• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2624

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Gray Hat Python Justin Seitz 9781593271923 No Starch Press,US
Gray Hat Python

ISBN: 9781593271923 / Angielski / Miękka / 216 str.

ISBN: 9781593271923/Angielski/Miękka/216 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Justin Seitz

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore.

Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin...

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly,...

cena: 191,18

 Security Engineering for Service-Oriented Architectures Michael Hafner Ruth Breu 9783540795384 Springer
Security Engineering for Service-Oriented Architectures

ISBN: 9783540795384 / Angielski / Twarda / 248 str.

ISBN: 9783540795384/Angielski/Twarda/248 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Hafner; Ruth Breu
The growing popularity of Service Oriented Architectures is mainly due to business and technology trendsthat have crystallized over thepast decade. On the business side, companies struggle to survive in a competitive - vironment that pushes them towards a tighter integration into an industry s value chain, to outsource non core business operations or to constantly- engineer business processes. These challenges boosted the demand for sc- able IT-solutions, with e?orts ultimately resulting in a ?exible architectural paradigm Service Oriented Architectures. On the technical side, middleware...
The growing popularity of Service Oriented Architectures is mainly due to business and technology trendsthat have crystallized over thepast decade. On...
cena: 201,24

 Electronic Healthcare Information Security Kudakwashe Dube Fredrick Mtenzi Charles A. Shoniregun 9780387848174 Springer
Electronic Healthcare Information Security

ISBN: 9780387848174 / Angielski / Twarda / 190 str.

ISBN: 9780387848174/Angielski/Twarda/190 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kudakwashe Dube; Fredrick Mtenzi; Charles A. Shoniregun
The adoption of Information and Communication Technologies (ICT) in healthcare is driven by the need to contain costs while maximizing quality and efficiency. However, ICT adoption for healthcare information management has brought far-reaching effects and implications on the spirit of the Hippocratic Oath, patient privacy and confidentiality. A wave of security breaches have led to pressing calls for opt-in and opt-out provisions where patients are free to choose to or not have their healthcare information collected and recorded within healthcare information systems. Such provisions have...
The adoption of Information and Communication Technologies (ICT) in healthcare is driven by the need to contain costs while maximizing quality and eff...
cena: 402,53

 Information Theoretic Security: Third International Conference, Icits 2008, Calgary, Canada, August 10-13, 2008, Proceedings Safavi-Naini, Reihaneh 9783540850922 Springer
Information Theoretic Security: Third International Conference, Icits 2008, Calgary, Canada, August 10-13, 2008, Proceedings

ISBN: 9783540850922 / Angielski / Miękka / 249 str.

ISBN: 9783540850922/Angielski/Miękka/249 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Reihaneh Safavi-Naini
ICITS 2008, the Third InternationalConference on Information Theoretic Se- rity, was held in Calgary, Alberta, Canada, during August 10-13, 2008, at the Universityof Calgary.This seriesof conferences wasstarted with the 2005IEEE InformationTheoryWorkshoponTheoryandPracticein Information-Theoretic Security (ITW 2005, Japan), held on Awaji Island, Japan, October 16-19,2005. The conference series aims at bringing focus to security research when there is no unproven computational assumption on the adversary. This is the fra- work proposed by Claude Shannon in his seminal paper formalizing modern...
ICITS 2008, the Third InternationalConference on Information Theoretic Se- rity, was held in Calgary, Alberta, Canada, during August 10-13, 2008, at t...
cena: 201,24

 On the Move to Meaningful Internet Systems: OTM 2008 Workshops: OTM Confederated International Workshops and Posters, ADI, AWeSoMe, COMBEK, EI2N, IWSS Tari, Zahir 9783540888741 Springer
On the Move to Meaningful Internet Systems: OTM 2008 Workshops: OTM Confederated International Workshops and Posters, ADI, AWeSoMe, COMBEK, EI2N, IWSS

ISBN: 9783540888741 / Angielski / Miękka / 1128 str.

ISBN: 9783540888741/Angielski/Miękka/1128 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robert Meersman
This volume constitutes the refereed proceedings of 13 international workshops held as part of OTM 2008 in Monterrey, Mexico, in November 2008. The 106 revised full papers presented were carefully reviewed and selected from a total of 171 submissions to the workshops. The volume starts with 19 additional revised poster papers of the OTM 2008 main conferences CoopIS and ODBASE. Topics of the workshop papers are ambient data integration (ADI 2008), agents and web services merging in distributed environment (AWeSoMe 2008), community-based evolution of knowledge-intensive systems (COMBEK 2008),...
This volume constitutes the refereed proceedings of 13 international workshops held as part of OTM 2008 in Monterrey, Mexico, in November 2008. The 10...
cena: 603,81

 Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings Rafail Ostrovsky, Roberto de Prisco, Ivan Visconti 9783540858546 Springer-Verlag Berlin and Heidelberg GmbH &
Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings

ISBN: 9783540858546 / Angielski / Miękka / 423 str.

ISBN: 9783540858546/Angielski/Miękka/423 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rafail Ostrovsky;Roberto de Prisco;Ivan Visconti
This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008. The book contains one invited talk and 26 revised full papers which were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and Cryptanalysis, and Key Exchange.
This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, ...
cena: 350,20

 Global Initiatives to Secure Cyberspace: An Emerging Landscape Portnoy, Michael 9780387097633 Springer
Global Initiatives to Secure Cyberspace: An Emerging Landscape

ISBN: 9780387097633 / Angielski / Twarda / 163 str.

ISBN: 9780387097633/Angielski/Twarda/163 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Seymour Goodman; Michael Portnoy
As cyberspace continues to rapidly expand, its infrastructure is now an in- gral part of the world's economy and social structure. Given this increasing int- connectivity and interdependence, what progress has been made in developing an ecosystem of safety and security? This study is the second phase of an initial - tempt to survey and catalog the multitude of emerging organizations promoting global initiatives to secure cyberspace. The authors provide a breakdown and analysis of organizations by type, - cluding international, regional, private-public, and non-governmental organi- tions....
As cyberspace continues to rapidly expand, its infrastructure is now an in- gral part of the world's economy and social structure. Given this increasi...
cena: 402,53

 Safety-Critical Systems: Problems, Process and Practice: Proceedings of the Seventeenth Safety-Critical Systems Symposium Brighton, Uk, 3 - 5 February Dale, Chris 9781848823488 Springer
Safety-Critical Systems: Problems, Process and Practice: Proceedings of the Seventeenth Safety-Critical Systems Symposium Brighton, Uk, 3 - 5 February

ISBN: 9781848823488 / Angielski / Miękka / 246 str.

ISBN: 9781848823488/Angielski/Miękka/246 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chris Dale; Tom Anderson

"Safety-Critical Systems: Problems, Process and Practice" contains the papers presented at the seventeenth annual Safety-critical Systems Symposium, held at Brighton, UK, in February 2009.

The Symposium is for engineers, managers and academics in the field of system safety, across all industry sectors, so the papers making up this volume offer a wide-ranging coverage of current safety topics, and a blend of academic research and industrial experience. They include both recent developments in the field and discussion of open issues that will shape future progress.

The first...

"Safety-Critical Systems: Problems, Process and Practice" contains the papers presented at the seventeenth annual Safety-critical Systems Symposium...

cena: 603,81

 Grid Computing Security Anirban Chakrabarti 9783540444923 Springer
Grid Computing Security

ISBN: 9783540444923 / Angielski / Twarda / 331 str.

ISBN: 9783540444923/Angielski/Twarda/331 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Anirban Chakrabarti

Based on research and industry experience, this book structures the issues pertaining to grid computing security into three main categories: architecture-related, infrastructure-related, and management-related issues. It discusses all three categories in detail, presents existing solutions, standards, and products, and pinpoints their shortcomings and open questions. Together with a brief introduction into grid computing in general and underlying security technologies, this book offers the first concise and detailed introduction to this important area, targeting professionals in the grid...

Based on research and industry experience, this book structures the issues pertaining to grid computing security into three main categories: archit...

cena: 201,24

 On the Move to Meaningful Internet Systems 2006: Otm 2006 Workshops: Otm Confederated International Conferences and Posters, Awesome, Cams, Cominf, Is Tari, Zahir 9783540482734 Springer
On the Move to Meaningful Internet Systems 2006: Otm 2006 Workshops: Otm Confederated International Conferences and Posters, Awesome, Cams, Cominf, Is

ISBN: 9783540482734 / Angielski / Miękka / 1010 str.

ISBN: 9783540482734/Angielski/Miękka/1010 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robert Meersman

This two-volume set LNCS 4277/4278 constitutes the refereed proceedings of 14 international workshops held as part of OTM 2006 in Montpellier, France in October/November 2006. The 191 revised full papers presented were carefully reviewed and selected from a total of 493 submissions to the workshops. The first volume begins with 26 additional revised short or poster papers of the OTM 2006 main conferences.


This two-volume set LNCS 4277/4278 constitutes the refereed proceedings of 14 international workshops held as part of OTM 2006 in Montpellier, Fran...

cena: 402,53

 On the Move to Meaningful Internet Systems 2006: Coopis, Doa, Gada, and Odbase: Otm Confederated International Conferences, Coopis, Doa, Gada, and Odb Tari, Zahir 9783540482871 Springer
On the Move to Meaningful Internet Systems 2006: Coopis, Doa, Gada, and Odbase: Otm Confederated International Conferences, Coopis, Doa, Gada, and Odb

ISBN: 9783540482871 / Angielski / Miękka / 1115 str.

ISBN: 9783540482871/Angielski/Miękka/1115 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robert Meersman

This two-volume set LNCS 4275/4276 constitutes the refereed proceedings of the four confederated conferences CoopIS 2006, DOA 2006, GADA 2006, and ODBASE 2006 held as OTM 2006 in Montpellier, France in October/November 2006. The 106 revised full and nine short papers presented together with four keynote speeches were carefully reviewed and selected from a total of 361 submissions.


This two-volume set LNCS 4275/4276 constitutes the refereed proceedings of the four confederated conferences CoopIS 2006, DOA 2006, GADA 2006, and ...

cena: 603,81

 Progress in Cryptology - Indocrypt 2006: 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings Barua, Rana 9783540497677 Springer
Progress in Cryptology - Indocrypt 2006: 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings

ISBN: 9783540497677 / Angielski / Miękka / 458 str.

ISBN: 9783540497677/Angielski/Miękka/458 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rana Barua; Tanja Lange

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, held in Kolkata, India in December 2006. The 29 revised full papers and 2 invited papers cover such topics as symmetric cryptography, provable security, fast implementation of public key cryptography, id-based cryptography, as well as embedded systems and side channel attacks.


This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, held in Kolkata, India i...

cena: 201,24

 Progress in Cryptology - Vietcrypt 2006: First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selec Nguyen, Phong Q. 9783540687993 Springer
Progress in Cryptology - Vietcrypt 2006: First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selec

ISBN: 9783540687993 / Angielski / Miękka / 388 str.

ISBN: 9783540687993/Angielski/Miękka/388 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Phong Q. Nguyen

This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Cryptology in Vietnam, VIETCRYPT 2006, held in Hanoi, Vietnam, September 2006. The 25 papers cover signatures and lightweight cryptography, pairing-based cryptography, algorithmic number theory, ring signatures and group signatures, hash functions, cryptanalysis, key agreement and threshold cryptography, as well as public-key encryption.


This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Cryptology in Vietnam, VIETCRYPT 2006, held...

cena: 201,24

 Topics in Cryptology – CT-RSA 2007: The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings Masayuki Abe 9783540693277 Springer-Verlag Berlin and Heidelberg GmbH &
Topics in Cryptology – CT-RSA 2007: The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings

ISBN: 9783540693277 / Angielski / Miękka / 403 str.

ISBN: 9783540693277/Angielski/Miękka/403 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Masayuki Abe
The RSA Conference, with over 15,000 attendees and 300 exhibitors, is the largest computer security event of the year. The Cryptographers Track (CT- RSA) is a research conference within the RSA Conference. Starting in 2001, CT-RSA continues to its seventh year and is now regarded as one of the major regularly staged event for presenting the results of cryptographic research to a wide variety of audiences. The proceedings of CT-RSA 2007 contain 25 papers selected from 73 s- missions which cover all the topics of cryptography. All the submissions were reviewed by at least three reviewers, which...
The RSA Conference, with over 15,000 attendees and 300 exhibitors, is the largest computer security event of the year. The Cryptographers Track (CT- R...
cena: 201,24

 Security and Privacy in Ad-Hoc and Sensor Networks: 4th European Workshop, Esas 2007, Cambridge, Uk, July 2-3, 2007, Proceedings Stajano, Frank 9783540732747 Springer
Security and Privacy in Ad-Hoc and Sensor Networks: 4th European Workshop, Esas 2007, Cambridge, Uk, July 2-3, 2007, Proceedings

ISBN: 9783540732747 / Angielski / Miękka / 250 str.

ISBN: 9783540732747/Angielski/Miękka/250 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Catherine Meadows
You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks. The wo- nd rd shop took place in Cambridge, UK, on the 2 and 3 of July 2007. The workshop was European in name and location but it was de?nitely transatlantic in scope. We had a program chair from Europe and one from the USA, and membership of our program committee was almost evenly split - tween those two regions. When looking at participation, the workshop was even more global than that: the submitted papers came from 25 countries in 6 con- nents. We...
You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks. The wo- nd rd...
cena: 201,24

 Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, Dimva 2007 Lucerne, Switzerland, July 12-13, 2007 Pro Hämmerli, Bernhard 9783540736134 Springer
Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, Dimva 2007 Lucerne, Switzerland, July 12-13, 2007 Pro

ISBN: 9783540736134 / Angielski / Miękka / 254 str.

ISBN: 9783540736134/Angielski/Miękka/254 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robin Sommer
organized by Lexi Pimenidis of RWTH Aachen.
organized by Lexi Pimenidis of RWTH Aachen.
cena: 201,24

 The Future of Identity in the Information Society: Challenges and Opportunities Rannenberg, Kai 9783540884804 Springer
The Future of Identity in the Information Society: Challenges and Opportunities

ISBN: 9783540884804 / Angielski / Twarda / 526 str.

ISBN: 9783540884804/Angielski/Twarda/526 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kai Rannenberg; Andre Deuker; Denis Royer

Digitising personal information is changing our ways of identifying persons and managing relations. What used to be a "natural" identity, is now as virtual as a user account at a web portal, an email address, or a mobile phone number. It is subject to diverse forms of identity management in business, administration, and among citizens. Core question and source of conflict is who owns how much identity information of whom and who needs to place trust into which identity information to allow access to resources.

This book presents multidisciplinary answers from research, government,...

Digitising personal information is changing our ways of identifying persons and managing relations. What used to be a "natural" identity, is now as...

cena: 805,10

 Advances in Information Processing and Protection Jerzy Pejas Khalid Saeed 9780387731360 Springer
Advances in Information Processing and Protection

ISBN: 9780387731360 / Angielski / Twarda / 460 str.

ISBN: 9780387731360/Angielski/Twarda/460 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jerzy Pejas; Khalid Saeed
The Computer Science is relatively new field which is developing very fast not only because due to the huge interest of scientists and the market request, but also because this science has created possibilities for people of investigation and solved many problems that some time ago seemed to be insolvable. Such problems had only been described in science fiction novels, like underwater journeys of captain Nemo described by Jules Verne in XIX century. At present, various human dreams are successively becoming reality exactly as the underwater journeys became possible in the XX century. The...
The Computer Science is relatively new field which is developing very fast not only because due to the huge interest of scientists and the market requ...
cena: 805,10

 Information Security Applications: 9th International Workshop, Wisa 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers Sohn, Kiwook 9783642003059 Springer
Information Security Applications: 9th International Workshop, Wisa 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers

ISBN: 9783642003059 / Angielski / Miękka / 348 str.

ISBN: 9783642003059/Angielski/Miękka/348 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kyo-Il Chung
The 9th International Workshop on Information Security Applications (WISA 2008) was held in Jeju Island, Korea during September 23-25, 2008. The wo- shop was sponsoredby the Korea Institute of Information Security and Crypt- ogy(KIISC), theElectronicsandTelecommunicationsResearchInstitute(ETRI) and the Ministry of Knowledge Economy (MKE). WISAaimsatprovidingaforumforprofessionalsfromacademiaandindustry to present their work and to exchange ideas. The workshop covers all technical aspects of security applications, including cryptographic and non-cryptographic techniques. We were...
The 9th International Workshop on Information Security Applications (WISA 2008) was held in Jeju Island, Korea during September 23-25, 2008. The wo- s...
cena: 201,24

 Encryption for Digital Content Aggelos Kiayias Serdar Pehlivanglu 9781441900432 Springer
Encryption for Digital Content

ISBN: 9781441900432 / Angielski / Twarda / 209 str.

ISBN: 9781441900432/Angielski/Twarda/209 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Aggelos Kiayias; Serdar Pehlivanglu

Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques.

Encryption for Digital Content...

Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth...

cena: 402,53

Pierwsza Podprzednia  67  68  69  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia