![]() |
Anti-Spam Measures: Analysis and Design
ISBN: 9783642090875 / Angielski / Miękka / 209 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. I am not sure about the meaning of a preface, neither about its convenience or needlessness nor about the addressees. However, I suppose that it is expected to tell a (part of the) story behind the story and that it is read by at least two types of readers: The ?rst group consists of friends, colleagues, and all others who have contributed to the opus in any way. Presumably, most of them like being named in the preface, and I think they deserve this attention becausetheyhaveaccompaniedtheroadtotheopusandare, thus, partofthe whole. Thesecondgroupcomprisesthoseacademicfellowswhoareinthesame...
I am not sure about the meaning of a preface, neither about its convenience or needlessness nor about the addressees. However, I suppose that it is ex...
|
cena:
201,24 |
![]() |
Computing with C# and the .Net Framework
ISBN: 9781449615505 / Angielski / Miękka / 756 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Thoroughly Revised And Updated To Incorporate Microsoft? Visual Studio? 2010, Computing With C# And The .NET Framework, Second Edition Carefully Introduces Object-Oriented And Event-Driven Programming With Numerous Examples, So Students Can Grasp These Difficult Concepts And Then Apply Them. Appropriate For The Two-Term CS1 And Introductory C# Programming Courses, This Text Takes A Spiral Approach To Teach Objects, Starting With Simple Intuitive Examples, Then Simple Class Design, And Progresses To The More Difficult Aspects Of Inheritance And Polymorphism. Similarly With Events, The Spiral...
Thoroughly Revised And Updated To Incorporate Microsoft? Visual Studio? 2010, Computing With C# And The .NET Framework, Second Edition Carefully Intro...
|
cena:
808,06 |
![]() |
Managing Information Risk and the Economics of Security
ISBN: 9781441935298 / Angielski / Miękka / 347 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of serious study and ongoing research. While much research has focused on the technical aspects of computer security, far less attention has been given to the management issues of information risk and the economic concerns facing firms and nations. Managing Information Risk and the Economics of Security provides leading edge thinking on the security issues facing managers, policy makers, and individuals. Many of the chapters of this volume were...
Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of s...
|
cena:
603,81 |
![]() |
Primality Testing and Integer Factorization in Public-Key Cryptography
ISBN: 9781441945860 / Angielski / Miękka / 371 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P). There is still no polynomial-time algorithm for IFP. Many practical public-key cryptosystems and protocols such as RSA (Rivest-Shamir-Adleman) rely their security on computational intractability of IFP. Primality Testing and Integer Factorization in Public Key Cryptography, Second Edition, provides a survey of recent progress in primality testing and integer... The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm,... |
cena:
603,81 |
![]() |
Junos Enterprise Routing: A Practical Guide to Junos Routing and Certification
ISBN: 9781449398637 / Angielski / Miękka / 770 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Considered the go-to study guide for Juniper Networks enterprise routing certification exams, this book offers you unparalleled coverage of all the services available to Junos administrators including the most recent set of flow-based security services and design guidelines that incorporate services and features of the MX, SRX, and EX network devices. Its emphasis on practical solutions also makes this book an ideal on-the-job reference for design, maintenance, and troubleshooting issues in the enterprise. Simply put, this updated edition is the most comprehensive and authoritative... Considered the go-to study guide for Juniper Networks enterprise routing certification exams, this book offers you unparalleled coverage of all the... |
cena:
286,89 |
![]() |
Advanced Research on Electronic Commerce, Web Application, and Communication: International Conference, ECWAC 2011, Guangzhou, China, April 16-17, 201
ISBN: 9783642203664 / Angielski / Miękka / 492 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set CCIS 143 and CCIS 144 constitutes the refereed proceedings of the International Conference on Electronic Commerce, Web Application, and Communication, ECWAC 2011, held in Guangzhou, China, in April 2011.The 148 revised full papers presented in both volumes were carefully reviewed and selected from a large number of submissions. Providing a forum for engineers, scientists, researchers in electronic commerce, Web application, and communication fields, the conference will put special focus also on aspects such as e-business, e-learning, and e-security, intelligent information...
The two-volume set CCIS 143 and CCIS 144 constitutes the refereed proceedings of the International Conference on Electronic Commerce, Web Application,...
|
cena:
402,53 |
![]() |
Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems
ISBN: 9789400713376 / Angielski / Twarda / 214 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In Security Trends for FPGA's the authors present an analysis of current threats against embedded systems and especially FPGAs. They discuss about requirements according to the FIPS standard in order to build a secure system. This point is of paramount importance as it guarantees the level of security of a system. Also highlighted are current vulnerabilities of FPGAs at all the levels of the security pyramid. It is essential from a design point of view to be aware of all the levels in order to provide a comprehensive solution. The strength of a system is defined by its weakest point; there is...
In Security Trends for FPGA's the authors present an analysis of current threats against embedded systems and especially FPGAs. They discuss about req...
|
cena:
402,53 |
![]() |
Open Source Systems Security Certification
ISBN: 9781441945907 / Angielski / Miękka / 204 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Open Source Advances in Computer Applications book series provides timely technological and business information for: Enabling Open Source Systems (OSS) to become an integral part of systems and devices produced by technology companies; Inserting OSS in the critical path of complex network development and embedded products, including methodologies and tools for domain-specific OSS testing (lab code available), plus certification of security, dependability and safety properties for complex systems; Ensuring integrated systems,... Open Source Advances in Computer Applications book series provides timely technological and business information for: ... |
cena:
402,53 |
![]() |
Group Testing Theory in Network Security: An Advanced Solution
ISBN: 9781461401278 / Angielski / Miękka / 100 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Group Testing Theory in Network Security explores a new branch of group testing theory with an application which enhances research results in network security. This brief presents new solutions on several advanced network security problems and mathematical frameworks based on the group testing theory, specifically denial-of-service and jamming attacks. A new application of group testing, illustrated in this text, requires additional theories, such as size constraint group testing and connected group testing. Included in this text is a chapter devoted to discussing open problems and... Group Testing Theory in Network Security explores a new branch of group testing theory with an application which enhances research results i... |
cena:
201,09 |
![]() |
Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication: 5th Ifip Wg 11.2 International Workshop, W
ISBN: 9783642210396 / Angielski / Miękka / 392 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the refereed proceedings of the 5th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2011, held in Heraklion, Crete, Greece, in June 2011. The 19 revised full papers and 8 short papers presented together with a keynote speech were carefully reviewed and selected from 80 submissions. They are organized in topical sections on mobile authentication and access control, lightweight authentication, algorithms, hardware implementation, security and cryptography, security...
This volume constitutes the refereed proceedings of the 5th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security...
|
cena:
201,24 |
![]() |
Internet of Things - Global Technological and Societal Trends: Smart Environments and Spaces to Green Ict
ISBN: 9788792329738 / Angielski / Twarda / 338 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Internet of Things-- Global Technological and Societal Trends builds on the ideas put forward by the European research Cluster on the Internet of Things Strategic Research Agenda. It presents global views and state-of-the-art results on the challenges the research, development, and deployment of Internet of Things (IoT) face at the global level. The objective of this book is to define the IoT in a global view and present the research agenda for IoT technologies by addressing the new technological developments and providing a global balanced coverage of the challenges and technical and...
Internet of Things-- Global Technological and Societal Trends builds on the ideas put forward by the European research Cluster on the Internet ...
|
cena:
766,28 |
![]() |
principles of modern operating systems
ISBN: 9781449626341 / Angielski / Twarda / 564 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Rev. ed. of: Principles of modern operating systems / Jose M. Garrido, Richard Schlesinger. c2008.
Rev. ed. of: Principles of modern operating systems / Jose M. Garrido, Richard Schlesinger. c2008.
|
cena:
725,30 |
![]() |
Mike Meyers' CompTIA Network+ Guide to Managing and Troubleshooting Networks Lab Manual (Exam N10-005)
ISBN: 9780071788830 / Angielski / Miękka / 496 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Practice the IT Skills Essential for Your Success
In this lab manual, you'll practice:
Practice the IT Skills Essential for Your Success
|
cena:
251,09 |
![]() |
802.11n: A Survival Guide: Wi-Fi Above 100 Mbps
ISBN: 9781449312046 / Angielski / Miękka / 144 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Wireless has finally come of age. With a significant jump in throughput over previous standards, 802.11n is the first wireless technology that doesn t trade speed for mobility, and users have stormed onto wireless networks with a passion. In this concise guide, Matthew Gast chair of the IEEE group that produced revision 802.11-2012 shows you why wireless has become the default method of connecting to a network, and provides technical details you need to plan, design, and deploy 802.11n today. Building a network for the multitude of new devices is now a strategic decision for network... Wireless has finally come of age. With a significant jump in throughput over previous standards, 802.11n is the first wireless technology that does... |
cena:
81,93 |
![]() |
Foundations of Security Analysis and Design VI: FOSAD Tutorial Lectures
ISBN: 9783642230813 / Angielski / Miękka / 275 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The FOSAD symposia are a vital means of disseminating cutting-edge developments in computer network security. This collection features revised versions of nine lectures given at FOSAD tutorials by some of the world's leading researchers in the field.
The FOSAD symposia are a vital means of disseminating cutting-edge developments in computer network security. This collection features revised version...
|
cena:
201,24 |
![]() |
Global Security, Safety, and Sustainability: 7th International and 4th E-Democracy Joint Conferences, Icgs3/E-Democracy 2011, Thessaloniki, Greece, Au
ISBN: 9783642334474 / Angielski / Miękka / 290 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Global Security, Safety, and Sustainability (ICDS3), and of the 4th e-Democracy Joint Conferences (e-Democracy 2011) which were held in Thessaloniki in August 2011.
Constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Global Security, Safety, and Sustainability (IC...
|
cena:
201,24 |
![]() |
Ethical Governance of Emerging Technologies Development
ISBN: 9781466636705 / Angielski / Twarda / 408 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The more integrated technology becomes in our everyday lives and businesses, the more vital it grows that its applications are utilized in an ethical and appropriate way. Ethical Governance of Emerging Technologies Development combines multiple perspectives on ethical backgrounds, theories, and management approaches when implementing new technologies into an environment. Understanding the ethical implications associated with utilizing new advancements in technology is useful for professionals, researchers, and graduate students interested in this growing area of research.
The more integrated technology becomes in our everyday lives and businesses, the more vital it grows that its applications are utilized in an ethical ...
|
cena:
985,79 |
![]() |
Smart Card Research and Advanced Applications: 11th International Conference, Cardis 2012, Graz, Austria, November 28-30, 2012, Revised Selected Paper
ISBN: 9783642372872 / Angielski / Miękka / 297 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Smart Card Research and Advanced Applications, CARDIS 2012, held in Graz, Austria, in November 2012. The 18 revised full papers presented together with an invited talk were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on Java card security, protocols, side-channel attacks, implementations, and implementations for resource-constrained devices.
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Smart Card Research and Advanced App...
|
cena:
201,24 |
![]() |
Solarwinds Orion Network Performance Monitor
ISBN: 9781849688482 / Angielski / Miękka / 336 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Orion Network Performance Monitor is a scalable, easy-to-use, cost-effective network monitoring system that provides a complete overview of network environments by monitoring performance and availability. Orion NPM enables you to be proactive in detecting, diagnosing, and resolving network issues and outages and has the benefit of supporting hundreds of types of server, OS, and network vendors including Cisco, HP, Microsoft, Linux, Motorola, Brocade, Foundry, and more. Orion NPM is a well-known product and is used by thousands of public and private companies, educational institutions, and...
Orion Network Performance Monitor is a scalable, easy-to-use, cost-effective network monitoring system that provides a complete overview of network en...
|
cena:
280,93 |
![]() |
Internet and the Law: Technology, Society, and Compromises
ISBN: 9781610693493 / Angielski / Twarda / 352 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "Internet and the Law: Technology, Society, and Compromises, Second Edition" is "the" go-to source for anyone who needs clear explanations of complex legal concepts related to online practices and content. This wide-ranging, alphabetical reference explores diverse areas of law, including territorial jurisdiction and taxation, that are relevant to or affected by advances in information technology and the rise of the Internet. Particular emphasis is placed on intellectual property law and laws regarding freedom of expression. The Internet, as this book shows, raises questions not only about... "Internet and the Law: Technology, Society, and Compromises, Second Edition" is "the" go-to source for anyone who needs clear explanations of compl... |
cena:
548,27 |