Cryptography: Policy and Algorithms: International Conference Brisbane, Queensland, Australia, July 3-5, 1995. Proceedings
ISBN: 9783540607595 / Angielski / Miękka / 336 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Australia in July 1995.
Over the past few years, issues relating to cryptography policy have made headline news, particularly those concerned with the rights to privacy of the individual, who may choose to use cryptographic systems to maintain confidentiality, against the needs of legal authorities to conduct wiretapping to help combat crime. The 27 revised full contributions in this volume are devoted to both crypto policy matters and the... This book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Au...
|
|
cena:
191,40 zł |
Computer Security - ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjovik, Norway, October 13-15, 2003, Proceedings
ISBN: 9783540203001 / Angielski / Miękka / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ESORICS, the European Symposium On Research In Computer Security, is the leading research-oriented conference on the theory and practice of computer - curity in Europe. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together - searchersinthisarea, bypromotingtheexchangeofideaswithsystemdevelopers and by encouraging links with researchers in related areas. ESORICS is coordinated by an independent steering committee. In the past it took place every two years at various locations throughout Europe. Starting this year,...
ESORICS, the European Symposium On Research In Computer Security, is the leading research-oriented conference on the theory and practice of computer -...
|
|
cena:
191,40 zł |
Information Security and Cryptology - ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers
ISBN: 9783540213765 / Angielski / Miękka / 464 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003. The 32 revised full papers presented together with an invited paper were carefully selected from 163 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, primitives, fast implementations, computer security and mobile security, voting and auction protocols, watermarking, authentication and threshold protocols, and... This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 20... |
|
cena:
191,40 zł |
Information Security and Privacy: 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings
ISBN: 9783540405153 / Angielski / Miękka / 540 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This book constitutes the refereed proceedings of the 8th Australasian Conference on Information Security and Privacy, ACISP 2003, held in Wollongong, Australia, in July 2003. The 42 revised full papers presented together with 3 invited contributions were carefully reviewed and selected from 158 submissions. The papers are organized in topical sections on privacy and anonymity, elliptic curve cryptography, cryptanalysis, mobile and network security, digital signatures, cryptosystems, key management, and theory and hash functions.
This book constitutes the refereed proceedings of the 8th Australasian Conference on Information Security and Privacy, ACISP 2003, held in... |
|
cena:
191,40 zł |
Cryptography and Lattices: International Conference, CaLC 2001, Providence, RI, USA, March 29-30, 2001. Revised Papers
ISBN: 9783540424888 / Angielski / Miękka / 224 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This title constitutes the thoroughly refereed post-proceedings of the International Conference on Cryptography and Lattices, CaLC 2001, held in Providence, RI, USA in March 2001. The 14 revised full papers presented together with an overview paper were carefully reviewed and selected for inclusion in the book. All aspects of lattices and lattice reduction in cryptography, both for cryptographic construction and cryptographic analysis, are addressed.
This title constitutes the thoroughly refereed post-proceedings of the International Conference on Cryptography and Lattices, CaLC 2001, held in Provi...
|
|
cena:
191,40 zł |
Information Security: 4th International Conference, ISC 2001 Malaga, Spain, October 1-3, 2001 Proceedings
ISBN: 9783540426622 / Angielski / Miękka / 562 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Information Security Conference 2001 brought together individuals involved in multiple disciplines of information security to foster the exchange of ideas. The conference, an outgrowth of the Information Security Workshop (ISW) series, was held in Malaga, Spain, on October 1-3, 2001. Previous workshops were ISW '97 at Ishikawa, Japan; ISW '99 at Kuala Lumpur, Malaysia; and ISW 2000 at Wollongong, Australia. The General Co chairs, Javier Lopez and Eiji Okamoto, oversaw the local organization, registration, and performed many other tasks. Many individuals deserve thanks for their...
The Information Security Conference 2001 brought together individuals involved in multiple disciplines of information security to foster the exchange ...
|
|
cena:
191,40 zł |
Financial Cryptography: 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000 Proceedings
ISBN: 9783540427001 / Angielski / Miękka / 384 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Financial Cryptography 2000 marked the fourth time the technical, business, legal, and political communities from around the world joined together on the smallislandofAnguilla, BritishWestIndiestodiscussanddiscovernewadvances in securing electronic ?nancial transactions. The conference, sponsored by the International Financial Cryptography Association, was held on February 20 24, 2000. The General Chair, Don Beaver, oversaw the local organization and registration. The program committee considered 68 submissions of which 21 papers were accepted. Each submitted paper was reviewed by a minimum...
Financial Cryptography 2000 marked the fourth time the technical, business, legal, and political communities from around the world joined together on ...
|
|
cena:
191,40 zł |
Integrity Primitives for Secure Information Systems: Final RIPE Report of RACE Integrity Primitives Evaluation
ISBN: 9783540606406 / Angielski / Miękka / 251 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This manual documents the outcome of the EC sponsored project RACE Integrity Primitives Evaluation (R1040), RIPE. This project is a huge joint 350 man-month project conducted by 16 leading European security experts.
This book offers expert advice to professionals seeking to secure information systems by applying up-to-date cryptographic techniques. The core of this volume is a detailed integrity primitives portfolio recommendation. Among the issues addressed are security services, integrity mechanisms, data origin authentication, entity authentication, access control, data integrity,... This manual documents the outcome of the EC sponsored project RACE Integrity Primitives Evaluation (R1040), RIPE. This project is a huge joint 350 man...
|
|
cena:
191,40 zł |
Fast Software Encryption: 6th International Workshop, FSE'99 Rome, Italy, March 24-26, 1999 Proceedings
ISBN: 9783540662266 / Angielski / Miękka / 324 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the refereed post-workshop proceedings of the 6th International Workshop on Fast Software Encryption (FSE'99), held in Rome, Italy, in March 1999. The 22 revised full papers presented were carefully selected from a total of 51 submissions during two rounds of reviewing and revision. The book is divided into sections on advanced encryption standard (AES), remotely keyed encryptions, analysis of block ciphers, miscellaneous, modes of operation and stream ciphers.
This volume constitutes the refereed post-workshop proceedings of the 6th International Workshop on Fast Software Encryption (FSE'99), held in Rome, I...
|
|
cena:
191,40 zł |
Beautiful Security: Leading Security Experts Explain How They Think
ISBN: 9780596527488 / Angielski / Miękka / 302 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by exercising enormous creativity, and those defending against them must do the same.
Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology dem... |
|
cena:
206,37 zł |
Computer Safety, Reliability and Security: 20th International Conference, SAFECOMP 2001, Budapest, Hungary, September 26-28, 2001 Proceedings
ISBN: 9783540426073 / Angielski / Miękka / 256 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This year we celebrated another anniversary: after 20 years of SAFECOMP in 1999, th this was the 20 SAFECOMP since its inauguration in 1979. This series of events focuses on critical computer applications. It is intended to be a platform for knowledge transfer between academia, industry, and research institutions. Papers are solicited on all aspects of computer systems in which safety, reliability, and security (applied to safety in terms of integrity and availability) are of importance. The 20th SAFECOMP tried to cover new grounds, both thematically and geographically. The previous 19...
This year we celebrated another anniversary: after 20 years of SAFECOMP in 1999, th this was the 20 SAFECOMP since its inauguration in 1979. This seri...
|
|
cena:
191,40 zł |
Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings
ISBN: 9783540205920 / Angielski / Miękka / 550 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2003, held in Taipei, Taiwan in November/December 2003.The 32 revised full papers presented together with one invited paper were carefully reviewed and selected from 188 submissions. The papers are organized in topical sections on public key cryptography, number theory, efficient implementations, key management and protocols, hash functions, group signatures, block cyphers, broadcast and multicast, foundations and complexity theory,...
This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Securit...
|
|
cena:
191,40 zł |
Computer Security - ESORICS 2004: 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings
ISBN: 9783540229872 / Angielski / Miękka / 457 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ForewordfromtheProgramChairs These proceedings contain the papers selected for presentation at the 9th - ropean Symposium on Research in Computer Security (ESORICS), held during September 13 15, 2004 in Sophia Antipolis, France. In response to the call for papers 159 papers were submitted to the conference. These papers were evaluated on the basis of their signi?cance, novelty, and te- nicalquality. Eachpaper wasreviewedby at leastthree members of the program committee. The program committee meeting was held electronically; there was an intensive discussion over a period of two weeks. Of the...
ForewordfromtheProgramChairs These proceedings contain the papers selected for presentation at the 9th - ropean Symposium on Research in Computer Secu...
|
|
cena:
191,40 zł |
Watermarking in Audio: Key Techniques and Technologies
ISBN: 9781604975017 / Angielski / Twarda / 208 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
631,16 zł |
Information Security and Cryptology: ICISC 2007
ISBN: 9783540767879 / Angielski / Miękka / 388 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ICISC 2007, held in Seoul, Korea, November 29-30, 2007. The papers are organized in topical sections on cryptoanalysis, access control, system security, biometrics, cryptographic protocols, hash functions, block and stream ciphers, copyright protection, smart/java cards, elliptic curve cryptosystems as well as authentication and authorization. This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ICISC 2007, held in Seo... |
|
cena:
191,40 zł |
Finite Automata and Application to Cryptography
ISBN: 9783540782568 / Angielski / Twarda / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Finite Automata and Application to Cryptography mainly deals with the invertibility theory of finite automata and its application to cryptography. In addition, autonomous finite automata and Latin arrays, which are relative to the canonical form for one-key cryptosystems based on finite automata, are also discussed. Finite automata are regarded as a natural model for ciphers. The Ra Rb transformation method is introduced to deal with the structure problem of such automata; then public key cryptosystems based on finite automata and a canonical form for one-key ciphers... Finite Automata and Application to Cryptography mainly deals with the invertibility theory of finite automata and its application to crypt... |
|
cena:
574,29 zł |
Network Security: Know It All
ISBN: 9780123744630 / Angielski / Twarda / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security. Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the field's leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources. * Chapters contributed by recognized...
Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the fi...
|
|
cena:
311,17 zł |
The It Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments
ISBN: 9781597492669 / Angielski / Miękka / 715 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This "roadmap" provides a way of interpreting complex, often confusing, compliance requirements within the larger scope of an organization's overall needs.
The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to...
|
|
cena:
274,86 zł |
Malware Forensics: Investigating and Analyzing Malicious Code
ISBN: 9781597492683 / Angielski / Miękka / 674 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Written by authors who have investigated and prosecuted federal malware cases, this book deals with the emerging and evolving field of live forensics, where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss live forensics on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence... Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Writte... |
|
cena:
285,23 zł |
It Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement
ISBN: 9781420086171 / Angielski / Twarda / 305 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practices, focused auditing activities, a functioning system of internal control, and a close watch by the board s audit committee and CEO. Written as a contribution to the accounting and auditing professions as well as to IT practitioners, IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement links these two key business strategies and explains how to perform IT auditing in a comprehensive and strategic... Information technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practi... |
|
cena:
622,44 zł |