![]() |
New Perspectives on Information Systems Development: Theory, Methods, and Practice
ISBN: 9780306472510 / Angielski / Twarda / 695 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is a result of the Tenth International Conference on Information Systems Development (ISD2001) held at Royal Holloway, University of London, United Kingdom, during September 5-7, 2001. ISD 2001 carries on the fine tradition established by the first Polish-Scandinavian Seminar on Current Trends in Information Systems Development Methodologies, held in Gdansk, Poland in 1988. Through the years, this seminar evolved into an International Conference on Information Systems Development. The Conference gives participants an opportunity to express ideas on the current state of the art in...
This book is a result of the Tenth International Conference on Information Systems Development (ISD2001) held at Royal Holloway, University of London,...
|
cena:
1127,15 |
![]() |
International Power and International Communication
ISBN: 9780312125271 / Angielski / Miękka / 184 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Over seven chapters the book shows how international communication has been shaped by the structure of international political power and how these means of global communication have in turn been strategic tools for the exercise of international political power. There are separate chapters on global news flows, the international trade in cultural products (films, books, advertising, recorded music, periodicals and books), and government propaganda activities. The politics of the International Telecommunication Union (ITU), the Universal Postal Union (UPU) and the World Intellectual Property...
Over seven chapters the book shows how international communication has been shaped by the structure of international political power and how these mea...
|
cena:
201,24 |
![]() |
Cyber Spaces/Social Spaces: Culture Clash in Computerized Classrooms
ISBN: 9780312218942 / Angielski / Twarda / 172 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. What happens when a new social technology is imposed on the established social technology of the school? This book presents an unusual application of critical cultural analysis to a series of empirical case studies of educational uses of information and communication technologies (ICTs). Drawing on research conducted over a ten-year period in three different regions of the Anglo-American developed world, it examines themes arising from the struggle for the social spaces and emerging cyber spaces of schooling; the role of identity projects in educational change; and the paradoxes which arise...
What happens when a new social technology is imposed on the established social technology of the school? This book presents an unusual application of ...
|
cena:
201,24 |
![]() |
An Integrated Approach to Software Engineering
ISBN: 9780387208817 / Angielski / Twarda / 566 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. An introductory course in Software Engineering remains one of the hardest subjects to teach. Much of the difficulty stems from the fact that Software Engineering is a very wide field which includes a wide range of topics. Con- sequently, what should be the focus of an introductory course remains a challenge with many possible viewpoints. This third edition of the book approaches the problem from the perspec- tive of what skills a student should possess after the introductory course, particularly if it may be the only course on software engineering in the stu- dent's program. The goal of this...
An introductory course in Software Engineering remains one of the hardest subjects to teach. Much of the difficulty stems from the fact that Software ...
|
cena:
297,70 |
![]() |
Coding for Data and Computer Communications
ISBN: 9780387212456 / Angielski / Twarda / 548 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Coding is an highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basis of coding can prevent a serious and practical understanding of this important area. "Coding for Data and Computer Communications" eschews the complex mathematics and clearly describes the core concepts, principles, and methods of channel codes ( for error correction), source codes (for compressing data), and secure codes (for cryptography, data hiding, and privacy). Conveniently organized and segmented into three associated parts for... Coding is an highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basi... |
cena:
402,53 |
![]() |
Intrusion Detection and Correlation: Challenges and Solutions
ISBN: 9780387233987 / Angielski / Twarda / 118 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and cryptography. The Internet is omnipresent and companies have increasingly put critical resources online. This has given rise to the activities of cyber criminals. Virtually all organizations face increasing threats to their networks and the... Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the proble... |
cena:
402,53 |
![]() |
A Classical Introduction to Cryptography: Applications for Communications Security
ISBN: 9780387254647 / Angielski / Twarda / 336 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes. This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra and number theory for cryptologists; public key cryptography and cryptanalysis of these schemes; and other cryptographic protocols, e.g. secret sharing, zero-knowledge proofs and undeniable signature... A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication securit... |
cena:
483,04 |
![]() |
Secure Data Management in Decentralized Systems
ISBN: 9780387276946 / Angielski / Twarda / 462 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Database security is one of the classical topics in the research of information system security. Ever since the early years of database management systems, a great deal of research activity has been conducted. Fruitful results have been produced, many of which are widely adopted in commercial and military database management systems. In recent years, the research scope of database security has been greatly expanded due to the rapid development of the global internetworked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of - ganizations....
Database security is one of the classical topics in the research of information system security. Ever since the early years of database management sys...
|
cena:
603,81 |
![]() |
A Classical Introduction to Cryptography Exercise Book
ISBN: 9780387279343 / Angielski / Twarda / 254 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerland Serge Vaudenay EPFL, Switzerland Springer - Thomas Baignbres Pascal Junod EPFL - I&C - LASEC Lausanne, Switzerland Lausanne, Switzerland Yi Lu Jean Monnerat EPFL - I&C - LASEC EPFL-I&C-LASEC Lausanne, Switzerland Lausanne, Switzerland Serge Vaudenay Lausanne, Switzerland Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY...
TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerlan...
|
cena:
173,06 |
![]() |
Cryptographics: Exploiting Graphics Cards for Security
ISBN: 9780387290157 / Angielski / Twarda / 140 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes. CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. As the processing power of GPUs increases, research involving the use of GPUs... Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficult... |
cena:
402,53 |
![]() |
Orthogonal Frequency Division Multiplexing for Wireless Communications
ISBN: 9780387290959 / Angielski / Twarda / 308 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Orthogonal Frequency Division Multiplexing for Wireless Communications is an edited volume with contributions by leading authorities in the subject of OFDM. Its coverage consists of principles, important wireless topics (e.g. Synchronization, channel estimation, etc.) and techniques. Included is information for advancing wireless communication in a multipath environment with an emphasis on implementation of OFDM in base stations. Orthogonal Frequency Division Multiplexing for Wireless Communications provides a comprehensive introduction of the... Orthogonal Frequency Division Multiplexing for Wireless Communications is an edited volume with contributions by leading authoriti... |
cena:
805,10 |
![]() |
Computer Viruses and Malware
ISBN: 9780387302362 / Angielski / Twarda / 228 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare. Computer Viruses and Malware... Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger... |
cena:
523,30 |
![]() |
Power Analysis Attacks: Revealing the Secrets of Smart Cards
ISBN: 9780387308579 / Angielski / Twarda / 338 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance. Power Analysis Attacks: Revealing the Secrets of Smart Cards is the first comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how... Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mo... |
cena:
724,58 |
![]() |
Network Security Policies and Procedures
ISBN: 9780387309378 / Angielski / Twarda / 244 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures gives the reader a strong, multi-disciplinary understanding of how to pursue this goal. This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on "the other side of the fence" view an organization s security and will... Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and P... |
cena:
402,53 |
![]() |
Malware Detection
ISBN: 9780387327204 / Angielski / Twarda / 324 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Given the deleterious affects of malware on our cyber infrastructure, identifying malicious programs is an important goal. Unfortunately, malware detectors have... Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medi... |
cena:
1207,67 |
![]() |
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
ISBN: 9780387327211 / Angielski / Twarda / 394 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc networks and wireless sensor networks. It is suitable as a text for computer science courses in wireless systems and security. It includes implementation studies with mica2 mote sensors. Due to the open spectrum nature of wireless communication, it is subject to attacks and intrusions. Hence the wireless network synchronization needs to be both robust and secure. Furthermore, issues such as energy constraints and mobility make the localization process even more challenging. The... This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc networks and wireless sensor netw... |
cena:
805,10 |
![]() |
Security for Wireless Sensor Networks
ISBN: 9780387327235 / Angielski / Twarda / 212 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional wireless sensor nodes to monitor and report the conditions and events in their local environments. A large collection of these sensor nodes can thus form a wireless sensor network in an ad hoc manner, creating a new type of information systems. Such sensor networks have recently emerged as an important means to study and interact with the physical world and have received a lot of attention due to their wide applications in military and civilian operations such as target...
The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional wireless sensor nodes to monito...
|
cena:
603,81 |
![]() |
Precoding Techniques for Digital Communication Systems
ISBN: 9780387717685 / Angielski / Twarda / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. During the past two decades, many communication techniques have been developed to achieve various goals such as higher data rate, more robust link quality, andmoreusercapacityinmorerigorouschannelconditions.Themost well known are, for instance, CDMA, OFDM, MIMO, multiuser OFDM, and UWB systems.All these systems havetheir ownunique superioritywhile they also induce other drawbacks that limit the system performance. Conventional way to overcome the drawback is to impose most of the computational e?ort in the receiver side and let the transmitter design much simpler than receiver. The fact is...
During the past two decades, many communication techniques have been developed to achieve various goals such as higher data rate, more robust link qua...
|
cena:
402,53 |
![]() |
Analysis of Computer and Communication Networks
ISBN: 9780387744360 / Angielski / Twarda / 669 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The purpose of this book is to give the reader two things, to paraphrase Mark Twain: Roots to know the basics of modeling networks and Wings to fly away and attempt modeling other proposed systems of interest. The Internet phenomenon is affecting us all in the way we communicate, conduct business, and access information and entertainment. More unforeseen applications are still to come. All of this is due to the existence of an efficient global hi- performance network that connects millions of users and moves information at a high rate with small delay. High-Performance Networks A...
The purpose of this book is to give the reader two things, to paraphrase Mark Twain: Roots to know the basics of modeling networks and Wings to fly aw...
|
cena:
442,79 |
![]() |
Geospatial Services and Applications for the Internet
ISBN: 9780387746739 / Angielski / Twarda / 179 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The use of geospatial technologies has become ubiquitous since the leading Internet vendors delivered a number of popular map websites. Today, businesses are either migrating location-specific capabilities into their information systems, or expanding existing Geospatial Information Systems (GIS) implementation into enterprise-wide solutions. As enterprise information systems evolve toward service-oriented architecture (SOA), geospatial technologies also evolve along the same lines. Geospatial Services and Applications for the Internet covers a wide spectrum of... The use of geospatial technologies has become ubiquitous since the leading Internet vendors delivered a number of popular map websites. Today, busi... |
cena:
402,53 |