• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Information Theory

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946350]
• Literatura piękna
 [1816154]

  więcej...
• Turystyka
 [70666]
• Informatyka
 [151172]
• Komiksy
 [35576]
• Encyklopedie
 [23172]
• Dziecięca
 [611458]
• Hobby
 [135995]
• AudioBooki
 [1726]
• Literatura faktu
 [225763]
• Muzyka CD
 [378]
• Słowniki
 [2917]
• Inne
 [444280]
• Kalendarze
 [1179]
• Podręczniki
 [166508]
• Poradniki
 [469467]
• Religia
 [507199]
• Czasopisma
 [496]
• Sport
 [61352]
• Sztuka
 [242330]
• CD, DVD, Video
 [3348]
• Technologie
 [219391]
• Zdrowie
 [98638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3525]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Information Theory

ilość książek w kategorii: 3051

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Noiseless Steganography: The Key to Covert Communications Desoky, Abdelrahman 9781439846216 Auerbach Publications
Noiseless Steganography: The Key to Covert Communications

ISBN: 9781439846216 / Angielski / Twarda / 300 str.

ISBN: 9781439846216/Angielski/Twarda/300 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Abdelrahman Desoky

Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind:

  • The first to comprehensively cover Linguistic Steganography
  • The first to comprehensively cover Graph Steganography
  • The first to comprehensively cover Game Steganography

Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These...

Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind:

  • The ...
cena: 612,21

 Algebraic and Stochastic Coding Theory Dave K. Kythe Prem K. Kythe 9781439881811 CRC Press
Algebraic and Stochastic Coding Theory

ISBN: 9781439881811 / Angielski / Twarda / 512 str.

ISBN: 9781439881811/Angielski/Twarda/512 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dave K. Kythe; Prem K. Kythe

Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand for readers with a thorough knowledge of digital arithmetic, Boolean and modern algebra, and probability theory. It explains the underlying principles of coding theory and offers a clear, detailed description of each code. More advanced readers will appreciate its coverage of recent developments in coding theory and stochastic processes.

After a brief review of coding history and Boolean algebra, the book introduces linear codes,...

Using a simple yet rigorous approach, Algebraic and Stochastic Coding Theory makes the subject of coding theory easy to understand...

cena: 783,64

 Economics of Information Security and Privacy III Bruce Schneier 9781461419808 Springer
Economics of Information Security and Privacy III

ISBN: 9781461419808 / Angielski / Twarda / 283 str.

ISBN: 9781461419808/Angielski/Twarda/283 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bruce Schneier
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations...
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining...
cena: 603,81

 Perspectives and Implications for the Development of Information Infrastructures Panos Constantinides 9781466616226 Information Science Reference
Perspectives and Implications for the Development of Information Infrastructures

ISBN: 9781466616226 / Angielski / Twarda / 270 str.

ISBN: 9781466616226/Angielski/Twarda/270 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Panos Constantinides
In the same way that infrastructures such as transportation, electricity, sewage, and water supply are widely assumed to be integrators of urban spaces, information infrastructures are assumed to be integrators of information spaces. With the advent of Web 2.0 and new types of information infrastructures such as online social networks and smart mobile platforms, a more in-depth understanding of the various rights to access, use, develop, and modify information infrastructure resources is necessary. Perspectives and Implications for the Development of Information Infrastructures aims at...
In the same way that infrastructures such as transportation, electricity, sewage, and water supply are widely assumed to be integrators of urban space...
cena: 896,90

 Cryptographic Hardware and Embedded Systems -- CHES 2011: 13th International Workshop, Nara, Japan, September 28 - October 1, 2011, Proceedings Preneel, Bart 9783642239502 Springer
Cryptographic Hardware and Embedded Systems -- CHES 2011: 13th International Workshop, Nara, Japan, September 28 - October 1, 2011, Proceedings

ISBN: 9783642239502 / Angielski / Miękka / 524 str.

ISBN: 9783642239502/Angielski/Miękka/524 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bart Preneel; Tsuyoshi Takagi
This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections named: FPGA implementation; AES; elliptic curve cryptosystems; lattices; side channel attacks; fault attacks; lightweight symmetric algorithms, PUFs; public-key cryptosystems; and hash functions.
This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japa...
cena: 201,24

 Theoretical and Mathematical Foundations of Computer Science: Second International Conference, ICTMF 2011, Singapore, May 5-6, 2011, Selected Papers Zhou, Qihai 9783642249983 Springer
Theoretical and Mathematical Foundations of Computer Science: Second International Conference, ICTMF 2011, Singapore, May 5-6, 2011, Selected Papers

ISBN: 9783642249983 / Angielski / Miękka / 632 str.

ISBN: 9783642249983/Angielski/Miękka/632 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Qihai Zhou
This book constitutes the refereed post-proceedings of the Second International Conference on Theoretical and Mathematical Foundations of Computer Science, ICTMF 2011, held in Singapore in May 2011. The conference was held together with the Second International Conference on High Performance Networking, Computing, and Communication systems, ICHCC 2011, which proceedings are published in CCIS 163. The 84 revised selected papers presented were carefully reviewed and selected for inclusion in the book. The topics covered range from computational science, engineering and technology to digital...
This book constitutes the refereed post-proceedings of the Second International Conference on Theoretical and Mathematical Foundations of Computer Sci...
cena: 402,53

 Cryptology and Network Security: 10th International Conference, CANS 2011 Sanya, China, December 10-12, 2011 Proceedings Lin, Dongdai 9783642255120 Springer
Cryptology and Network Security: 10th International Conference, CANS 2011 Sanya, China, December 10-12, 2011 Proceedings

ISBN: 9783642255120 / Angielski / Miękka / 313 str.

ISBN: 9783642255120/Angielski/Miękka/313 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dongdai Lin; Gene Tsudik; Xiaoyun Wang
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmetric cryptanalysis, symmetric ciphers, public key cryptography, protocol attacks, and privacy techniques.
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, Chin...
cena: 201,24

 Information Security Technology for Applications: 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revi Aura, Tuomas 9783642279362 Springer
Information Security Technology for Applications: 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revi

ISBN: 9783642279362 / Angielski / Miękka / 288 str.

ISBN: 9783642279362/Angielski/Miękka/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tuomas Aura; Kimmo J. Rvinen; Kaisa Nyberg
Constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto University in Espoo, Finland in October 2010. This title covers such topics as network security; monitoring and reputation; privacy; policy enforcement; and, more.
Constitutes the thoroughly refereed post-conference proceedings of the 15th Nordic Conference in Secure IT Systems, NordSec 2010, held at Aalto Univer...
cena: 201,24

 Plunkett's Infotech Industry Almanac 2017: Infotech Industry Market Research, Statistics, Trends & Leading Companies Jack W. Plunkett 9781628314281 Plunkett Research
Plunkett's Infotech Industry Almanac 2017: Infotech Industry Market Research, Statistics, Trends & Leading Companies

ISBN: 9781628314281 / Angielski / Miękka / 652 str.

ISBN: 9781628314281/Angielski/Miękka/652 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jack W. Plunkett
A complete market research guide to the InfoTech industry-for strategic planning, competitive intelligence, employment searches or financial research. Contains computer, software and network trends analysis; statistical tables; and glossary. Includes our profiles of the 500 top global InfoTech firms, public and private, U.S. and international.
A complete market research guide to the InfoTech industry-for strategic planning, competitive intelligence, employment searches or financial research....
cena: 1420,35

 Analytics for Managers: With Excel Bell, Peter C. 9780415622691 Routledge
Analytics for Managers: With Excel

ISBN: 9780415622691 / Angielski / Twarda / 328 str.

ISBN: 9780415622691/Angielski/Twarda/328 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peter Bell; Gregory Zaric

Analytics is one of a number of terms which are used to describe a data-driven more scientific approach to management. Ability in analytics is an essential management skill: knowledge of data and analytics helps the manager to analyze decision situations, prevent problem situations from arising, identify new opportunities, and often enables many millions of dollars to be added to the bottom line for the organization.

The objective of this book is to introduce analytics from the perspective of the general manager of a corporation. Rather than examine the details or attempt an...

Analytics is one of a number of terms which are used to describe a data-driven more scientific approach to management. Ability in analytics is an e...

cena: 930,57

 Webbasierte Datenintegration: Ansätze Zur Messung Und Sicherung Der Informationsqualität in Heterogenen Datenbeständen Unter Verwendung Eines Vollst Helmis, Steven 9783834807236 Vieweg+teubner Verlag
Webbasierte Datenintegration: Ansätze Zur Messung Und Sicherung Der Informationsqualität in Heterogenen Datenbeständen Unter Verwendung Eines Vollst

ISBN: 9783834807236 / Niemiecki / Miękka / 198 str.

ISBN: 9783834807236/Niemiecki/Miękka/198 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Steven Helmis; Robert Hollmann
Die Autoren diskutieren die Problematik der Datenqualitat, und entwickeln ein webbasiertes Werkzeug, welches die Integration der Daten ermoglicht und die Qualitat der Datenbestande testet. Die Analyse der Bestande, das Auffinden von Duplikaten und die Bereinigung der Daten stehen dabei im Fokus dieses Werkzeuges, welches eine Grundlage fur eine umfassende Datenqualitats- und Bereinigungslosung darstellen kann.
Die Autoren diskutieren die Problematik der Datenqualitat, und entwickeln ein webbasiertes Werkzeug, welches die Integration der Daten ermoglicht und ...
cena: 263,32

 Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings Cramer, Ronald 9783642289132 Springer
Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings

ISBN: 9783642289132 / Angielski / Miękka / 656 str.

ISBN: 9783642289132/Angielski/Miękka/656 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ronald Cramer
This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge.
This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in ...
cena: 201,24

 Running IT Like a Business: Accenture's Step-By-Step Guide Kress, Robert E. 9781849283564 Itgp
Running IT Like a Business: Accenture's Step-By-Step Guide

ISBN: 9781849283564 / Angielski / Miękka / 142 str.

ISBN: 9781849283564/Angielski/Miękka/142 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robert E. Kress
Global management, technology and outsourcing company Accenture has achieved incredible results through the transformation of its IT function. It has doubled its revenues in ten years, significantly decreased its IT spending, despite an increase in workforce of nearly 300%, and its number of satisfied customers is growing and growing. Discover how it has achieved all this, and how you can realize similar benefits in your organization. Running IT like a Business, Second edition shows you how your IT function can provide much more than products and services and add real value to your business....
Global management, technology and outsourcing company Accenture has achieved incredible results through the transformation of its IT function. It has ...
cena: 202,27

 Applications of Algebra to Communications, Control, and Signal Processing Nigel Boston 9781461438625 Springer
Applications of Algebra to Communications, Control, and Signal Processing

ISBN: 9781461438625 / Angielski / Miękka / 44 str.

ISBN: 9781461438625/Angielski/Miękka/44 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nigel Boston
Over the last 50 years there have been an increasing number of applications of algebraic tools to solve problems in communications, in particular in the fields of error-control codes and cryptography. More recently, broader applications have emerged, requiring quite sophisticated algebra - for example, the Alamouti scheme in MIMO communications is just Hamilton's quaternions in disguise and has spawned the use of PhD-level algebra to produce generalizations. Likewise, in the absence of credible alternatives, the industry has in many cases been forced to adopt elliptic curve cryptography. In...
Over the last 50 years there have been an increasing number of applications of algebraic tools to solve problems in communications, in particular in t...
cena: 169,28

 User Perception and Influencing Factors of Technology in Everyday Life Anabela Mesquita 9781466619548 Information Science Reference
User Perception and Influencing Factors of Technology in Everyday Life

ISBN: 9781466619548 / Angielski / Twarda / 396 str.

ISBN: 9781466619548/Angielski/Twarda/396 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Anabela Mesquita
An increasing amount of research is being developed in the area where technology and humans meet. The success or failure of technologies and the question whether technology helps humans to fulfill their goals or whether it hinders them is in most cases not a technical one.User Perception and Influencing Factors of Technology in Everyday Life addresses issues of human and technology interaction. The research in this work is interdisciplinary, ranging from more technical subjects such as computer science, engineering, and information systems, to non-technical descriptions of technology and...
An increasing amount of research is being developed in the area where technology and humans meet. The success or failure of technologies and the quest...
cena: 896,90

 Fault Analysis in Cryptography Marc Joye Michael Tunstall 9783642296550 Springer
Fault Analysis in Cryptography

ISBN: 9783642296550 / Angielski / Twarda / 356 str.

ISBN: 9783642296550/Angielski/Twarda/356 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marc Joye; Michael Tunstall
Fault attacks is an active area of research in cryptography, currently explored in hundreds of research papers and dedicated conferences. This book is the first comprehensive treatment of the subject covering both the theory and practice of these attacks as well as defense techniques. ... Preventing fault attacks without sacrificing performance is nontrivial. Over the years a number of innovative ideas have been proposed for efficiently verifying cryptographic computations. Many defense strategies are described in the book, some of which are already deployed in real-world cryptographic...
Fault attacks is an active area of research in cryptography, currently explored in hundreds of research papers and dedicated conferences. This book is...
cena: 402,53

 Interference Cancellation Using Space-Time Processing and Precoding Design Feng Li 9783642307119 Springer
Interference Cancellation Using Space-Time Processing and Precoding Design

ISBN: 9783642307119 / Angielski / Twarda / 96 str.

ISBN: 9783642307119/Angielski/Twarda/96 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Feng Li
Written by a recognized leader in the field, this is the first book on deploying space-time processing and precoding design to cancel multi-antenna interference, and includes design procedures and in-depth performance data for a series of multi-user systems.
Written by a recognized leader in the field, this is the first book on deploying space-time processing and precoding design to cancel multi-antenna in...
cena: 402,53

 Random Walks and Diffusions on Graphs and Databases: An Introduction Philipp Blanchard, Dimitri Volchenkov 9783642268427 Springer-Verlag Berlin and Heidelberg GmbH &
Random Walks and Diffusions on Graphs and Databases: An Introduction

ISBN: 9783642268427 / Angielski / Miękka / 262 str.

ISBN: 9783642268427/Angielski/Miękka/262 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Philipp Blanchard;Dimitri Volchenkov
Most networks and databases that humans have to deal with contain large, albeit finite number of units. Their structure, for maintaining functional consistency of the components, is essentially not random and calls for a precise quantitative description of relations between nodes (or data units) and all network components. This book is an introduction, for both graduate students and newcomers to the field, to the theory of graphs and random walks on such graphs. The methods based on random walks and diffusions for exploring the structure of finite connected graphs and databases are reviewed...
Most networks and databases that humans have to deal with contain large, albeit finite number of units. Their structure, for maintaining functional co...
cena: 362,11

 Beginning C# 5.0 Databases  9781430242604 Apress
Beginning C# 5.0 Databases

ISBN: 9781430242604 / Angielski / Miękka / 440 str.

ISBN: 9781430242604/Angielski/Miękka/440 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

Assuming only basic knowledge of C#, Beginning C# 5.0 Databases teaches all the fundamentals of database technology and database programming readers need to quickly become highly proficient database users and application developers.

A comprehensive tutorial on both SQL Server 2012 and Visual Studio 2012, Beginning C# 5.0 Databases explains and demonstrates various techniques and ways to build a database application using T-SQL and C#. Full of practical, detailed examples, it's been fully revised and updated for Winforms using C# 5.0 and Visual...

Assuming only basic knowledge of C#, Beginning C# 5.0 Databases teaches all the fundamentals of database technology and database ...

cena: 261,63

 Developments in Language Theory: 16th International Conference, Dlt 2012, Taipei, Taiwan, August 14-17, 2012, Proceedings Yen, Hsu-Chun 9783642316524 Springer
Developments in Language Theory: 16th International Conference, Dlt 2012, Taipei, Taiwan, August 14-17, 2012, Proceedings

ISBN: 9783642316524 / Angielski / Miękka / 478 str.

ISBN: 9783642316524/Angielski/Miękka/478 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hsu-Chun Yen; Oscar H. Ibarra
Constitutes the refereed proceedings of the 16th International Conference on Developments in Language Theory, DLT 2012, held in Taipei, Taiwan, in August 2012.
Constitutes the refereed proceedings of the 16th International Conference on Developments in Language Theory, DLT 2012, held in Taipei, Taiwan, in Aug...
cena: 201,24

Pierwsza Podprzednia  109  110  111  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia