• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2624

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Cryptography and Coding: 11th Ima International Conference, Cirencester, Uk, December 18-20, 2007, Proceedings Galbraith, Steven 9783540772712 Not Avail
Cryptography and Coding: 11th Ima International Conference, Cirencester, Uk, December 18-20, 2007, Proceedings

ISBN: 9783540772712 / Angielski / Miękka / 442 str.

ISBN: 9783540772712/Angielski/Miękka/442 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Steven Galbraith

This book constitutes the refereed proceedings of the 11th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2007. The 22 revised full papers presented together with two invited contributions were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key encryption, curves, and RSA implementation.


This book constitutes the refereed proceedings of the 11th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in Dece...

cena: 201,24

 Selected Areas in Cryptography Adams, Carlisle 9783540773597 Not Avail
Selected Areas in Cryptography

ISBN: 9783540773597 / Angielski / Miękka / 426 str.

ISBN: 9783540773597/Angielski/Miękka/426 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Carlisle Adams
SAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop was held at the University of Ottawa. Previous workshops were held at Queen s University in Kingston (1994, 1996, 1998, 1999, and 2005), Carleton University in Ottawa (1995, 1997, and 2003), University of Waterloo (2000 and 2004), Fields Institute in Toronto (2001), Memorial University of Newfoundland in St. Johns (2002), and Conc- dia University in Montreal (2006). The intent of the workshop is to provide a stimulating atmosphere where researchersin cryptology can...
SAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop was held at the Universit...
cena: 201,24

 Financial Cryptography and Data Security: 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarbo Dietrich, Sven 9783540773658 Not Avail
Financial Cryptography and Data Security: 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarbo

ISBN: 9783540773658 / Angielski / Miękka / 406 str.

ISBN: 9783540773658/Angielski/Miękka/406 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sven Dietrich; Rachna Dhamija
The 11th International Conference on Financial Cryptography and Data Security (FC 2007, http: //fc07. ifca. ai), organized by the International Financial Crypt- raphy Association (IFCA, http: //www. ifca. ai/), was held in Tobago, February 12 15, 2007. The conference is a well-established and premier international - rum for research, advanced development, education, exploration, and debate - garding security in the context of ?nance and commerce. We continue to cover all aspects of securing transactions and systems, which this year included a range of technical areas such as cryptography,...
The 11th International Conference on Financial Cryptography and Data Security (FC 2007, http: //fc07. ifca. ai), organized by the International Financ...
cena: 201,24

 Information Hiding: 9th International Workshop, Ih 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers Furon, Teddy 9783540773696 Not Avail
Information Hiding: 9th International Workshop, Ih 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers

ISBN: 9783540773696 / Angielski / Miękka / 396 str.

ISBN: 9783540773696/Angielski/Miękka/396 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Teddy Furon
We are glad to present in this volume the proceedings of the ninth edition of Information Hiding (IH 2007). The conference was held in Saint Malo, the C- sairs town, France, during June 11 13, 2007. It was organized by a team of four Frenchpiratessupported by the valuablehelp of the conferenceorganizationcell of INRIA Rennes. Continuing the tradition of the previous editions, we tried to provide a b- anced program covering the di?erent aspects of information hiding. This being said, the selection of the program was a very challenging task. This year, 105 papers from 25 countries were...
We are glad to present in this volume the proceedings of the ninth edition of Information Hiding (IH 2007). The conference was held in Saint Malo, the...
cena: 201,24

 Distributed Computing and Networking: 8th International Conference, Icdcn 2006, Guwahati, India, December 27-30, 2006, Proceedings Chaudhuri, Soma 9783540681397 Springer
Distributed Computing and Networking: 8th International Conference, Icdcn 2006, Guwahati, India, December 27-30, 2006, Proceedings

ISBN: 9783540681397 / Angielski / Miękka / 612 str.

ISBN: 9783540681397/Angielski/Miękka/612 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Soma Chaudhuri; Samir R. Das; Himadri S. Paul
VI realm between distributed computing and networking, namely, Modeling Biological Networks, Network Security, Algorithmic Issues in Wireless Sensor Networks, and Optical Networking. This was made possible by the efforts of the Tutorial Chairs, Sr- har Iyer and Pinaki Mitra. The Organizing Committee worked hard to ensure that the participants enjoyed a comfortable stay and the technical meetings proceeded as smoothly as possible. We are grateful to the General Vice Chair, Sukumar Nandi, for arranging to hold the conference in Guwahati and for all he did to make the conference a success....
VI realm between distributed computing and networking, namely, Modeling Biological Networks, Network Security, Algorithmic Issues in Wireless Sensor N...
cena: 402,53

 Abstract Data Types 3.5 Walker, Henry M. 9780669400007 Heath
Abstract Data Types 3.5

ISBN: 9780669400007 / Angielski / Twarda / 752 str.

ISBN: 9780669400007/Angielski/Twarda/752 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Henry M. Walker; Nell Dale;Dale
cena: 417,32

 Information Security and Cryptology: ICISC 2007 Nam, Kil-Hyun 9783540767879 Not Avail
Information Security and Cryptology: ICISC 2007

ISBN: 9783540767879 / Angielski / Miękka / 388 str.

ISBN: 9783540767879/Angielski/Miękka/388 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kil-Hyun Nam

This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ICISC 2007, held in Seoul, Korea, November 29-30, 2007. The papers are organized in topical sections on cryptoanalysis, access control, system security, biometrics, cryptographic protocols, hash functions, block and stream ciphers, copyright protection, smart/java cards, elliptic curve cryptosystems as well as authentication and authorization.


This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ICISC 2007, held in Seo...

cena: 201,24

 Finite Automata and Application to Cryptography Renji Tao 9783540782568 Springer
Finite Automata and Application to Cryptography

ISBN: 9783540782568 / Angielski / Twarda / 350 str.

ISBN: 9783540782568/Angielski/Twarda/350 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Renji Tao

Finite Automata and Application to Cryptography mainly deals with the invertibility theory of finite automata and its application to cryptography. In addition, autonomous finite automata and Latin arrays, which are relative to the canonical form for one-key cryptosystems based on finite automata, are also discussed.

Finite automata are regarded as a natural model for ciphers. The Ra Rb transformation method is introduced to deal with the structure problem of such automata; then public key cryptosystems based on finite automata and a canonical form for one-key ciphers...

Finite Automata and Application to Cryptography mainly deals with the invertibility theory of finite automata and its application to crypt...

cena: 603,81

 Spam & Internet Privacy B G Kutais 9781594545771 Nova Science Publishers Inc
Spam & Internet Privacy

ISBN: 9781594545771 / Angielski / Miękka / 129 str.

ISBN: 9781594545771/Angielski/Miękka/129 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
B G Kutais
Who, except the senders of this dangerous and ever-more sophisticated material, is not attacked everyday? What laws protect us if any? What is being done about it if anything? This book presents the progress on these issues which rate extremely high on eve
Who, except the senders of this dangerous and ever-more sophisticated material, is not attacked everyday? What laws protect us if any? What is being d...
cena: 421,16

 Cryptanalytic Attacks on Rsa Yan, Song Y. 9780387487410 SPRINGER-VERLAG NEW YORK INC.
Cryptanalytic Attacks on Rsa

ISBN: 9780387487410 / Angielski / Twarda / 255 str.

ISBN: 9780387487410/Angielski/Twarda/255 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Song Y. Yan

RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and widely-used cryptographic system in today's digital world, for which its three inventors Rivest, Shamir and Adleman received the year 2002 Turing Award, the equivalent Nobel Prize in Computer Science.

Cryptanalytic Attacks on RSA covers almost all major known cryptanalytic attacks and defenses of the RSA cryptographic system and its variants. Since RSA depends heavily on computational complexity theory and number...

RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and...

cena: 402,53

 Alice: The Programming Language: The Programming Language Garrido, Jose M. 9780763750596 JONES AND BARTLETT PUBLISHERS, INC
Alice: The Programming Language: The Programming Language

ISBN: 9780763750596 / Angielski / Miękka / 60 str.

ISBN: 9780763750596/Angielski/Miękka/60 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jose M. Garrido
An excellent primer for the CS0 student, as well as the ideal companion to Computer Science Illuminated, Third Edition, Alice: The Programming Language offers a clear introduction to this engaging language. This overview describes the fundamentals of the language, the structure of Alice programs, how Alice supports object-oriented programming, and much more.
An excellent primer for the CS0 student, as well as the ideal companion to Computer Science Illuminated, Third Edition, Alice: The Programming Languag...
cena: 249,78

 Information Security Applications: 8th International Workshop, WISA 2007 Jeju Island, Korea, August 27-29, 2007 Revised Selected Papers Sehun, Kim 9783540775348 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Information Security Applications: 8th International Workshop, WISA 2007 Jeju Island, Korea, August 27-29, 2007 Revised Selected Papers

ISBN: 9783540775348 / Angielski / Miękka / 406 str.

ISBN: 9783540775348/Angielski/Miękka/406 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
The 8th International Workshop on Information Security Applications (WISA 2007) was held on Jeju Island, Korea during August 27 29, 2007. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). WISAaimsatprovidingaforumforprofessionalsfromacademiaandindustry to present their work and to exchange ideas. The workshop covers all technical aspects of security applications, including cryptographic and non-cryptographic techniques. We...
The 8th International Workshop on Information Security Applications (WISA 2007) was held on Jeju Island, Korea during August 27 29, 2007. The workshop...
cena: 201,24

 Advances in Computer Science - ASIAN 2006: Secure Software and Related Issues: 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 20 Okada, Mitsu 9783540775041 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Advances in Computer Science - ASIAN 2006: Secure Software and Related Issues: 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 20

ISBN: 9783540775041 / Angielski / Miękka / 382 str.

ISBN: 9783540775041/Angielski/Miękka/382 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

Running to more than 360 pages, and complete with online files and updates, this book constitutes the thoroughly refereed post-proceedings of the 11th Asian Computing Science Conference, ASIAN 2006, held in Tokyo, Japan. The 17 revised full papers and 8 revised short papers presented together with 1 invited paper were carefully selected during two rounds of reviewing from 115 submissions. The papers cover theory, practice, applications, and experiences related to secure software.


Running to more than 360 pages, and complete with online files and updates, this book constitutes the thoroughly refereed post-proceedings of the 1...

cena: 201,24

 E-Voting and Identity: First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers Alkassar, Ammar 9783540774921 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
E-Voting and Identity: First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers

ISBN: 9783540774921 / Angielski / Miękka / 208 str.

ISBN: 9783540774921/Angielski/Miękka/208 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Voting and identity have a very delicate relationship. Only a few processes - pendsomuchonanidentitymanagementrespectingthe?nelinebetweenreliable identi?cation and reliable non-identi?ability each at its part during the process. And only a few processes may change their outer appearance so much with the advent of new IT as voting and identity management do. So it was no surprise in FIDIS, the interdisciplinary Network of Excellence working on the Future of Identity in the Information Society, when Ammar Alkassarproposedanalyzethetechnical, socio-ethicalandlegalrelationsbetween Identity and...
Voting and identity have a very delicate relationship. Only a few processes - pendsomuchonanidentitymanagementrespectingthe?nelinebetweenreliable iden...
cena: 201,24

 Theory of Cryptography: Fifth Theory of Cryptography Conference, Tcc 2008, New York, Usa, March 19-21, 2008, Proceedings Canetti, Ran 9783540785231 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Theory of Cryptography: Fifth Theory of Cryptography Conference, Tcc 2008, New York, Usa, March 19-21, 2008, Proceedings

ISBN: 9783540785231 / Angielski / Miękka / 645 str.

ISBN: 9783540785231/Angielski/Miękka/645 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This book constitutes the refereed proceedings of the Fifth Theory of Cryptography Conference, TCC 2008, held in New York, USA, March 19-21, 2008. The 33 revised full papers presented were carefully reviewed and selected from 81 submissions. The papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic problems.
This book constitutes the refereed proceedings of the Fifth Theory of Cryptography Conference, TCC 2008, held in New York, USA, March 19-21, 2008. The...
cena: 402,53

 The Internet of Things: First International Conference, Iot 2008, Zurich, Switzerland, March 26-28, 2008, Proceedings Floerkemeier, Christian 9783540787303 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
The Internet of Things: First International Conference, Iot 2008, Zurich, Switzerland, March 26-28, 2008, Proceedings

ISBN: 9783540787303 / Angielski / Miękka / 378 str.

ISBN: 9783540787303/Angielski/Miękka/378 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This book constitutes the refereed proceedings of the First International Conference for Industry and Academia on the Internet of Things, IOT 2008, held in Zurich, Switzerland, in March 2008. The 23 revised full papers presented were carefully reviewed and selected from 92 initial submissions. The papers are organized in topical sections on EPC network, middleware, business aspects, RFID technology and regulatory issues, applications, and sensing systems.
This book constitutes the refereed proceedings of the First International Conference for Industry and Academia on the Internet of Things, IOT 2008, he...
cena: 201,24

 From Problem to Solution: Wireless Sensor Networks Security Zhen Jiang, Yi Pan 9781604564570 Nova Science Publishers Inc
From Problem to Solution: Wireless Sensor Networks Security

ISBN: 9781604564570 / Angielski / Twarda / 382 str.

ISBN: 9781604564570/Angielski/Twarda/382 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Zhen Jiang;Yi Pan
Reserving data authenticity in a hostile environment, where the sensor nodes may be compromised, is a critical security issue for wireless sensor networks. This book explains such attacks and that which can be roughly categorized as isolated attacks by eac
Reserving data authenticity in a hostile environment, where the sensor nodes may be compromised, is a critical security issue for wireless sensor netw...
cena: 479,92

 Young Women with Unplanned Pregnancies in Bangkok, Thailand Zhen Jiang, Yi Pan 9781604564587 Nova Science Publishers Inc
Young Women with Unplanned Pregnancies in Bangkok, Thailand

ISBN: 9781604564587 / Angielski / Miękka / 101 str.

ISBN: 9781604564587/Angielski/Miękka/101 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Zhen Jiang;Yi Pan
This text examines the decision making process and health seeking patterns of low-income young women in Thailand with unplanned pregnancies who opted for abortion, putting the baby up for adoption, or keeping the baby.
This text examines the decision making process and health seeking patterns of low-income young women in Thailand with unplanned pregnancies who opted ...
cena: 262,88

 Topics in Cryptology - Ct-Rsa 2008: The Cryptographers' Track at the Rsa Conference 2008, San Francisco, Ca, Usa, April 8-11, 2008, Proceedings Malkin, Tal 9783540792628 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Topics in Cryptology - Ct-Rsa 2008: The Cryptographers' Track at the Rsa Conference 2008, San Francisco, Ca, Usa, April 8-11, 2008, Proceedings

ISBN: 9783540792628 / Angielski / Miękka / 437 str.

ISBN: 9783540792628/Angielski/Miękka/437 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2008, CT-RSA 2008, held in San Francisco, CA, USA in April 2008.

The 26 revised full papers presented together with the abstract of 1 invited talk were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message authentication codes, improved aes implementations, public key encryption with special properties, side channel cryptanalysis, cryptography...

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2008, CT-RSA 2008, held in San Francisco, CA, USA...

cena: 201,24

 Advances in Cryptology - Eurocrypt 2008: 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Tu Smart, Nigel 9783540789666 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Advances in Cryptology - Eurocrypt 2008: 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Tu

ISBN: 9783540789666 / Angielski / Miękka / 564 str.

ISBN: 9783540789666/Angielski/Miękka/564 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

Here are the refereed proceedings of the 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2008. The 31 revised full papers presented were carefully reviewed and selected from 163 submissions.

Here are the refereed proceedings of the 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT...

cena: 201,24

Pierwsza Podprzednia  64  65  66  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia