• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2624

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 E-Voting and Identity: Second International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009, Proceedings Peter Y. A. Ryan, Berry Schoenmakers 9783642041341 Springer-Verlag Berlin and Heidelberg GmbH &
E-Voting and Identity: Second International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009, Proceedings

ISBN: 9783642041341 / Angielski / Miękka / 191 str.

ISBN: 9783642041341/Angielski/Miękka/191 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peter Y. A. Ryan;Berry Schoenmakers
This volume constitutes the proceedings of the Second International Conference on E-Voting and Identity, VOTE-ID 2009, held in Luxembourg in September 2009. The 11 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 24 submissions. The selected papers cover a wide range of aspects of voting: proposals for high assurance voting systems, evaluation of existing systems, assessment of public response to electronic voting, and legal aspects.
This volume constitutes the proceedings of the Second International Conference on E-Voting and Identity, VOTE-ID 2009, held in Luxembourg in September...
cena: 201,24

 Computational Gas-Solids Flows and Reacting Systems: Theory, Methods and Practice Pannala, Sreekanth 9781615206513 Engineering Science Reference
Computational Gas-Solids Flows and Reacting Systems: Theory, Methods and Practice

ISBN: 9781615206513 / Angielski / Twarda / 500 str.

ISBN: 9781615206513/Angielski/Twarda/500 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sreekanth Pannala; Madhava Syamlal; Thomas J. O'Brien
"This book provides various approaches to computational gas-solids flow and will aid the researchers, graduate students and practicing engineers in this rapidly expanding area"--Provided by publisher.
"This book provides various approaches to computational gas-solids flow and will aid the researchers, graduate students and practicing engineers in th...
cena: 922,53

 Global Security, Safety, and Sustainability: 5th International Conference, Icgs3 2009, London, Uk, September 1-2, 2009, Proceedings Jahankhani, Hamid 9783642040610 Springer
Global Security, Safety, and Sustainability: 5th International Conference, Icgs3 2009, London, Uk, September 1-2, 2009, Proceedings

ISBN: 9783642040610 / Angielski / Miękka / 252 str.

ISBN: 9783642040610/Angielski/Miękka/252 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hamid Jahankhani
The Annual (ICGS) International Conference is an established platform in which se- rity, safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe. The 2009 two-day conference focused on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, s- cial events and infrastructures. The importance of adopting systematic and...
The Annual (ICGS) International Conference is an established platform in which se- rity, safety and sustainability issues can be examined from several...
cena: 201,24

 Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks Markowitch, Olivier 9783642039430 Springer
Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks

ISBN: 9783642039430 / Angielski / Miękka / 166 str.

ISBN: 9783642039430/Angielski/Miękka/166 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Olivier Markowitch
This volume contains the 12 papers presented at the WISTP 2009 conference, held in Brussels, Belgium in September 2009. WISTP 2009 was the third int- national workshop devoted to information security theory and practice. WISTP 2009 built on the successful WISTP 2007 and 2008 conferences, held in Heraklion, Crete, Greece and Seville, Spain in May 2007 and May 2008, - spectively. The proceedings of WISTP 2007 and WISTP 2008 were published as volumes 4462 and 5019 of the Lecture Notes in Computer Science series. This workshop received the following support: - Co-sponsored by IFIP WG 11. 2 Small...
This volume contains the 12 papers presented at the WISTP 2009 conference, held in Brussels, Belgium in September 2009. WISTP 2009 was the third int- ...
cena: 201,24

 Information Hiding: 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers Katzenbeisser, Stefan 9783642044304 Springer
Information Hiding: 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers

ISBN: 9783642044304 / Angielski / Miękka / 277 str.

ISBN: 9783642044304/Angielski/Miękka/277 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stefan Katzenbeisser
We are glad to present in this volume the proceedings of Information Hiding 2009, which was held in Darmstadt, Germany, during June 8-10,2009.The c- ference was organizedby the Center for Advanced Security Research Darmstadt (CASED). Continuing the tradition of previous editions, we tried to create a balanced program, covering di?erent aspects of information hiding, ranging from di- tal watermarking to steganography and steganalysis and information forensics. Furthermore, we see new topics, such as physically unclonable functions and hardware Trojan horse detection, being addressed at the...
We are glad to present in this volume the proceedings of Information Hiding 2009, which was held in Darmstadt, Germany, during June 8-10,2009.The c- f...
cena: 201,24

 Computer Security - ESORICS 2009: 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings Backes, Michael 9783642044434 Springer
Computer Security - ESORICS 2009: 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings

ISBN: 9783642044434 / Angielski / Miękka / 724 str.

ISBN: 9783642044434/Angielski/Miękka/724 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Backes

This book constitutes the proceedings of the 14th European Symposium on Research in Computer Security, ESORICS 2009, held in Saint-Malo, France, in September 2009.

The 42 papers included in the book were carefully reviewed and selected from 220 papers. The topics covered are network security, information flow, language based security, access control, privacy, distributed systems security, security primitives, web security, cryptography, protocols, and systems security and forensics.


This book constitutes the proceedings of the 14th European Symposium on Research in Computer Security, ESORICS 2009, held in Saint-Malo, France, in...

cena: 402,53

 Provable Security: Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings Josef Pawel Pieprzyk, Fangguo Zhang 9783642046414 Springer-Verlag Berlin and Heidelberg GmbH &
Provable Security: Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings

ISBN: 9783642046414 / Angielski / Miękka / 275 str.

ISBN: 9783642046414/Angielski/Miękka/275 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Josef Pawel Pieprzyk;Fangguo Zhang
The third International Conference on Provable Security (ProvSec 2009) was held in Guangzhou, China, November 11-13, 2009. It continued the theme of ProvableSecurity initiated by the ProvSec2007 conference in Wollongong, A- tralia. The second ProvSec conference was organized in Shanghai, China. The conference was sponsored by the Center for Advanced Computing - Cryptog- phy and Algorithms (ACAC), Macquarie University, Australia; Guangdong Key Laboratory of Information Security Technology, Sun Yat-sen University, China; andthe NationalNaturalScienceFoundationofChina (NSFC).JiwuHuangwas the...
The third International Conference on Provable Security (ProvSec 2009) was held in Guangzhou, China, November 11-13, 2009. It continued the theme of P...
cena: 201,24

 C Programming for Scientists and Engineers with Applications Reddy, Rama 9780763739522 Jones & Bartlett Publishers
C Programming for Scientists and Engineers with Applications

ISBN: 9780763739522 / Angielski / Miękka / 838 str.

ISBN: 9780763739522/Angielski/Miękka/838 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rama N. Reddy; Carol Ziegler
C is a favored and widely used programming language, particularly within the fields of science and engineering. C Programming for Scientists and Engineers with Applications guides readers through the fundamental, as well as the advanced concepts, of the C programming language as it applies to solving engineering and scientific problems. Ideal for readers with no prior programming experience, this text provides numerous sample problems and their solutions in the areas of mechanical engineering, electrical engineering, heat transfer, fluid mechanics, physics, chemistry, and more. It begins...
C is a favored and widely used programming language, particularly within the fields of science and engineering. C Programming for Scientists and Engi...
cena: 773,84

 Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009, Proceedings Ehud Gudes, Jaideep Vaidya 9783642030062 Springer-Verlag Berlin and Heidelberg GmbH &
Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009, Proceedings

ISBN: 9783642030062 / Angielski / Miękka / 315 str.

ISBN: 9783642030062/Angielski/Miękka/315 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ehud Gudes;Jaideep Vaidya
This volume contains the papers presented at the 23rd Annual IFIP WG 11. 3 Working Conference on Data and Applications Security (DBSEC) held at C- cordia University, Montreal, Canada, July 12 15, 2009. This year s working conference continued its tradition of being a forum for disseminating original research results and practical experiences in data and applications security. This year we had an excellent program consisting of 9 research paper s- sionswith 18 full researchpapers, and 4 shortpaperswhich were selected froma total of 47 submissions after a rigorous reviewing process by the...
This volume contains the papers presented at the 23rd Annual IFIP WG 11. 3 Working Conference on Data and Applications Security (DBSEC) held at C- cor...
cena: 201,24

 Dnssec Specifications Reed Media Services 9780979034275 Reed Media Services
Dnssec Specifications

ISBN: 9780979034275 / Angielski / Miękka / 356 str.

ISBN: 9780979034275/Angielski/Miękka/356 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Reed Media Services
DNSSEC Specifications provides a complete overview and exhaustive coverage of the requirements and features of the DNS Security Extensions. All of the important RFCs defining DNSSEC are collected in this volume. The indexed book covers DNS threats, DNS clarifications and protocol modifications, digital signatures, security algorithms, public and private keys, EDNS0, on-line signing, deployment steps, key rollovers, DNSSEC Lookaside Validation, and more.
DNSSEC Specifications provides a complete overview and exhaustive coverage of the requirements and features of the DNS Security Extensions. All of the...
cena: 98,02

 Security in Embedded Devices Catherine H. Gebotys 9781441915290 Springer
Security in Embedded Devices

ISBN: 9781441915290 / Angielski / Twarda / 297 str.

ISBN: 9781441915290/Angielski/Twarda/297 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Catherine H. Gebotys

Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespread in many embedded devices. For some time, typical embedded system designers have been dealing with tremendous challenges in performance, power, price and reliability. However now they must additionally deal with definition of security requirements, security design and implementation. Given the limited number of security engineers in the market, large background of cryptography with which these standards are based upon, and difficulty of...

Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widespr...

cena: 603,81

 Entity Authentication and Personal Privacy in Future Cellular Systems Geir M. Kien 9788792329325 River Publishers
Entity Authentication and Personal Privacy in Future Cellular Systems

ISBN: 9788792329325 / Angielski / Twarda / 268 str.

ISBN: 9788792329325/Angielski/Twarda/268 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Geir M. Kien
There are currently more than four billion cellular subscribers in the world, and this number is constantly growing. With this in mind, it should be clear that the use of mobile communication has already become a pervasive and ubiquitous global commodity.

Entity Authentication and Personal Privacy in Future Cellular Systems explains and examines access security as it is found in mobile/cellular systems. It conducts a thorough investigation of how access security and personal privacy is handled in the 3GPP system. This includes both the 2G systems GSM/GPRS and the 3G system...
There are currently more than four billion cellular subscribers in the world, and this number is constantly growing. With this in mind, it should be c...
cena: 450,54

 Computer Networking Illuminated Barrett 9780763785918 Jones & Bartlett Publishers
Computer Networking Illuminated

ISBN: 9780763785918 / Angielski / Miękka / 799 str.

ISBN: 9780763785918/Angielski/Miękka/799 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Barrett
Computer Networking Illuminated provides a practical, hands-on introduction to the fundamental concepts, technologies, and applications of networks. Combining many years of professional and academic expertise, the authors have written an easy-to-understand text covering the basics of data communication, network topologies, protocols, security, routing and switching, naming and addressing, troubleshooting, and much more. Key concepts are reinforced by numerous Challenge Exercises, which allow students to gain hands-on experience with networking tools and utilities, and Challenge Scenarios,...
Computer Networking Illuminated provides a practical, hands-on introduction to the fundamental concepts, technologies, and applications of networks. C...
cena: 1146,06

 Making Systems Safer: Proceedings of the Eighteenth Safety-Critical Systems Symposium, Bristol, Uk, 9-11th February 2010 Dale, Chris 9781849960854
Making Systems Safer: Proceedings of the Eighteenth Safety-Critical Systems Symposium, Bristol, Uk, 9-11th February 2010

ISBN: 9781849960854 / Angielski / Miękka / 273 str.

ISBN: 9781849960854/Angielski/Miękka/273 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chris Dale

Making Systems Safer contains the papers presented at the eighteenth annual Safety-critical Systems Symposium, held at Bristol, UK, in February 2010.

The Symposium is for engineers, managers and academics in the field of system safety, across all industry sectors, so the papers making up this volume offer a wide-ranging coverage of current safety topics, and a blend of academic research and industrial experience. They include both recent developments in the field and discussion of open issues that will shape future progress.

The first paper reflects a tutorial - on...

Making Systems Safer contains the papers presented at the eighteenth annual Safety-critical Systems Symposium, held at Bristol, UK, in February 201...

cena: 603,81

 Cryptology and Network Security: 8th International Conference, Cans 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings Garay, Juan A. 9783642104329 Springer
Cryptology and Network Security: 8th International Conference, Cans 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings

ISBN: 9783642104329 / Angielski / Miękka / 538 str.

ISBN: 9783642104329/Angielski/Miękka/538 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Juan A. Garay
The 8th International Conference on Cryptology and Network Security (CANS 2009) was held at the Ishikawa Prefectural Museum of Art in Kanazawa, Japan, during December 12-14, 2009. The conference was jointly co-organized by the NationalInstituteofAdvancedIndustrialScienceandTechnology(AIST), Japan, and the Japan Advanced Institute of Science and Technology (JAIST). In ad- tion, the event was supported by the Special Interest Group on Computer Se- rity (CSEC), IPSJ, Japan, the Japan Technical Group on Information Security (ISEC), IEICE, the Japan Technical Committee on Information and Com-...
The 8th International Conference on Cryptology and Network Security (CANS 2009) was held at the Ishikawa Prefectural Museum of Art in Kanazawa, Japan,...
cena: 402,53

 Game Engine Design and Implementation: Foundations of Game Development Thorn, Alan 9780763784515 Jones & Bartlett Publishers
Game Engine Design and Implementation: Foundations of Game Development

ISBN: 9780763784515 / Angielski / Miękka / 594 str.

ISBN: 9780763784515/Angielski/Miękka/594 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Part Of The New Foundations Of Game Development Series Almost Every Video Game On The Market Today Is Powered By A Game Engine. But, What Is A Game Engine? What Does It Do? How Are They Useful To Both Developers And The Game? And How Are They Made? These, And Other Important Engine Related Questions, Are Explored And Discussed In This Book. In Clear And Concise Language, This Book Examines Through Examples And Exercises Both The Design And Implementation Of A Video Game Engine. Specifically, It Focuses On The Core Components Of A Game Engine, Audio And Sound Systems, File And Resource...
Part Of The New Foundations Of Game Development Series Almost Every Video Game On The Market Today Is Powered By A Game Engine. But, What Is A Game E...
cena: 617,12

 Theory of Cryptography: 7th Theory of Cryptography Conference, Tcc 2010, Zurich, Switzerland, February 9-11, 2010, Proceedings Micciancio, Daniele 9783642117985 Springer
Theory of Cryptography: 7th Theory of Cryptography Conference, Tcc 2010, Zurich, Switzerland, February 9-11, 2010, Proceedings

ISBN: 9783642117985 / Angielski / Miękka / 610 str.

ISBN: 9783642117985/Angielski/Miękka/610 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Daniele Micciancio
TCC2010, the7thTheoryofCryptographyConference, washeldatETHZurich, Zurich, Switzerland, during February 9-11, 2010. TCC 2010 was sponsored by theInternationalAssociationofCryptologicResearch(IACR)andwasorganized in cooperation with the Information Security and Cryptography group at ETH Zurich.The GeneralChairsof the conferencewereMartin Hirt andUeli Maurer. The conference received 100 submissions, of which the Program Committee selected 33 for presentation at the conference. The Best Student Paper Award was given to Kai-Min Chung and Feng-Hao Liu for their paper "ParallelRepe- tion Theorems...
TCC2010, the7thTheoryofCryptographyConference, washeldatETHZurich, Zurich, Switzerland, during February 9-11, 2010. TCC 2010 was sponsored by theInter...
cena: 402,53

 Personal Data Privacy and Protection in a Surveillance Era: Technologies and Practices Akrivopoulou, Christina 9781609600839 Information Science Publishing
Personal Data Privacy and Protection in a Surveillance Era: Technologies and Practices

ISBN: 9781609600839 / Angielski / Twarda / 402 str.

ISBN: 9781609600839/Angielski/Twarda/402 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Christina Akrivopoulou
This book spans a number of interdependent and emerging topics in the area of legal protection of privacy and technology and explores the new threats that cyberspace poses to the privacy of individuals, as well as the threats that surveillance technologies generate in public spaces and in digital communication--Provided by publisher.
This book spans a number of interdependent and emerging topics in the area of legal protection of privacy and technology and explores the new threats ...
cena: 922,53

 Progress in Cryptology--AFRICACRYPT 2010 Bernstein, Daniel J. 9783642126772 Not Avail
Progress in Cryptology--AFRICACRYPT 2010

ISBN: 9783642126772 / Angielski / Miękka / 436 str.

ISBN: 9783642126772/Angielski/Miękka/436 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Daniel J. Bernstein; Tanja Lange
Africacrypt 2010, the Third International Conference on Cryptology in Africa, took place May 3-6, 2010 in Stellenbosch, South Africa. The General Chairs, Riaal Domingues from the South African Communications and Security Agency and Christine Swart from the University of Cape Town, were always a pleasure to work with and did an outstanding job with the local arrangements. We are deeplythankfulthat theyagreedto hostAfricacrypt2010with onlyfour months notice after unanticipated events forced a change of location. The Africacrypt 2010 submission deadline was split into two. Authors s- mitting...
Africacrypt 2010, the Third International Conference on Cryptology in Africa, took place May 3-6, 2010 in Stellenbosch, South Africa. The General Chai...
cena: 201,24

 Security and Privacy Assurance in Advancing Technologies: New Developments Nemati, Hamid 9781609602000 Information Science Publishing
Security and Privacy Assurance in Advancing Technologies: New Developments

ISBN: 9781609602000 / Angielski / Twarda / 496 str.

ISBN: 9781609602000/Angielski/Twarda/496 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hamid R. Nemati
"This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changing roles of information technology and how this change will impact information security and privacy"--Provided by publisher.
"This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changin...
cena: 922,53

Pierwsza Podprzednia  70  71  72  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia