![]() |
Cybersecurity of Industrial Internet of Things (Iiot)
ISBN: 9781032467818 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
597,30 |
![]() |
From Web 1.0 to Web 3.0: Understanding the Past, Present, and Future of the Internet
ISBN: 9781041012689 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
597,30 |
![]() |
Cyberterrorism: The Rise of Misinformation and Disinformation
ISBN: 9781041077374 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
597,30 |
![]() |
Systematic Security: Building Quantum Security: Preparing for Q-Day and Beyond
ISBN: 9781041166634 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
597,30 |
![]() |
Mitigating the Risks of AI Deepfakes
ISBN: 9781032823508 / Angielski / Twarda / 30-04-2026 / 288 str. Książka dostępna od: 30-04-2026 |
|
Termin ukazania się książki: 30-04-2026
Książkę można już zamówić z rabatem 5% |
|
567,44 |
![]() |
Research Advances in Network Technologies: Volume 3
ISBN: 9781041145172 / Angielski / Twarda / 12-05-2026 / 384 str. Książka dostępna od: 12-05-2026 |
|
Termin ukazania się książki: 12-05-2026
Książkę można już zamówić z rabatem 5% |
|
567,44 |
![]() |
Managing Information Risk and the Economics of Security
ISBN: 9780387097619 / Niemiecki / Twarda / 347 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of serious study and ongoing research. While much research has focused on the technical aspects of computer security, far less attention has been given to the management issues of information risk and the economic concerns facing firms and nations. Managing Information Risk and the Economics of Security provides leading edge thinking on the security issues facing managers, policy makers, and individuals. Many of the chapters of this volume were...
Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of s...
|
cena:
610,90 |
![]() |
Primality Testing and Integer Factorization in Public-Key Cryptography
ISBN: 9780387772677 / Angielski / Twarda / 371 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P). There is still no polynomial-time algorithm for IFP. Many practical public-key cryptosystems and protocols such as RSA (Rivest-Shamir-Adleman) rely their security on computational intractability of IFP. Primality Testing and Integer Factorization in Public Key Cryptography, Second Edition, provides a survey of recent progress in primality testing and integer... The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm,... |
cena:
610,90 |
![]() |
Open Source Software for Digital Forensics
ISBN: 9781441958020 / Angielski / Twarda / 124 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in computer forensics. It presents the motivations for using FLOSS applications as tools for collection, preservation and analysis of digital evidence in computer and network forensics. It also covers extensively several forensic FLOSS tools, their origins and evolution. Open Source Software for Digital Forensics is based on the OSSCoNF workshop, which was held in Milan, Italy, September 2008 at the World Computing Congress, co-located with OSS 2008. This edited... Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in computer forensics.... |
cena:
610,90 |
![]() |
Trustworthy Internet
ISBN: 9788847018174 / Angielski / Miękka / 388 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book collects a selection of the papers presented at the 21st International Tyrrhenian Workshop on Digital Communications, organized by CNIT and dedicated this year to the theme "Trustworthy Internet." The workshop provided a lively discussion on the challenges involved in reshaping the Internet into a trustworthy reality, articulated around the Internet by and for People, the Internet of Contents, the Internet of Services and the Internet of Things, supported by the Network Infrastructure foundation. The papers have been revised after the workshop to take account of feedbacks received...
This book collects a selection of the papers presented at the 21st International Tyrrhenian Workshop on Digital Communications, organized by CNIT and ...
|
cena:
610,90 |
![]() |
Counterterrorism and Open Source Intelligence
ISBN: 9783709103876 / Angielski / Twarda / 458 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism and open source intelligence, demonstrating how various existing as well as novel tools and techniques can be applied in combating covert terrorist networks. A particular focus will be on future challenges of open...
Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there...
|
cena:
610,90 |
![]() |
Managing Information Risk and the Economics of Security
ISBN: 9781441935298 / Angielski / Miękka / 347 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of serious study and ongoing research. While much research has focused on the technical aspects of computer security, far less attention has been given to the management issues of information risk and the economic concerns facing firms and nations. Managing Information Risk and the Economics of Security provides leading edge thinking on the security issues facing managers, policy makers, and individuals. Many of the chapters of this volume were...
Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of s...
|
cena:
610,90 |
![]() |
Primality Testing and Integer Factorization in Public-Key Cryptography
ISBN: 9781441945860 / Angielski / Miękka / 371 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P). There is still no polynomial-time algorithm for IFP. Many practical public-key cryptosystems and protocols such as RSA (Rivest-Shamir-Adleman) rely their security on computational intractability of IFP. Primality Testing and Integer Factorization in Public Key Cryptography, Second Edition, provides a survey of recent progress in primality testing and integer... The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm,... |
cena:
610,90 |
![]() |
Open Source Software for Digital Forensics
ISBN: 9781489983282 / Angielski / Miękka / 124 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in computer forensics. It presents the motivations for using FLOSS applications as tools for collection, preservation and analysis of digital evidence in computer and network forensics. It also covers extensively several forensic FLOSS tools, their origins and evolution. Open Source Software for Digital Forensics is based on the OSSCoNF workshop, which was held in Milan, Italy, September 2008 at the World Computing Congress, co-located with OSS 2008. This edited... Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in computer forensics.... |
cena:
610,90 |
![]() |
Intelligent and Cloud Computing: Proceedings of ICICC 2019, Volume 2
ISBN: 9789811562044 / Angielski / Miękka / 712 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book features a collection of high-quality research papers presented at the International Conference on Intelligent and Cloud Computing (ICICC 2019), held at Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, India, on December 20, 2019. Including contributions on system and network design that can support existing and future applications and services, it covers topics such as cloud computing system and network design, optimization for cloud computing, networking, and applications, green cloud system design, cloud storage design and networking, storage security, cloud system...
This book features a collection of high-quality research papers presented at the International Conference on Intelligent and Cloud Computing (ICICC 20...
|
cena:
610,90 |
![]() |
Emerging Trends in Intelligent Systems & Network Security
ISBN: 9783031151903 / Angielski / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book covers selected research works presented at the fifth International Conference on Networking, Information Systems and Security (NISS 2022), organized by the Research Center for Data and Information Sciences at the National Research and Innovation Agency (BRIN), Republic of Indonesia, and Moroccan Mediterranean Association of Sciences and Sustainable Development, Morocco, during March 30–31, 2022, hosted in online mode in Bandung, Indonesia. Building on the successful history of the conference series in the recent four years, this book aims to present the paramount role of... This book covers selected research works presented at the fifth International Conference on Networking, Information Systems and Security (NISS 2022... |
cena:
610,90 |
![]() |
Bring Your Own Device Security Policy Compliance Framework
ISBN: 9783031868009 / Angielski / Twarda / 195 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Proliferation of Bring Your Own Device (BYOD) has instigated a widespread change, fast outpacing the security strategies deployed by organizations. The influx of these devices has created information security challenges within organizations, further exacerbated with employees’ inconsistent adherence with BYOD security policy. To prevent information security breaches, compliance with BYOD security policy and procedures is vital. This book aims to investigate the factors that determine employees' BYOD security policy compliance by using mixed methods approach. Security policy compliance...
Proliferation of Bring Your Own Device (BYOD) has instigated a widespread change, fast outpacing the security strategies deployed by organizations. Th...
|
cena:
610,90 |
![]() |
Web Programming with HTML5, CSS, and JavaScript
ISBN: 9781284091793 / Angielski / Twarda / 678 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Web Programming With HTML 5, CSS, And Javascript Is Written For The Undergraduate, Client-Side Web Programming Course. It Covers The Three Client-Side Technologies (HTML5, CSS, And Javascript) In Depth, With No Dependence On Server-Side Technologies. One Of The Distinguishing Features Of This New Text Is Its Coverage Of Canvas, One Of The Most Important New Features Of HTML5. Topics Are Presented In A Logical, Comprehensive Manner And Code Is Presented In Both Short Code Fragments And Complete Web Pages, Allowing Readers To Grasp Concepts Quickly And Then Apply The Concepts In The Context Of...
Web Programming With HTML 5, CSS, And Javascript Is Written For The Undergraduate, Client-Side Web Programming Course. It Covers The Three Client-Side...
|
cena:
612,23 |
![]() |
Cybersecurity: Ethics, Legal, Risks, and Policies
ISBN: 9781774630228 / Angielski / Twarda / 416 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
617,21 |
![]() |
Semantic Control for the Cybersecurity Domain: Investigation on the Representativeness of a Domain-Specific Terminology Referring to Lexical Variation
ISBN: 9781032250809 / Angielski / Twarda / 180 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
622,19 |