Fuzzing for Software Security Testing and Quality Assurance
ISBN: 9781596932142 / Angielski / Twarda / 312 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Offering a powerful new tool to build secure, high-quality software, this resource helps developers think like a software cracker so they can find and patch flaws before harmful viruses, worms, and Trojans can rampage systems. Traditional software programmers and testers learn how to make fuzzing a standard practice.
Offering a powerful new tool to build secure, high-quality software, this resource helps developers think like a software cracker so they can find and...
|
|
cena:
316,68 zł |
Intelligence and Security Informatics: International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings
ISBN: 9783540333616 / Angielski / Miękka / 188 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications. The First and Second Symposiums on ISI were held in Tucson, Arizona, in 2003 and 2004, respectively. In 2005, the IEEE International Conference on ISI was held in Atlanta, Georgia. These ISI conferences brought together academic researchers, law enforcement and intelligence experts, information technology consultants and practitioners to discuss their research and practice...
Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and sy...
|
|
cena:
192,30 zł |
Advances in Cryptology -- Asiacrypt 2006: 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai
ISBN: 9783540494751 / Angielski / Miękka / 470 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security, held in Shanghai, China, December 2006. The 30 revised full papers cover attacks on hash functions, stream ciphers, biometrics and ECC computation, id-based schemes, public-key schemes, RSA and factorization, construction of hash function, protocols, block ciphers, and signatures. This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Sec... |
|
cena:
192,30 zł |
Information Security and Cryptology: Second Sklois Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings
ISBN: 9783540496083 / Angielski / Miękka / 308 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State Key Laboratory of Inf- mation Security of the Chinese Academy of Sciences. This international conf- ence was held in Beijing, China and was sponsored by the Institute of Software, the Chinese Academy of Sciences, the Graduate University of Chinese Academy of Sciences and the National Natural Science Foundations of China. The c- ference proceedings, with contributed papers, are published by Springer in this volume of Lecture Notes in Computer Science (LNCS). The...
The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State Key Laboratory of Inf- m...
|
|
cena:
192,30 zł |
Information Security Management Handbook, Volume 3
ISBN: 9781420090925 / Angielski / Twarda / 392 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A compilation of the fundamental knowledge, skills, techniques, and tools required by all security professionals, this text forms the basis on which all IT security programs and certifications are created. Considered the gold-standard reference of information security, the Handbook includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide. In step with the increasingly fast pace of change in the technology field, this book is revised annually, keeping IT professionals updated and current. Volume 3 adds a... A compilation of the fundamental knowledge, skills, techniques, and tools required by all security professionals, this text forms the basis on whic... |
|
cena:
726,18 zł |
Security for Web Services and Service-Oriented Architectures
ISBN: 9783540877417 / Angielski / Twarda / 226 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Web services technologies are advancing fast and being extensively deployed in many di?erent application environments. Web services based on the eXt- sible Markup Language (XML), the Simple Object Access Protocol (SOAP), andrelatedstandards, anddeployedinService-OrientedArchitectures(SOAs) are the key to Web-based interoperability for applications within and across organizations. Furthermore, they are making it possible to deploy appli- tions that can be directly used by people, and thus making the Web a rich and powerful social interaction medium. The term Web 2.0 has been coined to embrace...
Web services technologies are advancing fast and being extensively deployed in many di?erent application environments. Web services based on the eXt- ...
|
|
cena:
288,47 zł |
Handbook of Remote Biometrics: For Surveillance and Security
ISBN: 9781848823846 / Angielski / Twarda / 381 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The development of technologies for the identi?cation of individuals has driven the interest and curiosity of many people. Spearheaded and inspired by the Bertillon coding system for the classi?cation of humans based on physical measurements, scientists and engineers have been trying to invent new devices and classi?cation systems to capture the human identity from its body measurements. One of the main limitations of the precursors of today s biometrics, which is still present in the vast majority of the existing biometric systems, has been the need to keep the device in close contact with...
The development of technologies for the identi?cation of individuals has driven the interest and curiosity of many people. Spearheaded and inspired by...
|
|
cena:
576,96 zł |
Fast Software Encryption: 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers
ISBN: 9783540365976 / Angielski / Miękka / 434 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Fast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored for the last ?ve years by the International Association for Cryptologic Research (IACR), and previous FSE workshops have been held around the world: 1993 Cambridge, UK 1994 Leuven, Belgium 1996 Cambridge, UK 1997 Haifa, Israel 1998 Paris, France 1999 Rome, Italy 2000 New York, USA 2001 Yokohama, Japan 2002 Leuven, Belgium 2003 Lund, Sweden 2004 New Delhi, India 2005 Paris, France The FSE workshop is devoted to research on fast and secure primitives for symmetric...
Fast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored for the last ?ve years by th...
|
|
cena:
192,30 zł |
Information Security and Cryptology - Icisc 2006: 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings
ISBN: 9783540491125 / Angielski / Miękka / 362 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ICISC 2006, held in Busan, Korea in November/December 2006. The 26 revised full papers cover such topics as hash functions, block and stream ciphers, network security and access control, mobile communications security, forensics, copyright protection, biometrics, public key cryptosystems, and digital signatures. This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ICISC 2006, held in Busa... |
|
cena:
192,30 zł |
Cryptology and Network Security: 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings
ISBN: 9783540494621 / Angielski / Miękka / 384 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China, December 2006. The 26 revised full papers and 2 invited papers cover encryption, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, and disponibility and reliability. This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, C... |
|
cena:
192,30 zł |
Information and Communications Security: 8th International Conference, Icics 2006, Raleigh, Nc, Usa, December 4-7, 2006, Proceedings
ISBN: 9783540494966 / Angielski / Miękka / 562 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security (ICICS 2006), held in Raleigh, North Carolina, USA, December 4 7, 2006. The ICICS conference series is an established forum that brings together researchersand scholars involved in m- tiple disciplines of Information and Communications Security in order to foster exchangeof ideas. The past sevenICICS conferences wereheld in Beijing, China (ICICS 1997); Sydney, Australia (ICICS 1999); Xi an China (ICICS 2001); S- gapore (ICICS 2002); Hohhot City, China (ICICS 2003); Malaga,...
It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security (ICICS 2006), held in Raleig...
|
|
cena:
384,63 zł |
Progress in Cryptology - Indocrypt 2006: 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings
ISBN: 9783540497677 / Angielski / Miękka / 458 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, held in Kolkata, India in December 2006. The 29 revised full papers and 2 invited papers cover such topics as symmetric cryptography, provable security, fast implementation of public key cryptography, id-based cryptography, as well as embedded systems and side channel attacks. This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, held in Kolkata, India i... |
|
cena:
192,30 zł |
Progress in Cryptology - Vietcrypt 2006: First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selec
ISBN: 9783540687993 / Angielski / Miękka / 388 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Cryptology in Vietnam, VIETCRYPT 2006, held in Hanoi, Vietnam, September 2006. The 25 papers cover signatures and lightweight cryptography, pairing-based cryptography, algorithmic number theory, ring signatures and group signatures, hash functions, cryptanalysis, key agreement and threshold cryptography, as well as public-key encryption. This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Cryptology in Vietnam, VIETCRYPT 2006, held... |
|
cena:
192,30 zł |
Topics in Cryptology – CT-RSA 2007: The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings
ISBN: 9783540693277 / Angielski / Miękka / 403 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The RSA Conference, with over 15,000 attendees and 300 exhibitors, is the largest computer security event of the year. The Cryptographers Track (CT- RSA) is a research conference within the RSA Conference. Starting in 2001, CT-RSA continues to its seventh year and is now regarded as one of the major regularly staged event for presenting the results of cryptographic research to a wide variety of audiences. The proceedings of CT-RSA 2007 contain 25 papers selected from 73 s- missions which cover all the topics of cryptography. All the submissions were reviewed by at least three reviewers, which...
The RSA Conference, with over 15,000 attendees and 300 exhibitors, is the largest computer security event of the year. The Cryptographers Track (CT- R...
|
|
cena:
192,30 zł |
Secure Semantic Service-Oriented Systems
ISBN: 9781420073317 / Angielski / Twarda / 463 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving threats, an up-to-date understanding of the mechanisms for securing semantic Web technologies is essential. Reviewing cutting-edge developments, Secure Semantic Service-Oriented Systems focuses on confidentiality, privacy, trust, and integrity management for Web services. It demonstrates the breadth and depth of applications of these... As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applicatio... |
|
cena:
700,25 zł |
Cryptanalysis of RSA and Its Variants
ISBN: 9781420075182 / Angielski / Twarda / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known mathematical attacks on RSA and its main variants, including CRT-RSA, multi-prime RSA, and multi-power RSA. Divided into three parts, the book first introduces RSA and reviews the mathematical background needed for the majority of attacks described in the remainder of the... Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outd... |
|
cena:
544,64 zł |
Cisco ASA Configuration
ISBN: 9780071622691 / Angielski / Miękka / 752 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "Richard Deal's gift of making difficult technology concepts understandable has remained constant. Whether it is presenting to a room of information technology professionals or writing books, Richard's communication skills are unsurpassed. As information technology professionals we are faced with overcoming challenges every day...Cisco ASA Configuration is a great reference and tool for answering our challenges." --From the Foreword by Steve Marcinek (CCIE 7225), Systems Engineer, Cisco Systems A hands-on guide to implementing Cisco ASA Configure and... "Richard Deal's gift of making difficult technology concepts understandable has remained constant. Whether it is presenting to a room of informatio... |
|
cena:
352,96 zł |
Collaborative Computer Security and Trust Management
ISBN: 9781605664149 / Angielski / Twarda / 316 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As the Internet grows and connects the world in new ways, computer security must become global and collaborative to understand and react to harmful security threats. Collaborative Computer Security and Trust Management combines perspectives of leading researchers in collaborative security to discuss recent advances in this burgeoning new field. Practitioners, researchers, and academicians are presented with lessons learned by international experts to meet the new challenges of security in the global information age. Covering topics such as trust-based security, threat and risk analysis, and...
As the Internet grows and connects the world in new ways, computer security must become global and collaborative to understand and react to harmful se...
|
|
cena:
1043,19 zł |
Handbook of Research on Secure Multimedia Distribution
ISBN: 9781605662626 / Angielski / Twarda / 616 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. New technologies and concepts are constantly being developed within multimedia distribution. In such an ever-evolving environment, academicians, researchers, and professionals of this discipline need access to the most current information about the concepts, issues, trends, and technologies in this emerging field. The Handbook of Research on Secure Multimedia Distribution provides the latest research on secure multimedia content distribution, embracing a wide variety of aspects and providing a scientifically and scholarly sound treatment of state-of-the-art techniques to students,...
New technologies and concepts are constantly being developed within multimedia distribution. In such an ever-evolving environment, academicians, resea...
|
|
cena:
1535,80 zł |
Adaptive Security Management Architecture
ISBN: 9780849370526 / Angielski / Twarda / 482 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. For an organization to function effectively, its security controls must not be so restrictive that the business is denied the ability to be innovative and flexible. But increasingly pervasive threats mandate vigilance in unlikely areas. Adaptive Security Management Architecture enables security professionals to structure the best program designed to meet the complex needs of an entire organization, taking into account the organization s business goals as well as the surrounding controls, processes, and units already in existence. Security aligned with... For an organization to function effectively, its security controls must not be so restrictive that the business is denied the ability to be innovat... |
|
cena:
622,44 zł |