![]() |
Advances in Cryptology - Asiacrypt 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching,
ISBN: 9783540768999 / Angielski / Miękka / 604 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ASIACRYPT 2007 was held in Kuching, Sarawak, Malaysia, during December 2 6, 2007. This was the 13th ASIACRYPT conference, and was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the Information Security Research (iSECURES) Lab of Swinburne University of Technology (Sarawak Campus) and the Sarawak Development Institute (SDI), and was ?nancially supported by the Sarawak Government. The General Chair was Raphael Phan and I had the privilege of serving as the Program Chair. The conference received 223 submissions (from which one submission was...
ASIACRYPT 2007 was held in Kuching, Sarawak, Malaysia, during December 2 6, 2007. This was the 13th ASIACRYPT conference, and was sponsored by the Int...
|
cena:
408,20 |
![]() |
Security in Wireless Mesh Networks
ISBN: 9780849382505 / Angielski / Twarda / 552 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. To achieve these aims, security mechanisms are essential to ensure trusted on-going communications.
Security in Wireless Mesh Networks explores key security challenges set in diverse scenarios, as well as emerging standards that include... Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is ...
|
cena:
671,97 |
![]() |
Information Security and Privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings
ISBN: 9783540657569 / Angielski / Miękka / 332 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This text constitutes the refereed proceedings of the 4th Australasian Conference on Information Security and Privacy, ACISP '99, held in Wollongong, New South Wales, Australia in April 1999. The 26 revised full papers presented were reviewed and selected from a total of 53 submissions. The book is divided into topical sections on Boolean functions, key management, cryptanalysis, signatures, RSA cryptosystems, group cryptography, network security, electronic commerce, address control, and odds and ends.
This text constitutes the refereed proceedings of the 4th Australasian Conference on Information Security and Privacy, ACISP '99, held in Wollongong, ...
|
cena:
204,08 |
![]() |
Managing Catastrophic Loss of Sensitive Data: A Guide for It and Security Professionals
ISBN: 9781597492393 / Angielski / Miękka / 293 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the appropriate recovery and notification steps when calamity strikes. *Addresses a very topical subject of great concern to security, general IT and business management
*Provides a step-by-step approach to managing the consequences of and recovering from the loss of sensitive data. *Gathers in a single place all information... Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professi...
|
cena:
231,45 |
![]() |
Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers
ISBN: 9780313345586 / Angielski / Twarda / 188 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Organizations with computer networks, Web sites, and employees carrying laptops and Blackberries face an array of security challenges. Among other things, they need to keep unauthorized people out of the network, thwart Web site hackers, and keep data safe from prying eyes or criminal hands. This book provides a high-level overview of these challenges and more. But it is not for the hard-core IT security engineer who works full time on networks. Instead, it is aimed at the nontechnical executive with responsibility for ensuring that information and assets stay safe and private. Written by... Organizations with computer networks, Web sites, and employees carrying laptops and Blackberries face an array of security challenges. Among other ... |
cena:
314,37 |
![]() |
Cryptography and Coding: 7th IMA International Conference, Cirencester, UK, December 20-22, 1999 Proceedings
ISBN: 9783540668879 / Angielski / Miękka / 352 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The IMA conferences onCryptographyandCoding arenotonly a blend of these two aspects of information theory, but a blend of mathematics and engineering and of theoretical results and applications. The papers in this book show that the1999conferencewasnoexception. Indeed, weagainsawthemathematics- derlyingcryptographyanderrorcorrectingcodingbeing appliedto otheraspects ofcommunications, andwe alsosawclassicalmathematicalconcepts nding new applications in communications theory. As usual the conference was held at the Royal Agricultural College, Cirencester, shortly before Christmas - this time...
The IMA conferences onCryptographyandCoding arenotonly a blend of these two aspects of information theory, but a blend of mathematics and engineering ...
|
cena:
271,36 |
![]() |
Shifting the Security Paradigm - The Risks of Information Assurance
ISBN: 9783836427395 / Angielski / Miękka / 52 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As the Department of Defense (DoD) moves to create decision superiority through the use of Network Centric Operations (NCO), decision-makers become increasingly exposed to data quality vulnerabilities that mimic integrity failures within the Information Assurance (IA) security program. This is a result of the current IA policies not having the controls needed to mitigate risks involving data quality (accuracy, relevance, timeliness, usability, completeness, brevity, and security) beyond the current list of limited security issues. Such narrowness of scope increases uncertainty among...
As the Department of Defense (DoD) moves to create decision superiority through the use of Network Centric Operations (NCO), decision-makers become ...
|
cena:
198,98 |
![]() |
Insider Attack and Cyber Security: Beyond the Hacker
ISBN: 9780387773216 / Angielski / Twarda / 223 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College. This book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and includes the following topics: critical IT infrastructure, insider threats,... Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial i... |
cena:
408,20 |
![]() |
Mobile Ad-Hoc and Sensor Networks: Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedings
ISBN: 9783540770237 / Angielski / Miękka / 894 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2007, held in Beijing, China, in December 2007. The papers address all current issues in mobile ad hoc and sensor networks and are organized in topical sections on routing, network protocols, energy efficiency, data processing, self-organization and synchronization, deployment and application, as well as security. This book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2007, held in Beijin... |
cena:
408,20 |
![]() |
Progress in Cryptology - Indocrypt 2007: 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings
ISBN: 9783540770251 / Angielski / Miękka / 442 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, held in Chennai, India, in December 2007. The papers and three invited lectures were carefully reviewed and selected. The papers are organized in topical sections on hashing, elliptic curve, cryptoanalysis, information theoretic security, elliptic curve cryptography, signature, side channel attack, symmetric cryptosystem, asymmetric cryptosystem, and short papers. This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, held in Chennai, India, ... |
cena:
204,08 |
![]() |
Security Protocols: 13th International Workshop, Cambridge, Uk, April 20-22, 2005, Revised Selected Papers
ISBN: 9783540771555 / Angielski / Miękka / 362 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was just the beginning. After that, position papers were revised (often more than once) and transcripts were c- culated, discussed, and edited several times: our intention was not to produce a sterile record of who said what, but to share some promising lines of enquiry into interesting problems. Now we bring these proceedings to a wider audience so that you can join in. Our theme this time was The systemlikes youandwants to be yourfriend. Security is usually seen as making...
Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was just the beginning. After tha...
|
cena:
204,08 |
![]() |
Cryptography and Coding: 11th Ima International Conference, Cirencester, Uk, December 18-20, 2007, Proceedings
ISBN: 9783540772712 / Angielski / Miękka / 442 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 11th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2007. The 22 revised full papers presented together with two invited contributions were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key encryption, curves, and RSA implementation. This book constitutes the refereed proceedings of the 11th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in Dece... |
cena:
204,08 |
![]() |
Selected Areas in Cryptography
ISBN: 9783540773597 / Angielski / Miękka / 426 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. SAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop was held at the University of Ottawa. Previous workshops were held at Queen s University in Kingston (1994, 1996, 1998, 1999, and 2005), Carleton University in Ottawa (1995, 1997, and 2003), University of Waterloo (2000 and 2004), Fields Institute in Toronto (2001), Memorial University of Newfoundland in St. Johns (2002), and Conc- dia University in Montreal (2006). The intent of the workshop is to provide a stimulating atmosphere where researchersin cryptology can...
SAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop was held at the Universit...
|
cena:
204,08 |
![]() |
Financial Cryptography and Data Security: 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarbo
ISBN: 9783540773658 / Angielski / Miękka / 406 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 11th International Conference on Financial Cryptography and Data Security (FC 2007, http: //fc07. ifca. ai), organized by the International Financial Crypt- raphy Association (IFCA, http: //www. ifca. ai/), was held in Tobago, February 12 15, 2007. The conference is a well-established and premier international - rum for research, advanced development, education, exploration, and debate - garding security in the context of ?nance and commerce. We continue to cover all aspects of securing transactions and systems, which this year included a range of technical areas such as cryptography,...
The 11th International Conference on Financial Cryptography and Data Security (FC 2007, http: //fc07. ifca. ai), organized by the International Financ...
|
cena:
204,08 |
![]() |
Medical Biometrics
ISBN: 9783540774105 / Angielski / Miękka / 342 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The past decade has seen a rapid growth in the demand for the usage of behavioral and physiological characteristics of humans for e-security and forensics applications. The significant advances in the biometrics techniques are increasingly incorporated in a number of other applications. In this context, medicine has emerged as the largest and most promising area. Medical biometrics primarily refers to the usage of beh- ioral and physiological characteristics of humans for medical diagnosis and body care. Thus the goal of medical biometrics is to explore solutions to the open problems in...
The past decade has seen a rapid growth in the demand for the usage of behavioral and physiological characteristics of humans for e-security and foren...
|
cena:
204,08 |
![]() |
OS X Exploits and Defense
ISBN: 9781597492546 / Angielski / Miękka / 333 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is... Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. Howeve... |
cena:
231,45 |
![]() |
Netcat Power Tools
ISBN: 9781597492577 / Angielski / Miękka / 260 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a "Swiss Army knife" utility, and for good reason. Just like the multi-function usefullness of the venerable Swiss Army pocket knife, Netcat's functionality is helpful as both a standalone program and a backe-end tool in a wide range of applications. Some of the many uses of Netcat include port scanning, transferring files,...
Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Dat...
|
cena:
218,96 |
![]() |
State of the Art in Applied Cryptography: Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997 Revised Lectures
ISBN: 9783540654742 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in 1983, the second in 1989, and since then the course has been a biennial event. The course is intended for both researchers and practitioners from industry and government. It covers the basic principles as well as the most recent - velopments. Our own interests mean that the course emphasizes cryptography, but we also ensure that the most important topics in computer...
The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of c...
|
cena:
204,08 |
![]() |
Biometric System and Data Analysis: Design, Evaluation, and Data Mining
ISBN: 9780387776255 / Angielski / Twarda / 268 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Biometric systems are being used in more places and on a larger scale than ever before. As these systems mature, it is vital to ensure the practitioners responsible for development and deployment, have a strong understanding of the fundamentals of tuning biometric systems. The focus of biometric research over the past four decades has typically been on the bottom line: driving down system-wide error rates. In doing so, powerful recognition algorithms have been developed for a number of biometric modalities. These algorithms operate exceedingly well under test conditions. ...Biometric systems are being used in more places and on a larger scale than ever before. As these systems mature, it is vital to ensure the practiti... |
cena:
612,32 |
![]() |
Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings
ISBN: 9783540226666 / Angielski / Miękka / 462 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 6th International workshop on Cryptographic Hardware and Embedded Systems, CHES 2004, held in Cambridge, MA, USA in August 2004. The 32 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on side channels, modular multiplication, low resources, implementation aspects, collision attacks, fault attacks, hardware implementation, and authentication and signatures.
This book constitutes the refereed proceedings of the 6th International workshop on Cryptographic Hardware and Embedded Systems, CHES 2004, held in... |
cena:
204,08 |