• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Network Security

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Network Security

ilość książek w kategorii: 2626

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Provable Security Susilo, Willy 9783540756699 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Provable Security

ISBN: 9783540756699 / Angielski / Miękka / 254 str.

ISBN: 9783540756699/Angielski/Miękka/254 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Willy Susilo; Joseph K. Liu

This book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, held in Wollongong, Australia. The 10 revised full papers presented together with seven short papers were carefully reviewed and selected. The papers are organized in topical sections on Authentication, Asymmetric Encryption, Signature, Protocol and Proving Technique, Authentication and Symmetric Encryption, Signature and Asymmetric Encryption.


This book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, held in Wollongong, Austra...

cena: 201,72 zł

 Advances in Information and Computer Security: Second International Workshop on Security, IWSEC 2007, Nara, Japan, October  29-31, 2007, Proceedings Hiroaki Kikuchi, Kai Rannenberg 9783540756507 Springer-Verlag Berlin and Heidelberg GmbH &
Advances in Information and Computer Security: Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings

ISBN: 9783540756507 / Angielski / Miękka / 462 str.

ISBN: 9783540756507/Angielski/Miękka/462 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hiroaki Kikuchi;Kai Rannenberg
The International Workshop on Security (IWSEC 2007) was the second in the annualseriesthat startedin 2006.IWSEC 2007washeld at the New Public Hall in Nara, Japan, during October 29 31, 2007. This year there were 112 paper submissions, and from these 30 papers were accepted. Accepted papers came from 27 di?erent countries, with the largest proportion coming from Japan (12). Estonia, China, Korea, Spain, Taiwan and the USA contributed 2 papers each and Canada, Germany, Greece, Poland, Turkeyand Vietnam contributed 1 paper each. We would liketo thank all of the authors who submitted papers to...
The International Workshop on Security (IWSEC 2007) was the second in the annualseriesthat startedin 2006.IWSEC 2007washeld at the New Public Hall in ...
cena: 201,72 zł

 Managing Virtualization of Networks and Services: 18th Ifip/IEEE International Workshop on Distributed Systems: Operations and Management, Dsom 2007, Clemm, Alexander 9783540756934 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Managing Virtualization of Networks and Services: 18th Ifip/IEEE International Workshop on Distributed Systems: Operations and Management, Dsom 2007,

ISBN: 9783540756934 / Angielski / Miękka / 272 str.

ISBN: 9783540756934/Angielski/Miękka/272 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This volume of the Lecture Notes in Computer Science series contains all papers th accepted for presentation at the 18 IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM 2007), which was held in the heart of Silicon Valley, San Jose, California, USA, on October 29 31, 2007. DSOM 2007 was the 18th event in a series of annual workshops. It followed in the footsteps of previous successful meetings, the most recent of which were held in Dublin, Ireland (DSOM 2006), Barcelona, Spain (DSOM 2005), Davis, California, USA (DSOM 2004), Heidelberg, Germany (DSOM...
This volume of the Lecture Notes in Computer Science series contains all papers th accepted for presentation at the 18 IFIP/IEEE International Worksho...
cena: 201,72 zł

 Security in Computing Systems: Challenges, Approaches and Solutions Biskup, Joachim 9783540784418 SPRINGER-VERLAG BERLIN AND HEIDELBERG GMBH &
Security in Computing Systems: Challenges, Approaches and Solutions

ISBN: 9783540784418 / Angielski / Twarda / 694 str.

ISBN: 9783540784418/Angielski/Twarda/694 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joachim Biskup
This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. Here, computing refers to all activities which individuals or groups directly or indirectly perform by means of computing s- tems, i. e., by means of computers and networks of them built on telecommuni- tion. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the information society, we are challenged to maintain our values, to pursue our goals and to enforce our...
This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of...
cena: 605,23 zł

 Wired/Wireless Internet Communications: 6th International Conference, Wwic 2008 Tampere, Finland, May 28-30, 2008 Proceedings Harju, Jarmo 9783540688051 Springer
Wired/Wireless Internet Communications: 6th International Conference, Wwic 2008 Tampere, Finland, May 28-30, 2008 Proceedings

ISBN: 9783540688051 / Angielski / Miękka / 225 str.

ISBN: 9783540688051/Angielski/Miękka/225 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jarmo Harju
WWIC2008wasorganizedbytheTechnicalUniversityofTampere, Finland, and it was the sixth event in a series of InternationalConferenceson Wired/Wireless Internet Communications. Previous events were held in Coimbra (Portugal) in 2007, Berne (Switzerland) in 2006, Xanthi (Greece) in 2005, Frankfurt (G- many) in 2004, and Las Vegas (USA) in 2002. The WWIC 2008 call for papers attracted 67 submissions from 33 co- tries, which were subject to thorough review work by the Technical Program Committee members and additional reviewers. The selection process resulted in acceptance of 18 papers, organized...
WWIC2008wasorganizedbytheTechnicalUniversityofTampere, Finland, and it was the sixth event in a series of InternationalConferenceson Wired/Wireless In...
cena: 201,72 zł

 Autonomic and Trusted Computing: 5th International Conference, Atc 2008, Oslo, Norway, June 23-25, 2008, Proceedings Rong, Chunming 9783540692942 Springer
Autonomic and Trusted Computing: 5th International Conference, Atc 2008, Oslo, Norway, June 23-25, 2008, Proceedings

ISBN: 9783540692942 / Angielski / Miękka / 688 str.

ISBN: 9783540692942/Angielski/Miękka/688 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chunming Rong
ThisvolumecontainstheproceedingsofATC2008, the5thInternationalConf- ence on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality. The conference was held in Oslo, Norway, d- ing June 23-25, 2008. ATC 2008 is a successor of the First IFIP Workshop on Trusted and Au- nomic Ubiquitous and Embedded Systems (TAUES 2005, Japan), the Inter- tional Workshop on Trusted and Autonomic Computing Systems (TACS 2006, Austria), the Third International Conference on Autonomic and Trusted C- puting (ATC 2006, China), and the 4th International Conference on...
ThisvolumecontainstheproceedingsofATC2008, the5thInternationalConf- ence on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computi...
cena: 403,47 zł

 Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD [With DVD] Long, Johnny 9781597492997 SYNGRESS MEDIA,U.S.
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD [With DVD]

ISBN: 9781597492997 / Angielski / Twarda / 1038 str.

ISBN: 9781597492997/Angielski/Twarda/1038 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Johnny Long; Ryan Russell

"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one." - from the Foreword to the first Stealing the Network book, How to Own the Box, Jeff Moss, Founder &...

"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology th...

cena: 321,23 zł

 Exposing Internet Address Use to EnhanceNetwork Security Evan M Cooke 9783836464420 VDM Verlag Dr. Mueller E.K.
Exposing Internet Address Use to EnhanceNetwork Security

ISBN: 9783836464420 / Angielski / Miękka / 152 str.

ISBN: 9783836464420/Angielski/Miękka/152 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Evan M Cooke
cena: 274,26 zł

 Breakthrough Perspectives in Network and Data Communications Security, Design and Applications Bose, Indranil 9781605661483 Information Science Reference
Breakthrough Perspectives in Network and Data Communications Security, Design and Applications

ISBN: 9781605661483 / Angielski / Twarda / 356 str.

ISBN: 9781605661483/Angielski/Twarda/356 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Indranil Bose
Modern organizations are critically dependent on data communications and network systems utilized in managing information and communications, vital to continuity and success of operations.
Modern organizations are critically dependent on data communications and network systems utilized in managing information and communications, vital to...
cena: 988,93 zł

 Towards Sustainable Society on Ubiquitous Networks: The 8th Ifip Conference on E-Business, E-Services, and E-Society (I3e 2008), September 24 - 26, 20 Oya, Makoto 9780387856902 Springer
Towards Sustainable Society on Ubiquitous Networks: The 8th Ifip Conference on E-Business, E-Services, and E-Society (I3e 2008), September 24 - 26, 20

ISBN: 9780387856902 / Angielski / Twarda / 363 str.

ISBN: 9780387856902/Angielski/Twarda/363 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Makoto Oya; Ryuya Uda; Chizuko Yasunobu
The massive growth of the Internet has made an enormous amount of infor- tion available to us. However, it is becoming very difficult for users to acquire an - plicable one. Therefore, some techniques such as information filtering have been - troduced to address this issue. Recommender systems filter information that is useful to a user from a large amount of information. Many e-commerce sites use rec- mender systems to filter specific information that users want out of an overload of - formation 2]. For example, Amazon. com is a good example of the success of - commender systems 1]. Over...
The massive growth of the Internet has made an enormous amount of infor- tion available to us. However, it is becoming very difficult for users to acq...
cena: 403,47 zł

 Secure Key Establishment Kim-Kwang Raymond Choo 9780387879680 Springer
Secure Key Establishment

ISBN: 9780387879680 / Angielski / Twarda / 216 str.

ISBN: 9780387879680/Angielski/Twarda/216 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kim-Kwang Raymond Choo

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.

Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare Rogaway model and the Canetti Krawczyk model is included. An...

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered ...

cena: 403,47 zł

 Information Warfare Daniel Ventre 9781848210943 Wiley-Iste
Information Warfare

ISBN: 9781848210943 / Angielski / Twarda / 303 str.

ISBN: 9781848210943/Angielski/Twarda/303 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Daniel Ventre
This book introduces policy, government, and security professionals to the concept of -information warfare, - covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between...
This book introduces policy, government, and security professionals to the concept of -information warfare, - covering its evolution over the last dec...
cena: 765,92 zł

 Information and Communications Security: 10th International Conference, Icics 2008 Birmingham, Uk, October 20 - 22, 2008. Proceedings Chen, Liqun 9783540886242 Springer
Information and Communications Security: 10th International Conference, Icics 2008 Birmingham, Uk, October 20 - 22, 2008. Proceedings

ISBN: 9783540886242 / Angielski / Miękka / 454 str.

ISBN: 9783540886242/Angielski/Miękka/454 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Liqun Chen
The10thInternationalConferenceonInformationandCommunicationsSecurity (ICICS) was held in Birmingham, UK, during 20-22 October 2008. The ICICS conference series is an established forum that brings together people working in di?erent ?elds of information and communications security from universities, researchinstitutes, industryandgovernmentinstitutions, andgivestheattendees the opportunity to exchange new ideas and investigate state-of-the-art devel- ments. In previous years, ICICS has taken place in China (2007, 2005, 2003, 2001, 1997), USA (2006), Spain (2004), Singapore (2002), and...
The10thInternationalConferenceonInformationandCommunicationsSecurity (ICICS) was held in Birmingham, UK, during 20-22 October 2008. The ICICS conferen...
cena: 201,72 zł

 Machine Learning in Cyber Trust: Security, Privacy, and Reliability Tsai, Jeffrey J. P. 9780387887340 Springer
Machine Learning in Cyber Trust: Security, Privacy, and Reliability

ISBN: 9780387887340 / Angielski / Twarda / 362 str.

ISBN: 9780387887340/Angielski/Twarda/362 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jeffrey J. P. Tsai; Philip S. Yu

Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems is a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms.

This book contains original materials by leading researchers in the area and covers applications of different machine learning methods in the reliability, security, performance, and privacy issues of cyber space. It enables readers to discover...

Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose priva...

cena: 625,41 zł

 Algebraic Cryptanalysis Gregory V. Bard 9780387887562 Springer
Algebraic Cryptanalysis

ISBN: 9780387887562 / Angielski / Twarda / 356 str.

ISBN: 9780387887562/Angielski/Twarda/356 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gregory V. Bard

Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided into three parts: Part One covers the process of turning a cipher into a system of equations; Part Two covers finite field linear algebra; Part Three covers the solution of Polynomial Systems of Equations, with a survey of the methods used in practice, including SAT-solvers and the methods of Nicolas Courtois.

Topics include:

Analytic Combinatorics, and its application to cryptanalysis

The...

Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided...

cena: 1008,75 zł

 Security and Dependability for Ambient Intelligence George Spanoudakis Antonio Man Kokolakis Spyros 9780387887746 Springer
Security and Dependability for Ambient Intelligence

ISBN: 9780387887746 / Angielski / Twarda / 392 str.

ISBN: 9780387887746/Angielski/Twarda/392 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
George Spanoudakis; Antonio Mana Gomez; Kokolakis Spyros

Security and Dependability for Ambient Intelligence is the primary publication for the SERENITY approach which provides security and dependability (S&D) solutions for dynamic, highly distributed and heterogeneous systems. The term Ambient Intelligence identifies an ambitious vision for pushing technological developments, that will enable heterogeneous networked systems and devices with computing capabilities (cars, house applications, mobile phones etc.). The objective of SERENITY is to enhance the security and dependability of ambient intelligence systems by providing a...

Security and Dependability for Ambient Intelligence is the primary publication for the SERENITY approach which provides security a...

cena: 605,23 zł

 Provable Security: Second International Conference, Provsec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings Baek, Joon Sang 9783540887324 Springer
Provable Security: Second International Conference, Provsec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings

ISBN: 9783540887324 / Angielski / Miękka / 378 str.

ISBN: 9783540887324/Angielski/Miękka/378 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joonsang Baek
Thesecondinternationalconferenceonprovablesecurity, ProvSec2008, washeld in Shanghai, China, during October 30th - November 1st, 2008. The conference wassponsoredbyShanghaiJiaoTongUniversity(SJTU)incooperationwiththe Chinese Association for Cryptologic Research (CACR) and the Natural Science Foundation of China (NSFC). The aim of ProvSec is to provide a platform for researchers, scholars, and practitionerstoexchangeideasandextendknowledgeonprovablesecurity, which is an important research area in cryptography. The ?rst ProvSec was held in Wollongong, Australia, in 2007. This year, the...
Thesecondinternationalconferenceonprovablesecurity, ProvSec2008, washeld in Shanghai, China, during October 30th - November 1st, 2008. The conference ...
cena: 201,72 zł

 On the Move to Meaningful Internet Systems: Otm 2008: Otm Confederated International Conferences, Coopis, Doa, Gada, Is, and Odbase 2008, Monterrey, M Tari, Zahir 9783540888703 Springer
On the Move to Meaningful Internet Systems: Otm 2008: Otm Confederated International Conferences, Coopis, Doa, Gada, Is, and Odbase 2008, Monterrey, M

ISBN: 9783540888703 / Angielski / Miękka / 972 str.

ISBN: 9783540888703/Angielski/Miękka/972 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robert Meersman
the second covering the issues of security in complex Internet-based information systems. Eachof these ?ve conferencesencouragesresearchersto treattheir respective topics within a framework that incorporates jointly (a) theory, (b) conceptual design and development, and (c) applications, in particular case studies and industrial solutions. Following and expanding the model created in 2003, we again solicited and selected quality workshop proposals to complement the more "archival" nature of the main conferences with research results in a number of selected and more...
the second covering the issues of security in complex Internet-based information systems. Eachof these ?ve conferencesencouragesresearchersto treatthe...
cena: 403,47 zł

 On the Move to Meaningful Internet Systems: Otm 2008: Otm Confederated International Conferences, Coopis, Doa, Gada, Is, and Odbase 2008, Monterrey, M Tari, Zahir 9783540888727 Springer
On the Move to Meaningful Internet Systems: Otm 2008: Otm Confederated International Conferences, Coopis, Doa, Gada, Is, and Odbase 2008, Monterrey, M

ISBN: 9783540888727 / Angielski / Miękka / 646 str.

ISBN: 9783540888727/Angielski/Miękka/646 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robert Meersman
the second covering the issues of security in complex Internet-based information systems. Eachof these ?ve conferencesencouragesresearchersto treattheir respective topics within a framework that incorporates jointly (a) theory, (b) conceptual design and development, and (c) applications, in particular case studies and industrial solutions. Following and expanding the model created in 2003, we again solicited and selected quality workshop proposals to complement the more "archival" nature of the main conferences with research results in a number of selected and more...
the second covering the issues of security in complex Internet-based information systems. Eachof these ?ve conferencesencouragesresearchersto treatthe...
cena: 201,72 zł

 Information Hiding: 10th International Workshop, Ih 2008, Sana Barbara, Ca, Usa, May 19-21, 2008, Revised Selected Papers Solanki, Kaushal 9783540889601 Springer
Information Hiding: 10th International Workshop, Ih 2008, Sana Barbara, Ca, Usa, May 19-21, 2008, Revised Selected Papers

ISBN: 9783540889601 / Angielski / Miękka / 388 str.

ISBN: 9783540889601/Angielski/Miękka/388 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kaushal Solanki
Constitutes the post-workshop proceedings of the 10th International Workshop on Information Hiding, IH 2008, held in Santa Barbara, CA, USA, in May 2008. This book presents the papers that are organized in topical sections on anonymity and privacy, steganography, forensics, novel technologies and applications, watermarking, and steganalysis.
Constitutes the post-workshop proceedings of the 10th International Workshop on Information Hiding, IH 2008, held in Santa Barbara, CA, USA, in May 20...
cena: 201,72 zł

Pierwsza Podprzednia  1  2  3  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia