![]() |
ICT Influences on Human Development, Interaction, and Collaboration
ISBN: 9781466619579 / Angielski / Twarda / 334 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Technology has always played a decisive role in humanity's progress. Throughout history, it has not only strengthened economic development but has become a powerful tool for human development. Nevertheless, the positive impact technology has on human development may become tainted by the risks it entails.ICT Influences on Human Development, Interaction, and Collaboration creates awareness on how ICTs contribute to human development in multiple areas. This publication describes the link between ICTs and human development, which includes economic, social, and political development. It...
Technology has always played a decisive role in humanity's progress. Throughout history, it has not only strengthened economic development but has bec...
|
cena:
977,55 zł |
![]() |
Information Security Technology for Applications: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised Selected Papers
ISBN: 9783642296147 / Angielski / Miękka / 273 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, October 26-28, 2011. The 16 revised papers presented together with 2 invited talks were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on applied cryptography, commercial security policies and their enforcement, communication and network security, security modeling and metrics, economics, law and social aspects of security, and software security and malware.
This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, Octo...
|
cena:
187,38 zł |
![]() |
Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation
ISBN: 9783642300417 / Angielski / Miękka / 138 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the result. Originally the technique was considered to be too inefficient for practical privacy-preserving applications, but in recent years rapid speed-up in computers and communication networks, algorithmic improvements, automatic generation, and optimizations have enabled their application in many scenarios. The author offers an extensive... Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate... |
cena:
449,78 zł |
![]() |
Trustworthy Global Computing: 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers
ISBN: 9783642300646 / Angielski / Miękka / 243 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the 6th International Symposium on Trustworthy Global Computing, TGC 2011, held in Aachen, Germany, in June 2011. This title features papers that are organized in topical sections on modeling formalisms for concurrent systems; model checking and quantitative extensions thereof; and more.
Constitutes the refereed proceedings of the 6th International Symposium on Trustworthy Global Computing, TGC 2011, held in Aachen, Germany, in June 20...
|
cena:
187,38 zł |
![]() |
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems: 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-2
ISBN: 9783642309540 / Angielski / Miękka / 225 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Contains the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on "Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems", WISTP 2012, held in Egham, UK, in June 2012. This title includes topics on protocols, privacy, policy and access control, and more.
Contains the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on "Information Security Theory and Practice: Security, Privacy and T...
|
cena:
187,38 zł |
![]() |
Applied Cryptography and Network Security: 10th International Conference, Acns 2012, Singapore, June 26-29, 2012, Proceedings
ISBN: 9783642312830 / Angielski / Miękka / 580 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in...
This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in S...
|
cena:
187,38 zł |
![]() |
Progress in Cryptology -- Africacrypt 2012: 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012, Proceedings
ISBN: 9783642314094 / Angielski / Miękka / 424 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Ifrane, Morocco, in July 2012.
Constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACR...
|
cena:
187,38 zł |
![]() |
Progress in VLSI Design and Test: 16th International Symposium on Vsli Design and Test, Vdat 2012, Shipur, India, July 1-4, 2012, Proceedings
ISBN: 9783642314933 / Angielski / Miękka / 408 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 16th International Symposium on VSLI Design and Test, VDAT 2012, held in Shibpur, India, in July 2012. The 30 revised regular papers presented together with 10 short papers and 13 poster sessions were carefully selected from 135 submissions. The papers are organized in topical sections on VLSI design, design and modeling of digital circuits and systems, testing and verification, design for testability, testing memories and regular logic arrays, embedded systems: hardware/software co-design and verification, emerging technology: nanoscale...
This book constitutes the refereed proceedings of the 16th International Symposium on VSLI Design and Test, VDAT 2012, held in Shibpur, India, in July...
|
cena:
187,38 zł |
![]() |
Information Technology Convergence, Secure and Trust Computing, and Data Management: Itcs 2012 & Sta 2012
ISBN: 9789400750821 / Angielski / Twarda / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 4th FTRA International Conference on Information Technology Convergence and Services (ITCS-12) will be held in Gwangju, Korea on September 6 - 8, 2012.
The ITCS-12 will be the most comprehensive conference focused on the various aspects of advances in information technology convergence, applications, and services. The ITCS-12 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of ITCS. In addition, the conference will publish high quality papers which are closely related to the various theories, modeling, and... The 4th FTRA International Conference on Information Technology Convergence and Services (ITCS-12) will be held in Gwangju, Korea on September 6 - 8, ...
|
cena:
562,23 zł |
![]() |
Information Theoretic Security: 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012, Proceedings
ISBN: 9783642322839 / Angielski / Miękka / 219 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels;...
This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in ...
|
cena:
172,43 zł |
![]() |
Information Flow Based Security Control Beyond Rbac: How to Enable Fine-Grained Security Policy Enforcement in Business Processes Beyond Limitations o
ISBN: 9783834826176 / Angielski / Miękka / 161 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Role-based access control (RBAC) is a widely used technology to control information flows as well as control flows within and between applications in compliance with restrictions implied by security policies, in particular, to prevent disclosure of information or access to resources beyond restrictions defined by those security policies. Since RBAC only provides the alternatives of either granting or denying access, more fine-grained control of information flows such as granting access to information provided that it will not be disclosed to targets outside our organisation during further...
Role-based access control (RBAC) is a widely used technology to control information flows as well as control flows within and between applications in ...
|
cena:
187,38 zł |
![]() |
Open Problems in Communication and Computation
ISBN: 9781461291626 / Angielski / Miękka / 236 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Thomas M. Cover and B. Gopinatb The papers in this volume are the contributions to a special workshop on problems in communication and computation conducted in the summers of 1984 and 1985 in Morristown, New Jersey, and the summer of 1986 in Palo Alto. California. The structure of this workshop was unique: no recent results. no surveys. Instead. we asked for outstanding open prob lems in the field. There are many famous open problems, including the question P = NP?, the simplex conjecture in communication theory, the capacity region of the broadcast channel. and the two.helper problem in...
Thomas M. Cover and B. Gopinatb The papers in this volume are the contributions to a special workshop on problems in communication and computation con...
|
cena:
374,81 zł |
![]() |
Spectrum Estimation and System Identification
ISBN: 9781461383208 / Angielski / Miękka / 327 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Spectrum estimation refers to analyzing the distribution of power or en ergy with frequency of the given signal, and system identification refers to ways of characterizing the mechanism or system behind the observed sig nal/data. Such an identification allows one to predict the system outputs, and as a result this has considerable impact in several areas such as speech processing, pattern recognition, target identification, seismology, and signal processing. A new outlook to spectrum estimation and system identification is pre sented here by making use of the powerful concepts of positive...
Spectrum estimation refers to analyzing the distribution of power or en ergy with frequency of the given signal, and system identification refers to w...
|
cena:
374,81 zł |
![]() |
Relative Information: Theories and Applications
ISBN: 9783642840197 / Angielski / Miękka / 258 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. For four decades, information theory has been viewed almost exclusively as a theory based upon the Shannon measure of uncertainty and information, usually referred to as Shannon entropy. Since the publication of Shannon's seminal paper in 1948, the theory has grown extremely rapidly and has been applied with varied success in almost all areas of human endeavor. At this time, the Shannon information theory is a well established and developed body of knowledge. Among its most significant recent contributions have been the use of the complementary principles of minimum and maximum entropy in...
For four decades, information theory has been viewed almost exclusively as a theory based upon the Shannon measure of uncertainty and information, usu...
|
cena:
187,38 zł |
![]() |
Moving Target Defense II: Application of Game Theory and Adversarial Modeling
ISBN: 9781461454151 / Angielski / Twarda / 204 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing. Moving Target Defense II: Application of Game Theory and Adversarial Modeling... Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their ... |
cena:
374,81 zł |
![]() |
Formal Languages and Computation: Models and Their Applications
ISBN: 9781466513457 / Angielski / Twarda / 316 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Formal Languages and Computation: Models and Their Applications gives a clear, comprehensive introduction to formal language theory and its applications in computer science. It covers all rudimental topics concerning formal languages and their models, especially grammars and automata, and sketches the basic ideas underlying the theory of computation, including computability, decidability, and computational complexity. Emphasizing the relationship between theory and application, the book describes many real-world applications, including computer science engineering techniques for language... Formal Languages and Computation: Models and Their Applications gives a clear, comprehensive introduction to formal language theory and its applica... |
cena:
453,32 zł |
![]() |
Multimedia Information Storage and Management
ISBN: 9781461286226 / Angielski / Miękka / 484 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Multimedia information systems are quite different from traditional information systems, especially in data types, modeling, delivery, and user interface. The large size of multimedia data and the high bandwidth requirement of multime- dia streams require new storage, buffering, delivery, and networking schemes. The presentational nature of multimedia applications requires a proper syn- chronization between multimedia streams, and the composition of multimedia documents in the distributed environment should overcome the heterogeneity of underlying systems. This book is edited for...
Multimedia information systems are quite different from traditional information systems, especially in data types, modeling, delivery, and user interf...
|
cena:
749,66 zł |
![]() |
The Maximum Entropy Method
ISBN: 9783642644849 / Angielski / Miękka / 327 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Forty years ago, in 1957, the Principle of Maximum Entropy was first intro duced by Jaynes into the field of statistical mechanics. Since that seminal publication, this principle has been adopted in many areas of science and technology beyond its initial application. It is now found in spectral analysis, image restoration and a number of branches ofmathematics and physics, and has become better known as the Maximum Entropy Method (MEM). Today MEM is a powerful means to deal with ill-posed problems, and much research work is devoted to it. My own research in the area ofMEM started in 1980,...
Forty years ago, in 1957, the Principle of Maximum Entropy was first intro duced by Jaynes into the field of statistical mechanics. Since that seminal...
|
cena:
374,81 zł |
![]() |
Are there fundamental principles in Geographic Information Science?: Tobler Lecture Event 2012 of the Association of American Geographers Geographic I
ISBN: 9781478213628 / Angielski / Miękka / 100 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book offers contributions from Nicholas Chrisman, Andrew Frank, and Dan Sui with their perspectives on engagements with fundamental principles in Geographic Information Science (GIScience). Michael Goodchild offers an afterword and Waldo Tobler contributes a preface. The book is intended for advanced undergraduate and graduate student readers.
This book offers contributions from Nicholas Chrisman, Andrew Frank, and Dan Sui with their perspectives on engagements with fundamental principles in...
|
cena:
77,18 zł |
![]() |
Information and Communications Security: 14th International Conference, Icics 2012, Hong Kong, China, October 29-31, 2012, Proceedings
ISBN: 9783642341281 / Angielski / Miękka / 506 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Hong Kong, China, in October 2012. The 23 regular papers and 26 short papers were carefully reviewed and selected from 101 submissions. The papers cover many important areas in information security such as privacy, security in mobile systems, software and network security, cryptanalysis, applied cryptography as well as GPU-enabled computation.
This book constitutes the refereed proceedings of the 14th International Conference on Information and Communications Security, ICICS 2012, held in Ho...
|
cena:
187,38 zł |