• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2952079]
• Literatura piękna
 [1850969]

  więcej...
• Turystyka
 [71058]
• Informatyka
 [151066]
• Komiksy
 [35579]
• Encyklopedie
 [23181]
• Dziecięca
 [620496]
• Hobby
 [139036]
• AudioBooki
 [1646]
• Literatura faktu
 [228729]
• Muzyka CD
 [379]
• Słowniki
 [2932]
• Inne
 [445708]
• Kalendarze
 [1409]
• Podręczniki
 [164793]
• Poradniki
 [480107]
• Religia
 [510956]
• Czasopisma
 [511]
• Sport
 [61267]
• Sztuka
 [243299]
• CD, DVD, Video
 [3411]
• Technologie
 [219640]
• Zdrowie
 [100984]
• Książkowe Klimaty
 [124]
• Zabawki
 [2281]
• Puzzle, gry
 [3363]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [8020]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2616

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Security Protocols: 6th International Workshop, Cambridge, Uk, April 15-17, 1998, Proceedings Christianson, Bruce 9783540656630 Springer
Security Protocols: 6th International Workshop, Cambridge, Uk, April 15-17, 1998, Proceedings

ISBN: 9783540656630 / Angielski / Miękka / 252 str.

ISBN: 9783540656630/Angielski/Miękka/252 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bruce Christianson; B. Christianson; B. Crispo
This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Security Protocols held in Cambridge, UK in April 1998.
The 15 revised papers presented as position statements are followed by transcripts of the discussions between the authors and the audience. Also included is a report on the final panel discussion on future directions in security protocols research and developments. Thus the volume reflects the lively interaction at the workshop. The papers are devoted to the interrelations between trust and delegation, exploring the...
This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Security Protocols held in Cambridge, UK ...
cena: 201,24

 The Best of Freebsd Basics Lavigne, Dru 9780979034220 Reed Media Services
The Best of Freebsd Basics

ISBN: 9780979034220 / Angielski / Miękka / 596 str.

ISBN: 9780979034220/Angielski/Miękka/596 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dru Lavigne; Jeremy C. Reed; Greg Lehey
cena: 195,21

 Security Protocols: 8th International Workshops Cambridge, Uk, April 3-5, 2000 Revised Papers Christianson, Bruce 9783540425663 Springer
Security Protocols: 8th International Workshops Cambridge, Uk, April 3-5, 2000 Revised Papers

ISBN: 9783540425663 / Angielski / Miękka / 264 str.

ISBN: 9783540425663/Angielski/Miękka/264 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
B. Christianson; B. Criso; M. Roe
The Cambridge International Workshop on Security Protocols has now run for eight years. Each year we set a theme, focusing upon a speci?c aspect of security protocols, and invite position papers. Anybody is welcome to send us a position paper (yes, you are invited) and we don t insist they relate to the current theme in an obvious way. In our experience, the emergence of the theme as a unifying threadtakesplaceduringthediscussionsattheworkshopitself.Theonlyground rule is that position papers should formulate an approach to some unresolved issues, rather than being a description of a ?nished...
The Cambridge International Workshop on Security Protocols has now run for eight years. Each year we set a theme, focusing upon a speci?c aspect of se...
cena: 201,24

 Security Protocols: 10th International Workshop, Cambridge, Uk, April 17-19, 2002, Revised Papers Christianson, Bruce 9783540208303 Springer
Security Protocols: 10th International Workshop, Cambridge, Uk, April 17-19, 2002, Revised Papers

ISBN: 9783540208303 / Angielski / Miękka / 248 str.

ISBN: 9783540208303/Angielski/Miękka/248 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bruno Crispo; James A. Malcolm; Michael Roe
Once again we bring you the proceedings of the International Workshop on Security Protocols. It seems hard to believe that we have reached the tenth event in this annual series. This year our theme was "Discerning the Protocol Participants." Security protocols are usually described in terms of the active participants - Alice c- putes foo and sends it to Bob. However most security protocols also include o?-line participants, which are not synchronously involved in the exchange of messages: a bank may participate on behalf of a customer, and an arbiter may subsequently be asked to interpret the...
Once again we bring you the proceedings of the International Workshop on Security Protocols. It seems hard to believe that we have reached the tenth e...
cena: 201,24

 Security Protocols: 9th International Workshop, Cambridge, Uk, April 25-27, 2001 Revised Papers Christianson, Bruce 9783540442639 Springer
Security Protocols: 9th International Workshop, Cambridge, Uk, April 25-27, 2001 Revised Papers

ISBN: 9783540442639 / Angielski / Miękka / 246 str.

ISBN: 9783540442639/Angielski/Miękka/246 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
B. Chrisianson; B. Cirspo; Bruce Christianson
Hello and welcome. These are the proceedings of the 9th International Workshop on Security Protocols, the ?rst to be held in the new millennium. This year our theme was "mobile computing versus immobile security." As usual, the insights and challenges which emerged during the workshop are re?ected in the position papers, which appear here in rewritten form. Transcripts are also included of the discussions which took place in C- bridge as the initial versions were presented. These transcripts are intended to provide a perspective on lines of argument which are worth pursuing further. Our...
Hello and welcome. These are the proceedings of the 9th International Workshop on Security Protocols, the ?rst to be held in the new millennium. This ...
cena: 201,24

 Information Security Practice and Experience: Third International Conference, Ispec 2007, Hong Kong, China, May 7-9, 2007, Proceedings Dawson, Ed 9783540721598 Springer
Information Security Practice and Experience: Third International Conference, Ispec 2007, Hong Kong, China, May 7-9, 2007, Proceedings

ISBN: 9783540721598 / Angielski / Miękka / 370 str.

ISBN: 9783540721598/Angielski/Miękka/370 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ed Dawson; Duncan S. Wong
The third international conference on Information Security Practice and - perience (ISPEC 2007) was held in Hong Kong, China, May 7 9, 2007. The conference was organized and sponsored by City University of Hong Kong. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is an annual conference that brings together researchers and practitioners to provide a con?uence of new information security technologies, their applications and their integration with IT systems in various vertical...
The third international conference on Information Security Practice and - perience (ISPEC 2007) was held in Hong Kong, China, May 7 9, 2007. The confe...
cena: 201,24

 SQL for Microsoft Access Allison, Cecelia L. 9781598220605 Wordware Publishing
SQL for Microsoft Access

ISBN: 9781598220605 / Angielski / Miękka / 374 str.

ISBN: 9781598220605/Angielski/Miękka/374 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Cecelia L. Allison
SQL For Microsoft Access (2Nd Edition) Provides A Guide To Getting The Most Out Of Microsoft Access Through The Use Of Structured Query Language. Step-By-Step Examples Demonstrate How To Use SQL Script To Create Tables, Add Records To Tables, And Retrieve And Manage Records. Readers Will Also Learn About Calculated Fields, Access Projects, And The Integration Of SQL Script In VBA And ASP Code. Explore The Relational Database Structure And The Basics Of SQL. Understand How Table Joins, Unions, And Subqueries Are Used To Retrieve Records From Multiple Tables Simultaneously. Learn How To Filter...
SQL For Microsoft Access (2Nd Edition) Provides A Guide To Getting The Most Out Of Microsoft Access Through The Use Of Structured Query Language. Step...
cena: 165,50

 A Complete Guide to Programming in C++ Peter Prinz Ulla Kirch-Prinz 9780763718176 JONES AND BARTLETT PUBLISHERS, INC
A Complete Guide to Programming in C++

ISBN: 9780763718176 / Angielski / Miękka / 848 str.

ISBN: 9780763718176/Angielski/Miękka/848 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peter Prinz; Ulla Kirch-Prinz
This guide uses a double-page spread with a description of language elements on one side and an illustration with graphics and sample programs on the other. The chapters include exercises and sample solutions and an appendix provides binary number representation, pre-processor directives, and operat
This guide uses a double-page spread with a description of language elements on one side and an illustration with graphics and sample programs on the ...
cena: 486,78

 Dependable Computing: Third Latin-American Symposium, Ladc 2007, Morelia, Mexico, September 26-28, 2007, Proceedings Bondavalli, Andrea 9783540752936 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Dependable Computing: Third Latin-American Symposium, Ladc 2007, Morelia, Mexico, September 26-28, 2007, Proceedings

ISBN: 9783540752936 / Angielski / Miękka / 242 str.

ISBN: 9783540752936/Angielski/Miękka/242 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

This book constitutes the refereed proceedings of the Third Latin-American Symposium on Dependable Computing, LADC 2007, held in Morelia, Mexico, in September 2007. The papers are organized in topical sections on fault-tolerant algorithms, software engineering of dependable systems, networking and mobile computing, experimental dependability evaluation, as well as intrusion tolerance and security.


This book constitutes the refereed proceedings of the Third Latin-American Symposium on Dependable Computing, LADC 2007, held in Morelia, Mexico, i...

cena: 201,24

 Trustworthy Global Computing: Third Symposium, Tgc 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers Barthe, Gilles 9783540786627 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Trustworthy Global Computing: Third Symposium, Tgc 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers

ISBN: 9783540786627 / Angielski / Miękka / 401 str.

ISBN: 9783540786627/Angielski/Miękka/401 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This volume contains the post-proceedings of the third edition of the Int- national Symposium on Trustworthy Global Computing (TGC 2007), held in Sophia-Antipolis, France, November 5 6,2007, andtutorialpapersofthe foll- ing Workshop on the Interplay of Programming Languages and Cryptography, held in Sophia Antipolis, November 7, 2007. TheSymposiumonTrustworthyGlobalComputingisaninternationalannual venue dedicated to safe and reliable computation in global computers. It focuses on providing tools and frameworks for constructing well-behaved applications and for reasoning about their behavior...
This volume contains the post-proceedings of the third edition of the Int- national Symposium on Trustworthy Global Computing (TGC 2007), held in Soph...
cena: 201,24

 Dependability Metrics: Gi-Dagstuhl Research Seminar, Dagstuhl Castle, Germany, October 5 - November 1, 2005, Advanced Lectures Eusgeld, Irene 9783540689461 Springer
Dependability Metrics: Gi-Dagstuhl Research Seminar, Dagstuhl Castle, Germany, October 5 - November 1, 2005, Advanced Lectures

ISBN: 9783540689461 / Angielski / Miękka / 305 str.

ISBN: 9783540689461/Angielski/Miękka/305 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Irene Eusgeld
With the growingubiquity of computing systems it is essentialthat we canplace reliance on the services they deliver. This is particularly obvious and important in areas like aircraft avionics, global ?nancial transaction processing, or nuclear power plant control where human lives or large ?nancial values are at stake. But also the worldwide daily nuisances of computer viruses or data corruptions caused by crashing operating systems collectively impose high costs on society, which are beginning to become economically relevant. Within computer science, the termdependability has been introduced...
With the growingubiquity of computing systems it is essentialthat we canplace reliance on the services they deliver. This is particularly obvious and ...
cena: 173,10

 Ubiquitous Intelligence and Computing: 5th International Conference, UIC 2008 Oslo, Norway, June 23-25, 2008 Proceedings Sandnes, Frode Eika 9783540692928 Springer
Ubiquitous Intelligence and Computing: 5th International Conference, UIC 2008 Oslo, Norway, June 23-25, 2008 Proceedings

ISBN: 9783540692928 / Angielski / Miękka / 788 str.

ISBN: 9783540692928/Angielski/Miękka/788 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Frode Eika Sandnes
This volume contains the proceedings of UIC 2008, the 5th International C- ference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces. The conference was held in Oslo, Norway, during June 23 25, 2008. The event was the ?fth meeting of this conference series. USW 2005 (First International Workshop on Ubiquitous Smart World), held in March 2005 in Taiwan, was the ?rst event in the series. This event was followed by UISW 2005 (SecondInternationalSymposiumonUbiquitousIntelligenceandSmartWorlds) held in December 2005 in Japan, by UIC 2006 (Third International...
This volume contains the proceedings of UIC 2008, the 5th International C- ference on Ubiquitous Intelligence and Computing: Building Smart Worlds in ...
cena: 402,53

 software testing: interview questions  Koirala, S. 9781934015247 Infinity Science Press
software testing: interview questions

ISBN: 9781934015247 / Angielski / Miękka / 220 str.

ISBN: 9781934015247/Angielski/Miękka/220 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
S. Koirala; S. Sheikh; Shivprasad Koirala
The Competence And Quality Of Software Testers Are Often Judged By The Various Testing Techniques They Have Mastered. As The Name Suggests, Software Testing Provides A Self-Study Format And Is Designed For Certification Course Review, And For "Freshers" As Well As Professionals Who Are Searching For Opportunities In The Software Testing Field. Along With Software Testing Basics, The Book Covers Software Testing Techniques And Interview Questions (E.G., Six Sigma And CMMI) Which Are Important From The Software Quality Assurance (SQA) Perspective. It Also Has In-Depth Coverage Of Software...
The Competence And Quality Of Software Testers Are Often Judged By The Various Testing Techniques They Have Mastered. As The Name Suggests, Software T...
cena: 346,61

 Integrating Advanced Computer-Aided Design, Manufacturing, and Numerical Control: Principles and Implementations Xu, Xun 9781599047140 Information Science Reference
Integrating Advanced Computer-Aided Design, Manufacturing, and Numerical Control: Principles and Implementations

ISBN: 9781599047140 / Angielski / Twarda / 424 str.

ISBN: 9781599047140/Angielski/Twarda/424 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xun Xu
For many years, computers have been playing a prominent role in the process of product design and manufacture. As manufacturing continues to march into the future, there is a critical need to address the role of computer technologies in an integrated fashion, placing emphasis on product data exchange as well as product data management.
For many years, computers have been playing a prominent role in the process of product design and manufacture. As manufacturing continues to march int...
cena: 834,13

 Post-Quantum Cryptography Buchmann, Johannes 9783540884026 Springer
Post-Quantum Cryptography

ISBN: 9783540884026 / Angielski / Miękka / 248 str.

ISBN: 9783540884026/Angielski/Miękka/248 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Johannes Buchmann
Threedecadesagopublic-keycryptosystemsmadea revolutionarybreakthrough in cryptography. They have developed into an indispensable part of our m- ern communication system. In practical applications RSA, DSA, ECDSA, and similar public key cryptosystems are commonly used. Their security depends on assumptions about the di?culty of certain problems in number theory, such as the Integer Prime Factorization Problem or the Discrete Logarithm Problem. However, in 1994 Peter Shor showed that quantum computers could break any public-key cryptosystembased on these hard number theory problems. This means...
Threedecadesagopublic-keycryptosystemsmadea revolutionarybreakthrough in cryptography. They have developed into an indispensable part of our m- ern co...
cena: 241,50

 Managing Information Risk and the Economics of Security M. Eric Johnson 9780387097619 Springer
Managing Information Risk and the Economics of Security

ISBN: 9780387097619 / Niemiecki / Twarda / 347 str.

ISBN: 9780387097619/Niemiecki/Twarda/347 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
M. Eric Johnson
Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of serious study and ongoing research. While much research has focused on the technical aspects of computer security, far less attention has been given to the management issues of information risk and the economic concerns facing firms and nations. Managing Information Risk and the Economics of Security provides leading edge thinking on the security issues facing managers, policy makers, and individuals. Many of the chapters of this volume were...
Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of s...
cena: 603,81

 Information Security and Cryptology - Icisc 2002: 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers Lee, Pil Joong 9783540007166 Springer
Information Security and Cryptology - Icisc 2002: 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers

ISBN: 9783540007166 / Angielski / Miękka / 544 str.

ISBN: 9783540007166/Angielski/Miękka/544 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Pil Joong Lee; Chae Hoon Lim

This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002.

The 35 revised full papers presented together with an invited paper were carefully selected from 142 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, Internet security, block ciphers and stream ciphers, stream ciphers and other primitives, efficient implementations, side-channel attacks, cryptographic protocols and...

This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2...

cena: 201,24

 Primality Testing and Integer Factorization in Public-Key Cryptography Song Y. Yan 9780387772677 SPRINGER-VERLAG NEW YORK INC.
Primality Testing and Integer Factorization in Public-Key Cryptography

ISBN: 9780387772677 / Angielski / Twarda / 371 str.

ISBN: 9780387772677/Angielski/Twarda/371 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Song Y. Yan

The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P). There is still no polynomial-time algorithm for IFP. Many practical public-key cryptosystems and protocols such as RSA (Rivest-Shamir-Adleman) rely their security on computational intractability of IFP.

Primality Testing and Integer Factorization in Public Key Cryptography, Second Edition, provides a survey of recent progress in primality testing and integer...

The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm,...

cena: 603,81

 The JavaScript Programming Language Ray Toal 9780763766580 National Book Network
The JavaScript Programming Language

ISBN: 9780763766580 / Angielski / Miękka / 95 str.

ISBN: 9780763766580/Angielski/Miękka/95 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ray Toal
This text offers a brief introductory level overview of the JavaScript programming language that is now an important aspect of every programmer's toolbox.
This text offers a brief introductory level overview of the JavaScript programming language that is now an important aspect of every programmer's tool...
cena: 350,48

 Trustworthy Global Computing: 4th International Symposium, Tgc 2008, Barcelona, Spain, November 3-4, 2008, Revised Selected Papers Kaklamanis, Christos 9783642009440 Springer
Trustworthy Global Computing: 4th International Symposium, Tgc 2008, Barcelona, Spain, November 3-4, 2008, Revised Selected Papers

ISBN: 9783642009440 / Angielski / Miękka / 217 str.

ISBN: 9783642009440/Angielski/Miękka/217 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Christos Kaklamanis
This volume contains the proceedings of the fourth edition of the International Symposium on Trustworthy Global Computing (TGC 2008) that was held in Barcelona, Spain, November 3-4, 2008. The Symposium on Trustworthy Global Computing is an international annual venue dedicated to safe and reliable c- putation in global computers. It focuses on providing frameworks, tools, and protocolsfor constructing well-behavedapplications and onreasoningrigorously about their behavior and properties. The related models of computation inc- porate code and data mobility over distributed networks with highly...
This volume contains the proceedings of the fourth edition of the International Symposium on Trustworthy Global Computing (TGC 2008) that was held in ...
cena: 201,24

Pierwsza Podprzednia  106  107  108  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia