• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2626

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 On the Move to Meaningful Internet Systems 2005: Coopis, Doa, and Odbase: Otm Confederated International Conferences, Coopis, Doa, and Odbase 2005, Ag Tari, Zahir 9783540297383 Springer
On the Move to Meaningful Internet Systems 2005: Coopis, Doa, and Odbase: Otm Confederated International Conferences, Coopis, Doa, and Odbase 2005, Ag

ISBN: 9783540297383 / Angielski / Miękka / 740 str.

ISBN: 9783540297383/Angielski/Miękka/740 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
R. Meersman; Robert Meersman
Constitutes the refereed proceedings of the three confederated conferences CoopIS 2005, DOA 2005, and ODBASE 2005 held as OTM 2005 in Agia Napa, Cyprus in October/November 2005. This title presents 89 revised and 7 short papers together with 3 keynote speeches that were reviewed and selected from a total of 360 submissions.
Constitutes the refereed proceedings of the three confederated conferences CoopIS 2005, DOA 2005, and ODBASE 2005 held as OTM 2005 in Agia Napa, Cypru...
cena: 403,47 zł

 Anti-Spam Measures: Analysis and Design Schryen, Guido 9783540717485 Springer
Anti-Spam Measures: Analysis and Design

ISBN: 9783540717485 / Angielski / Twarda / 232 str.

ISBN: 9783540717485/Angielski/Twarda/232 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Guido Schryen

This book examines anti-spam measures in terms of their potentials, limitations, advantages, and drawbacks. These factors determine to which extent the measures can contribute to the reduction of spam in the long run. It examines legislative, organizational, behavioral, and technological anti-spam measures, including an insight into their effectiveness. In addition, it presents the conceptual development and analysis of an infrastructural e-mail framework, which features such a complementary application, and considers deployment issues.


This book examines anti-spam measures in terms of their potentials, limitations, advantages, and drawbacks. These factors determine to which extent...

cena: 201,72 zł

 UbiComp 2007: Ubiquitous Computing: 9th International Conference, UbiComp 2007 Innsbruck, Austria, September 16-19, 2007 Proceedings Krumm, John 9783540748526 Springer
UbiComp 2007: Ubiquitous Computing: 9th International Conference, UbiComp 2007 Innsbruck, Austria, September 16-19, 2007 Proceedings

ISBN: 9783540748526 / Angielski / Miękka / 548 str.

ISBN: 9783540748526/Angielski/Miękka/548 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gregory D. Abowd
The Ubiquitous Computing conference series provides the premier forum in which to present original research results in all areas relating to the design, implementation, app- cation and evaluation of ubiquitous computing technologies. It is a well-established platform to introduce and discuss research that enables new capabilities, appropriate security and privacy, improved user experiences and simplified and powerful devel- ment and deployment practices. These proceedings contain the papers presented at the Ninth International Conf- ence on Ubiquitous Computing (UbiComp 2007) in Innsbruck,...
The Ubiquitous Computing conference series provides the premier forum in which to present original research results in all areas relating to the desig...
cena: 201,72 zł

 Advances in Cryptology - Crypto 2007: 27th Annual International Cryptology Conference, Santa Barbara, Ca, Usa, August 19-23, 2007, Proceedings Menezes, Alfred 9783540741428 Springer
Advances in Cryptology - Crypto 2007: 27th Annual International Cryptology Conference, Santa Barbara, Ca, Usa, August 19-23, 2007, Proceedings

ISBN: 9783540741428 / Angielski / Miękka / 650 str.

ISBN: 9783540741428/Angielski/Miękka/650 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alfred Menezes

This volume constitutes the refereed proceedings of the 27th Annual International Cryptology Conference held in Santa Barbara, California, in August 2007. Thirty-three full papers are presented along with one important invited lecture. The papers address current foundational, theoretical, and research aspects of cryptology, cryptography, and cryptanalysis. In addition, readers will discover many advanced and emerging applications.


This volume constitutes the refereed proceedings of the 27th Annual International Cryptology Conference held in Santa Barbara, California, in Augus...

cena: 403,47 zł

 Network-Based Information Systems: First International Conference, NBiS 2007 Regensburg, Germany, September 3-7, 2007 Proceedings Enokido, Tomoya 9783540745723 Springer
Network-Based Information Systems: First International Conference, NBiS 2007 Regensburg, Germany, September 3-7, 2007 Proceedings

ISBN: 9783540745723 / Angielski / Miękka / 562 str.

ISBN: 9783540745723/Angielski/Miękka/562 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Leonhard Barolli
Welcome to the proceedings of the 1st International Conference on Network- Based Information Systems (NBiS-2007), in conjunction with the 18th Inter- tional Conference on Database and Expert Systems Applications DEXA-2007, which was held in Regensburg, Germany, September 3-4, 2007. The main objective of NBiS-2007 was to bring together scientists, engineers, and researchers from both network systems and information systems with the aimofencouragingtheexchangeofideas, opinions, andexperiencebetweenthese two communities. NBiS started as a workshop and for 9 years it was held together with DEXA...
Welcome to the proceedings of the 1st International Conference on Network- Based Information Systems (NBiS-2007), in conjunction with the 18th Inter- ...
cena: 201,72 zł

 Computer Network Security Gorodetsky, Vladimir 9783540739852 Springer
Computer Network Security

ISBN: 9783540739852 / Angielski / Miękka / 436 str.

ISBN: 9783540739852/Angielski/Miękka/436 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Igor Kotenko

This book constitutes the refereed proceedings of the Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, held in St. Petersburg, Russia in September 2007. Its objective was to bring together leading researchers from academia and governmental organizations as well as practitioners in the area of computer networks and information security.


This book constitutes the refereed proceedings of the Fourth International Conference on Mathematical Methods, Models, and Architectures for Comput...

cena: 201,72 zł

 Intrusion Detection Systems Robert D Luigi V. Mancini 9780387772653 Not Avail
Intrusion Detection Systems

ISBN: 9780387772653 / Angielski / Twarda / 250 str.

ISBN: 9780387772653/Angielski/Twarda/250 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robert Di Pietro; Luigi V. Mancini

To defend against computer and network attacks, multiple, complementary security devices such as intrusion detection systems (IDSs), and firewalls are widely deployed to monitor networks and hosts. These various IDSs will flag alerts when suspicious events are observed. This book is an edited volume by world class leaders within computer network and information security presented in an easy-to-follow style. It introduces defense alert systems against computer and network attacks. It also covers integrating intrusion alerts within security policy framework for intrusion response, related...

To defend against computer and network attacks, multiple, complementary security devices such as intrusion detection systems (IDSs), and firewalls ...

cena: 645,58 zł

 Cryptology and Network Security: 6th International Conference, CANS 2007 Singapore, December 8-10, 2007 Proceedings Bao, Feng 9783540769682 Not Avail
Cryptology and Network Security: 6th International Conference, CANS 2007 Singapore, December 8-10, 2007 Proceedings

ISBN: 9783540769682 / Angielski / Miękka / 302 str.

ISBN: 9783540769682/Angielski/Miękka/302 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Feng Bao

This book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS 2007, held in Singapore, in December 2007. The 17 revised full papers presented were carefully reviewed and selected. The papers are organized in topical sections on signatures, network security, secure keyword search and private information retrieval, public key encryption, intrusion detection, email security, denial of service attacks, and authentication.


This book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS 2007, held in Singapore...

cena: 201,72 zł

 Information Systems Security: Third International Conference, Iciss 2007, Delhi, India, December 16-20, 2007, Proceedings McDaniel, Patrick 9783540770855 Not Avail
Information Systems Security: Third International Conference, Iciss 2007, Delhi, India, December 16-20, 2007, Proceedings

ISBN: 9783540770855 / Angielski / Miękka / 342 str.

ISBN: 9783540770855/Angielski/Miękka/342 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Patrick McDaniel

This book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS 2007, held in Delhi, India, in December 2007. The 18 revised full papers and five short papers presented together with four keynote papers were carefully reviewed and selected. The papers are organized in topical sections on network security, cryptography, architectures and systems, cryptanalysis, protocols, detection and recognition, as well as short papers.


This book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS 2007, held in Delhi, In...

cena: 201,72 zł

 Distributed Computing and Networking Rao, Shrisha 9783540774433 Not Avail
Distributed Computing and Networking

ISBN: 9783540774433 / Angielski / Miękka / 610 str.

ISBN: 9783540774433/Angielski/Miękka/610 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shrisha Rao

This book constitutes the fully refereed proceedings of the 9th International Conference on Distributed Computing and Networking, ICDCN 2008 - formerly known as IWDC (International Workshop on Distributed Computing), held in Kolkata, India, in January 2008. The 30 revised full papers and 27 revised short papers presented together with 3 keynote talks and 1 invited lecture were carefully reviewed and selected from 185 submissions. The papers are organized in topical sections.


This book constitutes the fully refereed proceedings of the 9th International Conference on Distributed Computing and Networking, ICDCN 2008 - form...

cena: 403,47 zł

 VoIP Network Security and Forensic Models Using Patterns Pelaez, Juan C. 9783836428132 VDM Verlag
VoIP Network Security and Forensic Models Using Patterns

ISBN: 9783836428132 / Angielski / Miękka / 204 str.

ISBN: 9783836428132/Angielski/Miękka/204 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Juan C. Pelaez
Voice over Internet Protocol (VoIP) networks is becoming the most popular telephony system in the world. However, studies of the security of VoIP networks are still in their infancy. VoIP devices and networks are commonly attacked, and it is therefore necessary to analyze the threats against the converged network and the techniques that exist today to stop or mitigate these attacks. We also need to understand what evidence can be obtained from the VoIP system after an attack has occurred.
Many of these attacks occur in similar ways in different contexts or environ­ments. Generic solutions to...
Voice over Internet Protocol (VoIP) networks is becoming the most popular telephony system in the world. However, studies of the security of VoIP netw...
cena: 316,10 zł

 Privacy-Preserving Data Mining: Models and Algorithms Aggarwal, Charu C. 9780387709918 Not Avail
Privacy-Preserving Data Mining: Models and Algorithms

ISBN: 9780387709918 / Angielski / Twarda / 514 str.

ISBN: 9780387709918/Angielski/Twarda/514 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Charu C. Aggarwal; Philip S. Yu

Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals, causing concerns that personal data may be used for a variety of intrusive or malicious purposes.

Privacy-Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in a privacy-preserving way. These techniques generally fall into the following categories: data modification techniques, cryptographic methods and protocols for data sharing, statistical techniques for disclosure and...

Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals, causing concerns t...

cena: 887,69 zł

 Security and Privacy in Ad-Hoc and Sensor Networks: Third European Workshop, Esas 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Pape Buttyan, Levente 9783540691723 Springer
Security and Privacy in Ad-Hoc and Sensor Networks: Third European Workshop, Esas 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Pape

ISBN: 9783540691723 / Angielski / Miękka / 198 str.

ISBN: 9783540691723/Angielski/Miękka/198 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Levente Buttyan; Virgil Gligor; Dirk Westhoff
Theseproceedingscontainthepapersofthe3rdEuropeanWorkshoponSecurity and Privacy in Ad Hoc and Sensor Networks (ESAS 2006), which was held in Hamburg, Germany, September 20 21, 2006, in conjunction with the 11th European Symposium on Research in Computer Security (ESORICS 2006). This year, a total of 44 full papers were submitted to ESAS. Each subm- ted paper was reviewed by at least three expert referees. After a short period of discussion and deliberation, the Program Committee selected 14 papers for presentation and subsequent publication in the workshop proceedings. This c- responds to an...
Theseproceedingscontainthepapersofthe3rdEuropeanWorkshoponSecurity and Privacy in Ad Hoc and Sensor Networks (ESAS 2006), which was held in Hamburg, G...
cena: 201,72 zł

 Information Systems Security: Second International Conference, Iciss 2006, Kolkata, India, December 19-21, 2006, Proceedings Bagchi, Aditya 9783540689621 Springer
Information Systems Security: Second International Conference, Iciss 2006, Kolkata, India, December 19-21, 2006, Proceedings

ISBN: 9783540689621 / Angielski / Miękka / 384 str.

ISBN: 9783540689621/Angielski/Miękka/384 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Aditya Bagchi; Vijayalakshmi Atluri

This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS 2006, held in Kolkata, India in December 2006. The 20 revised full papers and five short papers presented together with four invited papers and three ongoing project summaries were carefully reviewed and selected from 79 submissions. The papers discuss in depth the current state of the research and practice in information systems security.


This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS 2006, held in Kolkata,...

cena: 201,72 zł

 Securing Peer-to-Peer Video Conferences - From concepts to implementations Fuwen Liu 9783836452823 VDM Verlag Dr. Mueller E.K.
Securing Peer-to-Peer Video Conferences - From concepts to implementations

ISBN: 9783836452823 / Angielski / Miękka / 168 str.

ISBN: 9783836452823/Angielski/Miękka/168 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Fuwen Liu
cena: 316,10 zł

 Secure Multi-Party Non-Repudiation Protocols and Applications Jos?? A. Onieva Javier Lopez Jianying Zhou 9780387756295 Not Avail
Secure Multi-Party Non-Repudiation Protocols and Applications

ISBN: 9780387756295 / Angielski / Twarda / 190 str.

ISBN: 9780387756295/Angielski/Twarda/190 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jose A. Onieva; Javier Lopez; Jianying Zhou

The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. This book is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. The book is also suitable as an advanced-level...

The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professio...

cena: 403,47 zł

 Trust Management Etalle, Sandro 9780387736549 Not Avail
Trust Management

ISBN: 9780387736549 / Angielski / Twarda / 414 str.

ISBN: 9780387736549/Angielski/Twarda/414 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stephen Marsh; Sandro Etalle
This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Mo- ton, New Brunswick, Canada from July 29th to August 2nd, 2007. The annual iTrust international conference looks at trust from multidis- plinary perspectives: economic, legal, psychology, philosophy, sociology as well as information technology, is built on the work of the iTrust working group (http: //www.itrust.uoc.gr), and has had four highly successful conferences in Europe to date. The annual PST conference has quickly established itself as a...
This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Mo- t...
cena: 403,47 zł

 Invisibility Toolkit - 100 Ways to Disappear From Oppressive Governments, Stalke: How to Disappear and Be Invisible Internationally Henderson, Lance 9781517160081 Createspace
Invisibility Toolkit - 100 Ways to Disappear From Oppressive Governments, Stalke: How to Disappear and Be Invisible Internationally

ISBN: 9781517160081 / Angielski / Miękka / 270 str.

ISBN: 9781517160081/Angielski/Miękka/270 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lance Henderson
Your sovereignty is under attack You don't need the red pill to see it because you've already been unplugged. It's all around you. Everywhere. Within this book lies top secrets known only to the FBI and a few law enforcement agencies: How to disappear in style and retain assets. How to switch up multiple identities on the fly and be invisible such that no one; not your ex, not your parole officer, nor even the federal government can find you. Ever. The Invisibility Toolkit is the ultimate guide for anyone who values their privacy or needs to disappear. Whether you're running from stalkers or...
Your sovereignty is under attack You don't need the red pill to see it because you've already been unplugged. It's all around you. Everywhere. Within...
cena: 64,52 zł

 Trusted Computing Chris Mitchell 9780863415258 INSTITUTION OF ENGINEERING AND TECHNOLOGY
Trusted Computing

ISBN: 9780863415258 / Angielski / Twarda / 328 str.

ISBN: 9780863415258/Angielski/Twarda/328 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chris Mitchell
This book provides an introduction to trusted computing technology and its applications. As computers are increasingly embedded and wireless connected, security becomes imperative.
This book provides an introduction to trusted computing technology and its applications. As computers are increasingly embedded and wireless connected...
cena: 462,34 zł

 Computer Networks and Open Systems: An Application Development Perspective: An Application Development Perspective Cassel, L. N. 9780763711221 JONES AND BARTLETT PUBLISHERS, INC
Computer Networks and Open Systems: An Application Development Perspective: An Application Development Perspective

ISBN: 9780763711221 / Angielski / Miękka / 496 str.

ISBN: 9780763711221/Angielski/Miękka/496 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
L. N. Cassell
Computer Networks And Open Systems: An Application Development Perspective Covers Principles, Theory, And Techniques Of Networks And Open Systems From A Practical Perspective, Using Real System And Network Applications As Its Basis. The Selection Of Topics Forms A Core Of Material In Computer Networking, Emphasizing Methods And The Environment For Application Development. The Text Aims To Make Readers Immediately Comfortable In Today's Networking Environment While Equipping Them To Keep Pace In One Of The Fastest Moving And Most Exciting Areas Of Computer System Development. Students Will...
Computer Networks And Open Systems: An Application Development Perspective Covers Principles, Theory, And Techniques Of Networks And Open Systems From...
cena: 931,42 zł

Pierwsza Podprzednia  1  2  3  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia