Conflict and Cooperation in Cyberspace: The Challenge to National Security
ISBN: 9781466592018 / Angielski / Twarda / 360 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Conflict and Cooperation in Cyberspace: The Challenge to National Security brings together some of the world's most distinguished military leaders, scholars, cyber operators, and policymakers in a discussion of current and future challenges that cyberspace poses to the United States and the world. Maintaining a focus on policy-relevant solutions, it offers a well-reasoned study of how to prepare for war, while attempting to keep the peace in the cyberspace domain. The discussion begins with thoughtful contributions concerning the attributes and importance of cyberspace...Conflict and Cooperation in Cyberspace: The Challenge to National Security brings together some of the world's most distinguished ... |
|
cena:
533,12 zł |
Automatic Defense Against Zero-Day Polymorphic Worms in Communication Networks
ISBN: 9781466557277 / Angielski / Twarda / 338 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to defend against these threats is just too slow. Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion ... |
|
cena:
431,52 zł |
Practical Signcryption
ISBN: 9783642265938 / Angielski / Miękka / 274 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In today's world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality - the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features...
In today's world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confiden...
|
|
cena:
389,09 zł |
Security and Privacy for Implantable Medical Devices
ISBN: 9781461416739 / Angielski / Twarda / 205 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD). It describes in detail new issues termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. Coverage includes vulnerabilities and defense across multiple levels, with basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures. Experts...
This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable m...
|
|
cena:
389,09 zł |
Advances in Biometrics for Secure Human Authentication and Recognition
ISBN: 9781466582422 / Angielski / Twarda / 352 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Although biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns about their security. Advances in Biometrics for Secure Human Authentication and Recognition showcases some of the latest technologies and algorithms being used for human authentication and recognition. Although biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns about their security.... |
|
cena:
660,05 zł |
Managing Intelligence: A Guide for Law Enforcement Professionals
ISBN: 9781466586420 / Angielski / Miękka / 503 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Intelligence is used daily by law enforcement personnel across the world in operations to combat terrorism and drugs and to assist in investigating serious and organized crime. Managing Intelligence: A Guide for Law Enforcement Professionals is designed to assist practitioners and agencies build an efficient system to gather and manage intelligence effectively and lawfully in line with the principles of intelligence-led policing. Research for this book draws from discussions with hundreds of officers in different agencies, roles, and ranks from the UK, United States,... Intelligence is used daily by law enforcement personnel across the world in operations to combat terrorism and drugs and to assist in investigating... |
|
cena:
431,52 zł |
Hacked: A Radical Approach to Hacker Culture and Crime
ISBN: 9781479869718 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Inside the life of a hacker and cybercrime culture. Public discourse, from pop culture to political rhetoric, portrays hackers as deceptive, digital villains. But what do we actually know about them?
In Hacked, Kevin F. Steinmetz explores what it means to be a hacker and the nuances of hacker culture. Through extensive interviews with hackers, observations of hacker communities, and analyses of hacker cultural products, Steinmetz demystifies the figure of the hacker and situates the practice of hacking within the larger political and economic structures of... Inside the life of a hacker and cybercrime culture. Public discourse, from pop culture to political rhetoric, portrays hackers as dec...
|
|
cena:
131,95 zł |
Wireless Mobile Internet Security
ISBN: 9781118496534 / Angielski / Twarda / 522 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies through multiple enhancements of both cellular mobile systems and Internet interoperability. Flawless integration between these two wired/wireless networks will enable subscribers to not only roam worldwide, but also to solve the...
The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also mad...
|
|
cena:
502,12 zł |
What They Didn't Teach at the Academy: Topics, Stories, and Reality Beyond the Classroom
ISBN: 9781439869192 / Angielski / Miękka / 398 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. While professional courses and how-to manuals can prepare us for expected events that will occur in the course of our careers, there remains an untapped reservoir of life experience that cannot be prepared for in training or study. These events and experiences give texture and meaning to our work and shape our character. Filled with stories of courage and inspiration, What They Didn't Teach at the Academy: Topics, Stories, and Reality Beyond the Classroom looks at experiences encountered by public safety and military professionals that were not necessarily encompassed in their... While professional courses and how-to manuals can prepare us for expected events that will occur in the course of our careers, there remains an unt... |
|
cena:
340,13 zł |
Security for Wireless Implantable Medical Devices
ISBN: 9781461471523 / Angielski / Miękka / 45 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the treatment of chronic diseases, wireless Implantable Medical Devices (IMDs) are commonly used to communicate with an outside programmer (reader). Such communication raises serious security concerns, such as the ability for hackers to gain access to a patient's medical records. This brief provides an overview of such attacks and the new security challenges, defenses, design issues, modeling and performance evaluation in wireless IMDs. While studying the vulnerabilities of IMDs and corresponding security defenses, the reader will also learn the methodologies and tools for designing...
In the treatment of chronic diseases, wireless Implantable Medical Devices (IMDs) are commonly used to communicate with an outside programmer (reader)...
|
|
cena:
194,52 zł |
Real-time Security Extensions for EPCglobal Networks: Case Study for the Pharmaceutical Industry
ISBN: 9783642363429 / Angielski / Twarda / 146 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book reviews the design of real-time security extensions for EPCglobal networks based on in-memory technology, presents authentication protocols for devices with low computational resources and outlines steps for implementing history-based access control.
This book reviews the design of real-time security extensions for EPCglobal networks based on in-memory technology, presents authentication protocols ...
|
|
cena:
194,52 zł |
The Evolution of Policing: Worldwide Innovations and Insights
ISBN: 9781466567153 / Angielski / Twarda / 497 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Each year, the International Police Executive Symposium (IPES) holds a global conference for police scholars and practitioners to exchange information about the latest trends in police practice and research. Drawn from recent proceedings, The Evolution of Policing: Worldwide Innovations and Insights explores major policing initiatives and evolutions across the globe and presents practical insights on how police are retooling their profession. With insight from both police practitioners and scholars, the book covers a range of topics, including: ... Each year, the International Police Executive Symposium (IPES) holds a global conference for police scholars and practitioners to exchange informat... |
|
cena:
609,27 zł |
Security and Privacy in Biometrics
ISBN: 9781447152293 / Angielski / Twarda / 438 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of... This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from... |
|
cena:
389,09 zł |
Dynamic Mixed Models for Familial Longitudinal Data
ISBN: 9781461428015 / Angielski / Miękka / 494 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book provides a theoretical foundation for the analysis of discrete data such as count and binary data in the longitudinal setup. Unlike the existing books, this book uses a class of auto-correlation structures to model the longitudinal correlations for the repeated discrete data that accommodates all possible Gaussian type auto-correlation models as special cases including the equi-correlation models. This new dynamic modelling approach is utilized to develop theoretically sound inference techniques such as the generalized quasi-likelihood (GQL) technique for consistent and efficient... This book provides a theoretical foundation for the analysis of discrete data such as count and binary data in the longitudinal setup. Unlike the e... |
|
cena:
389,09 zł |
Wired/Wireless Internet Communication: 11th International Conference, Wwic 2013, St. Petersburg, Russia, June 5-7, 2013. Proceedings
ISBN: 9783642384004 / Angielski / Miękka / 277 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 11th International Conference on Wired/Wireless Internet Communications, WWIC 2013, held in St. Petersburg, Russia, during June 5-7, 2013. The 21 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on: MAC and scheduling; mobility; fixed networks; services and security; sensor networks; services; and wireless.
This book constitutes the refereed proceedings of the 11th International Conference on Wired/Wireless Internet Communications, WWIC 2013, held in St. ...
|
|
cena:
179,00 zł |
Web-Age Information Management: 14th International Conference, Waim 2013, Beidaihe, China, June 14-16, 2013. Proceedings
ISBN: 9783642385612 / Angielski / Miękka / 812 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 14th International Conference on Web-Age Information Management, WAIM 2013, held in Beidaihe, China, in June 2013. The 47 revised full papers presented together with 29 short papers and 5 keynotes were carefully reviewed and selected from a total of 248 submissions. The papers are organized in topical sections on data mining; information integration and heterogeneous systems; big data; spatial and temporal databases; information extraction; new hardware and miscellaneous; query processing and optimization; social network and graphs;...
This book constitutes the refereed proceedings of the 14th International Conference on Web-Age Information Management, WAIM 2013, held in Beidaihe, Ch...
|
|
cena:
194,52 zł |
Cyberspace and International Relations: Theory, Prospects and Challenges
ISBN: 9783642374807 / Angielski / Twarda / 284 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cyberspace is everywhere in today's world and has significant implications not only for global economic activity, but also for international politics and transnational social relations. This compilation addresses for the first time the "cyberization" of international relations - the growing dependence of actors in IR on the infrastructure and instruments of the internet, and the penetration of cyberspace into all fields of their activities. The volume approaches this topical issue in a comprehensive and interdisciplinary fashion, bringing together scholars from disciplines such as IR,... Cyberspace is everywhere in today's world and has significant implications not only for global economic activity, but also for international politi... |
|
cena:
466,91 zł |
Cloud Computing: Methods and Practical Approaches
ISBN: 9781447151067 / Angielski / Twarda / 347 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents both state-of-the-art research developments and practical guidance on approaches, technologies and frameworks for the emerging cloud paradigm. Topics and features: presents the state of the art in cloud technologies, infrastructures, and service delivery and deployment models; discusses relevant theoretical frameworks, practical approaches and suggested methodologies; offers guidance and best practices for the development of cloud-based services and infrastructures, and examines management aspects of cloud computing; reviews consumer perspectives on mobile cloud computing...
This book presents both state-of-the-art research developments and practical guidance on approaches, technologies and frameworks for the emerging clou...
|
|
cena:
389,09 zł |
The Basics of IT Audit: Purposes, Processes, and Practical Information
ISBN: 9780124171596 / Angielski / Miękka / 244 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA. IT auditing occurs in some form in virtually every organization, private or public, large or small. The large number and wide variety of laws, regulations, policies, and industry standards that call for IT auditing make it hard for... The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Pa... |
|
cena:
152,27 zł |
Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers
ISBN: 9783642267987 / Angielski / Miękka / 356 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. The 27 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, data protection and identity management, eID cards and eID interoperability, emerging technologies, privacy for eGovernment and AAL applications, social networks and privacy, privacy...
This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer ...
|
|
cena:
194,52 zł |