• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Information Theory

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Information Theory

ilość książek w kategorii: 3017

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Information Security and Assurance: International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011, Proceedings Kim, Tai-hoon 9783642231407 Springer
Information Security and Assurance: International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011, Proceedings

ISBN: 9783642231407 / Angielski / Miękka / 408 str.

ISBN: 9783642231407/Angielski/Miękka/408 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tai-hoon Kim; Hojjat Adeli; Rosslin John Robles
This book constitutes the proceedings of the International Conference on Information Security and Assurance, held in Brno, Czech Republic in August 2011.
This book constitutes the proceedings of the International Conference on Information Security and Assurance, held in Brno, Czech Republic in August 20...
cena: 201,24

 Recent Advances in Intrusion Detection: 14th International Symposium, Raid 2011, Menlo Park, Ca, Usa, September 20-21, 2011, Proceedings Sommer, Robin 9783642236433 Springer
Recent Advances in Intrusion Detection: 14th International Symposium, Raid 2011, Menlo Park, Ca, Usa, September 20-21, 2011, Proceedings

ISBN: 9783642236433 / Angielski / Miękka / 399 str.

ISBN: 9783642236433/Angielski/Miękka/399 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robin Sommer; Davide Balzarotti; Gregor Maier
This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments.
This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA...
cena: 201,24

 Cryptographic Protocol: Security Analysis Based on Trusted Freshness Dong, Ling 9783642240720 Springer
Cryptographic Protocol: Security Analysis Based on Trusted Freshness

ISBN: 9783642240720 / Angielski / Twarda / 373 str.

ISBN: 9783642240720/Angielski/Twarda/373 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ling Dong; Kefei Chen

"Cryptographic Protocol: Security Analysis Based on Trusted Freshness" mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the trusted freshness component. A novel freshness principle based on the trusted freshness component is presented; this principle is the basis for an efficient and easy method for analyzing the security of cryptographic protocols. The reasoning results of the new approach, when compared with the security conditions, can either establish the correctness of a cryptographic protocol when the protocol is...

"Cryptographic Protocol: Security Analysis Based on Trusted Freshness" mainly discusses how to analyze and design cryptographic protocols based on ...

cena: 684,33

 Vlsi-Soc: Forward-Looking Trends in IC and Systems Design: 18th Ifip Wg 10.5/IEEE International Conference on Very Large Scale Integration, Vlsi-Soc 2 Ayala, Jose L. 9783642285653 Springer
Vlsi-Soc: Forward-Looking Trends in IC and Systems Design: 18th Ifip Wg 10.5/IEEE International Conference on Very Large Scale Integration, Vlsi-Soc 2

ISBN: 9783642285653 / Angielski / Twarda / 358 str.

ISBN: 9783642285653/Angielski/Twarda/358 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jose L. Ayala; David Atienza Alonso; Ricardo Reis
Covers VLSI technology and advanced research. This book addresses the trend towards increasing chip integration and technology process advancements bringing about stimulating new challenges both at the physical and system-design levels, as well as in the test of theses systems.
Covers VLSI technology and advanced research. This book addresses the trend towards increasing chip integration and technology process advancements br...
cena: 201,24

 Thinkquest 2010: Proceedings of the First International Conference on Contours of Computing Technology Pise, S. J. 9788184899887 Springer India
Thinkquest 2010: Proceedings of the First International Conference on Contours of Computing Technology

ISBN: 9788184899887 / Angielski / Twarda / 323 str.

ISBN: 9788184899887/Angielski/Twarda/323 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
S. J. Pise
This proceedings is a representation of decades of research, teaching and application in the field. Image Processing, Fusion and Information Technology areas, Digital radio Communication, Wimax, Electrical engg, VLSI approach to processor design, embedded systems design are dealt in detail through models and illustrative techniques.
This proceedings is a representation of decades of research, teaching and application in the field. Image Processing, Fusion and Information Technolog...
cena: 402,53

 Information Theory for Continuous Systems Shunsuke Ihara 9789810209858 World Scientific Publishing Company
Information Theory for Continuous Systems

ISBN: 9789810209858 / Angielski / Twarda / 324 str.

ISBN: 9789810209858/Angielski/Twarda/324 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shunsuke Ihara
This book provides a systematic mathematical analysis of entropy and stochastic processes, especially Gaussian processes, and its applications to information theory. The contents fall roughly into two parts. In the first part the main emphasis is on entropy; a unified treatment of entrop in information theory, probability theory and mathematical statistics is presented. The second part deals mostly with information theory for continuous communication systems, based on the most recently available methods in probability theory, and the analysis developed in the first part. Particular emphasis...
This book provides a systematic mathematical analysis of entropy and stochastic processes, especially Gaussian processes, and its applications to info...
cena: 475,08

 
Mathematical Analysis, Wavelets and Signal Processing

ISBN: 9780821803844 / Angielski / Miękka / 354 str.

ISBN: 9780821803844/Angielski/Miękka/354 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This work contains the proceedings of an international conference held in Cairo (January 1994), where mathematicians and engineers gathered to exchange ideas and to discuss new research trends. Mathematical and engineering discoveries, such as wavelets, multiresolution analysis, and subband coding schemes, caused rapid advancements in signal analysis and processing, necessitating an interdisciplinary approach. Contributors to this conference demonstrated that some traditional areas of mathematical analysis - sampling theory, approximation theory, and orthogonal polynomials - have proven...
This work contains the proceedings of an international conference held in Cairo (January 1994), where mathematicians and engineers gathered to exchang...
cena: 563,24

 State Variables and Communication Theory Arthur B. Baggeroer 9780262523547 MIT Press Ltd
State Variables and Communication Theory

ISBN: 9780262523547 / Angielski / Miękka / 198 str.

ISBN: 9780262523547/Angielski/Miękka/198 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Arthur B. Baggeroer

Although state variable concepts are a part of modern control theory, they have not been extensively applied in communication theory. The purpose of this book is to demonstrate how the concepts and methods of state variables can be used advantageously in analyzing a variety of communication theory problems. In contrast to the impulse response and covariance function description of systems and random processes commonly used in the analysis of communication problems, Professor Baggeroer points out that a state variable approach describes these systems and processes in terms of differential...

Although state variable concepts are a part of modern control theory, they have not been extensively applied in communication theory. The purpose o...

cena: 195,12

 ICT Influences on Human Development, Interaction, and Collaboration Susheel Chhabra 9781466619579 Information Science Reference
ICT Influences on Human Development, Interaction, and Collaboration

ISBN: 9781466619579 / Angielski / Twarda / 334 str.

ISBN: 9781466619579/Angielski/Twarda/334 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Susheel Chhabra
Technology has always played a decisive role in humanity's progress. Throughout history, it has not only strengthened economic development but has become a powerful tool for human development. Nevertheless, the positive impact technology has on human development may become tainted by the risks it entails.ICT Influences on Human Development, Interaction, and Collaboration creates awareness on how ICTs contribute to human development in multiple areas. This publication describes the link between ICTs and human development, which includes economic, social, and political development. It...
Technology has always played a decisive role in humanity's progress. Throughout history, it has not only strengthened economic development but has bec...
cena: 896,90

 Information Security Technology for Applications: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised Selected Papers Peeter Laud 9783642296147 Springer-Verlag Berlin and Heidelberg GmbH &
Information Security Technology for Applications: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised Selected Papers

ISBN: 9783642296147 / Angielski / Miękka / 273 str.

ISBN: 9783642296147/Angielski/Miękka/273 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peeter Laud
This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, October 26-28, 2011. The 16 revised papers presented together with 2 invited talks were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on applied cryptography, commercial security policies and their enforcement, communication and network security, security modeling and metrics, economics, law and social aspects of security, and software security and malware.
This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, Octo...
cena: 201,24

 Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation Schneider, Thomas 9783642300417 Springer
Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation

ISBN: 9783642300417 / Angielski / Miękka / 138 str.

ISBN: 9783642300417/Angielski/Miękka/138 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thomas Schneider

Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the result. Originally the technique was considered to be too inefficient for practical privacy-preserving applications, but in recent years rapid speed-up in computers and communication networks, algorithmic improvements, automatic generation, and optimizations have enabled their application in many scenarios.

The author offers an extensive...

Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate...

cena: 483,04

 Trustworthy Global Computing: 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers Roberto Bruni, Vladimiro Sassone 9783642300646 Springer-Verlag Berlin and Heidelberg GmbH &
Trustworthy Global Computing: 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers

ISBN: 9783642300646 / Angielski / Miękka / 243 str.

ISBN: 9783642300646/Angielski/Miękka/243 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Roberto Bruni;Vladimiro Sassone
Constitutes the refereed proceedings of the 6th International Symposium on Trustworthy Global Computing, TGC 2011, held in Aachen, Germany, in June 2011. This title features papers that are organized in topical sections on modeling formalisms for concurrent systems; model checking and quantitative extensions thereof; and more.
Constitutes the refereed proceedings of the 6th International Symposium on Trustworthy Global Computing, TGC 2011, held in Aachen, Germany, in June 20...
cena: 201,24

 Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems: 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-2 Ioannis Askoxylakis, Henrich C. Pöhls, Joachim Posegga 9783642309540 Springer-Verlag Berlin and Heidelberg GmbH &
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems: 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-2

ISBN: 9783642309540 / Angielski / Miękka / 225 str.

ISBN: 9783642309540/Angielski/Miękka/225 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ioannis Askoxylakis;Henrich C. Pohls;Joachim Posegga
Contains the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on "Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems", WISTP 2012, held in Egham, UK, in June 2012. This title includes topics on protocols, privacy, policy and access control, and more.
Contains the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on "Information Security Theory and Practice: Security, Privacy and T...
cena: 201,24

 Applied Cryptography and Network Security: 10th International Conference, Acns 2012, Singapore, June 26-29, 2012, Proceedings Bao, Feng 9783642312830 Springer
Applied Cryptography and Network Security: 10th International Conference, Acns 2012, Singapore, June 26-29, 2012, Proceedings

ISBN: 9783642312830 / Angielski / Miękka / 580 str.

ISBN: 9783642312830/Angielski/Miękka/580 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Feng Bao; Pierangela Samarati; Jianying Zhou
This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in...
This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in S...
cena: 201,24

 Progress in Cryptology -- Africacrypt 2012: 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012, Proceedings Mitrokotsa, Aikaterini 9783642314094 Springer
Progress in Cryptology -- Africacrypt 2012: 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012, Proceedings

ISBN: 9783642314094 / Angielski / Miękka / 424 str.

ISBN: 9783642314094/Angielski/Miękka/424 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Aikaterini Mitrokotsa; Serge Vaudenay
Constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Ifrane, Morocco, in July 2012.
Constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACR...
cena: 201,24

 Progress in VLSI Design and Test: 16th International Symposium on Vsli Design and Test, Vdat 2012, Shipur, India, July 1-4, 2012, Proceedings Rahaman, Hafizur 9783642314933 Springer
Progress in VLSI Design and Test: 16th International Symposium on Vsli Design and Test, Vdat 2012, Shipur, India, July 1-4, 2012, Proceedings

ISBN: 9783642314933 / Angielski / Miękka / 408 str.

ISBN: 9783642314933/Angielski/Miękka/408 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hafizur Rahaman; Sanatan Chattopadhyay; Santanu Chattopadhyay
This book constitutes the refereed proceedings of the 16th International Symposium on VSLI Design and Test, VDAT 2012, held in Shibpur, India, in July 2012. The 30 revised regular papers presented together with 10 short papers and 13 poster sessions were carefully selected from 135 submissions. The papers are organized in topical sections on VLSI design, design and modeling of digital circuits and systems, testing and verification, design for testability, testing memories and regular logic arrays, embedded systems: hardware/software co-design and verification, emerging technology: nanoscale...
This book constitutes the refereed proceedings of the 16th International Symposium on VSLI Design and Test, VDAT 2012, held in Shibpur, India, in July...
cena: 201,24

 Information Technology Convergence, Secure and Trust Computing, and Data Management: Itcs 2012 & Sta 2012 Park 9789400750821 Springer
Information Technology Convergence, Secure and Trust Computing, and Data Management: Itcs 2012 & Sta 2012

ISBN: 9789400750821 / Angielski / Twarda / 296 str.

ISBN: 9789400750821/Angielski/Twarda/296 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jong Hyuk Park; Jongsung Kim; Deqing Zou
The 4th FTRA International Conference on Information Technology Convergence and Services (ITCS-12) will be held in Gwangju, Korea on September 6 - 8, 2012.
The ITCS-12 will be the most comprehensive conference focused on the various aspects of advances in information technology convergence, applications, and services.
The ITCS-12 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of ITCS. In addition, the conference will publish high quality papers which are closely related to the various theories, modeling, and...
The 4th FTRA International Conference on Information Technology Convergence and Services (ITCS-12) will be held in Gwangju, Korea on September 6 - 8, ...
cena: 603,81

 Information Theoretic Security: 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012, Proceedings Adam Smith 9783642322839 Springer-Verlag Berlin and Heidelberg GmbH &
Information Theoretic Security: 6th International Conference, ICITS 2012, Montreal, QC, Canada, August 15-17, 2012, Proceedings

ISBN: 9783642322839 / Angielski / Miękka / 219 str.

ISBN: 9783642322839/Angielski/Miękka/219 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Adam Smith
This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012. The 11 full papers presented in this volume were carefully reviewed and selected from 46 submissions. In addition 11 papers were selected for the workshop track, abstracts of 7 of these contributions are also included in this book. Topics of interest are: physical layer security; multiparty computations; codes, lattices and cryptography; authentication codes; randomness extraction; cryptography from noisy channels; wiretap channels;...
This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in ...
cena: 185,18

 Information Flow Based Security Control Beyond Rbac: How to Enable Fine-Grained Security Policy Enforcement in Business Processes Beyond Limitations o Fischer-Hellmann, Klaus-Peter 9783834826176 Vieweg+teubner Verlag
Information Flow Based Security Control Beyond Rbac: How to Enable Fine-Grained Security Policy Enforcement in Business Processes Beyond Limitations o

ISBN: 9783834826176 / Angielski / Miękka / 161 str.

ISBN: 9783834826176/Angielski/Miękka/161 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Klaus-Peter Fischer-Hellmann
Role-based access control (RBAC) is a widely used technology to control information flows as well as control flows within and between applications in compliance with restrictions implied by security policies, in particular, to prevent disclosure of information or access to resources beyond restrictions defined by those security policies. Since RBAC only provides the alternatives of either granting or denying access, more fine-grained control of information flows such as granting access to information provided that it will not be disclosed to targets outside our organisation during further...
Role-based access control (RBAC) is a widely used technology to control information flows as well as control flows within and between applications in ...
cena: 201,24

 Open Problems in Communication and Computation Thomas M. Cover B. Gopinath 9781461291626 Springer
Open Problems in Communication and Computation

ISBN: 9781461291626 / Angielski / Miękka / 236 str.

ISBN: 9781461291626/Angielski/Miękka/236 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thomas M. Cover; B. Gopinath
Thomas M. Cover and B. Gopinatb The papers in this volume are the contributions to a special workshop on problems in communication and computation conducted in the summers of 1984 and 1985 in Morristown, New Jersey, and the summer of 1986 in Palo Alto. California. The structure of this workshop was unique: no recent results. no surveys. Instead. we asked for outstanding open prob lems in the field. There are many famous open problems, including the question P = NP?, the simplex conjecture in communication theory, the capacity region of the broadcast channel. and the two.helper problem in...
Thomas M. Cover and B. Gopinatb The papers in this volume are the contributions to a special workshop on problems in communication and computation con...
cena: 402,53

Pierwsza Podprzednia  10  11  12  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia