![]() |
Noiseless Steganography: The Key to Covert Communications
ISBN: 9781439846216 / Angielski / Twarda / 300 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind:
Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These... Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind:
|
cena:
612,21 |
![]() |
Algebraic and Stochastic Coding Theory
ISBN: 9781439881811 / Angielski / Twarda / 512 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes. After a brief review of coding history and Boolean algebra, the book introduces linear codes,... Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand... |
cena:
783,64 |
![]() |
Economics of Information Security and Privacy III
ISBN: 9781461419808 / Angielski / Twarda / 283 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations...
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining...
|
cena:
603,81 |
![]() |
Perspectives and Implications for the Development of Information Infrastructures
ISBN: 9781466616226 / Angielski / Twarda / 270 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the same way that infrastructures such as transportation, electricity, sewage, and water supply are widely assumed to be integrators of urban spaces, information infrastructures are assumed to be integrators of information spaces. With the advent of Web 2.0 and new types of information infrastructures such as online social networks and smart mobile platforms, a more in-depth understanding of the various rights to access, use, develop, and modify information infrastructure resources is necessary. Perspectives and Implications for the Development of Information Infrastructures aims at...
In the same way that infrastructures such as transportation, electricity, sewage, and water supply are widely assumed to be integrators of urban space...
|
cena:
896,90 |
![]() |
Cryptographic Hardware and Embedded Systems -- CHES 2011: 13th International Workshop, Nara, Japan, September 28 - October 1, 2011, Proceedings
ISBN: 9783642239502 / Angielski / Miękka / 524 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections named: FPGA implementation; AES; elliptic curve cryptosystems; lattices; side channel attacks; fault attacks; lightweight symmetric algorithms, PUFs; public-key cryptosystems; and hash functions.
This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japa...
|
cena:
201,24 |
![]() |
Theoretical and Mathematical Foundations of Computer Science: Second International Conference, ICTMF 2011, Singapore, May 5-6, 2011, Selected Papers
ISBN: 9783642249983 / Angielski / Miękka / 632 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed post-proceedings of the Second International Conference on Theoretical and Mathematical Foundations of Computer Science, ICTMF 2011, held in Singapore in May 2011. The conference was held together with the Second International Conference on High Performance Networking, Computing, and Communication systems, ICHCC 2011, which proceedings are published in CCIS 163. The 84 revised selected papers presented were carefully reviewed and selected for inclusion in the book. The topics covered range from computational science, engineering and technology to digital...
This book constitutes the refereed post-proceedings of the Second International Conference on Theoretical and Mathematical Foundations of Computer Sci...
|
cena:
402,53 |
![]() |
Cryptology and Network Security: 10th International Conference, CANS 2011 Sanya, China, December 10-12, 2011 Proceedings
ISBN: 9783642255120 / Angielski / Miękka / 313 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmetric cryptanalysis, symmetric ciphers, public key cryptography, protocol attacks, and privacy techniques.
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, Chin...
|
cena:
201,24 |
![]() |
Information Security Technology for Applications: 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revi
ISBN: 9783642279362 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto University in Espoo, Finland in October 2010. This title covers such topics as network security; monitoring and reputation; privacy; policy enforcement; and, more.
Constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto Univer...
|
cena:
201,24 |
![]() |
Plunkett's Infotech Industry Almanac 2017: Infotech Industry Market Research, Statistics, Trends & Leading Companies
ISBN: 9781628314281 / Angielski / Miękka / 652 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A complete market research guide to the InfoTech industry-for strategic planning, competitive intelligence, employment searches or financial research. Contains computer, software and network trends analysis; statistical tables; and glossary. Includes our profiles of the 500 top global InfoTech firms, public and private, U.S. and international.
A complete market research guide to the InfoTech industry-for strategic planning, competitive intelligence, employment searches or financial research....
|
cena:
1420,35 |
![]() |
Analytics for Managers: With Excel
ISBN: 9780415622691 / Angielski / Twarda / 328 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Analytics is one of a number of terms which are used to describe a data-driven more scientific approach to management. Ability in analytics is an essential management skill: knowledge of data and analytics helps the manager to analyze decision situations, prevent problem situations from arising, identify new opportunities, and often enables many millions of dollars to be added to the bottom line for the organization. The objective of this book is to introduce analytics from the perspective of the general manager of a corporation. Rather than examine the details or attempt an... Analytics is one of a number of terms which are used to describe a data-driven more scientific approach to management. Ability in analytics is an e... |
cena:
930,57 |
![]() |
Webbasierte Datenintegration: Ansätze Zur Messung Und Sicherung Der Informationsqualität in Heterogenen Datenbeständen Unter Verwendung Eines Vollst
ISBN: 9783834807236 / Niemiecki / Miękka / 198 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Die Autoren diskutieren die Problematik der Datenqualitat, und entwickeln ein webbasiertes Werkzeug, welches die Integration der Daten ermoglicht und die Qualitat der Datenbestande testet. Die Analyse der Bestande, das Auffinden von Duplikaten und die Bereinigung der Daten stehen dabei im Fokus dieses Werkzeuges, welches eine Grundlage fur eine umfassende Datenqualitats- und Bereinigungslosung darstellen kann.
Die Autoren diskutieren die Problematik der Datenqualitat, und entwickeln ein webbasiertes Werkzeug, welches die Integration der Daten ermoglicht und ...
|
cena:
263,32 |
![]() |
Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings
ISBN: 9783642289132 / Angielski / Miękka / 656 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge.
This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in ...
|
cena:
201,24 |
![]() |
Running IT Like a Business: Accenture's Step-By-Step Guide
ISBN: 9781849283564 / Angielski / Miękka / 142 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Global management, technology and outsourcing company Accenture has achieved incredible results through the transformation of its IT function. It has doubled its revenues in ten years, significantly decreased its IT spending, despite an increase in workforce of nearly 300%, and its number of satisfied customers is growing and growing. Discover how it has achieved all this, and how you can realize similar benefits in your organization. Running IT like a Business, Second edition shows you how your IT function can provide much more than products and services and add real value to your business....
Global management, technology and outsourcing company Accenture has achieved incredible results through the transformation of its IT function. It has ...
|
cena:
202,27 |
![]() |
Applications of Algebra to Communications, Control, and Signal Processing
ISBN: 9781461438625 / Angielski / Miękka / 44 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Over the last 50 years there have been an increasing number of applications of algebraic tools to solve problems in communications, in particular in the fields of error-control codes and cryptography. More recently, broader applications have emerged, requiring quite sophisticated algebra - for example, the Alamouti scheme in MIMO communications is just Hamilton's quaternions in disguise and has spawned the use of PhD-level algebra to produce generalizations. Likewise, in the absence of credible alternatives, the industry has in many cases been forced to adopt elliptic curve cryptography. In...
Over the last 50 years there have been an increasing number of applications of algebraic tools to solve problems in communications, in particular in t...
|
cena:
169,28 |
![]() |
User Perception and Influencing Factors of Technology in Everyday Life
ISBN: 9781466619548 / Angielski / Twarda / 396 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. An increasing amount of research is being developed in the area where technology and humans meet. The success or failure of technologies and the question whether technology helps humans to fulfill their goals or whether it hinders them is in most cases not a technical one.User Perception and Influencing Factors of Technology in Everyday Life addresses issues of human and technology interaction. The research in this work is interdisciplinary, ranging from more technical subjects such as computer science, engineering, and information systems, to non-technical descriptions of technology and...
An increasing amount of research is being developed in the area where technology and humans meet. The success or failure of technologies and the quest...
|
cena:
896,90 |
![]() |
Fault Analysis in Cryptography
ISBN: 9783642296550 / Angielski / Twarda / 356 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Fault attacks is an active area of research in cryptography, currently explored in hundreds of research papers and dedicated conferences. This book is the first comprehensive treatment of the subject covering both the theory and practice of these attacks as well as defense techniques. ... Preventing fault attacks without sacrificing performance is nontrivial. Over the years a number of innovative ideas have been proposed for efficiently verifying cryptographic computations. Many defense strategies are described in the book, some of which are already deployed in real-world cryptographic...
Fault attacks is an active area of research in cryptography, currently explored in hundreds of research papers and dedicated conferences. This book is...
|
cena:
402,53 |
![]() |
Interference Cancellation Using Space-Time Processing and Precoding Design
ISBN: 9783642307119 / Angielski / Twarda / 96 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Written by a recognized leader in the field, this is the first book on deploying space-time processing and precoding design to cancel multi-antenna interference, and includes design procedures and in-depth performance data for a series of multi-user systems.
Written by a recognized leader in the field, this is the first book on deploying space-time processing and precoding design to cancel multi-antenna in...
|
cena:
402,53 |
![]() |
Random Walks and Diffusions on Graphs and Databases: An Introduction
ISBN: 9783642268427 / Angielski / Miękka / 262 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Most networks and databases that humans have to deal with contain large, albeit finite number of units. Their structure, for maintaining functional consistency of the components, is essentially not random and calls for a precise quantitative description of relations between nodes (or data units) and all network components. This book is an introduction, for both graduate students and newcomers to the field, to the theory of graphs and random walks on such graphs. The methods based on random walks and diffusions for exploring the structure of finite connected graphs and databases are reviewed...
Most networks and databases that humans have to deal with contain large, albeit finite number of units. Their structure, for maintaining functional co...
|
cena:
362,11 |
![]() |
Beginning C# 5.0 Databases
ISBN: 9781430242604 / Angielski / Miękka / 440 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Assuming only basic knowledge of C#, Beginning C# 5.0 Databases teaches all the fundamentals of database technology and database programming readers need to quickly become highly proficient database users and application developers. A comprehensive tutorial on both SQL Server 2012 and Visual Studio 2012, Beginning C# 5.0 Databases explains and demonstrates various techniques and ways to build a database application using T-SQL and C#. Full of practical, detailed examples, it's been fully revised and updated for Winforms using C# 5.0 and Visual... Assuming only basic knowledge of C#, Beginning C# 5.0 Databases teaches all the fundamentals of database technology and database ... |
cena:
261,63 |
![]() |
Developments in Language Theory: 16th International Conference, Dlt 2012, Taipei, Taiwan, August 14-17, 2012, Proceedings
ISBN: 9783642316524 / Angielski / Miękka / 478 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the 16th International Conference on Developments in Language Theory, DLT 2012, held in Taipei, Taiwan, in August 2012.
Constitutes the refereed proceedings of the 16th International Conference on Developments in Language Theory, DLT 2012, held in Taipei, Taiwan, in Aug...
|
cena:
201,24 |