![]() |
Gray Hat Python
ISBN: 9781593271923 / Angielski / Miękka / 216 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore. Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin... Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly,... |
cena:
191,18 |
![]() |
Security Engineering for Service-Oriented Architectures
ISBN: 9783540795384 / Angielski / Twarda / 248 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The growing popularity of Service Oriented Architectures is mainly due to business and technology trendsthat have crystallized over thepast decade. On the business side, companies struggle to survive in a competitive - vironment that pushes them towards a tighter integration into an industry s value chain, to outsource non core business operations or to constantly- engineer business processes. These challenges boosted the demand for sc- able IT-solutions, with e?orts ultimately resulting in a ?exible architectural paradigm Service Oriented Architectures. On the technical side, middleware...
The growing popularity of Service Oriented Architectures is mainly due to business and technology trendsthat have crystallized over thepast decade. On...
|
cena:
201,24 |
![]() |
Electronic Healthcare Information Security
ISBN: 9780387848174 / Angielski / Twarda / 190 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The adoption of Information and Communication Technologies (ICT) in healthcare is driven by the need to contain costs while maximizing quality and efficiency. However, ICT adoption for healthcare information management has brought far-reaching effects and implications on the spirit of the Hippocratic Oath, patient privacy and confidentiality. A wave of security breaches have led to pressing calls for opt-in and opt-out provisions where patients are free to choose to or not have their healthcare information collected and recorded within healthcare information systems. Such provisions have...
The adoption of Information and Communication Technologies (ICT) in healthcare is driven by the need to contain costs while maximizing quality and eff...
|
cena:
402,53 |
![]() |
Information Theoretic Security: Third International Conference, Icits 2008, Calgary, Canada, August 10-13, 2008, Proceedings
ISBN: 9783540850922 / Angielski / Miękka / 249 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ICITS 2008, the Third InternationalConference on Information Theoretic Se- rity, was held in Calgary, Alberta, Canada, during August 10-13, 2008, at the Universityof Calgary.This seriesof conferences wasstarted with the 2005IEEE InformationTheoryWorkshoponTheoryandPracticein Information-Theoretic Security (ITW 2005, Japan), held on Awaji Island, Japan, October 16-19,2005. The conference series aims at bringing focus to security research when there is no unproven computational assumption on the adversary. This is the fra- work proposed by Claude Shannon in his seminal paper formalizing modern...
ICITS 2008, the Third InternationalConference on Information Theoretic Se- rity, was held in Calgary, Alberta, Canada, during August 10-13, 2008, at t...
|
cena:
201,24 |
![]() |
On the Move to Meaningful Internet Systems: OTM 2008 Workshops: OTM Confederated International Workshops and Posters, ADI, AWeSoMe, COMBEK, EI2N, IWSS
ISBN: 9783540888741 / Angielski / Miękka / 1128 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the refereed proceedings of 13 international workshops held as part of OTM 2008 in Monterrey, Mexico, in November 2008. The 106 revised full papers presented were carefully reviewed and selected from a total of 171 submissions to the workshops. The volume starts with 19 additional revised poster papers of the OTM 2008 main conferences CoopIS and ODBASE. Topics of the workshop papers are ambient data integration (ADI 2008), agents and web services merging in distributed environment (AWeSoMe 2008), community-based evolution of knowledge-intensive systems (COMBEK 2008),...
This volume constitutes the refereed proceedings of 13 international workshops held as part of OTM 2008 in Monterrey, Mexico, in November 2008. The 10...
|
cena:
603,81 |
![]() |
Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings
ISBN: 9783540858546 / Angielski / Miękka / 423 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008. The book contains one invited talk and 26 revised full papers which were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and Cryptanalysis, and Key Exchange.
This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, ...
|
cena:
350,20 |
![]() |
Global Initiatives to Secure Cyberspace: An Emerging Landscape
ISBN: 9780387097633 / Angielski / Twarda / 163 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As cyberspace continues to rapidly expand, its infrastructure is now an in- gral part of the world's economy and social structure. Given this increasing int- connectivity and interdependence, what progress has been made in developing an ecosystem of safety and security? This study is the second phase of an initial - tempt to survey and catalog the multitude of emerging organizations promoting global initiatives to secure cyberspace. The authors provide a breakdown and analysis of organizations by type, - cluding international, regional, private-public, and non-governmental organi- tions....
As cyberspace continues to rapidly expand, its infrastructure is now an in- gral part of the world's economy and social structure. Given this increasi...
|
cena:
402,53 |
![]() |
Safety-Critical Systems: Problems, Process and Practice: Proceedings of the Seventeenth Safety-Critical Systems Symposium Brighton, Uk, 3 - 5 February
ISBN: 9781848823488 / Angielski / Miękka / 246 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "Safety-Critical Systems: Problems, Process and Practice" contains the papers presented at the seventeenth annual Safety-critical Systems Symposium, held at Brighton, UK, in February 2009. The Symposium is for engineers, managers and academics in the field of system safety, across all industry sectors, so the papers making up this volume offer a wide-ranging coverage of current safety topics, and a blend of academic research and industrial experience. They include both recent developments in the field and discussion of open issues that will shape future progress. The first... "Safety-Critical Systems: Problems, Process and Practice" contains the papers presented at the seventeenth annual Safety-critical Systems Symposium... |
cena:
603,81 |
![]() |
Grid Computing Security
ISBN: 9783540444923 / Angielski / Twarda / 331 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Based on research and industry experience, this book structures the issues pertaining to grid computing security into three main categories: architecture-related, infrastructure-related, and management-related issues. It discusses all three categories in detail, presents existing solutions, standards, and products, and pinpoints their shortcomings and open questions. Together with a brief introduction into grid computing in general and underlying security technologies, this book offers the first concise and detailed introduction to this important area, targeting professionals in the grid... Based on research and industry experience, this book structures the issues pertaining to grid computing security into three main categories: archit... |
cena:
201,24 |
![]() |
On the Move to Meaningful Internet Systems 2006: Otm 2006 Workshops: Otm Confederated International Conferences and Posters, Awesome, Cams, Cominf, Is
ISBN: 9783540482734 / Angielski / Miękka / 1010 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This two-volume set LNCS 4277/4278 constitutes the refereed proceedings of 14 international workshops held as part of OTM 2006 in Montpellier, France in October/November 2006. The 191 revised full papers presented were carefully reviewed and selected from a total of 493 submissions to the workshops. The first volume begins with 26 additional revised short or poster papers of the OTM 2006 main conferences. This two-volume set LNCS 4277/4278 constitutes the refereed proceedings of 14 international workshops held as part of OTM 2006 in Montpellier, Fran... |
cena:
402,53 |
![]() |
On the Move to Meaningful Internet Systems 2006: Coopis, Doa, Gada, and Odbase: Otm Confederated International Conferences, Coopis, Doa, Gada, and Odb
ISBN: 9783540482871 / Angielski / Miękka / 1115 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This two-volume set LNCS 4275/4276 constitutes the refereed proceedings of the four confederated conferences CoopIS 2006, DOA 2006, GADA 2006, and ODBASE 2006 held as OTM 2006 in Montpellier, France in October/November 2006. The 106 revised full and nine short papers presented together with four keynote speeches were carefully reviewed and selected from a total of 361 submissions. This two-volume set LNCS 4275/4276 constitutes the refereed proceedings of the four confederated conferences CoopIS 2006, DOA 2006, GADA 2006, and ... |
cena:
603,81 |
![]() |
Progress in Cryptology - Indocrypt 2006: 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings
ISBN: 9783540497677 / Angielski / Miękka / 458 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, held in Kolkata, India in December 2006. The 29 revised full papers and 2 invited papers cover such topics as symmetric cryptography, provable security, fast implementation of public key cryptography, id-based cryptography, as well as embedded systems and side channel attacks. This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, held in Kolkata, India i... |
cena:
201,24 |
![]() |
Progress in Cryptology - Vietcrypt 2006: First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selec
ISBN: 9783540687993 / Angielski / Miękka / 388 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Cryptology in Vietnam, VIETCRYPT 2006, held in Hanoi, Vietnam, September 2006. The 25 papers cover signatures and lightweight cryptography, pairing-based cryptography, algorithmic number theory, ring signatures and group signatures, hash functions, cryptanalysis, key agreement and threshold cryptography, as well as public-key encryption. This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Cryptology in Vietnam, VIETCRYPT 2006, held... |
cena:
201,24 |
![]() |
Topics in Cryptology – CT-RSA 2007: The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings
ISBN: 9783540693277 / Angielski / Miękka / 403 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The RSA Conference, with over 15,000 attendees and 300 exhibitors, is the largest computer security event of the year. The Cryptographers Track (CT- RSA) is a research conference within the RSA Conference. Starting in 2001, CT-RSA continues to its seventh year and is now regarded as one of the major regularly staged event for presenting the results of cryptographic research to a wide variety of audiences. The proceedings of CT-RSA 2007 contain 25 papers selected from 73 s- missions which cover all the topics of cryptography. All the submissions were reviewed by at least three reviewers, which...
The RSA Conference, with over 15,000 attendees and 300 exhibitors, is the largest computer security event of the year. The Cryptographers Track (CT- R...
|
cena:
201,24 |
![]() |
Security and Privacy in Ad-Hoc and Sensor Networks: 4th European Workshop, Esas 2007, Cambridge, Uk, July 2-3, 2007, Proceedings
ISBN: 9783540732747 / Angielski / Miękka / 250 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks. The wo- nd rd shop took place in Cambridge, UK, on the 2 and 3 of July 2007. The workshop was European in name and location but it was de?nitely transatlantic in scope. We had a program chair from Europe and one from the USA, and membership of our program committee was almost evenly split - tween those two regions. When looking at participation, the workshop was even more global than that: the submitted papers came from 25 countries in 6 con- nents. We...
You hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks. The wo- nd rd...
|
cena:
201,24 |
![]() |
Detection of Intrusions and Malware, and Vulnerability Assessment: 4th International Conference, Dimva 2007 Lucerne, Switzerland, July 12-13, 2007 Pro
ISBN: 9783540736134 / Angielski / Miękka / 254 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. organized by Lexi Pimenidis of RWTH Aachen.
organized by Lexi Pimenidis of RWTH Aachen.
|
cena:
201,24 |
![]() |
The Future of Identity in the Information Society: Challenges and Opportunities
ISBN: 9783540884804 / Angielski / Twarda / 526 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digitising personal information is changing our ways of identifying persons and managing relations. What used to be a "natural" identity, is now as virtual as a user account at a web portal, an email address, or a mobile phone number. It is subject to diverse forms of identity management in business, administration, and among citizens. Core question and source of conflict is who owns how much identity information of whom and who needs to place trust into which identity information to allow access to resources. This book presents multidisciplinary answers from research, government,... Digitising personal information is changing our ways of identifying persons and managing relations. What used to be a "natural" identity, is now as... |
cena:
805,10 |
![]() |
Advances in Information Processing and Protection
ISBN: 9780387731360 / Angielski / Twarda / 460 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Computer Science is relatively new field which is developing very fast not only because due to the huge interest of scientists and the market request, but also because this science has created possibilities for people of investigation and solved many problems that some time ago seemed to be insolvable. Such problems had only been described in science fiction novels, like underwater journeys of captain Nemo described by Jules Verne in XIX century. At present, various human dreams are successively becoming reality exactly as the underwater journeys became possible in the XX century. The...
The Computer Science is relatively new field which is developing very fast not only because due to the huge interest of scientists and the market requ...
|
cena:
805,10 |
![]() |
Information Security Applications: 9th International Workshop, Wisa 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers
ISBN: 9783642003059 / Angielski / Miękka / 348 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 9th International Workshop on Information Security Applications (WISA 2008) was held in Jeju Island, Korea during September 23-25, 2008. The wo- shop was sponsoredby the Korea Institute of Information Security and Crypt- ogy(KIISC), theElectronicsandTelecommunicationsResearchInstitute(ETRI) and the Ministry of Knowledge Economy (MKE). WISAaimsatprovidingaforumforprofessionalsfromacademiaandindustry to present their work and to exchange ideas. The workshop covers all technical aspects of security applications, including cryptographic and non-cryptographic techniques. We were...
The 9th International Workshop on Information Security Applications (WISA 2008) was held in Jeju Island, Korea during September 23-25, 2008. The wo- s...
|
cena:
201,24 |
![]() |
Encryption for Digital Content
ISBN: 9781441900432 / Angielski / Twarda / 209 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques. Encryption for Digital Content... Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth... |
cena:
402,53 |