![]() |
E-Voting and Identity: Second International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009, Proceedings
ISBN: 9783642041341 / Angielski / Miękka / 191 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the proceedings of the Second International Conference on E-Voting and Identity, VOTE-ID 2009, held in Luxembourg in September 2009. The 11 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 24 submissions. The selected papers cover a wide range of aspects of voting: proposals for high assurance voting systems, evaluation of existing systems, assessment of public response to electronic voting, and legal aspects.
This volume constitutes the proceedings of the Second International Conference on E-Voting and Identity, VOTE-ID 2009, held in Luxembourg in September...
|
cena:
201,24 |
![]() |
Computational Gas-Solids Flows and Reacting Systems: Theory, Methods and Practice
ISBN: 9781615206513 / Angielski / Twarda / 500 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "This book provides various approaches to computational gas-solids flow and will aid the researchers, graduate students and practicing engineers in this rapidly expanding area"--Provided by publisher.
"This book provides various approaches to computational gas-solids flow and will aid the researchers, graduate students and practicing engineers in th...
|
cena:
922,53 |
![]() |
Global Security, Safety, and Sustainability: 5th International Conference, Icgs3 2009, London, Uk, September 1-2, 2009, Proceedings
ISBN: 9783642040610 / Angielski / Miękka / 252 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Annual (ICGS) International Conference is an established platform in which se- rity, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe. The 2009 two-day conference focused on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, s- cial events and infrastructures. The importance of adopting systematic and...
The Annual (ICGS) International Conference is an established platform in which se- rity, safety and sustainability issues can be examined from several...
|
cena:
201,24 |
![]() |
Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks
ISBN: 9783642039430 / Angielski / Miękka / 166 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the 12 papers presented at the WISTP 2009 conference, held in Brussels, Belgium in September 2009. WISTP 2009 was the third int- national workshop devoted to information security theory and practice. WISTP 2009 built on the successful WISTP 2007 and 2008 conferences, held in Heraklion, Crete, Greece and Seville, Spain in May 2007 and May 2008, - spectively. The proceedings of WISTP 2007 and WISTP 2008 were published as volumes 4462 and 5019 of the Lecture Notes in Computer Science series. This workshop received the following support: - Co-sponsored by IFIP WG 11. 2 Small...
This volume contains the 12 papers presented at the WISTP 2009 conference, held in Brussels, Belgium in September 2009. WISTP 2009 was the third int- ...
|
cena:
201,24 |
![]() |
Information Hiding: 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers
ISBN: 9783642044304 / Angielski / Miękka / 277 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. We are glad to present in this volume the proceedings of Information Hiding 2009, which was held in Darmstadt, Germany, during June 8-10,2009.The c- ference was organizedby the Center for Advanced Security Research Darmstadt (CASED). Continuing the tradition of previous editions, we tried to create a balanced program, covering di?erent aspects of information hiding, ranging from di- tal watermarking to steganography and steganalysis and information forensics. Furthermore, we see new topics, such as physically unclonable functions and hardware Trojan horse detection, being addressed at the...
We are glad to present in this volume the proceedings of Information Hiding 2009, which was held in Darmstadt, Germany, during June 8-10,2009.The c- f...
|
cena:
201,24 |
![]() |
Computer Security - ESORICS 2009: 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings
ISBN: 9783642044434 / Angielski / Miękka / 724 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 14th European Symposium on Research in Computer Security, ESORICS 2009, held in Saint-Malo, France, in September 2009. The 42 papers included in the book were carefully reviewed and selected from 220 papers. The topics covered are network security, information flow, language based security, access control, privacy, distributed systems security, security primitives, web security, cryptography, protocols, and systems security and forensics. This book constitutes the proceedings of the 14th European Symposium on Research in Computer Security, ESORICS 2009, held in Saint-Malo, France, in... |
cena:
402,53 |
![]() |
Provable Security: Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings
ISBN: 9783642046414 / Angielski / Miękka / 275 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The third International Conference on Provable Security (ProvSec 2009) was held in Guangzhou, China, November 11-13, 2009. It continued the theme of ProvableSecurity initiated by the ProvSec2007 conference in Wollongong, A- tralia. The second ProvSec conference was organized in Shanghai, China. The conference was sponsored by the Center for Advanced Computing - Cryptog- phy and Algorithms (ACAC), Macquarie University, Australia; Guangdong Key Laboratory of Information Security Technology, Sun Yat-sen University, China; andthe NationalNaturalScienceFoundationofChina (NSFC).JiwuHuangwas the...
The third International Conference on Provable Security (ProvSec 2009) was held in Guangzhou, China, November 11-13, 2009. It continued the theme of P...
|
cena:
201,24 |
![]() |
C Programming for Scientists and Engineers with Applications
ISBN: 9780763739522 / Angielski / Miękka / 838 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. C is a favored and widely used programming language, particularly within the fields of science and engineering. C Programming for Scientists and Engineers with Applications guides readers through the fundamental, as well as the advanced concepts, of the C programming language as it applies to solving engineering and scientific problems. Ideal for readers with no prior programming experience, this text provides numerous sample problems and their solutions in the areas of mechanical engineering, electrical engineering, heat transfer, fluid mechanics, physics, chemistry, and more. It begins...
C is a favored and widely used programming language, particularly within the fields of science and engineering. C Programming for Scientists and Engi...
|
cena:
773,84 |
![]() |
Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009, Proceedings
ISBN: 9783642030062 / Angielski / Miękka / 315 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the papers presented at the 23rd Annual IFIP WG 11. 3 Working Conference on Data and Applications Security (DBSEC) held at C- cordia University, Montreal, Canada, July 12 15, 2009. This year s working conference continued its tradition of being a forum for disseminating original research results and practical experiences in data and applications security. This year we had an excellent program consisting of 9 research paper s- sionswith 18 full researchpapers, and 4 shortpaperswhich were selected froma total of 47 submissions after a rigorous reviewing process by the...
This volume contains the papers presented at the 23rd Annual IFIP WG 11. 3 Working Conference on Data and Applications Security (DBSEC) held at C- cor...
|
cena:
201,24 |
![]() |
Dnssec Specifications
ISBN: 9780979034275 / Angielski / Miękka / 356 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. DNSSEC Specifications provides a complete overview and exhaustive coverage of the requirements and features of the DNS Security Extensions. All of the important RFCs defining DNSSEC are collected in this volume. The indexed book covers DNS threats, DNS clarifications and protocol modifications, digital signatures, security algorithms, public and private keys, EDNS0, on-line signing, deployment steps, key rollovers, DNSSEC Lookaside Validation, and more.
DNSSEC Specifications provides a complete overview and exhaustive coverage of the requirements and features of the DNS Security Extensions. All of the...
|
cena:
98,02 |
![]() |
Security in Embedded Devices
ISBN: 9781441915290 / Angielski / Twarda / 297 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices. For some time, typical embedded system designers have been dealing with tremendous challenges in performance, power, price and reliability. However now they must additionally deal with definition of security requirements, security design and implementation. Given the limited number of security engineers in the market, large background of cryptography with which these standards are based upon, and difficulty of... Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespr... |
cena:
603,81 |
![]() |
Entity Authentication and Personal Privacy in Future Cellular Systems
ISBN: 9788792329325 / Angielski / Twarda / 268 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. There are currently more than four billion cellular subscribers in the world, and this number is constantly growing. With this in mind, it should be clear that the use of mobile communication has already become a pervasive and ubiquitous global commodity.
Entity Authentication and Personal Privacy in Future Cellular Systems explains and examines access security as it is found in mobile/cellular systems. It conducts a thorough investigation of how access security and personal privacy is handled in the 3GPP system. This includes both the 2G systems GSM/GPRS and the 3G system... There are currently more than four billion cellular subscribers in the world, and this number is constantly growing. With this in mind, it should be c...
|
cena:
450,54 |
![]() |
Computer Networking Illuminated
ISBN: 9780763785918 / Angielski / Miękka / 799 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computer Networking Illuminated provides a practical, hands-on introduction to the fundamental concepts, technologies, and applications of networks. Combining many years of professional and academic expertise, the authors have written an easy-to-understand text covering the basics of data communication, network topologies, protocols, security, routing and switching, naming and addressing, troubleshooting, and much more. Key concepts are reinforced by numerous Challenge Exercises, which allow students to gain hands-on experience with networking tools and utilities, and Challenge Scenarios,...
Computer Networking Illuminated provides a practical, hands-on introduction to the fundamental concepts, technologies, and applications of networks. C...
|
cena:
1146,06 |
![]() |
Making Systems Safer: Proceedings of the Eighteenth Safety-Critical Systems Symposium, Bristol, Uk, 9-11th February 2010
ISBN: 9781849960854 / Angielski / Miękka / 273 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Making Systems Safer contains the papers presented at the eighteenth annual Safety-critical Systems Symposium, held at Bristol, UK, in February 2010. The Symposium is for engineers, managers and academics in the field of system safety, across all industry sectors, so the papers making up this volume offer a wide-ranging coverage of current safety topics, and a blend of academic research and industrial experience. They include both recent developments in the field and discussion of open issues that will shape future progress. The first paper reflects a tutorial - on... Making Systems Safer contains the papers presented at the eighteenth annual Safety-critical Systems Symposium, held at Bristol, UK, in February 201... |
cena:
603,81 |
![]() |
Cryptology and Network Security: 8th International Conference, Cans 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings
ISBN: 9783642104329 / Angielski / Miękka / 538 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 8th International Conference on Cryptology and Network Security (CANS 2009) was held at the Ishikawa Prefectural Museum of Art in Kanazawa, Japan, during December 12-14, 2009. The conference was jointly co-organized by the NationalInstituteofAdvancedIndustrialScienceandTechnology(AIST), Japan, and the Japan Advanced Institute of Science and Technology (JAIST). In ad- tion, the event was supported by the Special Interest Group on Computer Se- rity (CSEC), IPSJ, Japan, the Japan Technical Group on Information Security (ISEC), IEICE, the Japan Technical Committee on Information and Com-...
The 8th International Conference on Cryptology and Network Security (CANS 2009) was held at the Ishikawa Prefectural Museum of Art in Kanazawa, Japan,...
|
cena:
402,53 |
![]() |
Game Engine Design and Implementation: Foundations of Game Development
ISBN: 9780763784515 / Angielski / Miękka / 594 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Part Of The New Foundations Of Game Development Series Almost Every Video Game On The Market Today Is Powered By A Game Engine. But, What Is A Game Engine? What Does It Do? How Are They Useful To Both Developers And The Game? And How Are They Made? These, And Other Important Engine Related Questions, Are Explored And Discussed In This Book. In Clear And Concise Language, This Book Examines Through Examples And Exercises Both The Design And Implementation Of A Video Game Engine. Specifically, It Focuses On The Core Components Of A Game Engine, Audio And Sound Systems, File And Resource...
Part Of The New Foundations Of Game Development Series Almost Every Video Game On The Market Today Is Powered By A Game Engine. But, What Is A Game E...
|
cena:
617,12 |
![]() |
Theory of Cryptography: 7th Theory of Cryptography Conference, Tcc 2010, Zurich, Switzerland, February 9-11, 2010, Proceedings
ISBN: 9783642117985 / Angielski / Miękka / 610 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. TCC2010, the7thTheoryofCryptographyConference, washeldatETHZurich, Zurich, Switzerland, during February 9-11, 2010. TCC 2010 was sponsored by theInternationalAssociationofCryptologicResearch(IACR)andwasorganized in cooperation with the Information Security and Cryptography group at ETH Zurich.The GeneralChairsof the conferencewereMartin Hirt andUeli Maurer. The conference received 100 submissions, of which the Program Committee selected 33 for presentation at the conference. The Best Student Paper Award was given to Kai-Min Chung and Feng-Hao Liu for their paper "ParallelRepe- tion Theorems...
TCC2010, the7thTheoryofCryptographyConference, washeldatETHZurich, Zurich, Switzerland, during February 9-11, 2010. TCC 2010 was sponsored by theInter...
|
cena:
402,53 |
![]() |
Personal Data Privacy and Protection in a Surveillance Era: Technologies and Practices
ISBN: 9781609600839 / Angielski / Twarda / 402 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book spans a number of interdependent and emerging topics in the area of legal protection of privacy and technology and explores the new threats that cyberspace poses to the privacy of individuals, as well as the threats that surveillance technologies generate in public spaces and in digital communication--Provided by publisher.
This book spans a number of interdependent and emerging topics in the area of legal protection of privacy and technology and explores the new threats ...
|
cena:
922,53 |
![]() |
Progress in Cryptology--AFRICACRYPT 2010
ISBN: 9783642126772 / Angielski / Miękka / 436 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Africacrypt 2010, the Third International Conference on Cryptology in Africa, took place May 3-6, 2010 in Stellenbosch, South Africa. The General Chairs, Riaal Domingues from the South African Communications and Security Agency and Christine Swart from the University of Cape Town, were always a pleasure to work with and did an outstanding job with the local arrangements. We are deeplythankfulthat theyagreedto hostAfricacrypt2010with onlyfour months notice after unanticipated events forced a change of location. The Africacrypt 2010 submission deadline was split into two. Authors s- mitting...
Africacrypt 2010, the Third International Conference on Cryptology in Africa, took place May 3-6, 2010 in Stellenbosch, South Africa. The General Chai...
|
cena:
201,24 |
![]() |
Security and Privacy Assurance in Advancing Technologies: New Developments
ISBN: 9781609602000 / Angielski / Twarda / 496 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changing roles of information technology and how this change will impact information security and privacy"--Provided by publisher.
"This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changin...
|
cena:
922,53 |