• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - General

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - General

ilość książek w kategorii: 5403

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Secure Systems Development with UML Jan Jürjens 9783540007012 Springer-Verlag Berlin and Heidelberg GmbH &
Secure Systems Development with UML

ISBN: 9783540007012 / Angielski / Twarda / 316 str.

ISBN: 9783540007012/Angielski/Twarda/316 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jan Jurjens

Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is difficult, mainly because of the conflict between development costs and verifiable correctness.

Jurjens presents the UML extension UMLsec for secure systems development. It uses the standard UML extension mechanisms, and can be employed to evaluate UML specifications for vulnerabilities using a formal semantics of a simplified fragment of UML. Established rules of security engineering can be encapsulated and hence made available even to...

Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is diffi...

cena: 403,47

 Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings Antonio Lioy, Daniele Mazzocchi 9783540201854 Springer-Verlag Berlin and Heidelberg GmbH &
Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings

ISBN: 9783540201854 / Angielski / Miękka / 268 str.

ISBN: 9783540201854/Angielski/Miękka/268 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Antonio Lioy;Daniele Mazzocchi
This book constitutes the refereed proceedings of the 7th IFIP International Conference on Communications and Multimedia Security, CMS 2003, held in Torino, Italy in October 2003.The 21 revised full papers presented were carefully reviewed and selected for presentation. The papers are organized in topical sections on cryptography, network security, mobile and wireless network security, trust and privacy, application security, and multimedia security.
This book constitutes the refereed proceedings of the 7th IFIP International Conference on Communications and Multimedia Security, CMS 2003, held in T...
cena: 201,72

 Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, Isi 2004, Tucson, Az, Usa, June 10-11, 2004, Proceed Chen, Hsinchun 9783540221258 Springer
Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, Isi 2004, Tucson, Az, Usa, June 10-11, 2004, Proceed

ISBN: 9783540221258 / Angielski / Miękka / 544 str.

ISBN: 9783540221258/Angielski/Miękka/544 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
H. Chen; Hsinchun Chen
The past two years have seen signi?cant interest and progress made in national and homeland security research in the areas of information technologies, orga- zational studies, and security-related public policy. Like medical and biological research, which is facing signi?cant information overload and yet also trem- dous opportunities for new innovation, the communities of law enforcement, criminal analysis, and intelligence are facing the same challenge. As medical - formatics and bioinformatics have become major ?elds of study, the science of intelligence and security informatics is now...
The past two years have seen signi?cant interest and progress made in national and homeland security research in the areas of information technologies...
cena: 403,47

 Foundations of Security Analysis and Design III: FOSAD 2004/2005 Tutorial Lectures Aldini, Alessandro 9783540289555 Springer
Foundations of Security Analysis and Design III: FOSAD 2004/2005 Tutorial Lectures

ISBN: 9783540289555 / Angielski / Miękka / 286 str.

ISBN: 9783540289555/Angielski/Miękka/286 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alessandro Aldini; Roberto Gorrieri; Fabio Martinelli
The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of - search groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security aspects. The "Int- national School on Foundations of Security Analysis and Design" (FOSAD, see http: //www.sti.uniurb.it/events/fosad/)has been one of the foremost events - tablishedwiththegoalofdisseminatingknowledgeinthiscriticalarea, especially for young researchers approaching the ?eld and graduate...
The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing numb...
cena: 181,38

 Trustworthy Global Computing: International Symposium, Tgc 2005, Edinburgh, Uk, April 7-9, 2005. Revised Selected Papers De Nicola, Rocco 9783540300076 Springer
Trustworthy Global Computing: International Symposium, Tgc 2005, Edinburgh, Uk, April 7-9, 2005. Revised Selected Papers

ISBN: 9783540300076 / Angielski / Miękka / 371 str.

ISBN: 9783540300076/Angielski/Miękka/371 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
De R. Nicola; Rocco De Nicola; Davide Sangiorgi
Constitutes the post-proceedings of the International Symposium on Trustworthy Global Computing. This book covers issues, such as resource usage, language-based security, theories of trust and authentication, privacy, reliability and business integrity access control and mechanisms for enforcing them, and more.
Constitutes the post-proceedings of the International Symposium on Trustworthy Global Computing. This book covers issues, such as resource usage, lang...
cena: 201,72

 Electronic Government: 5th International Conference, EGOV 2006, Krakow, Poland, September 4-8, 2006, Proceedings Wimmer, Maria A. 9783540376866 Springer
Electronic Government: 5th International Conference, EGOV 2006, Krakow, Poland, September 4-8, 2006, Proceedings

ISBN: 9783540376866 / Angielski / Miękka / 374 str.

ISBN: 9783540376866/Angielski/Miękka/374 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Maria A. Wimmer; Hans J. Scholl; Ake Gronlund

This book presents the refereed proceedings of the 5th International Conference on Electronic Government, EGOV 2006, held in in Krakow, Poland in conjunction with DEXA 2006. The book offers 31 revised papers depicting the state of the art in e-government/ e-governance, arranged in topical sections on research, review and outlook, participation and democracy, designing government services, legal dimensions in e-government, procurement and governance issues in networked governments, and more.


This book presents the refereed proceedings of the 5th International Conference on Electronic Government, EGOV 2006, held in in Krakow, Poland in c...

cena: 201,72

 Quantum Computing and Quantum Communications: First NASA International Conference, QCQC '98, Palm Springs, California, USA, February 17-20, 1998, Selected Papers Colin P. Williams 9783540655145 Springer-Verlag Berlin and Heidelberg GmbH &
Quantum Computing and Quantum Communications: First NASA International Conference, QCQC '98, Palm Springs, California, USA, February 17-20, 1998, Selected Papers

ISBN: 9783540655145 / Angielski / Miękka / 480 str.

ISBN: 9783540655145/Angielski/Miękka/480 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Colin P. Williams
This text constitutes the strictly refereed post-proceedings of the First NASA International Conference on Quantum Computing and Quantum Communications, QCQC'98, held in Palm Springs, California, USA in February 1998. As the record of the large-scale meeting entirely devoted to quantum computing and communication, this book is a survey of developments in the area. The 43 carefully reviewed papers are organized in topical sections on entanglement and quantum algorithms, quantum cryptography, quantum copying and quantum information theory, quantum error correction and fault-tolerant quantum...
This text constitutes the strictly refereed post-proceedings of the First NASA International Conference on Quantum Computing and Quantum Communication...
cena: 201,72

 Information Security and Cryptology - ICISC'99: Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings JooSeok Song 9783540673804 Springer-Verlag Berlin and Heidelberg GmbH &
Information Security and Cryptology - ICISC'99: Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings

ISBN: 9783540673804 / Angielski / Miękka / 284 str.

ISBN: 9783540673804/Angielski/Miękka/284 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
JooSeok Song
The 2nd International Conference on Information Security and Cryptology (ICISC)wassponsored bythe KoreaInstituteofInformationSecurityandCr- tology(KIISC). It took place at Korea University, Seoul, Korea, December 9-10, 1999. Jong In Lee of Korea University was responsible for the organization. The call for papers brought 61 papers from 10 countries on four continents. As in the last year the review process was totally blind. The informationabout - thors or their a?liationwas not given to Technical Program Committee (TPC) members. Each TPC member was random-coded and did not even know who...
The 2nd International Conference on Information Security and Cryptology (ICISC)wassponsored bythe KoreaInstituteofInformationSecurityandCr- tology(KII...
cena: 201,72

 Theory of Cryptography: 4th Theory of Cryptography Conference, Tcc 2007, Amsterdam, the Netherlands, February 21-24, 2007, Proceedings Vadhan, Salil P. 9783540709350 Springer
Theory of Cryptography: 4th Theory of Cryptography Conference, Tcc 2007, Amsterdam, the Netherlands, February 21-24, 2007, Proceedings

ISBN: 9783540709350 / Angielski / Miękka / 612 str.

ISBN: 9783540709350/Angielski/Miękka/612 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Salil P. Vadhan

This book constitutes the refereed proceedings of the 4th Theory of Cryptography Conference, TCC 2007, held in Amsterdam, The Netherlands in February 2007. The 31 revised full papers cover encryption, universally composable security, arguments and zero knowledge, notions of security, obfuscation, secret sharing and multiparty computation, signatures and watermarking, private approximation and black-box reductions, and key establishment.


This book constitutes the refereed proceedings of the 4th Theory of Cryptography Conference, TCC 2007, held in Amsterdam, The Netherlands in Februa...

cena: 403,47

 Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers Lee, Jae-Kwang 9783540710929 Springer
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers

ISBN: 9783540710929 / Angielski / Miękka / 428 str.

ISBN: 9783540710929/Angielski/Miękka/428 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jae-Kwang Lee; Okyeon Yi; Moti Yung

This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Island, Korea in August 2006. Coverage in the 30 revised full papers includes public key crypto applications and virus protection, cyber indication and intrusion detection, biometrics and security trust management, secure software and systems, smart cards and secure hardware, and mobile security.


This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Isla...

cena: 201,72

 Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6/WG 8.8/WG 11.2 International Workshop, Sauveron, Damien 9783540723530 Springer
Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6/WG 8.8/WG 11.2 International Workshop,

ISBN: 9783540723530 / Angielski / Miękka / 272 str.

ISBN: 9783540723530/Angielski/Miękka/272 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Damien Sauveron; Konstantinos Markantonakis; Angelos Bilas
With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous. Ensuring the security of these complex and yet resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers.Although there are a number of information security conferences that look at particular aspects of the challenge, we decided to create the Workshop in Information - curity Theory and Practices (WISTP) to consider the problem as a whole. In additiontheworkshopaimsto bringtogetherresearchersandpractitionersin-...
With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- ...
cena: 201,72

 Advances in Cryptology - EUROCRYPT 2007: 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, S Naor, Moni 9783540725398 Springer
Advances in Cryptology - EUROCRYPT 2007: 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, S

ISBN: 9783540725398 / Angielski / Miękka / 608 str.

ISBN: 9783540725398/Angielski/Miękka/608 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Moni Naor

This book constitutes the refereed proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2007, held in Barcelona, Spain in May 2007. The 33 revised full papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications.


This book constitutes the refereed proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic Techniqu...

cena: 201,72

 Transactions on Data Hiding and Multimedia Security II Yun Q. Shi 9783540730910 Springer
Transactions on Data Hiding and Multimedia Security II

ISBN: 9783540730910 / Angielski / Miękka / 136 str.

ISBN: 9783540730910/Angielski/Miękka/136 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Q. Shi

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of...

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various appl...

cena: 201,72

 Data and Applications Security XXI: 21st Annual Ifip Wg 11.3 Working Conference on Data and Applications Security, Redondo Beach, Ca, Usa, July 8-11, Barker, Steve 9783540735335 Springer
Data and Applications Security XXI: 21st Annual Ifip Wg 11.3 Working Conference on Data and Applications Security, Redondo Beach, Ca, Usa, July 8-11,

ISBN: 9783540735335 / Angielski / Miękka / 294 str.

ISBN: 9783540735335/Angielski/Miękka/294 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gail-Joon Ahn; Steve Barker
This volume contains the papers presented at the 21st Annual IFIP WG 11.3 Conference on Data and Applications Security (DBSEC) held July 8 11 in - dondo Beach, California, USA. The purpose of the DBSEC conference is to disseminate original research results and experience reports in data and app- cations security. In response to the call for papers, 44 submissions were received. Following a rigorousreviewingprocess,18high-qualitypaperswereacceptedforpresentation and publication. In addition, two short papers were selected for poster pres- tation. The conference program also included one...
This volume contains the papers presented at the 21st Annual IFIP WG 11.3 Conference on Data and Applications Security (DBSEC) held July 8 11 in - don...
cena: 201,72

 Information Hiding: 8th International Workshop, Ih 2006, Alexandria, Va, Usa, July 10-12, 2006, Revised Seleceted Papers Camenisch, Jan 9783540741237 Springer
Information Hiding: 8th International Workshop, Ih 2006, Alexandria, Va, Usa, July 10-12, 2006, Revised Seleceted Papers

ISBN: 9783540741237 / Angielski / Miękka / 402 str.

ISBN: 9783540741237/Angielski/Miękka/402 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Christian Collberg

This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, Virginia, in July 2006. Twenty-five carefully reviewed full papers are organized into topical sections covering watermarking, information hiding and networking, data hiding in unusual content, fundamentals, software protection, steganalysis, steganography, and subliminal channels.


This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, Virginia, in July...

cena: 201,72

 Secure Computer and Network Systems: Modeling, Analysis and Design Ye, Nong 9780470023242 John Wiley & Sons
Secure Computer and Network Systems: Modeling, Analysis and Design

ISBN: 9780470023242 / Angielski / Twarda / 354 str.

ISBN: 9780470023242/Angielski/Twarda/354 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nong Ye
Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of computer and network applications. Yet, our dependence on computer and network systems has also exposed us to new risks, which threaten the security of, and present new challenges for protecting our assets and information on computer and network systems. The reliability of computer and network systems ultimately depends on security and quality of service (QoS) performance.

This book presents quantitative modeling and...

Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by...
cena: 595,35

 Security and Software for Cybercafes Esharenana E. Adomi 9781599049038 Idea Group Reference
Security and Software for Cybercafes

ISBN: 9781599049038 / Angielski / Twarda / 360 str.

ISBN: 9781599049038/Angielski/Twarda/360 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Esharenana E. Adomi
Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are traveling, to access Web mail and instant messages, read newspapers, and explore other resources of the Internet. Due to the important role Internet cafes play in facilitating access to information, there is a need for their systems to have well-installed software in order to ensure smooth service delivery.
Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are...
cena: 922,53

 Privacy Enhancing Technologies Borisov, Nikita 9783540755500 Not Avail
Privacy Enhancing Technologies

ISBN: 9783540755500 / Angielski / Miękka / 290 str.

ISBN: 9783540755500/Angielski/Miękka/290 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Philippe Golle

This book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, PET 2007, held in conjunction with WOTE 2007, the IAVoSS Workshop on Trustworthy Elections. The papers cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems.


This book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, PET 2007, held...

cena: 201,72

 Error Control, Cryptology, and Speech Compression: Workshop on Information Protection, Moscow, Russia, December 6 - 9, 1993. Selected Papers Andrew Chmora, Stephen B. Wicker 9783540582656 Springer-Verlag Berlin and Heidelberg GmbH &
Error Control, Cryptology, and Speech Compression: Workshop on Information Protection, Moscow, Russia, December 6 - 9, 1993. Selected Papers

ISBN: 9783540582656 / Angielski / Miękka / 127 str.

ISBN: 9783540582656/Angielski/Miękka/127 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andrew Chmora;Stephen B. Wicker
This volume comprises a collection of papers presented at the Workshop on Information Protection, held in Moscow, Russia in December 1993. The 16 thoroughly refereed papers by internationally known scientists selected for this volume offer an exciting perspective on error control coding, cryptology, and speech compression. In the former Soviet Union, research related to information protection was often shielded from the international scientific community. Therefore, the results presented by Russian researchers and engineers at this first international workshop on this topic are of particular...
This volume comprises a collection of papers presented at the Workshop on Information Protection, held in Moscow, Russia in December 1993. The 16 thor...
cena: 201,72

 Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Turtorial Lectures Aldini, Alessandro 9783540748090 Springer
Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Turtorial Lectures

ISBN: 9783540748090 / Angielski / Miękka / 338 str.

ISBN: 9783540748090/Angielski/Miękka/338 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Roberto Gorrieri

The increasing relevance of security to real-life applications, such as electronic commerce, is attested by the fast-growing number of research groups, events, conferences, and summer schools that are studying it. This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International Schools on Foundations of Security Analysis and Design, FOSAD 2006/2007, held in Bertinoro, Italy, in September 2006 and September 2007.


The increasing relevance of security to real-life applications, such as electronic commerce, is attested by the fast-growing number of research gro...

cena: 201,72

Pierwsza Podprzednia  10  11  12  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia