Multimedia Communication Security: Recent Advances
ISBN: 9781604569254 / Angielski / Twarda / 246 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. .
.
|
|
cena:
508,27 zł |
Information Security - The Next Decade
ISBN: 9780412640209 / Angielski / Twarda / 625 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. These are the proceedings of the Eleventh International Information Security Conference which was held in Cape Town, South Africa, May 1995. This conference addressed the information security requirements of the next decade and papers were presented covering a wide range of subjects including current industry expectations and current research aspects. The evolutionary development of information security as a professional and research discipline was discussed along with security in open distributed systems and security in groupware.
These are the proceedings of the Eleventh International Information Security Conference which was held in Cape Town, South Africa, May 1995. This conf...
|
|
cena:
769,29 zł |
The Crypto Controversy: A Key Conflict in the Information Society
ISBN: 9789041111432 / Angielski / Twarda / 312 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography is essential for information security and electronic commerce, yet it can also be abused by criminals to thwart police wiretaps and computer searches. How should governments address this conflict of interests? Will they require people to deposit crypto keys with a trusted' agent? Will governments outlaw cryptography that does not provide for law-enforcement access? This is not yet another study of the crypto controversy to conclude that this or that interest is paramount. This is not a study commissioned by a government, nor is it a report that campaigns on the electronic...
Cryptography is essential for information security and electronic commerce, yet it can also be abused by criminals to thwart police wiretaps and compu...
|
|
cena:
1104,39 zł |
The Limits of Trust: Cryptography, Governments, & Electronic Commerce
ISBN: 9789041106353 / Angielski / Twarda / 621 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
2001,16 zł |
Database Security X: Status and Prospects
ISBN: 9780412808203 / Angielski / Twarda / 313 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The purpose of this book is to discuss, in depth, the current state of research and practice in database security, to enable readers to expand their knowledge. The book brings together contributions from experts in the field throughout the world. Database security is still a key topic in mist businesses and in the public sector, having implications for the whole of society.
The purpose of this book is to discuss, in depth, the current state of research and practice in database security, to enable readers to expand their k...
|
|
cena:
576,96 zł |
Communications and Multimedia Security II
ISBN: 9780412797804 / Angielski / Twarda / 318 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In multimedia and communication environments all documents must be protected against attacks. The movie Forrest Gump showed how multimedia documents can be manipulated. The required security can be achieved by a number of different security measures. This book provides an overview of the current research in Multimedia and Communication Security. A broad variety of subjects are addressed including: network security; attacks; cryptographic techniques; healthcare and telemedicine; security infrastructures; payment systems; access control; models and policies; auditing and firewalls. This volume...
In multimedia and communication environments all documents must be protected against attacks. The movie Forrest Gump showed how multimedia documents c...
|
|
cena:
576,96 zł |
Hacking Wall Street: Attacks And Countermeasures
ISBN: 9781441463630 / Angielski / Miękka / 404 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In this one of a kind book, the author exposes the who, what, why and how of today's professional hackers as they attempt and often succeed in stealing the identities of millions of consumers and swindle Wall Street's largest financial services firms out of millions of dollars. For the first time, look inside the world of the new generation cyber criminal with detailed descriptions of modern phishing toolkits, Trojans, pump and dump schemes and advanced malware distribution systems. Follow the author on a trip through the cyber criminal underground and understand how they find and attack a...
In this one of a kind book, the author exposes the who, what, why and how of today's professional hackers as they attempt and often succeed in stealin...
|
|
cena:
68,59 zł |
A Guide to Kernel Exploitation: Attacking the Core
ISBN: 9781597494861 / Angielski / Miękka / 442 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented categorically so that even when a specifically detailed vulnerability has been patched, the foundational information provided will help hackers in writing a newer, better attack; or help pen testers, auditors, and the like develop a more concrete design and defensive structure.
The book is... A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel...
|
|
cena:
203,61 zł |
Dynamic Police Training
ISBN: 9781439815878 / Angielski / Miękka / 182 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As police work has become increasingly professionalized, classrooms have become a preferred environment for training. However, the best preparation for police work has traditionally been conducted on the job. Dynamic Police Training partners the experienced law enforcement officer s "street-smart" perspective of what makes training work with a professional educator s "book-smart" approach to writing curriculum to achieve the best results in police training programs. A results-oriented handbook for police trainers seeking clear and definitive information on... As police work has become increasingly professionalized, classrooms have become a preferred environment for training. However, the best preparation... |
|
cena:
399,35 zł |
It Induction and Information Security Awareness
ISBN: 9781849280334 / Angielski / Miękka / 54 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A pocket guide that puts forward the case for an organisation-wide, and fully supported IT Induction and Information Security Awareness Programme. It intends to provide clarity of purpose, equate the programme to organisational roles and offer practical assistance in the development and delivery of an IT Induction programme.
A pocket guide that puts forward the case for an organisation-wide, and fully supported IT Induction and Information Security Awareness Programme. It ...
|
|
cena:
86,89 zł |
Computational Methods in Biometric Authentication: Statistical Methods for Performance Evaluation
ISBN: 9781849962018 / Angielski / Twarda / 317 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Biometrics, the science of using physical traits to identify individuals, is playing an increasing role in our security-conscious society and across the globe. Biometric authentication, or bioauthentication, systems are being used to secure everything from amusement parks to bank accounts to military installations. Yet developments in this field have not been matched by an equivalent improvement in the statistical methods for evaluating these systems. Compensating for this need, this unique text/reference provides a basic statistical methodology for practitioners and testers of...
Biometrics, the science of using physical traits to identify individuals, is playing an increasing role in our security-conscious society and across t...
|
|
cena:
576,96 zł |
Certification and Security in Health-Related Web Applications: Concepts and Solutions
ISBN: 9781616928957 / Angielski / Twarda / 354 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book aims to bridge the worlds of healthcare and information technology, increase the security awareness of professionals, students and users and highlight the recent advances in certification and security in health-related Web applications--Provided by publisher.
This book aims to bridge the worlds of healthcare and information technology, increase the security awareness of professionals, students and users and...
|
|
cena:
1419,89 zł |
Theory of Cryptography: 7th Theory of Cryptography Conference, Tcc 2010, Zurich, Switzerland, February 9-11, 2010, Proceedings
ISBN: 9783642117985 / Angielski / Miękka / 610 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. TCC2010, the7thTheoryofCryptographyConference, washeldatETHZurich, Zurich, Switzerland, during February 9-11, 2010. TCC 2010 was sponsored by theInternationalAssociationofCryptologicResearch(IACR)andwasorganized in cooperation with the Information Security and Cryptography group at ETH Zurich.The GeneralChairsof the conferencewereMartin Hirt andUeli Maurer. The conference received 100 submissions, of which the Program Committee selected 33 for presentation at the conference. The Best Student Paper Award was given to Kai-Min Chung and Feng-Hao Liu for their paper "ParallelRepe- tion Theorems...
TCC2010, the7thTheoryofCryptographyConference, washeldatETHZurich, Zurich, Switzerland, during February 9-11, 2010. TCC 2010 was sponsored by theInter...
|
|
cena:
384,63 zł |
Securing the Smart Grid: Next Generation Power Grid Security
ISBN: 9781597495707 / Angielski / Miękka / 290 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies. A smart grid is a modernized electric grid that uses information and communications technology to be able to process information, such as the behaviors of suppliers and consumers. The book discusses different infrastructures in a smart grid, such as the automatic metering infrastructure (AMI). It also discusses the controls that consumers, device manufacturers, and... Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats an... |
|
cena:
181,49 zł |
Information Security Risk Management for ISO 27001/Iso27002
ISBN: 9781849280433 / Angielski / Miękka / 198 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Expert guidance on planning and implementing a risk assessment and protecting your business information. In the knowledge economy, organisations have to be able to protect their information assets. Information security management has, therefore, become a critical corporate discipline. The international code of practice for an information security management system (ISMS) is ISO27002. As the code of practice explains, information security management enables organisations to ensure business continuity, minimise business risk, and maximise return on investments and business opportunities . ISMS...
Expert guidance on planning and implementing a risk assessment and protecting your business information. In the knowledge economy, organisations have ...
|
|
cena:
210,24 zł |
Progress in Cryptology--AFRICACRYPT 2010
ISBN: 9783642126772 / Angielski / Miękka / 436 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Africacrypt 2010, the Third International Conference on Cryptology in Africa, took place May 3-6, 2010 in Stellenbosch, South Africa. The General Chairs, Riaal Domingues from the South African Communications and Security Agency and Christine Swart from the University of Cape Town, were always a pleasure to work with and did an outstanding job with the local arrangements. We are deeplythankfulthat theyagreedto hostAfricacrypt2010with onlyfour months notice after unanticipated events forced a change of location. The Africacrypt 2010 submission deadline was split into two. Authors s- mitting...
Africacrypt 2010, the Third International Conference on Cryptology in Africa, took place May 3-6, 2010 in Stellenbosch, South Africa. The General Chai...
|
|
cena:
192,30 zł |
The Illusion of Due Diligence: Notes from the CISO Underground
ISBN: 9781451566031 / Angielski / Miękka / 214 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As a CISO, my job is to protect corporate information assets while ensuring security obligations are met for the business. My job is to ensure shareholders, investors, employees, our customers and their interests are protected. My job is to provide the appropriate level of security for data and data transactions in preventing, detecting and responding to breaches. Regulations have brought information security issues to the forefront expanding funding for technologies, staffing and training. More and more we see exposure of data and leakage of sensitive information. Do corporate boards and the...
As a CISO, my job is to protect corporate information assets while ensuring security obligations are met for the business. My job is to ensure shareho...
|
|
cena:
64,01 zł |
IP Address Management
ISBN: 9780470585870 / Angielski / Twarda / 448 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System). The consequence of inaccurately configuring DHCP is that end users may not be able to obtain IP addresses to access the network. Without proper DNS configuration, usability of the network will greatly suffer as the name-to-address lookup process may fail. Imagine having to navigate to a website or send...
This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management ...
|
|
cena:
633,09 zł |
Computer Security
ISBN: 9780470741153 / Angielski / Miękka / 464 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A completely up-to-date resource on computer security
Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of... A completely up-to-date resource on computer security
Assuming no previous experience in the field of computer security, this must-have book... |
|
cena:
294,57 zł |
Advances in Cryptology - EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques French Rivier
ISBN: 9783642131899 / Angielski / Miękka / 712 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. These are the proceedings of Eurocrypt 2010, the 29th in the series of Eu- pean conferences on the Theory and Application of Cryptographic Techniques. The conference was sponsored by the International Association for Cryptologic Research and held on the French Riviera, May 30 June 3, 2010. A total of 191 papers were received of which 188 were retained as valid submissions. These were each assigned to at least three Program Committee members and a total of 606 review reports were produced. The printed record of the reviews and extensive online discussions that followed would be almost as...
These are the proceedings of Eurocrypt 2010, the 29th in the series of Eu- pean conferences on the Theory and Application of Cryptographic Techniques....
|
|
cena:
192,30 zł |