• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2624

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore Abe, Masayuki 9783642173721 Not Avail
Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore

ISBN: 9783642173721 / Angielski / Miękka / 634 str.

ISBN: 9783642173721/Angielski/Miękka/634 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Masayuki Abe
ASIACRYPT 2010 was held in the Swiss otel Merchant Court in Singapore, d- ing December 5-9, 2010. The conference was sponsored by the International Association for Cryptologic Research (IACR) in cooperation with the Coding and Cryptography Research Group of Nanyang Technological University. It was also supported by the Singapore Tourism Board, and co-sponsored by the - tional Research Foundation of Singapore, Lee Foundation, IBM Singapore Ltd., O'Connor'sSingaporeLtd., Pu?ersoftLtd., PrivylinkLtd., Hewlett-PackardS- gaporeLtd., JardineOneSolutionLtd., andSingaporeMathematicalSociety.San Ling...
ASIACRYPT 2010 was held in the Swiss otel Merchant Court in Singapore, d- ing December 5-9, 2010. The conference was sponsored by the International As...
cena: 201,24

 Information and Communications Security: 12th International Conference, Icics 2010, Barcelona, Spain, December 15-17, 2010 Proceedings Soriano, Miguel 9783642176494 Not Avail
Information and Communications Security: 12th International Conference, Icics 2010, Barcelona, Spain, December 15-17, 2010 Proceedings

ISBN: 9783642176494 / Angielski / Miękka / 474 str.

ISBN: 9783642176494/Angielski/Miękka/474 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Miguel Soriano; Sihan Qing; Javier Lopez
Information and communication security must provide technological solutions to the tension between the accelerating growth of social, economical and g- ernmental demand for digitalization of information on the one hand, and on the other, the legal and ethical obligation to protect the individuals and organi- tions involved. These proceedings contain the papers accepted at the 2010 International Conference on Information and Communications Security (ICICS 2010), held in Barcelona, Spain, during December 15-17, and hosted by the Information Security Group of the Universitat Polit ecnica de...
Information and communication security must provide technological solutions to the tension between the accelerating growth of social, economical and g...
cena: 201,24

 Security in Computing Systems: Challenges, Approaches and Solutions Biskup, Joachim 9783642097195 Springer
Security in Computing Systems: Challenges, Approaches and Solutions

ISBN: 9783642097195 / Angielski / Miękka / 694 str.

ISBN: 9783642097195/Angielski/Miękka/694 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joachim Biskup
This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. Here, computing refers to all activities which individuals or groups directly or indirectly perform by means of computing s- tems, i. e., by means of computers and networks of them built on telecommuni- tion. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the information society, we are challenged to maintain our values, to pursue our goals and to enforce our...
This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of...
cena: 603,81

 Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011, Proceedings Aggelos Kiayias 9783642190735 Springer-Verlag Berlin and Heidelberg GmbH &
Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011, Proceedings

ISBN: 9783642190735 / Angielski / Miękka / 417 str.

ISBN: 9783642190735/Angielski/Miękka/417 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Aggelos Kiayias
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2011, CT-RSA 2011, held in San Francisco, CA, USA, in February 2011.
The 24 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on secure two-party computation, cryptographic primitives, side channel attacks, authenticated key agreement, proofs of security, block ciphers, security notions, public-key encryption, crypto tools and parameters, and digital signatures.
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2011, CT-RSA 2011, held in San Francisco, CA, USA, i...
cena: 201,24

 Advances in Information Processing and Protection Jerzy Pejas Khalid Saeed 9781441944573 Springer
Advances in Information Processing and Protection

ISBN: 9781441944573 / Angielski / Miękka / 460 str.

ISBN: 9781441944573/Angielski/Miękka/460 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jerzy Pejas; Khalid Saeed
The Computer Science is relatively new field which is developing very fast not only because due to the huge interest of scientists and the market request, but also because this science has created possibilities for people of investigation and solved many problems that some time ago seemed to be insolvable. Such problems had only been described in science fiction novels, like underwater journeys of captain Nemo described by Jules Verne in XIX century. At present, various human dreams are successively becoming reality exactly as the underwater journeys became possible in the XX century. The...
The Computer Science is relatively new field which is developing very fast not only because due to the huge interest of scientists and the market requ...
cena: 805,10

 Smart Cards, Tokens, Security and Applications Keith Mayes Konstantinos Markantonakis 9781441944269 Springer
Smart Cards, Tokens, Security and Applications

ISBN: 9781441944269 / Angielski / Miękka / 392 str.

ISBN: 9781441944269/Angielski/Miękka/392 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Keith Mayes; Konstantinos Markantonakis

Providing a broad overview of the many card systems and solutions in practical use today, this state-of-the art work is written by contributing authors who are active researchers and acknowledged experts in their field. A single book cannot be found to match both the breadth and depth of content. The book combines a cross-discipline overview of smart cards, tokens and related security and applications plus a technical reference to support further research and study. A step-by-step approach educates the reader and by the end of the book the reader should be able to play an educated role in...

Providing a broad overview of the many card systems and solutions in practical use today, this state-of-the art work is written by contributing aut...

cena: 483,04

 Cryptanalytic Attacks on Rsa Yan, Song Y. 9781441943101 Springer
Cryptanalytic Attacks on Rsa

ISBN: 9781441943101 / Angielski / Miękka / 255 str.

ISBN: 9781441943101/Angielski/Miękka/255 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Song Y. Yan

RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and widely-used cryptographic system in today's digital world, for which its three inventors Rivest, Shamir and Adleman received the year 2002 Turing Award, the equivalent Nobel Prize in Computer Science.

Cryptanalytic Attacks on RSA covers almost all major known cryptanalytic attacks and defenses of the RSA cryptographic system and its variants. Since RSA depends heavily on computational complexity theory and number...

RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and...

cena: 422,66

 Decision and Game Theory for Security: First International Conference, Gamesec 2010, Berlin, Germany, November 22-23, 2010. Proceedings Alpcan, Tansu 9783642171963 Springer
Decision and Game Theory for Security: First International Conference, Gamesec 2010, Berlin, Germany, November 22-23, 2010. Proceedings

ISBN: 9783642171963 / Angielski / Miękka / 281 str.

ISBN: 9783642171963/Angielski/Miękka/281 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tansu Alpcan; Levente Buttyan; John S. Baras
Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the - formation age. Concurrently, security of ubiquitous communication, data, and computing poses novel research challenges. Security is a multi-faceted problem due to the complexity of underlying hardware, software, and network inter- pendencies as well as human and social factors. It involves decision making on multiple levels and multiple time scales, given the limited resources available to both malicious attackers and administrators defending...
Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the...
cena: 201,24

 Secure Key Establishment Kim-Kwang Raymond Choo 9781441946898 Not Avail
Secure Key Establishment

ISBN: 9781441946898 / Angielski / Miękka / 216 str.

ISBN: 9781441946898/Angielski/Miękka/216 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kim-Kwang Raymond Choo

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.

Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare Rogaway model and the Canetti Krawczyk model is included. An...

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered ...

cena: 402,53

 Post-Quantum Cryptography: Third International Workshop, Pqcrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings Sendrier, Nicolas 9783642129285 Not Avail
Post-Quantum Cryptography: Third International Workshop, Pqcrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings

ISBN: 9783642129285 / Angielski / Miękka / 241 str.

ISBN: 9783642129285/Angielski/Miękka/241 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nicolas Sendrier
The recent development of quantum computing and quantum algorithmics has raised important questions in cryptography. With Shor s algorithm (Peter W. Shor, Polynomial-TimeAlgorithms for Prime Factorization and Discrete Lo- rithmsonaQuantumComputer, SIAMJ.Sci.Statist.Comput.41(2):303-332, 1999)thecollapseofsomeofthemostwidelyusedtechniquesfor securingdigital communications has become a possibility. In consequence, the everlasting duty of the cryptographic research community to keep an eye on alternative te- niques has become an urgent necessity. Post-quantum cryptography was born. Its primary...
The recent development of quantum computing and quantum algorithmics has raised important questions in cryptography. With Shor s algorithm (Peter W. S...
cena: 201,24

 Intrusion Detection Effektiv!: Modellierung Und Analyse Von Angriffsmustern Michael Meier 9783540482512 Springer
Intrusion Detection Effektiv!: Modellierung Und Analyse Von Angriffsmustern

ISBN: 9783540482512 / Niemiecki / Twarda / 209 str.

ISBN: 9783540482512/Niemiecki/Twarda/209 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Meier

Intrusion-Detection-Systeme werden zum Schutz vor Angriffen von IT-Systemen eingesetzt. Sie erkennen Missbrauch, indem sie Systemereignisse mit bekannten Angriffsmustern vergleichen. Der praktische Einsatz dieser Systeme ist haufig von Fehlalarmen gepragt. Die Ursache liegt in unzureichenden Angriffsmustern. Der Autor stellt hier Ansatze zur Steigerung der Wirksamkeit von Missbrauchserkennung im praktischen Einsatz vor. Systematisch untersucht er Anforderungen an die Reprasentation von Angriffsmustern. Er entwickelt einen an Petri-Netze angelehnten Ansatz zur grafischen Modellierung,...

Intrusion-Detection-Systeme werden zum Schutz vor Angriffen von IT-Systemen eingesetzt. Sie erkennen Missbrauch, indem sie Systemereignisse mit bek...

cena: 112,84

 Theory of Cryptography: 8th Theory of Cryptography Conference, Tcc 2011, Providence, Ri, Usa, March 28-30, 2011, Proceedings Ishai, Yuval 9783642195709 Not Avail
Theory of Cryptography: 8th Theory of Cryptography Conference, Tcc 2011, Providence, Ri, Usa, March 28-30, 2011, Proceedings

ISBN: 9783642195709 / Angielski / Miękka / 631 str.

ISBN: 9783642195709/Angielski/Miękka/631 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yuval Ishai
Constitutes the thoroughly refereed proceedings of the 8th Theory of Cryptography Conference, TCC 2011, that was held in Providence, Rhode Island, USA. This book includes 35 full papers together with 2 invited talks.
Constitutes the thoroughly refereed proceedings of the 8th Theory of Cryptography Conference, TCC 2011, that was held in Providence, Rhode Island, USA...
cena: 402,53

 Voice Over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research Keromytis, Angelos D. 9781441998651 Not Avail
Voice Over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research

ISBN: 9781441998651 / Angielski / Miękka / 100 str.

ISBN: 9781441998651/Angielski/Miękka/100 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Angelos D. Keromytis

Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the consumer market, new business models. However, VoIP systems also represent a higher complexity in terms of architecture, protocols and implementation, with a corresponding increase in the potential for misuse.

In this book, the authors...

Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and mili...

cena: 201,24

 Formal Correctness of Security Protocols Giampaolo Bella 9783642087820 Not Avail
Formal Correctness of Security Protocols

ISBN: 9783642087820 / Angielski / Miękka / 274 str.

ISBN: 9783642087820/Angielski/Miękka/274 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Giampaolo Bella

The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols. The method of analysis turns out to be both powerful and flexible. This research advances significant extensions to the method of analysis, while the findings on the protocols analysed are novel and illuminating.


The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerber...

cena: 201,24

 The Tangled Web Michal Zalewski 9781593273880 No Starch Press
The Tangled Web

ISBN: 9781593273880 / Angielski / Miękka / 320 str.

ISBN: 9781593273880/Angielski/Miękka/320 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michal Zalewski

"Thorough and comprehensive coverage from one of the foremost experts in browser security."

--Tavis Ormandy, Google Inc.

Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape.

In The Tangled Web, Michal Zalewski, one of the world's top...

"Thorough and comprehensive coverage from one of the foremost experts in browser security."

--Tavis Ormandy, Google Inc.

...

cena: 286,79

 Proceedings of the Ifip Tc 11 23rd International Information Security Conference: Ifip 20th World Computer Congress, Ifip Sec'08, September 7-10, 2008 Jajodia, Sushil 9781441935205 Not Avail
Proceedings of the Ifip Tc 11 23rd International Information Security Conference: Ifip 20th World Computer Congress, Ifip Sec'08, September 7-10, 2008

ISBN: 9781441935205 / Angielski / Miękka / 738 str.

ISBN: 9781441935205/Angielski/Miękka/738 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sushil Jajodia; Pierangela Samarati; Stelvio Cimato
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with IFIP World Computer Congress (WCC 2008), September 8-10, 2008 in Milan, Italy. In - sponse to the call for papers, 143 papers were submitted to the conference. All - pers were evaluated on the basis of their signi?cance, novelty, and technical quality, and reviewed by at least three members of the program committee. Reviewing was blind meaning that the authors were not told which committee members reviewed which papers. The program committee...
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with I...
cena: 603,81

 Botnet Detection: Countering the Largest Security Threat Lee, Wenke 9781441943309 Not Avail
Botnet Detection: Countering the Largest Security Threat

ISBN: 9781441943309 / Angielski / Miękka / 168 str.

ISBN: 9781441943309/Angielski/Miękka/168 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Wenke Lee; Cliff Wang; David Dagon

Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat. Botnet Detection: Countering the Largest Security Threat consists of chapters contributed by world-class leaders in this field, from the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets.

Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help ...

cena: 523,30

 Insider Attack and Cyber Security: Beyond the Hacker Stolfo, Salvatore J. 9781441945891 Springer
Insider Attack and Cyber Security: Beyond the Hacker

ISBN: 9781441945891 / Angielski / Miękka / 223 str.

ISBN: 9781441945891/Angielski/Miękka/223 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Salvatore J. Stolfo; Steven M. Bellovin; Shlomo Hershkop

Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College.

This book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and includes the following topics: critical IT infrastructure, insider threats,...

Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial i...

cena: 402,53

 ICT Ethics and Security in the 21st Century: New Developments and Applications Quigley, Marian 9781609605735 Information Science Reference
ICT Ethics and Security in the 21st Century: New Developments and Applications

ISBN: 9781609605735 / Angielski / Twarda / 378 str.

ISBN: 9781609605735/Angielski/Twarda/378 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marian Quigley
The rapid, global growth of technology necessitates a continued review of issues relating to privacy and security, as well as studies on the adoption of and access to new products, tools, and software. ICT Ethics and Security in the 21st Century: New Developments and Applications highlights ethical dilemmas and security challenges posed by the rise of more recent technologies along with ongoing challenges such as the digital divide, threats to privacy, and organizational security measures. This book comprises a valuable resource for ICT researchers, educators, students, and professionals...
The rapid, global growth of technology necessitates a continued review of issues relating to privacy and security, as well as studies on the adoption ...
cena: 922,53

 Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances Chou, Te-Shun 9781613505076 Business Science Reference
Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances

ISBN: 9781613505076 / Angielski / Twarda / 372 str.

ISBN: 9781613505076/Angielski/Twarda/372 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Te-Shun Chou
The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by those attackers who are not authorized to access to the information. Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances details current trends and advances in information...
The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this incre...
cena: 999,40

Pierwsza Podprzednia  70  71  72  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia