Fast Software Encryption: 17th International Workshop, Fse 2010, Seoul, Korea, February 7-10, 2010 Revised Selected Papers
ISBN: 9783642138577 / Angielski / Miękka / 385 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Fast Software Encryption (FSE) 2010, the 17th in a series of workshopson s- metriccryptography, washeldinSeoul, Korea, duringFebruary7 10,2010.Since 2002, theFSE workshophasbeensponsoredbythe InternationalAssociationfor Cryptologic Research (IACR). The ?rst FSE workshop was held in Cambridge, UK (1993), followed by workshops in Leuven, Belgium (1994), Cambridge, UK (1996), Haifa, Israel(1997), Paris, France(1998), Rome, Italy(1999), NewYork, USA (2000), Yokohama, Japan (2001), Leuven, Belgium (2002), Lund, Sweden (2003), New Delhi, India (2004), Paris, France (2005), Graz, Austria (2006),...
Fast Software Encryption (FSE) 2010, the 17th in a series of workshopson s- metriccryptography, washeldinSeoul, Korea, duringFebruary7 10,2010.Since 2...
|
|
cena:
192,30 zł |
Digital Forensics and Cyber Crime: 4th International Conference, Icdf2c 2012, Lafayette, In, Usa, October 25-26, 2012, Revised Selected Papers
ISBN: 9783642398902 / Angielski / Miękka / 329 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book contains a selection of thoroughly refereed and revised papers from the Fourth International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2012, held in October 2012 in Lafayette, Indiana, USA. The 20 papers in this volume are grouped in the following topical sections: cloud investigation; malware; behavioral; law; mobile device forensics; and cybercrime investigations.
This book contains a selection of thoroughly refereed and revised papers from the Fourth International ICST Conference on Digital Forensics and Cyber ...
|
|
cena:
192,30 zł |
Security in Computing and Communications: International Symposium, Sscc 2013, Mysore, India, August 22-24, 2013. Proceedings
ISBN: 9783642405754 / Angielski / Miękka / 404 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in Mysore, India, in August 2013. The 24 revised full papers presented together with 15 poster papers were carefully reviewed and selected from 111 submissions. The papers cover all aspects of secure computing and communication in networking and distributed systems such as cloud-based data centers.
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in Mysore, ...
|
|
cena:
192,30 zł |
ISSE 2013 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2013 Conference
ISBN: 9783658033705 / Angielski / Miękka / 282 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents the most interesting talks given at ISSE 2013 the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The topics include: - Cloud Security, Trust Services, eId & Access Management - Human Factors, Awareness & Privacy, Regulations and Policies - Security Management - Cyber Security, Cybercrime, Critical Infrastructures - Mobile Security & Applications Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective... This book presents the most interesting talks given at ISSE 2013 the forum for the inter-disciplinary discussion of how to adequately secure electr... |
|
cena:
192,30 zł |
Information Theoretic Security: 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009, Revised Selected Papers
ISBN: 9783642144950 / Angielski / Miękka / 249 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ICITS2009washeldattheShizuokaConventionandArtsCenter"GRANSHIP" in Japan during December 3-6,2009.This was the 4th International Conference on Information Theoretic Security. Over the last few decades, we have seen several research topics studied - quiringinformationtheoreticalsecurity, alsocalledunconditionalsecurity, where there is no unproven computational assumption on the adversary. (This is the framework proposed by Claude Shannon in his seminal paper.) Also, coding as well as other aspects of information theory have been used in the design of cryptographic schemes. Examples are...
ICITS2009washeldattheShizuokaConventionandArtsCenter"GRANSHIP" in Japan during December 3-6,2009.This was the 4th International Conference on Informat...
|
|
cena:
192,30 zł |
Advances in Cryptology -- Crypto 2010: 30th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 15-19, 2010, Proceedings
ISBN: 9783642146220 / Angielski / Miękka / 741 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. CRYPTO2010, the30thAnnualInternationalCryptologyConference, wassp- sored by the International Association for Cryptologic Research (IACR) in - operation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of C- ifornia at Santa Barbara. The conference was held in Santa Barbara, Calif- nia, during August 15-19, 2010, in conjunction with CHES 2010 (Workshop on Cryptographic Hardware and Embedded Systems). Zul?kar Ramzan served as the General Chair. The conference received 203 submissions. The quality of the submissions...
CRYPTO2010, the30thAnnualInternationalCryptologyConference, wassp- sored by the International Association for Cryptologic Research (IACR) in - operati...
|
|
cena:
192,30 zł |
Foundations of Security Analysis and Design II: Fosad 2001/2002 Tutorial Lectures
ISBN: 9783540209553 / Angielski / Miękka / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security is a rapidly growing area of computer science, with direct and increasing relevance to real-life applications, such as Internet transactions, e-commerce, information protection, network and systems security, etc. Foundations for the analysis and design of security features of such applications are badly needed in order to validate and prove their correctness. This book presents thoroughly revised versions of six tutorial lectures given by leading researchers during two International Schools on Foundations of Security Analysis and Design, FOSAD 2001/2002, held in Bertinoro,... Security is a rapidly growing area of computer science, with direct and increasing relevance to real-life applications, such as Internet transactio... |
|
cena:
192,30 zł |
Topics in Cryptology - Ct-Rsa 2010: The 10th Cryptographers' Track at the Rsa Conference 2010, San Francisco, Ca, Usa, March 1-5, 2010. Proceedings
ISBN: 9783642119248 / Angielski / Miękka / 397 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The RSA Conference is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the conf- ence has included an academic Cryptographers'Track (CT-RSA). This year was the 10th anniversary of CT-RSA. Since its conception, the CT-RSA conference has become a major avenue for publishing high-quality research papers. The RSA conference was held in San Francisco, California, during March 1-5, 2010. This year we received94 submissions. Eachpaper gotassignedto three ref- ees. Papers submitted by the members of the Program Committee got...
The RSA Conference is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the conf...
|
|
cena:
192,30 zł |
Smart Grid Security: An End-To-End View of Security in the New Electrical Grid
ISBN: 9781439855874 / Angielski / Twarda / 328 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is a vital concern not only for cyber-security practitioners, engineers, policy makers, and utility executives, but also for the media and consumers. Smart Grid Security: An End-to-End View of Security in the New Electrical Grid explores the important techniques, challenges, and forces that will shape how we achieve a secure twenty-first century electric grid.
The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is a vital concern not only for...
|
|
cena:
700,25 zł |
Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems
ISBN: 9781849962377 / Angielski / Twarda / 198 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As depicted in David Lodge's celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth's population. Yet, the really dramatic shrinking had to wait until the mid-1990s, when Internet became widespread and the information age stopped being an empty buzzword. But small is not necessarily beautiful. We now live in a global village and, alas, some (often very powerful) voices state that we ought not expect any more privacy in it. Should this be true, we would have created our own...
As depicted in David Lodge's celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became ...
|
|
cena:
576,96 zł |
Information Security and Privacy: 15th Australasian Conference, Acisp 2010, Sydney, Australia, July 5-7, 2010, Proceedings
ISBN: 9783642140808 / Angielski / Miękka / 403 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The annual Australasian Conference on Information Security and Privacy is the premier Australian academic conference in its ?eld, showcasing research from around the globe on a range of topics. ACISP 2010 was held during July 5-7, 2010, at Macquarie University in Sydney, Australia. There were 97 paper submissions for the conference. These submission were reviewed by the Program Committee and a number of other individuals, whose namescanbefoundoverleaf.TheProgramCommitteethenselected24papersfor presentationatthe conference.Thesepapersarecontainedin theseproceedings. In addition to the...
The annual Australasian Conference on Information Security and Privacy is the premier Australian academic conference in its ?eld, showcasing research ...
|
|
cena:
192,30 zł |
Cyber-Security and Threat Politics: US Efforts to Secure the Information Age
ISBN: 9780415429818 / Angielski / Twarda / 192 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US. Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat... This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in ... |
|
cena:
752,12 zł |
Lattice Basis Reduction: An Introduction to the LLL Algorithm and Its Applications
ISBN: 9781439807026 / Angielski / Twarda / 332 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. First developed in the early 1980s by Lenstra, Lenstra, and Lovasz, the LLL algorithm was originally used to provide a polynomial-time algorithm for factoring polynomials with rational coefficients. It very quickly became an essential tool in integer linear programming problems and was later adapted for use in cryptanalysis. This book provides an introduction to the theory and applications of lattice basis reduction and the LLL algorithm. With numerous examples and suggested exercises, the text discusses various applications of lattice basis reduction to cryptography, number theory,... First developed in the early 1980s by Lenstra, Lenstra, and Lovasz, the LLL algorithm was originally used to provide a polynomial-time algorithm fo... |
|
cena:
570,57 zł |
Computer Safety, Reliability, and Security: 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010, Proceedings
ISBN: 9783642156502 / Angielski / Miękka / 482 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computers and microprocessors are indispensable in modern technical systems, their deployment spanning the domains automotive, railway, aerospace, and transportation, security, energy supply, telecommunication, critical infrastructures and process ind- tries. They perform tasks that a few decades ago were very difficult if not impossible. As they perform these tasks with increasing efficiency, more and more tasks are shifted from hardware to software, which means that the dependability of computer systems becomes crucial for the safety, security and reliability of technical systems. With the...
Computers and microprocessors are indispensable in modern technical systems, their deployment spanning the domains automotive, railway, aerospace, and...
|
|
cena:
192,30 zł |
Emergency Notification
ISBN: 9780313365874 / Angielski / Twarda / 210 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. To grasp the importance of emergency notification, imagine this scenario: A shooter is on the loose at a college campus. Chaos reigns. To contain the situation, campus personnel need to communicate immediately and efficiently, not only with the students, faculty, and staff, but also the local police, federal law enforcement, and media. Effective emergency notification makes things "right," it allows the right message to reach the right people at the right time--facilitating the right response. "Emergency Notification" explains how. This book offers must-know information for business... To grasp the importance of emergency notification, imagine this scenario: A shooter is on the loose at a college campus. Chaos reigns. To contain t... |
|
cena:
229,32 zł |
Staying Safe at School
ISBN: 9781439858288 / Angielski / Miękka / 158 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Now more than ever before, today s schools are hazard zones. Students are vulnerable to attack from other students and random individuals who may appear to be harmless on the surface or who may be sending out warning signals. Either way, to save their lives or protect themselves from injury, they must be prepared. Now in its second edition, Staying Safe at School is a guidebook that every parent and school administrator should make available to students. Concise and practical, this book will show teenagers how to:
Now more than ever before, today s schools are hazard zones. Students are vulnerable to attack from other students and random individuals who may a... |
|
cena:
155,56 zł |
Provable Security: 4th International Conference, Provsec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings
ISBN: 9783642162794 / Angielski / Miękka / 279 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010.
The 17 papers presented were carefully reviewed and selected from 47 submissions. The papers are divided in topical sections on identification, auto proofs, signature, hash function, protocol, encryption, and signcryption. This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010.
The 17 papers presented we... |
|
cena:
192,30 zł |
Digital Signatures: A Survey of Law and Practice in the European Union
ISBN: 9781855734692 / Angielski / Miękka / 466 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the explosion of e-commerce, and especially the use of the internet for business transactions, the "paperless office" should surely already have become a reality. Its progress has, however, been impede by tha lack of sufficient information security and a workable legal framework. So where are we now? Can we really trust electronic business transactions to be reliable, provable and enforceable, even on an international basis? Find the answers in this ground-breaking study undertaken for the European Commission. Carried out by the Interdisciplinary Centre for law and Information...
With the explosion of e-commerce, and especially the use of the internet for business transactions, the "paperless office" should surely already have ...
|
|
cena:
1037,40 zł |
Security and Cryptography for Networks: 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, Proceedings
ISBN: 9783642153167 / Angielski / Miękka / 471 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the proceedings of the 7th International Conference on Security and Cryptography for Networks that was held in Amalfi, Italy, in September 2010.
Constitutes the proceedings of the 7th International Conference on Security and Cryptography for Networks that was held in Amalfi, Italy, in September...
|
|
cena:
192,30 zł |
Optical and Digital Techniques for Information Security
ISBN: 9781441919205 / Angielski / Miękka / 354 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. There are wide-ranging implications in information security beyond national defense. Securing our information has implications for virtually all aspects of our lives, including protecting the privacy of our ?nancial transactions and medical records, facilitating all operations of government, maintaining the integrity of national borders, securing important facilities, ensuring the safety of our food and commercial products, protecting the safety of our aviation system--even safeguarding the integrity of our very identity against theft. Information security is a vital element in all of these...
There are wide-ranging implications in information security beyond national defense. Securing our information has implications for virtually all aspec...
|
|
cena:
384,63 zł |