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medi...

cena: 1221,84

 Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks Radha Poovendran Cliff Wang Sumit Roy 9781441940964 Springer
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks

ISBN: 9781441940964 / Angielski / Miękka / 394 str.

ISBN: 9781441940964/Angielski/Miękka/394 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Radha Poovendran; Cliff Wang; Sumit Roy

Localization is a critical process in mobile ad hoc networks and wireless sensor networks. Wireless sensor node or MANET devices need to know the network's location or its relative location, with respect to the rest of the network neighbors. However, due to the open spectrum nature of wireless communication, it is subject to attacks and intrusions. Hence the wireless network synchronization needs to be both robust and secure. Furthermore, issues such as energy constraints and mobility make the localization process even more challenging.

Secure Localization and Time...

Localization is a critical process in mobile ad hoc networks and wireless sensor networks. Wireless sensor node or MANET devices need to know the n...

cena: 837,35

 Artificial Intelligence Applications and Innovations: 3rd Ifip Conference on Artificial Intelligence Applications and Innovations (Aiai), 2006, June 7 Maglogiannis, Ilias 9781441941688 Springer
Artificial Intelligence Applications and Innovations: 3rd Ifip Conference on Artificial Intelligence Applications and Innovations (Aiai), 2006, June 7

ISBN: 9781441941688 / Angielski / Miękka / 744 str.

ISBN: 9781441941688/Angielski/Miękka/744 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ilias Maglogiannis; Kostas Karpouzis

Artificial Intelligence applications build on a rich and proven theoretical background to provide solutions to a wide range of real life problems. The ever expanding abundance of information and computing power enables researchers and users to tackle higly interesting issues for the first time, such as applications providing personalized access and interactivity to multimodal information based on preferences and semantic concepts or human-machine interface systems utilizing information on the affective state of the user. The purpose of the 3rd IFIP Conference on Artificial Intelligence...

Artificial Intelligence applications build on a rich and proven theoretical background to provide solutions to a wide range of real life problems. ...

cena: 610,90

 Information Theory and Network Coding Raymond W. Yeung 9781441946300 Not Avail
Information Theory and Network Coding

ISBN: 9781441946300 / Angielski / Miękka / 580 str.

ISBN: 9781441946300/Angielski/Miękka/580 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Raymond W. Yeung
This book is an evolution from my book A First Course in Information Theory published in 2002 when network coding was still at its infancy. The last few years have witnessed the rapid development of network coding into a research ?eld of its own in information science. With its root in infor- tion theory, network coding has not only brought about a paradigm shift in network communications at large, but also had signi?cant in?uence on such speci?c research ?elds as coding theory, networking, switching, wireless c- munications, distributeddatastorage, cryptography, andoptimizationtheory. While...
This book is an evolution from my book A First Course in Information Theory published in 2002 when network coding was still at its infancy. The last f...
cena: 264,71

 Topics in Geometry, Coding Theory and Cryptography Arnaldo Garcia Henning Stichtenoth 9789048173457 Springer
Topics in Geometry, Coding Theory and Cryptography

ISBN: 9789048173457 / Angielski / Miękka / 201 str.

ISBN: 9789048173457/Angielski/Miękka/201 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Arnaldo Garcia; Henning Stichtenoth

The theory of algebraic function fields over finite fields has its origins in number theory. However, after Goppas discovery of algebraic geometry codes around 1980, many applications of function fields were found in different areas of mathematics and information theory. This book presents survey articles on some of these new developments. The topics focus on material which has not yet been presented in other books or survey articles.


The theory of algebraic function fields over finite fields has its origins in number theory. However, after Goppas discovery of algebraic geometry ...

cena: 203,61

 Transdisciplinary Advancements in Cognitive Mechanisms and Human Information Processing Yingxu Wang 9781609605537 Information Science Reference
Transdisciplinary Advancements in Cognitive Mechanisms and Human Information Processing

ISBN: 9781609605537 / Angielski / Twarda / 436 str.

ISBN: 9781609605537/Angielski/Twarda/436 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yingxu Wang
Cognitive informatics is a multidisciplinary field that acts as the bridge between natural science and information science. Specifically, it investigates the potential applications of information processing and natural intelligence to science and engineering disciplines. Transdisciplinary Advancements in Cognitive Mechanisms and Human Information Processing examines innovative research in the emerging, multidisciplinary field of cognitive informatics. Researchers, practitioners and students can benefit from discussions of the connections between natural science and informatics that are...
Cognitive informatics is a multidisciplinary field that acts as the bridge between natural science and information science. Specifically, it investiga...
cena: 939,75

 Vlsi-Soc: Advanced Topics on Systems on a Chip: A Selection of Extended Versions of the Best Papers of the Fourteenth International Conference on Very Reis, Ricardo 9781441947086 Springer
Vlsi-Soc: Advanced Topics on Systems on a Chip: A Selection of Extended Versions of the Best Papers of the Fourteenth International Conference on Very

ISBN: 9781441947086 / Angielski / Miękka / 290 str.

ISBN: 9781441947086/Angielski/Miękka/290 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ricardo Reis; Vincent Mooney; Paul Hasler
This book contains extended and revised versions of the best papers that were presented during the fifteenth edition of the IFIP/IEEE WG10.5 International Conference on Very Large Scale Integration, a global System-on-a-Chip Design & CAD conference. The 15th conference was held at the Georgia Institute of Technology, Atlanta, USA (October 15-17, 2007). Previous conferences have taken place in Edinburgh, Trondheim, Vancouver, Munich, Grenoble, Tokyo, Gramado, Lisbon, Montpellier, Darmstadt, Perth and Nice. The purpose of this conference, sponsored by IFIP TC 10 Working Group 10.5 and by the...
This book contains extended and revised versions of the best papers that were presented during the fifteenth edition of the IFIP/IEEE WG10.5 Internati...
cena: 407,25

 Trust Management III: Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009, Proceedings Elena Ferrari, Ninghui Li, Elisa Bertino, Yücel Karabulut 9783642101908 Springer-Verlag Berlin and Heidelberg GmbH &
Trust Management III: Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009, Proceedings

ISBN: 9783642101908 / Angielski / Miękka / 319 str.

ISBN: 9783642101908/Angielski/Miękka/319 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Elena Ferrari;Ninghui Li;Elisa Bertino
This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, IFIPTM 2009, held in West Lafayette, IN, USA, in June 2009. The 17 revised full papers presented together with one invited paper and 5 demo descriptions were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on social aspects and usability, trust reasoning and processing, data security, enhancements to subjective logic, information sharing, risk assessment, and simulation of trust and reputation systems.
This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, IFIPTM 2009, held in West Lafayette, IN, USA, in J...
cena: 407,25

 Coding and Cryptology: Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings Yeow Meng Chee, Zhenbo Guo, San Ling, Fengjing Shao, Yuansheng Tang, Huaxiong Wang, Chaoping Xing 9783642209000 Springer-Verlag Berlin and Heidelberg GmbH &
Coding and Cryptology: Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings

ISBN: 9783642209000 / Angielski / Miękka / 295 str.

ISBN: 9783642209000/Angielski/Miękka/295 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yeow Meng Chee;Zhenbo Guo;San Ling
Constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC 2011, held in Qingdao, China, May 30-June 3, 2011. This title covers a range of foundational and methodological as well as applicative issues in coding and cryptology, as well as related areas such as combinatorics.
Constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC 2011, held in Qingdao, China, May 30-June 3, 2...
cena: 203,61

 Beginning T-SQL 2012 Scott Shaw 9781430237044 COMPUTER BOOKSHOPS
Beginning T-SQL 2012

ISBN: 9781430237044 / Angielski / Miękka / 456 str.

ISBN: 9781430237044/Angielski/Miękka/456 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Scott Shaw
Beginning T-SQL 2012 is the first step toward learning the T-SQL language that underlies Microsoft's SQL Server database engine. T-SQL is essential in writing SQL statements to get data into and out of a database. T-SQL is the foundation for business logic embedded in the database in the form of stored procedures and functions. Beginning T-SQL 2012 starts you on the path to mastering T-SQL, with an emphasis on best practices and sound coding techniques.

Beginning T-SQL 2012 begins with an introduction to databases, normalization, and to SQL Server Management...

Beginning T-SQL 2012 is the first step toward learning the T-SQL language that underlies Microsoft's SQL Server database engine. T-SQL is ess...
cena: 203,61

 Noiseless Steganography: The Key to Covert Communications Desoky, Abdelrahman 9781439846216 Auerbach Publications
Noiseless Steganography: The Key to Covert Communications

ISBN: 9781439846216 / Angielski / Twarda / 300 str.

ISBN: 9781439846216/Angielski/Twarda/300 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Abdelrahman Desoky

Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind:

  • The first to comprehensively cover Linguistic Steganography
  • The first to comprehensively cover Graph Steganography
  • The first to comprehensively cover Game Steganography

Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These...

Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind:

  • The ...
cena: 673,31

 Algebraic and Stochastic Coding Theory Dave K. Kythe Prem K. Kythe 9781439881811 CRC Press
Algebraic and Stochastic Coding Theory

ISBN: 9781439881811 / Angielski / Twarda / 512 str.

ISBN: 9781439881811/Angielski/Twarda/512 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dave K. Kythe; Prem K. Kythe

Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes.

After a brief review of coding history and Boolean algebra, the book introduces linear codes,...

Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand...

cena: 847,88

 Economics of Information Security and Privacy III Bruce Schneier 9781461419808 Springer
Economics of Information Security and Privacy III

ISBN: 9781461419808 / Angielski / Twarda / 283 str.

ISBN: 9781461419808/Angielski/Twarda/283 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bruce Schneier
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations...
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining...
cena: 610,90

 Perspectives and Implications for the Development of Information Infrastructures Panos Constantinides 9781466616226 Information Science Reference
Perspectives and Implications for the Development of Information Infrastructures

ISBN: 9781466616226 / Angielski / Twarda / 270 str.

ISBN: 9781466616226/Angielski/Twarda/270 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Panos Constantinides
In the same way that infrastructures such as transportation, electricity, sewage, and water supply are widely assumed to be integrators of urban spaces, information infrastructures are assumed to be integrators of information spaces. With the advent of Web 2.0 and new types of information infrastructures such as online social networks and smart mobile platforms, a more in-depth understanding of the various rights to access, use, develop, and modify information infrastructure resources is necessary. Perspectives and Implications for the Development of Information Infrastructures aims at...
In the same way that infrastructures such as transportation, electricity, sewage, and water supply are widely assumed to be integrators of urban space...
cena: 914,01

 Cryptographic Hardware and Embedded Systems -- CHES 2011: 13th International Workshop, Nara, Japan, September 28 - October 1, 2011, Proceedings Preneel, Bart 9783642239502 Springer
Cryptographic Hardware and Embedded Systems -- CHES 2011: 13th International Workshop, Nara, Japan, September 28 - October 1, 2011, Proceedings

ISBN: 9783642239502 / Angielski / Miękka / 524 str.

ISBN: 9783642239502/Angielski/Miękka/524 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bart Preneel; Tsuyoshi Takagi
This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections named: FPGA implementation; AES; elliptic curve cryptosystems; lattices; side channel attacks; fault attacks; lightweight symmetric algorithms, PUFs; public-key cryptosystems; and hash functions.
This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japa...
cena: 203,61

 Theoretical and Mathematical Foundations of Computer Science: Second International Conference, ICTMF 2011, Singapore, May 5-6, 2011, Selected Papers Zhou, Qihai 9783642249983 Springer
Theoretical and Mathematical Foundations of Computer Science: Second International Conference, ICTMF 2011, Singapore, May 5-6, 2011, Selected Papers

ISBN: 9783642249983 / Angielski / Miękka / 632 str.

ISBN: 9783642249983/Angielski/Miękka/632 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Qihai Zhou
This book constitutes the refereed post-proceedings of the Second International Conference on Theoretical and Mathematical Foundations of Computer Science, ICTMF 2011, held in Singapore in May 2011. The conference was held together with the Second International Conference on High Performance Networking, Computing, and Communication systems, ICHCC 2011, which proceedings are published in CCIS 163. The 84 revised selected papers presented were carefully reviewed and selected for inclusion in the book. The topics covered range from computational science, engineering and technology to digital...
This book constitutes the refereed post-proceedings of the Second International Conference on Theoretical and Mathematical Foundations of Computer Sci...
cena: 407,25

 Cryptology and Network Security: 10th International Conference, CANS 2011 Sanya, China, December 10-12, 2011 Proceedings Lin, Dongdai 9783642255120 Springer
Cryptology and Network Security: 10th International Conference, CANS 2011 Sanya, China, December 10-12, 2011 Proceedings

ISBN: 9783642255120 / Angielski / Miękka / 313 str.

ISBN: 9783642255120/Angielski/Miękka/313 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dongdai Lin; Gene Tsudik; Xiaoyun Wang
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmetric cryptanalysis, symmetric ciphers, public key cryptography, protocol attacks, and privacy techniques.
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, Chin...
cena: 203,61

Pierwsza Podprzednia  109  110  111  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia