![]() |
Security Protocols: 6th International Workshop, Cambridge, Uk, April 15-17, 1998, Proceedings
ISBN: 9783540656630 / Angielski / Miękka / 252 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Security Protocols held in Cambridge, UK in April 1998.
The 15 revised papers presented as position statements are followed by transcripts of the discussions between the authors and the audience. Also included is a report on the final panel discussion on future directions in security protocols research and developments. Thus the volume reflects the lively interaction at the workshop. The papers are devoted to the interrelations between trust and delegation, exploring the... This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Security Protocols held in Cambridge, UK ...
|
cena:
201,24 |
![]() |
The Best of Freebsd Basics
ISBN: 9780979034220 / Angielski / Miękka / 596 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
195,21 |
![]() |
Security Protocols: 8th International Workshops Cambridge, Uk, April 3-5, 2000 Revised Papers
ISBN: 9783540425663 / Angielski / Miękka / 264 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Cambridge International Workshop on Security Protocols has now run for eight years. Each year we set a theme, focusing upon a speci?c aspect of security protocols, and invite position papers. Anybody is welcome to send us a position paper (yes, you are invited) and we don t insist they relate to the current theme in an obvious way. In our experience, the emergence of the theme as a unifying threadtakesplaceduringthediscussionsattheworkshopitself.Theonlyground rule is that position papers should formulate an approach to some unresolved issues, rather than being a description of a ?nished...
The Cambridge International Workshop on Security Protocols has now run for eight years. Each year we set a theme, focusing upon a speci?c aspect of se...
|
cena:
201,24 |
![]() |
Security Protocols: 10th International Workshop, Cambridge, Uk, April 17-19, 2002, Revised Papers
ISBN: 9783540208303 / Angielski / Miękka / 248 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Once again we bring you the proceedings of the International Workshop on Security Protocols. It seems hard to believe that we have reached the tenth event in this annual series. This year our theme was "Discerning the Protocol Participants." Security protocols are usually described in terms of the active participants - Alice c- putes foo and sends it to Bob. However most security protocols also include o?-line participants, which are not synchronously involved in the exchange of messages: a bank may participate on behalf of a customer, and an arbiter may subsequently be asked to interpret the...
Once again we bring you the proceedings of the International Workshop on Security Protocols. It seems hard to believe that we have reached the tenth e...
|
cena:
201,24 |
![]() |
Security Protocols: 9th International Workshop, Cambridge, Uk, April 25-27, 2001 Revised Papers
ISBN: 9783540442639 / Angielski / Miękka / 246 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Hello and welcome. These are the proceedings of the 9th International Workshop on Security Protocols, the ?rst to be held in the new millennium. This year our theme was "mobile computing versus immobile security." As usual, the insights and challenges which emerged during the workshop are re?ected in the position papers, which appear here in rewritten form. Transcripts are also included of the discussions which took place in C- bridge as the initial versions were presented. These transcripts are intended to provide a perspective on lines of argument which are worth pursuing further. Our...
Hello and welcome. These are the proceedings of the 9th International Workshop on Security Protocols, the ?rst to be held in the new millennium. This ...
|
cena:
201,24 |
![]() |
Information Security Practice and Experience: Third International Conference, Ispec 2007, Hong Kong, China, May 7-9, 2007, Proceedings
ISBN: 9783540721598 / Angielski / Miękka / 370 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The third international conference on Information Security Practice and - perience (ISPEC 2007) was held in Hong Kong, China, May 7 9, 2007. The conference was organized and sponsored by City University of Hong Kong. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is an annual conference that brings together researchers and practitioners to provide a con?uence of new information security technologies, their applications and their integration with IT systems in various vertical...
The third international conference on Information Security Practice and - perience (ISPEC 2007) was held in Hong Kong, China, May 7 9, 2007. The confe...
|
cena:
201,24 |
![]() |
SQL for Microsoft Access
ISBN: 9781598220605 / Angielski / Miękka / 374 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. SQL For Microsoft Access (2Nd Edition) Provides A Guide To Getting The Most Out Of Microsoft Access Through The Use Of Structured Query Language. Step-By-Step Examples Demonstrate How To Use SQL Script To Create Tables, Add Records To Tables, And Retrieve And Manage Records. Readers Will Also Learn About Calculated Fields, Access Projects, And The Integration Of SQL Script In VBA And ASP Code. Explore The Relational Database Structure And The Basics Of SQL. Understand How Table Joins, Unions, And Subqueries Are Used To Retrieve Records From Multiple Tables Simultaneously. Learn How To Filter...
SQL For Microsoft Access (2Nd Edition) Provides A Guide To Getting The Most Out Of Microsoft Access Through The Use Of Structured Query Language. Step...
|
cena:
165,50 |
![]() |
A Complete Guide to Programming in C++
ISBN: 9780763718176 / Angielski / Miękka / 848 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This guide uses a double-page spread with a description of language elements on one side and an illustration with graphics and sample programs on the other. The chapters include exercises and sample solutions and an appendix provides binary number representation, pre-processor directives, and operat
This guide uses a double-page spread with a description of language elements on one side and an illustration with graphics and sample programs on the ...
|
cena:
486,78 |
![]() |
Dependable Computing: Third Latin-American Symposium, Ladc 2007, Morelia, Mexico, September 26-28, 2007, Proceedings
ISBN: 9783540752936 / Angielski / Miękka / 242 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Third Latin-American Symposium on Dependable Computing, LADC 2007, held in Morelia, Mexico, in September 2007. The papers are organized in topical sections on fault-tolerant algorithms, software engineering of dependable systems, networking and mobile computing, experimental dependability evaluation, as well as intrusion tolerance and security. This book constitutes the refereed proceedings of the Third Latin-American Symposium on Dependable Computing, LADC 2007, held in Morelia, Mexico, i... |
cena:
201,24 |
![]() |
Trustworthy Global Computing: Third Symposium, Tgc 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers
ISBN: 9783540786627 / Angielski / Miękka / 401 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the post-proceedings of the third edition of the Int- national Symposium on Trustworthy Global Computing (TGC 2007), held in Sophia-Antipolis, France, November 5 6,2007, andtutorialpapersofthe foll- ing Workshop on the Interplay of Programming Languages and Cryptography, held in Sophia Antipolis, November 7, 2007. TheSymposiumonTrustworthyGlobalComputingisaninternationalannual venue dedicated to safe and reliable computation in global computers. It focuses on providing tools and frameworks for constructing well-behaved applications and for reasoning about their behavior...
This volume contains the post-proceedings of the third edition of the Int- national Symposium on Trustworthy Global Computing (TGC 2007), held in Soph...
|
cena:
201,24 |
![]() |
Dependability Metrics: Gi-Dagstuhl Research Seminar, Dagstuhl Castle, Germany, October 5 - November 1, 2005, Advanced Lectures
ISBN: 9783540689461 / Angielski / Miękka / 305 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the growingubiquity of computing systems it is essentialthat we canplace reliance on the services they deliver. This is particularly obvious and important in areas like aircraft avionics, global ?nancial transaction processing, or nuclear power plant control where human lives or large ?nancial values are at stake. But also the worldwide daily nuisances of computer viruses or data corruptions caused by crashing operating systems collectively impose high costs on society, which are beginning to become economically relevant. Within computer science, the termdependability has been introduced...
With the growingubiquity of computing systems it is essentialthat we canplace reliance on the services they deliver. This is particularly obvious and ...
|
cena:
173,10 |
![]() |
Ubiquitous Intelligence and Computing: 5th International Conference, UIC 2008 Oslo, Norway, June 23-25, 2008 Proceedings
ISBN: 9783540692928 / Angielski / Miękka / 788 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the proceedings of UIC 2008, the 5th International C- ference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces. The conference was held in Oslo, Norway, during June 23 25, 2008. The event was the ?fth meeting of this conference series. USW 2005 (First International Workshop on Ubiquitous Smart World), held in March 2005 in Taiwan, was the ?rst event in the series. This event was followed by UISW 2005 (SecondInternationalSymposiumonUbiquitousIntelligenceandSmartWorlds) held in December 2005 in Japan, by UIC 2006 (Third International...
This volume contains the proceedings of UIC 2008, the 5th International C- ference on Ubiquitous Intelligence and Computing: Building Smart Worlds in ...
|
cena:
402,53 |
![]() |
software testing: interview questions
ISBN: 9781934015247 / Angielski / Miękka / 220 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Competence And Quality Of Software Testers Are Often Judged By The Various Testing Techniques They Have Mastered. As The Name Suggests, Software Testing Provides A Self-Study Format And Is Designed For Certification Course Review, And For "Freshers" As Well As Professionals Who Are Searching For Opportunities In The Software Testing Field. Along With Software Testing Basics, The Book Covers Software Testing Techniques And Interview Questions (E.G., Six Sigma And CMMI) Which Are Important From The Software Quality Assurance (SQA) Perspective. It Also Has In-Depth Coverage Of Software...
The Competence And Quality Of Software Testers Are Often Judged By The Various Testing Techniques They Have Mastered. As The Name Suggests, Software T...
|
cena:
346,61 |
![]() |
Integrating Advanced Computer-Aided Design, Manufacturing, and Numerical Control: Principles and Implementations
ISBN: 9781599047140 / Angielski / Twarda / 424 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. For many years, computers have been playing a prominent role in the process of product design and manufacture. As manufacturing continues to march into the future, there is a critical need to address the role of computer technologies in an integrated fashion, placing emphasis on product data exchange as well as product data management.
For many years, computers have been playing a prominent role in the process of product design and manufacture. As manufacturing continues to march int...
|
cena:
834,13 |
![]() |
Post-Quantum Cryptography
ISBN: 9783540884026 / Angielski / Miękka / 248 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Threedecadesagopublic-keycryptosystemsmadea revolutionarybreakthrough in cryptography. They have developed into an indispensable part of our m- ern communication system. In practical applications RSA, DSA, ECDSA, and similar public key cryptosystems are commonly used. Their security depends on assumptions about the di?culty of certain problems in number theory, such as the Integer Prime Factorization Problem or the Discrete Logarithm Problem. However, in 1994 Peter Shor showed that quantum computers could break any public-key cryptosystembased on these hard number theory problems. This means...
Threedecadesagopublic-keycryptosystemsmadea revolutionarybreakthrough in cryptography. They have developed into an indispensable part of our m- ern co...
|
cena:
241,50 |
![]() |
Managing Information Risk and the Economics of Security
ISBN: 9780387097619 / Niemiecki / Twarda / 347 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of serious study and ongoing research. While much research has focused on the technical aspects of computer security, far less attention has been given to the management issues of information risk and the economic concerns facing firms and nations. Managing Information Risk and the Economics of Security provides leading edge thinking on the security issues facing managers, policy makers, and individuals. Many of the chapters of this volume were...
Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of s...
|
cena:
603,81 |
![]() |
Information Security and Cryptology - Icisc 2002: 5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers
ISBN: 9783540007166 / Angielski / Miękka / 544 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002. The 35 revised full papers presented together with an invited paper were carefully selected from 142 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, Internet security, block ciphers and stream ciphers, stream ciphers and other primitives, efficient implementations, side-channel attacks, cryptographic protocols and... This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2... |
cena:
201,24 |
![]() |
Primality Testing and Integer Factorization in Public-Key Cryptography
ISBN: 9780387772677 / Angielski / Twarda / 371 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P). There is still no polynomial-time algorithm for IFP. Many practical public-key cryptosystems and protocols such as RSA (Rivest-Shamir-Adleman) rely their security on computational intractability of IFP. Primality Testing and Integer Factorization in Public Key Cryptography, Second Edition, provides a survey of recent progress in primality testing and integer... The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm,... |
cena:
603,81 |
![]() |
The JavaScript Programming Language
ISBN: 9780763766580 / Angielski / Miękka / 95 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This text offers a brief introductory level overview of the JavaScript programming language that is now an important aspect of every programmer's toolbox.
This text offers a brief introductory level overview of the JavaScript programming language that is now an important aspect of every programmer's tool...
|
cena:
350,48 |
![]() |
Trustworthy Global Computing: 4th International Symposium, Tgc 2008, Barcelona, Spain, November 3-4, 2008, Revised Selected Papers
ISBN: 9783642009440 / Angielski / Miękka / 217 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the proceedings of the fourth edition of the International Symposium on Trustworthy Global Computing (TGC 2008) that was held in Barcelona, Spain, November 3-4, 2008. The Symposium on Trustworthy Global Computing is an international annual venue dedicated to safe and reliable c- putation in global computers. It focuses on providing frameworks, tools, and protocolsfor constructing well-behavedapplications and onreasoningrigorously about their behavior and properties. The related models of computation inc- porate code and data mobility over distributed networks with highly...
This volume contains the proceedings of the fourth edition of the International Symposium on Trustworthy Global Computing (TGC 2008) that was held in ...
|
cena:
201,24 |