• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - General

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]

  więcej...
• Turystyka
 [52246]
• Informatyka
 [151406]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - General

ilość książek w kategorii: 5419

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Information Security and Cryptology: Second Sklois Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings Lipmaa, Helger 9783540496083 Springer
Information Security and Cryptology: Second Sklois Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings

ISBN: 9783540496083 / Angielski / Miękka / 308 str.

ISBN: 9783540496083/Angielski/Miękka/308 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Helger Lipmaa; Moti Yung; Donghai Lin
The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State Key Laboratory of Inf- mation Security of the Chinese Academy of Sciences. This international conf- ence was held in Beijing, China and was sponsored by the Institute of Software, the Chinese Academy of Sciences, the Graduate University of Chinese Academy of Sciences and the National Natural Science Foundations of China. The c- ference proceedings, with contributed papers, are published by Springer in this volume of Lecture Notes in Computer Science (LNCS). The...
The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State Key Laboratory of Inf- m...
cena: 203,13

 Cryptography : An Introduction  9780821829868 AMERICAN MATHEMATICAL SOCIETY
Cryptography : An Introduction

ISBN: 9780821829868 / Angielski / Miękka

ISBN: 9780821829868/Angielski/Miękka

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Learning about cryptography requires examining fundamental issues about information security. Questions abound and answering them requires an understanding of basic cryptography. This book, written by Russian cryptographers, explains those basics. Chapters are independent and can be read in any order. The introduction gives a general description of all the main notions of modern cryptography: a cipher, a key, security, an electronic digital signature, a cryptographic protocol, etc. Other chapters delve more deeply into this material. This text should be suitable for advanced high school...
Learning about cryptography requires examining fundamental issues about information security. Questions abound and answering them requires an understa...
cena: 252,84

 Information Security Management Handbook, Volume 3  9781420090925 TAYLOR & FRANCIS LTD
Information Security Management Handbook, Volume 3

ISBN: 9781420090925 / Angielski / Twarda / 392 str.

ISBN: 9781420090925/Angielski/Twarda/392 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

A compilation of the fundamental knowledge, skills, techniques, and tools required by all security professionals, this text forms the basis on which all IT security programs and certifications are created. Considered the gold-standard reference of information security, the Handbook includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide. In step with the increasingly fast pace of change in the technology field, this book is revised annually, keeping IT professionals updated and current. Volume 3 adds a...

A compilation of the fundamental knowledge, skills, techniques, and tools required by all security professionals, this text forms the basis on whic...

cena: 768,42

 Security for Web Services and Service-Oriented Architectures Elisa Bertino, Lorenzo Martino, Federica Paci, Anna Squicciarini 9783540877417 Springer-Verlag Berlin and Heidelberg GmbH &
Security for Web Services and Service-Oriented Architectures

ISBN: 9783540877417 / Angielski / Twarda / 226 str.

ISBN: 9783540877417/Angielski/Twarda/226 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Elisa Bertino;Lorenzo Martino;Federica Paci
Web services technologies are advancing fast and being extensively deployed in many di?erent application environments. Web services based on the eXt- sible Markup Language (XML), the Simple Object Access Protocol (SOAP), andrelatedstandards, anddeployedinService-OrientedArchitectures(SOAs) are the key to Web-based interoperability for applications within and across organizations. Furthermore, they are making it possible to deploy appli- tions that can be directly used by people, and thus making the Web a rich and powerful social interaction medium. The term Web 2.0 has been coined to embrace...
Web services technologies are advancing fast and being extensively deployed in many di?erent application environments. Web services based on the eXt- ...
cena: 304,72

 Handbook of Remote Biometrics: For Surveillance and Security Tistarelli, Massimo 9781848823846 Springer
Handbook of Remote Biometrics: For Surveillance and Security

ISBN: 9781848823846 / Angielski / Twarda / 381 str.

ISBN: 9781848823846/Angielski/Twarda/381 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Massimo Tistarelli; Stan Z. Li; Rama Chellappa
The development of technologies for the identi?cation of individuals has driven the interest and curiosity of many people. Spearheaded and inspired by the Bertillon coding system for the classi?cation of humans based on physical measurements, scientists and engineers have been trying to invent new devices and classi?cation systems to capture the human identity from its body measurements. One of the main limitations of the precursors of today s biometrics, which is still present in the vast majority of the existing biometric systems, has been the need to keep the device in close contact with...
The development of technologies for the identi?cation of individuals has driven the interest and curiosity of many people. Spearheaded and inspired by...
cena: 609,48

 Fast Software Encryption: 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers Matt Robshaw 9783540365976 Springer-Verlag Berlin and Heidelberg GmbH &
Fast Software Encryption: 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers

ISBN: 9783540365976 / Angielski / Miękka / 434 str.

ISBN: 9783540365976/Angielski/Miękka/434 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Matt Robshaw
Fast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored for the last ?ve years by the International Association for Cryptologic Research (IACR), and previous FSE workshops have been held around the world: 1993 Cambridge, UK 1994 Leuven, Belgium 1996 Cambridge, UK 1997 Haifa, Israel 1998 Paris, France 1999 Rome, Italy 2000 New York, USA 2001 Yokohama, Japan 2002 Leuven, Belgium 2003 Lund, Sweden 2004 New Delhi, India 2005 Paris, France The FSE workshop is devoted to research on fast and secure primitives for symmetric...
Fast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored for the last ?ve years by th...
cena: 203,13

 Information Security and Cryptology - Icisc 2006: 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings Rhee, Min Surp 9783540491125 Springer
Information Security and Cryptology - Icisc 2006: 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings

ISBN: 9783540491125 / Angielski / Miękka / 362 str.

ISBN: 9783540491125/Angielski/Miękka/362 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Min Surp Rhee

This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ICISC 2006, held in Busan, Korea in November/December 2006. The 26 revised full papers cover such topics as hash functions, block and stream ciphers, network security and access control, mobile communications security, forensics, copyright protection, biometrics, public key cryptosystems, and digital signatures.


This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ICISC 2006, held in Busa...

cena: 203,13

 Cryptology and Network Security: 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings David Pointcheval, Yi Mu, Kefei Chen 9783540494621 Springer-Verlag Berlin and Heidelberg GmbH &
Cryptology and Network Security: 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings

ISBN: 9783540494621 / Angielski / Miękka / 384 str.

ISBN: 9783540494621/Angielski/Miękka/384 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Pointcheval;Yi Mu;Kefei Chen

This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China, December 2006. The 26 revised full papers and 2 invited papers cover encryption, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, and disponibility and reliability.


This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, C...

cena: 203,13

 Information and Communications Security: 8th International Conference, Icics 2006, Raleigh, Nc, Usa, December 4-7, 2006, Proceedings Ning, Peng 9783540494966 Springer
Information and Communications Security: 8th International Conference, Icics 2006, Raleigh, Nc, Usa, December 4-7, 2006, Proceedings

ISBN: 9783540494966 / Angielski / Miękka / 562 str.

ISBN: 9783540494966/Angielski/Miękka/562 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peng Ning
It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security (ICICS 2006), held in Raleigh, North Carolina, USA, December 4 7, 2006. The ICICS conference series is an established forum that brings together researchersand scholars involved in m- tiple disciplines of Information and Communications Security in order to foster exchangeof ideas. The past sevenICICS conferences wereheld in Beijing, China (ICICS 1997); Sydney, Australia (ICICS 1999); Xi an China (ICICS 2001); S- gapore (ICICS 2002); Hohhot City, China (ICICS 2003); Malaga,...
It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security (ICICS 2006), held in Raleig...
cena: 406,31

 Progress in Cryptology - Indocrypt 2006: 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings Barua, Rana 9783540497677 Springer
Progress in Cryptology - Indocrypt 2006: 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings

ISBN: 9783540497677 / Angielski / Miękka / 458 str.

ISBN: 9783540497677/Angielski/Miękka/458 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rana Barua; Tanja Lange

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, held in Kolkata, India in December 2006. The 29 revised full papers and 2 invited papers cover such topics as symmetric cryptography, provable security, fast implementation of public key cryptography, id-based cryptography, as well as embedded systems and side channel attacks.


This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, held in Kolkata, India i...

cena: 203,13

 Progress in Cryptology - Vietcrypt 2006: First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selec Nguyen, Phong Q. 9783540687993 Springer
Progress in Cryptology - Vietcrypt 2006: First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selec

ISBN: 9783540687993 / Angielski / Miękka / 388 str.

ISBN: 9783540687993/Angielski/Miękka/388 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Phong Q. Nguyen

This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Cryptology in Vietnam, VIETCRYPT 2006, held in Hanoi, Vietnam, September 2006. The 25 papers cover signatures and lightweight cryptography, pairing-based cryptography, algorithmic number theory, ring signatures and group signatures, hash functions, cryptanalysis, key agreement and threshold cryptography, as well as public-key encryption.


This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Cryptology in Vietnam, VIETCRYPT 2006, held...

cena: 203,13

 Topics in Cryptology – CT-RSA 2007: The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings Masayuki Abe 9783540693277 Springer-Verlag Berlin and Heidelberg GmbH &
Topics in Cryptology – CT-RSA 2007: The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings

ISBN: 9783540693277 / Angielski / Miękka / 403 str.

ISBN: 9783540693277/Angielski/Miękka/403 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Masayuki Abe
The RSA Conference, with over 15,000 attendees and 300 exhibitors, is the largest computer security event of the year. The Cryptographers Track (CT- RSA) is a research conference within the RSA Conference. Starting in 2001, CT-RSA continues to its seventh year and is now regarded as one of the major regularly staged event for presenting the results of cryptographic research to a wide variety of audiences. The proceedings of CT-RSA 2007 contain 25 papers selected from 73 s- missions which cover all the topics of cryptography. All the submissions were reviewed by at least three reviewers, which...
The RSA Conference, with over 15,000 attendees and 300 exhibitors, is the largest computer security event of the year. The Cryptographers Track (CT- R...
cena: 203,13

 Secure Semantic Service-Oriented Systems Bhavani Thuraisingham   9781420073317 Taylor & Francis
Secure Semantic Service-Oriented Systems

ISBN: 9781420073317 / Angielski / Twarda / 463 str.

ISBN: 9781420073317/Angielski/Twarda/463 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bhavani Thuraisingham

As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving threats, an up-to-date understanding of the mechanisms for securing semantic Web technologies is essential.

Reviewing cutting-edge developments, Secure Semantic Service-Oriented Systems focuses on confidentiality, privacy, trust, and integrity management for Web services. It demonstrates the breadth and depth of applications of these...

As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applicatio...

cena: 768,42

 Cryptanalysis of RSA and Its Variants M. Jason Hinek Douglas R. Stinson  9781420075182 Taylor & Francis
Cryptanalysis of RSA and Its Variants

ISBN: 9781420075182 / Angielski / Twarda / 272 str.

ISBN: 9781420075182/Angielski/Twarda/272 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
M. Jason Hinek;Douglas R. Stinson

Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known mathematical attacks on RSA and its main variants, including CRT-RSA, multi-prime RSA, and multi-power RSA.

Divided into three parts, the book first introduces RSA and reviews the mathematical background needed for the majority of attacks described in the remainder of the...

Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outd...

cena: 594,91

 Public-Key Cryptography  9780821833650 AMERICAN MATHEMATICAL SOCIETY
Public-Key Cryptography

ISBN: 9780821833650 / Angielski / Twarda

ISBN: 9780821833650/Angielski/Twarda

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Presents a collection of articles that grew out of an expository and tutorial conference on public-key cryptography held at the Joint Mathematics Meetings (Baltimore). This book provides an introduction and survey on public-key cryptography for those with
Presents a collection of articles that grew out of an expository and tutorial conference on public-key cryptography held at the Joint Mathematics Meet...
cena: 530,46

 Cisco ASA Configuration Deal Richard 9780071622691 McGraw-Hill/Osborne Media
Cisco ASA Configuration

ISBN: 9780071622691 / Angielski / Miękka / 752 str.

ISBN: 9780071622691/Angielski/Miękka/752 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Deal Richard

"Richard Deal's gift of making difficult technology concepts understandable has remained constant. Whether it is presenting to a room of information technology professionals or writing books, Richard's communication skills are unsurpassed. As information technology professionals we are faced with overcoming challenges every day...Cisco ASA Configuration is a great reference and tool for answering our challenges." --From the Foreword by Steve Marcinek (CCIE 7225), Systems Engineer, Cisco Systems

A hands-on guide to implementing Cisco ASA

Configure and...

"Richard Deal's gift of making difficult technology concepts understandable has remained constant. Whether it is presenting to a room of informatio...

cena: 313,83

 Collaborative Computer Security and Trust Management Adam Slagell Jean-Marc Seigneur 9781605664149 Information Science Publishing
Collaborative Computer Security and Trust Management

ISBN: 9781605664149 / Angielski / Twarda / 316 str.

ISBN: 9781605664149/Angielski/Twarda/316 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Adam Slagell; Jean-Marc Seigneur
As the Internet grows and connects the world in new ways, computer security must become global and collaborative to understand and react to harmful security threats. Collaborative Computer Security and Trust Management combines perspectives of leading researchers in collaborative security to discuss recent advances in this burgeoning new field. Practitioners, researchers, and academicians are presented with lessons learned by international experts to meet the new challenges of security in the global information age. Covering topics such as trust-based security, threat and risk analysis, and...
As the Internet grows and connects the world in new ways, computer security must become global and collaborative to understand and react to harmful se...
cena: 927,56

 Handbook of Research on Secure Multimedia Distribution Shiguo Lian Yan Zhang 9781605662626 Information Science Publishing
Handbook of Research on Secure Multimedia Distribution

ISBN: 9781605662626 / Angielski / Twarda / 616 str.

ISBN: 9781605662626/Angielski/Twarda/616 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shiguo Lian; Yan Zhang
New technologies and concepts are constantly being developed within multimedia distribution. In such an ever-evolving environment, academicians, researchers, and professionals of this discipline need access to the most current information about the concepts, issues, trends, and technologies in this emerging field. The Handbook of Research on Secure Multimedia Distribution provides the latest research on secure multimedia content distribution, embracing a wide variety of aspects and providing a scientifically and scholarly sound treatment of state-of-the-art techniques to students,...
New technologies and concepts are constantly being developed within multimedia distribution. In such an ever-evolving environment, academicians, resea...
cena: 1365,57

 Adaptive Security Management Architecture James S. Tiller   9780849370526 Taylor & Francis
Adaptive Security Management Architecture

ISBN: 9780849370526 / Angielski / Twarda / 482 str.

ISBN: 9780849370526/Angielski/Twarda/482 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
James S. Tiller

For an organization to function effectively, its security controls must not be so restrictive that the business is denied the ability to be innovative and flexible. But increasingly pervasive threats mandate vigilance in unlikely areas. Adaptive Security Management Architecture enables security professionals to structure the best program designed to meet the complex needs of an entire organization, taking into account the organization s business goals as well as the surrounding controls, processes, and units already in existence.

Security aligned with...

For an organization to function effectively, its security controls must not be so restrictive that the business is denied the ability to be innovat...

cena: 669,27

 Information Security Management, Education and Privacy: Ifip 18th World Computer Congress Tc11 19th International Information Security Workshops 22-27 Deswarte, Yves 9781402081446 Kluwer Academic Publishers
Information Security Management, Education and Privacy: Ifip 18th World Computer Congress Tc11 19th International Information Security Workshops 22-27

ISBN: 9781402081446 / Angielski / Twarda / 313 str.

ISBN: 9781402081446/Angielski/Twarda/313 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yves Deswarte; Fridiric Cuppens; Sushil Jajodia
This volume gathers the papers presented at three workshops that are embedded in the IFIP/Sec Conference in 2004, to enlighten specific topics that are currently particularly active in Security. The first one is the 10th IFIP Annual Working Conference on Information Security Management. It is organized by the IFIP WG 11. 1, which is itself dedicated to Information Security Management, i. e., not only to the practical implementation of new security technology issued from recent research and development, but also and mostly to the improvement of security practice in all organizations, from...
This volume gathers the papers presented at three workshops that are embedded in the IFIP/Sec Conference in 2004, to enlighten specific topics that ar...
cena: 469,61

Pierwsza Podprzednia  16  17  18  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia