• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2624

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Theory of Cryptography: 4th Theory of Cryptography Conference, Tcc 2007, Amsterdam, the Netherlands, February 21-24, 2007, Proceedings Vadhan, Salil P. 9783540709350 Springer
Theory of Cryptography: 4th Theory of Cryptography Conference, Tcc 2007, Amsterdam, the Netherlands, February 21-24, 2007, Proceedings

ISBN: 9783540709350 / Angielski / Miękka / 612 str.

ISBN: 9783540709350/Angielski/Miękka/612 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Salil P. Vadhan

This book constitutes the refereed proceedings of the 4th Theory of Cryptography Conference, TCC 2007, held in Amsterdam, The Netherlands in February 2007. The 31 revised full papers cover encryption, universally composable security, arguments and zero knowledge, notions of security, obfuscation, secret sharing and multiparty computation, signatures and watermarking, private approximation and black-box reductions, and key establishment.


This book constitutes the refereed proceedings of the 4th Theory of Cryptography Conference, TCC 2007, held in Amsterdam, The Netherlands in Februa...

cena: 402,53

 Pervasive Computing: 5th International Conference, Pervasive 2007, Toronto, Canada, May 13-16, 2007, Proceedings Lamarca, Anthony 9783540720362 Springer
Pervasive Computing: 5th International Conference, Pervasive 2007, Toronto, Canada, May 13-16, 2007, Proceedings

ISBN: 9783540720362 / Angielski / Miękka / 374 str.

ISBN: 9783540720362/Angielski/Miękka/374 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marc Langheinrich

This book constitutes the refereed proceedings of the 5th International Conference on Pervasive Computing, PERVASIVE 2007, held in Toronto, Canada in May 2007. The 21 revised full papers are organized in topical sections on reaching out, context and its application, security and privacy, understanding use, sensing, as well as finding and positioning.


This book constitutes the refereed proceedings of the 5th International Conference on Pervasive Computing, PERVASIVE 2007, held in Toronto, Canada ...

cena: 201,24

 Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6/WG 8.8/WG 11.2 International Workshop, Sauveron, Damien 9783540723530 Springer
Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6/WG 8.8/WG 11.2 International Workshop,

ISBN: 9783540723530 / Angielski / Miękka / 272 str.

ISBN: 9783540723530/Angielski/Miękka/272 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Damien Sauveron; Konstantinos Markantonakis; Angelos Bilas
With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous. Ensuring the security of these complex and yet resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers.Although there are a number of information security conferences that look at particular aspects of the challenge, we decided to create the Workshop in Information - curity Theory and Practices (WISTP) to consider the problem as a whole. In additiontheworkshopaimsto bringtogetherresearchersandpractitionersin-...
With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- ...
cena: 201,24

 Advances in Cryptology - EUROCRYPT 2007: 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, S Naor, Moni 9783540725398 Springer
Advances in Cryptology - EUROCRYPT 2007: 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, S

ISBN: 9783540725398 / Angielski / Miękka / 608 str.

ISBN: 9783540725398/Angielski/Miękka/608 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Moni Naor

This book constitutes the refereed proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2007, held in Barcelona, Spain in May 2007. The 33 revised full papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications.


This book constitutes the refereed proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic Techniqu...

cena: 201,24

 Wired/Wireless Internet Communications: 5th International Conference, WWIC 2007 Coimbra, Portugal, May 23-25, 2007 Proceedings Boavida, Fernando 9783540726944 Springer
Wired/Wireless Internet Communications: 5th International Conference, WWIC 2007 Coimbra, Portugal, May 23-25, 2007 Proceedings

ISBN: 9783540726944 / Angielski / Miękka / 404 str.

ISBN: 9783540726944/Angielski/Miękka/404 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Fernando Boavida; Edmundo Monteiro; Saverio Mascolo
WWIC 2007 was organized by the University of Coimbra, Portugal, and it was the fifth event of a series of International Conferences on Wired/Wireless Internet Communications, addressing research topics such as the design and evaluation of protocols, the dynamics of the integration, the performance trade-offs, the need for new performance metrics, and cross-layer interactions. Previous events were held in Berne (Switzerland) in 2006, Xanthi (Greece) in 2005, Frankfurt (Germany) in 2004, and Las Vegas (USA) in 2002. As in 2005 and 2006, WWIC was selected as the official conference by COST...
WWIC 2007 was organized by the University of Coimbra, Portugal, and it was the fifth event of a series of International Conferences on Wired/Wireless ...
cena: 201,24

 Transactions on Data Hiding and Multimedia Security II Yun Q. Shi 9783540730910 Springer
Transactions on Data Hiding and Multimedia Security II

ISBN: 9783540730910 / Angielski / Miękka / 136 str.

ISBN: 9783540730910/Angielski/Miękka/136 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Q. Shi

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of...

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various appl...

cena: 201,24

 Information Hiding: 8th International Workshop, Ih 2006, Alexandria, Va, Usa, July 10-12, 2006, Revised Seleceted Papers Camenisch, Jan 9783540741237 Springer
Information Hiding: 8th International Workshop, Ih 2006, Alexandria, Va, Usa, July 10-12, 2006, Revised Seleceted Papers

ISBN: 9783540741237 / Angielski / Miękka / 402 str.

ISBN: 9783540741237/Angielski/Miękka/402 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Christian Collberg

This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, Virginia, in July 2006. Twenty-five carefully reviewed full papers are organized into topical sections covering watermarking, information hiding and networking, data hiding in unusual content, fundamentals, software protection, steganalysis, steganography, and subliminal channels.


This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, Virginia, in July...

cena: 201,24

 Trust, Privacy and Security in Digital Business: 4th International Conference, Trustbus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings Lambrinoudakis, Costas 9783540744085 Springer
Trust, Privacy and Security in Digital Business: 4th International Conference, Trustbus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings

ISBN: 9783540744085 / Angielski / Miękka / 310 str.

ISBN: 9783540744085/Angielski/Miękka/310 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gunther Pernul

This volume features the refereed proceedings of the 4th International Conference on Trust and Privacy in Digital Business. The 28 papers were all carefully reviewed. They cover privacy and identity management, security and risk management, security requirements and development, privacy enhancing technologies and privacy management, access control models, trust and reputation, security protocols, and security and privacy in mobile environments.


This volume features the refereed proceedings of the 4th International Conference on Trust and Privacy in Digital Business. The 28 paper...

cena: 201,24

 Trustworthy Global Computing Montanari, Ugo 9783540753339 Not Avail
Trustworthy Global Computing

ISBN: 9783540753339 / Angielski / Miękka / 354 str.

ISBN: 9783540753339/Angielski/Miękka/354 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Donald Sannella

This book constitutes the thoroughly refereed post-proceedings of the Second Symposium on Trustworthy Global Computing, TGC 2006, held in Lucca, Italy, in November 2006. The 14 revised papers presented together with two keynote lectures were carefully reviewed and selected from 32 submissions. The book starts off with activity reviews of four FP6 programmes of the European Union: Aeolus, Mobius, Sensoria, and Catnets.


This book constitutes the thoroughly refereed post-proceedings of the Second Symposium on Trustworthy Global Computing, TGC 2006, held in Lucca, It...

cena: 201,24

 Privacy Enhancing Technologies Borisov, Nikita 9783540755500 Not Avail
Privacy Enhancing Technologies

ISBN: 9783540755500 / Angielski / Miękka / 290 str.

ISBN: 9783540755500/Angielski/Miękka/290 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Philippe Golle

This book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, PET 2007, held in conjunction with WOTE 2007, the IAVoSS Workshop on Trustworthy Elections. The papers cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems.


This book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, PET 2007, held...

cena: 201,24

 E-Business and Telecommunication Networks: Second International Conference, Icete 2005, Reading, Uk, October 3-7, 2005. Selected Papers Filipe, Joaquim 9783540759928 Not Avail
E-Business and Telecommunication Networks: Second International Conference, Icete 2005, Reading, Uk, October 3-7, 2005. Selected Papers

ISBN: 9783540759928 / Angielski / Miękka / 308 str.

ISBN: 9783540759928/Angielski/Miękka/308 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Helder Coelhas; Monica Saramago; Joaquim Filipe

This book constitutes the refereed proceedings of the Second International Conference on E-business and Telecommunication Networks, ICETE 2005. The 85 revised full papers presented were carefully reviewed and selected from 151 submissions. The papers are organized in topical sections on global communication information systems and services, security and reliability in information systems and networks, wireless communication systems and networks, and multimedia signal processing.


This book constitutes the refereed proceedings of the Second International Conference on E-business and Telecommunication Networks, ICETE 2005. The...

cena: 201,24

 Secure Integrated Circuits and Systems  9780387718279 Not Avail
Secure Integrated Circuits and Systems

ISBN: 9780387718279 / Angielski / Twarda / 246 str.

ISBN: 9780387718279/Angielski/Twarda/246 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

On any advanced integrated circuit or "system-on-chip" there is a need for security. In many applications the actual implementation has become the weakest link in security rather than the algorithms or protocols. The purpose of the book is to give the integrated circuits and systems designer an insight into the basics of security and cryptography from the implementation point of view. As a designer of integrated circuits and systems it is important to know both the state-of-the-art attacks as well as the countermeasures. Optimizing for security is different from optimizations for speed,...

On any advanced integrated circuit or "system-on-chip" there is a need for security. In many applications the actual implementation has become the ...

cena: 402,53

 Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Turtorial Lectures Aldini, Alessandro 9783540748090 Springer
Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Turtorial Lectures

ISBN: 9783540748090 / Angielski / Miękka / 338 str.

ISBN: 9783540748090/Angielski/Miękka/338 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Roberto Gorrieri

The increasing relevance of security to real-life applications, such as electronic commerce, is attested by the fast-growing number of research groups, events, conferences, and summer schools that are studying it. This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International Schools on Foundations of Security Analysis and Design, FOSAD 2006/2007, held in Bertinoro, Italy, in September 2006 and September 2007.


The increasing relevance of security to real-life applications, such as electronic commerce, is attested by the fast-growing number of research gro...

cena: 201,24

 Advances in Cryptology - Asiacrypt 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Kurosawa, Kaoru 9783540768999 Not Avail
Advances in Cryptology - Asiacrypt 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching,

ISBN: 9783540768999 / Angielski / Miękka / 604 str.

ISBN: 9783540768999/Angielski/Miękka/604 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kaoru Kurosawa
ASIACRYPT 2007 was held in Kuching, Sarawak, Malaysia, during December 2 6, 2007. This was the 13th ASIACRYPT conference, and was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the Information Security Research (iSECURES) Lab of Swinburne University of Technology (Sarawak Campus) and the Sarawak Development Institute (SDI), and was ?nancially supported by the Sarawak Government. The General Chair was Raphael Phan and I had the privilege of serving as the Program Chair. The conference received 223 submissions (from which one submission was...
ASIACRYPT 2007 was held in Kuching, Sarawak, Malaysia, during December 2 6, 2007. This was the 13th ASIACRYPT conference, and was sponsored by the Int...
cena: 402,53

 Security in Wireless Mesh Networks Yan Zhang Jun Zheng Honglin Hu 9780849382505 Auerbach Publications
Security in Wireless Mesh Networks

ISBN: 9780849382505 / Angielski / Twarda / 552 str.

ISBN: 9780849382505/Angielski/Twarda/552 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yan Zhang; Jun Zheng; Honglin Hu
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. To achieve these aims, security mechanisms are essential to ensure trusted on-going communications.

Security in Wireless Mesh Networks explores key security challenges set in diverse scenarios, as well as emerging standards that include...

Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is ...
cena: 612,21

 Insider Attack and Cyber Security: Beyond the Hacker Stolfo, Salvatore J. 9780387773216 Not Avail
Insider Attack and Cyber Security: Beyond the Hacker

ISBN: 9780387773216 / Angielski / Twarda / 223 str.

ISBN: 9780387773216/Angielski/Twarda/223 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Salvatore Stolfo; Steven M. Bellovin; Angelos D. Keromytis

Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College.

This book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and includes the following topics: critical IT infrastructure, insider threats,...

Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial i...

cena: 402,53

 Trusted Computing Systeme: Konzepte Und Anforderungen Müller, Thomas 9783540764090 Not Avail
Trusted Computing Systeme: Konzepte Und Anforderungen

ISBN: 9783540764090 / Niemiecki / Twarda / 160 str.

ISBN: 9783540764090/Niemiecki/Twarda/160 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thomas M?ller

Der Begriff Trusted Computing umschreibt eine Reihe neuer Ansatze zur Verbesserung der Computersicherheit durch den Aufbau von Computersystemen aus vertrauenswurdigen Hardware- und Softwarekomponenten. Das Buch liefert erstmals einen umfassenden Uberblick uber die unterschiedlichen Konzepte des Trusted Computing und ermoglicht dadurch einen einfachen Einstieg in das komplexe Thema.

Verfugbare Umsetzungen verschiedener Trusted-Computing-Konzepte sowie deren Probleme und Grenzen werden aufbauend auf die Grundlagen dargestellt. Uber die Beschreibung des Trusted Platform Modules (TPM)...

Der Begriff Trusted Computing umschreibt eine Reihe neuer Ansatze zur Verbesserung der Computersicherheit durch den Aufbau von Computersystemen aus...

cena: 112,84

 Advances in Computer Science - Asian 2007. Computer and Network Security: 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, P Cervesato, Iliano 9783540769279 Not Avail
Advances in Computer Science - Asian 2007. Computer and Network Security: 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, P

ISBN: 9783540769279 / Angielski / Miękka / 330 str.

ISBN: 9783540769279/Angielski/Miękka/330 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Iliano Cervesato

This book constitutes the refereed proceedings of the 12th Asian Computing Science Conference, ASIAN 2007, held in Doha, Qatar, in December 2007. Covering all current aspects of computer and network security, the papers are organized in topical sections on program security, computer security, access control, protocols, intrusion detection, network security, and safe execution.


This book constitutes the refereed proceedings of the 12th Asian Computing Science Conference, ASIAN 2007, held in Doha, Qatar, in December 2007. C...

cena: 201,24

 Mobile Ad-Hoc and Sensor Networks: Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedings Zhang, Hongke 9783540770237 Not Avail
Mobile Ad-Hoc and Sensor Networks: Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedings

ISBN: 9783540770237 / Angielski / Miękka / 894 str.

ISBN: 9783540770237/Angielski/Miękka/894 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hongke Zhang

This book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2007, held in Beijing, China, in December 2007. The papers address all current issues in mobile ad hoc and sensor networks and are organized in topical sections on routing, network protocols, energy efficiency, data processing, self-organization and synchronization, deployment and application, as well as security.


This book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2007, held in Beijin...

cena: 402,53

 Progress in Cryptology - Indocrypt 2007: 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings Srinathan, K. 9783540770251 Not Avail
Progress in Cryptology - Indocrypt 2007: 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings

ISBN: 9783540770251 / Angielski / Miękka / 442 str.

ISBN: 9783540770251/Angielski/Miękka/442 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
K. Srinathan

This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, held in Chennai, India, in December 2007. The papers and three invited lectures were carefully reviewed and selected. The papers are organized in topical sections on hashing, elliptic curve, cryptoanalysis, information theoretic security, elliptic curve cryptography, signature, side channel attack, symmetric cryptosystem, asymmetric cryptosystem, and short papers.


This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, held in Chennai, India, ...

cena: 201,24

Pierwsza Podprzednia  64  65  66  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia