Coastal Lagoons: Critical Habitats of Environmental Change
ISBN: 9781420088304 / Angielski / Twarda / 568 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Dynamic and productive ecosystems, coastal lagoons play an important role in local economies and often bear the brunt of coastal development, agricultural, and urban waste, overuse from fisheries, aquaculture, transportation, energy production, and other human activities. The features that make coastal lagoons vital ecosystems underline the importance of sound management strategies for long-term environmental and resource sustainability. Written by an internationally renowned group of contributors, Coastal Lagoons: Critical Habitats of Environmental Change examines the... Dynamic and productive ecosystems, coastal lagoons play an important role in local economies and often bear the brunt of coastal development, agric... |
|
cena:
1011,47 zł |
advances in cryptology 1981 - 1997: electronic proceedings and index of the crypto and eurocrypt conference, 1981 - 1997
ISBN: 9783540650690 / Angielski / Miękka / 464 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. AboutCryptology It is nowwidelyperceivedthatweareexperiencinganinformationrevolution whose e?ects will ultimately be as pervasive and profound as was brought by the industrial revolution of the last century. From the beginning of time, information has been an important asset for humans. In the early days of humanexistence, themereknowledgeofwheretomosteasilygatherfoodwas the di?erence between life and death. Throughout history, information has provided the means for winning wars, making fortunes, and shaping history. The underlying theme of the information revolution is that we continue to...
AboutCryptology It is nowwidelyperceivedthatweareexperiencinganinformationrevolution whose e?ects will ultimately be as pervasive and profound as was ...
|
|
cena:
403,70 zł |
Securing Citrix Xenapp Server in the Enterprise
ISBN: 9781597492812 / Angielski / Miękka / 739 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it's running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious...
Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and ...
|
|
cena:
241,20 zł |
Next Generation Ssh2 Implementation: Securing Data in Motion
ISBN: 9781597492836 / Angielski / Miękka / 336 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new...
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal informat...
|
|
cena:
181,49 zł |
Easy Hacking: Simple Steps for Learning How to Hack
ISBN: 9781517159832 / Angielski / Miękka / 88 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the book EASY HACKING, you are going to learn everything which is needed in order to understand and implement hacking. It will provide you a complete description of hacking. You'll learn about the prerequisites for hacking, the various types of hackers involved, tools required in hacking and different types of techniques which are used for hacking attacks such as: Hacking a Facebook account Hacking a website Denial of Service Hacking wireless networks Hacking Windows XP Hacking a Web server Hacking a Gmail account through phishing Hacking a Linux system"
With the book EASY HACKING, you are going to learn everything which is needed in order to understand and implement hacking. It will provide you a comp...
|
|
cena:
54,86 zł |
Security and Privacy in Internet of Things (Iots): Models, Algorithms, and Implementations
ISBN: 9781498723183 / Angielski / Twarda / 584 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and... The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of h... |
|
cena:
518,65 zł |
Embedded Cryptographic Hardware: Methodologies & Architectures
ISBN: 9781594540127 / Angielski / Twarda / 295 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Modern cryptology, which is the basis of information security techniques, started in the late 70's and developed in the 80's. As communication networks were spreading deep into society, the need for secure communication greatly promoted cryptographic research. The need for fast but secure cryptographic systems is growing bigger. Therefore, dedicated systems for cryptography are becoming a key issue for designers. With the spread of reconfigurable hardware such as FPGAs, hardware implementations of cryptographic algorithms become cost-effective. The focus of this book is on all aspects of...
Modern cryptology, which is the basis of information security techniques, started in the late 70's and developed in the 80's. As communication network...
|
|
cena:
897,30 zł |
New Trends in Cryptographic Systems
ISBN: 9781594549779 / Angielski / Twarda / 135 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography is the study of methods to transform information from its original comprehensible form into a scrambled incomprehensible form, such that its content can only be disclosed to some qualified persons. This book includes content that is focused on
Cryptography is the study of methods to transform information from its original comprehensible form into a scrambled incomprehensible form, such that ...
|
|
cena:
1198,14 zł |
Security in the Private Cloud
ISBN: 9781482259551 / Angielski / Twarda / 381 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This comprehensive handbook serves as a professional reference and practitioner s guide to today s most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to determine whether the private cloud security solution is appropriate for their organization from a business and technical perspective, to select the appropriate cloud security model, and to plan and implement a cloud security adoption and migration strategy. "This comprehensive handbook serves as a professional reference and practitioner s guide to today s most complete and concise view of private cloud ... |
|
cena:
674,31 zł |
Information Assurance Architecture
ISBN: 9780849380679 / Angielski / Twarda / 620 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Examining the importance of aligning computer security (information assurance) with the goals of an organization, this book gives security personnel direction as to how systems should be designed, the process for doing so, and a methodology to follow.
Examining the importance of aligning computer security (information assurance) with the goals of an organization, this book gives security personnel d...
|
|
cena:
622,44 zł |
Information Security Applications: 8th International Workshop, WISA 2007 Jeju Island, Korea, August 27-29, 2007 Revised Selected Papers
ISBN: 9783540775348 / Angielski / Miękka / 406 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 8th International Workshop on Information Security Applications (WISA 2007) was held on Jeju Island, Korea during August 27 29, 2007. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). WISAaimsatprovidingaforumforprofessionalsfromacademiaandindustry to present their work and to exchange ideas. The workshop covers all technical aspects of security applications, including cryptographic and non-cryptographic techniques. We...
The 8th International Workshop on Information Security Applications (WISA 2007) was held on Jeju Island, Korea during August 27 29, 2007. The workshop...
|
|
cena:
192,30 zł |
E-Voting and Identity: First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers
ISBN: 9783540774921 / Angielski / Miękka / 208 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Voting and identity have a very delicate relationship. Only a few processes - pendsomuchonanidentitymanagementrespectingthe?nelinebetweenreliable identi?cation and reliable non-identi?ability each at its part during the process. And only a few processes may change their outer appearance so much with the advent of new IT as voting and identity management do. So it was no surprise in FIDIS, the interdisciplinary Network of Excellence working on the Future of Identity in the Information Society, when Ammar Alkassarproposedanalyzethetechnical, socio-ethicalandlegalrelationsbetween Identity and...
Voting and identity have a very delicate relationship. Only a few processes - pendsomuchonanidentitymanagementrespectingthe?nelinebetweenreliable iden...
|
|
cena:
192,30 zł |
Cyberwarfare: Terror at a Click
ISBN: 9781560729969 / Angielski / Miękka / 81 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
160,74 zł |
Cryptography Research Perspectives
ISBN: 9781604564921 / Angielski / Twarda / 257 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography is a branch of both mathematics and computer science, and is affiliated closely with information theory, computer security, and engineering. Cryptography is used in applications present in technologically advanced societies; examples include t
Cryptography is a branch of both mathematics and computer science, and is affiliated closely with information theory, computer security, and engineeri...
|
|
cena:
943,98 zł |
Policies and Research in Identity Management: First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Era
ISBN: 9780387779959 / Angielski / Twarda / 160 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification and access control is growing, not only in companies and organisations but also in the world at large. At the same time, such security measures have to be balanced with means for protecting the privacy of users. Identity management is put under pressure, due to the growing number of frauds who want to hide their true identity. This challenges the information security research community...
st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase ...
|
|
cena:
192,30 zł |
Wireless Security: Know It All
ISBN: 9781856175296 / Angielski / Miękka / 726 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf Communications engineers need to master a wide area of topics to excel. The Wireless Security Know It All covers every angle including Emerging Wireless Technologies and Security Issues, Wireless LAN and MAN Security, as well as Wireless Personal Area Networks. - A 360-degree view from our best-selling authors
-... The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first ...
|
|
cena:
295,61 zł |
Hardware-Based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
ISBN: 9780470193396 / Angielski / Twarda / 256 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format.
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the...
|
|
cena:
605,79 zł |
Guide to Biometric Reference Systems and Performance Evaluation
ISBN: 9781848002913 / Angielski / Twarda / 382 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the pioneering studies of Galton and Henry on ?ngerprint-based human id- ti?cation over a hundred years ago, biometrics recognition is now permeating many sectors of our society. Even though the origins and the most frequent use of b- metrics, primarily ?ngerprints, have been in forensics and law enforcement app- cations, biometric recognition is now needed to address a number of societal pr- lems related to security risks, terror threats and ?nancial fraud. In some situations, for example, detecting duplicate enrolments (for issuing of?cial documents such as passports and driver...
With the pioneering studies of Galton and Henry on ?ngerprint-based human id- ti?cation over a hundred years ago, biometrics recognition is now permea...
|
|
cena:
384,63 zł |
Geospatial Information Technology for Emergency Response
ISBN: 9780415422475 / Angielski / Twarda / 381 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. When disaster occurs, the response phrase is viewed as the most critical in terms of saving lives and protecting property. This book aims to share technological advances that allow wider, faster and better utilization of geospatial information in emergency response situations. When disaster occurs, the response phrase is viewed as the most critical in terms of saving lives and protecting property. This book aims to share ... |
|
cena:
1244,88 zł |
Securing Computer Networks: Anaysis Design and Implementation
ISBN: 9780849318689 / Angielski / Twarda / 392 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This updated guide presents expert information on analyzing, designing, and implementing all aspects of computer network security. Based on the authors' earlier work, Computer System and Network Security, this new book addresses important concerns regarding network security. It contains new chapters on World Wide Web security issues, secure electronic commerce, incident response, as well as two new appendices on PGP and UNIX security fundamentals.
This updated guide presents expert information on analyzing, designing, and implementing all aspects of computer network security. Based on the author...
|
|
cena:
197,05 zł |