• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - General

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]

  więcej...
• Turystyka
 [52246]
• Informatyka
 [151406]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - General

ilość książek w kategorii: 5419

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Information Theoretic Security: 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009, Revised Selected Papers Kurosawa, Kaoru 9783642144950 Not Avail
Information Theoretic Security: 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009, Revised Selected Papers

ISBN: 9783642144950 / Angielski / Miękka / 249 str.

ISBN: 9783642144950/Angielski/Miękka/249 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kaoru Kurosawa
ICITS2009washeldattheShizuokaConventionandArtsCenter"GRANSHIP" in Japan during December 3-6,2009.This was the 4th International Conference on Information Theoretic Security. Over the last few decades, we have seen several research topics studied - quiringinformationtheoreticalsecurity, alsocalledunconditionalsecurity, where there is no unproven computational assumption on the adversary. (This is the framework proposed by Claude Shannon in his seminal paper.) Also, coding as well as other aspects of information theory have been used in the design of cryptographic schemes. Examples are...
ICITS2009washeldattheShizuokaConventionandArtsCenter"GRANSHIP" in Japan during December 3-6,2009.This was the 4th International Conference on Informat...
cena: 203,13

 Advances in Cryptology -- Crypto 2010: 30th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 15-19, 2010, Proceedings Rabin, Tal 9783642146220 Not Avail
Advances in Cryptology -- Crypto 2010: 30th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 15-19, 2010, Proceedings

ISBN: 9783642146220 / Angielski / Miękka / 741 str.

ISBN: 9783642146220/Angielski/Miękka/741 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tal Rabin
CRYPTO2010, the30thAnnualInternationalCryptologyConference, wassp- sored by the International Association for Cryptologic Research (IACR) in - operation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of C- ifornia at Santa Barbara. The conference was held in Santa Barbara, Calif- nia, during August 15-19, 2010, in conjunction with CHES 2010 (Workshop on Cryptographic Hardware and Embedded Systems). Zul?kar Ramzan served as the General Chair. The conference received 203 submissions. The quality of the submissions...
CRYPTO2010, the30thAnnualInternationalCryptologyConference, wassp- sored by the International Association for Cryptologic Research (IACR) in - operati...
cena: 203,13

 Foundations of Security Analysis and Design II: Fosad 2001/2002 Tutorial Lectures Focardi, Riccardo 9783540209553 Springer
Foundations of Security Analysis and Design II: Fosad 2001/2002 Tutorial Lectures

ISBN: 9783540209553 / Angielski / Miękka / 272 str.

ISBN: 9783540209553/Angielski/Miękka/272 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Roberto Gorrieri; Riccardo Focardi

Security is a rapidly growing area of computer science, with direct and increasing relevance to real-life applications, such as Internet transactions, e-commerce, information protection, network and systems security, etc. Foundations for the analysis and design of security features of such applications are badly needed in order to validate and prove their correctness.

This book presents thoroughly revised versions of six tutorial lectures given by leading researchers during two International Schools on Foundations of Security Analysis and Design, FOSAD 2001/2002, held in Bertinoro,...

Security is a rapidly growing area of computer science, with direct and increasing relevance to real-life applications, such as Internet transactio...

cena: 203,13

 Topics in Cryptology - Ct-Rsa 2010: The 10th Cryptographers' Track at the Rsa Conference 2010, San Francisco, Ca, Usa, March 1-5, 2010. Proceedings Pieprzyk, Josef 9783642119248 Springer
Topics in Cryptology - Ct-Rsa 2010: The 10th Cryptographers' Track at the Rsa Conference 2010, San Francisco, Ca, Usa, March 1-5, 2010. Proceedings

ISBN: 9783642119248 / Angielski / Miękka / 397 str.

ISBN: 9783642119248/Angielski/Miękka/397 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Josef Pieprzyk
The RSA Conference is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the conf- ence has included an academic Cryptographers'Track (CT-RSA). This year was the 10th anniversary of CT-RSA. Since its conception, the CT-RSA conference has become a major avenue for publishing high-quality research papers. The RSA conference was held in San Francisco, California, during March 1-5, 2010. This year we received94 submissions. Eachpaper gotassignedto three ref- ees. Papers submitted by the members of the Program Committee got...
The RSA Conference is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the conf...
cena: 203,13

 Smart Grid Security: An End-To-End View of Security in the New Electrical Grid Sorebo, Gilbert N. 9781439855874 Taylor and Francis
Smart Grid Security: An End-To-End View of Security in the New Electrical Grid

ISBN: 9781439855874 / Angielski / Twarda / 328 str.

ISBN: 9781439855874/Angielski/Twarda/328 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gilbert Sorebo;Michael Echols;¬Abar
The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is a vital concern not only for cyber-security practitioners, engineers, policy makers, and utility executives, but also for the media and consumers. Smart Grid Security: An End-to-End View of Security in the New Electrical Grid explores the important techniques, challenges, and forces that will shape how we achieve a secure twenty-first century electric grid.
The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is a vital concern not only for...
cena: 768,42

 Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems Jordi Nin, Javier Herranz 9781849962377 Springer London Ltd
Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems

ISBN: 9781849962377 / Angielski / Twarda / 198 str.

ISBN: 9781849962377/Angielski/Twarda/198 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jordi Nin;Javier Herranz
As depicted in David Lodge's celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth's population. Yet, the really dramatic shrinking had to wait until the mid-1990s, when Internet became widespread and the information age stopped being an empty buzzword. But small is not necessarily beautiful. We now live in a global village and, alas, some (often very powerful) voices state that we ought not expect any more privacy in it. Should this be true, we would have created our own...
As depicted in David Lodge's celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became ...
cena: 609,48

 Information Security and Privacy: 15th Australasian Conference, Acisp 2010, Sydney, Australia, July 5-7, 2010, Proceedings Steinfeld, Ron 9783642140808 Not Avail
Information Security and Privacy: 15th Australasian Conference, Acisp 2010, Sydney, Australia, July 5-7, 2010, Proceedings

ISBN: 9783642140808 / Angielski / Miękka / 403 str.

ISBN: 9783642140808/Angielski/Miękka/403 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ron Steinfeld; Philip Hawkes
The annual Australasian Conference on Information Security and Privacy is the premier Australian academic conference in its ?eld, showcasing research from around the globe on a range of topics. ACISP 2010 was held during July 5-7, 2010, at Macquarie University in Sydney, Australia. There were 97 paper submissions for the conference. These submission were reviewed by the Program Committee and a number of other individuals, whose namescanbefoundoverleaf.TheProgramCommitteethenselected24papersfor presentationatthe conference.Thesepapersarecontainedin theseproceedings. In addition to the...
The annual Australasian Conference on Information Security and Privacy is the premier Australian academic conference in its ?eld, showcasing research ...
cena: 203,13

 Cyber-Security and Threat Politics: US Efforts to Secure the Information Age Dunn Cavelty, Myriam 9780415429818 Routledge
Cyber-Security and Threat Politics: US Efforts to Secure the Information Age

ISBN: 9780415429818 / Angielski / Twarda / 192 str.

ISBN: 9780415429818/Angielski/Twarda/192 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Myriam Dunn Cavelty; Anderson Carolyn Dunn; My Dunn Cavelty

This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US.

Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat...

This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in ...

cena: 793,21

 Lattice Basis Reduction: An Introduction to the LLL Algorithm and Its Applications Bremner, Murray R. 9781439807026 CRC Press
Lattice Basis Reduction: An Introduction to the LLL Algorithm and Its Applications

ISBN: 9781439807026 / Angielski / Twarda / 332 str.

ISBN: 9781439807026/Angielski/Twarda/332 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Murray R. Bremner

First developed in the early 1980s by Lenstra, Lenstra, and Lovasz, the LLL algorithm was originally used to provide a polynomial-time algorithm for factoring polynomials with rational coefficients. It very quickly became an essential tool in integer linear programming problems and was later adapted for use in cryptanalysis. This book provides an introduction to the theory and applications of lattice basis reduction and the LLL algorithm. With numerous examples and suggested exercises, the text discusses various applications of lattice basis reduction to cryptography, number theory,...

First developed in the early 1980s by Lenstra, Lenstra, and Lovasz, the LLL algorithm was originally used to provide a polynomial-time algorithm fo...

cena: 619,70

 Computer Safety, Reliability, and Security: 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010, Proceedings Schoitsch, Erwin 9783642156502 Not Avail
Computer Safety, Reliability, and Security: 29th International Conference, SAFECOMP 2010, Vienna, Austria, September 14-17, 2010, Proceedings

ISBN: 9783642156502 / Angielski / Miękka / 482 str.

ISBN: 9783642156502/Angielski/Miękka/482 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Erwin Schoitsch
Computers and microprocessors are indispensable in modern technical systems, their deployment spanning the domains automotive, railway, aerospace, and transportation, security, energy supply, telecommunication, critical infrastructures and process ind- tries. They perform tasks that a few decades ago were very difficult if not impossible. As they perform these tasks with increasing efficiency, more and more tasks are shifted from hardware to software, which means that the dependability of computer systems becomes crucial for the safety, security and reliability of technical systems. With the...
Computers and microprocessors are indispensable in modern technical systems, their deployment spanning the domains automotive, railway, aerospace, and...
cena: 203,13

 Emergency Notification Robert C. Chandler 9780313365874 Praeger Publishers
Emergency Notification

ISBN: 9780313365874 / Angielski / Twarda / 210 str.

ISBN: 9780313365874/Angielski/Twarda/210 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robert C. Chandler

To grasp the importance of emergency notification, imagine this scenario: A shooter is on the loose at a college campus. Chaos reigns. To contain the situation, campus personnel need to communicate immediately and efficiently, not only with the students, faculty, and staff, but also the local police, federal law enforcement, and media. Effective emergency notification makes things "right," it allows the right message to reach the right people at the right time--facilitating the right response. "Emergency Notification" explains how.

This book offers must-know information for business...

To grasp the importance of emergency notification, imagine this scenario: A shooter is on the loose at a college campus. Chaos reigns. To contain t...

cena: 234,83

 Staying Safe at School Chester L. Quarles Tammy Quarles 9781439858288 CRC Press
Staying Safe at School

ISBN: 9781439858288 / Angielski / Miękka / 158 str.

ISBN: 9781439858288/Angielski/Miękka/158 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chester L. Quarles; Tammy Quarles

Now more than ever before, today s schools are hazard zones. Students are vulnerable to attack from other students and random individuals who may appear to be harmless on the surface or who may be sending out warning signals. Either way, to save their lives or protect themselves from injury, they must be prepared. Now in its second edition, Staying Safe at School is a guidebook that every parent and school administrator should make available to students. Concise and practical, this book will show teenagers how to:

  • Perform a risk assessment to...

Now more than ever before, today s schools are hazard zones. Students are vulnerable to attack from other students and random individuals who may a...

cena: 168,50

 Provable Security: 4th International Conference, Provsec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings Kurosawa, Kaoru 9783642162794 Not Avail
Provable Security: 4th International Conference, Provsec 2010, Malacca, Malaysia, October 13-15, 2010, Proceedings

ISBN: 9783642162794 / Angielski / Miękka / 279 str.

ISBN: 9783642162794/Angielski/Miękka/279 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Swee-Huay Heng; Kaoru Kurosawa
This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010.
The 17 papers presented were carefully reviewed and selected from 47 submissions. The papers are divided in topical sections on identification, auto proofs, signature, hash function, protocol, encryption, and signcryption.
This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010.
The 17 papers presented we...
cena: 203,13

 Digital Signatures: A Survey of Law and Practice in the European Union European Commission 9781855734692 Woodhead Publishing,
Digital Signatures: A Survey of Law and Practice in the European Union

ISBN: 9781855734692 / Angielski / Miękka / 466 str.

ISBN: 9781855734692/Angielski/Miękka/466 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
European Commission
With the explosion of e-commerce, and especially the use of the internet for business transactions, the "paperless office" should surely already have become a reality. Its progress has, however, been impede by tha lack of sufficient information security and a workable legal framework. So where are we now? Can we really trust electronic business transactions to be reliable, provable and enforceable, even on an international basis?

Find the answers in this ground-breaking study undertaken for the European Commission. Carried out by the Interdisciplinary Centre for law and Information...

With the explosion of e-commerce, and especially the use of the internet for business transactions, the "paperless office" should surely already have ...
cena: 991,52

 Security and Cryptography for Networks: 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, Proceedings Garay, Juan A. 9783642153167 Not Avail
Security and Cryptography for Networks: 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, Proceedings

ISBN: 9783642153167 / Angielski / Miękka / 471 str.

ISBN: 9783642153167/Angielski/Miękka/471 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Juan A. Garay; Roberto De Prisco
Constitutes the proceedings of the 7th International Conference on Security and Cryptography for Networks that was held in Amalfi, Italy, in September 2010.
Constitutes the proceedings of the 7th International Conference on Security and Cryptography for Networks that was held in Amalfi, Italy, in September...
cena: 203,13

 Optical and Digital Techniques for Information Security Bahram Javidi 9781441919205 Not Avail
Optical and Digital Techniques for Information Security

ISBN: 9781441919205 / Angielski / Miękka / 354 str.

ISBN: 9781441919205/Angielski/Miękka/354 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bahram Javidi
There are wide-ranging implications in information security beyond national defense. Securing our information has implications for virtually all aspects of our lives, including protecting the privacy of our ?nancial transactions and medical records, facilitating all operations of government, maintaining the integrity of national borders, securing important facilities, ensuring the safety of our food and commercial products, protecting the safety of our aviation system--even safeguarding the integrity of our very identity against theft. Information security is a vital element in all of these...
There are wide-ranging implications in information security beyond national defense. Securing our information has implications for virtually all aspec...
cena: 406,31

 Secure Systems Development with UML Jan Jurjens 9783642056352 Springer-Verlag Berlin and Heidelberg GmbH &
Secure Systems Development with UML

ISBN: 9783642056352 / Angielski / Miękka / 316 str.

ISBN: 9783642056352/Angielski/Miękka/316 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jan Jurjens

Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is difficult, mainly because of the conflict between development costs and verifiable correctness.

Jurjens presents the UML extension UMLsec for secure systems development. It uses the standard UML extension mechanisms, and can be employed to evaluate UML specifications for vulnerabilities using a formal semantics of a simplified fragment of UML. Established rules of security engineering can be encapsulated and hence made available even to...

Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is diffi...

cena: 411,17

 Future of Trust in Computing: Proceedings of the First International Conference Future of Trust in Computing 2008 Grawrock, David 9783834807946 Vieweg+Teubner
Future of Trust in Computing: Proceedings of the First International Conference Future of Trust in Computing 2008

ISBN: 9783834807946 / Angielski / Miękka / 227 str.

ISBN: 9783834807946/Angielski/Miękka/227 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Claire Vishik; David Gawrock; Helmut Reimer
Several constituencies are working on building and preserving users trust in the digital economy through - are examining new behaviors associated with ubiquitous connectivity and mobile computing as wel- hance privacy using new technologies and processes in order to ensure that concerns about privacy do where users rights are protected and technology is designed in a way to make sure it can be trusted. Consumer advocates are ensuring that users requirements and concerns are understood and recognized. trusted systems. And technologists and architects in industry are designing products and...
Several constituencies are working on building and preserving users trust in the digital economy through - are examining new behaviors associated with...
cena: 69,04

 Sicher & Mobil: Sicherheit in Der Drahtlosen Kommunikation Osterhage, Wolfgang W. 9783642030826 Springer, Berlin
Sicher & Mobil: Sicherheit in Der Drahtlosen Kommunikation

ISBN: 9783642030826 / Niemiecki / Twarda / 184 str.

ISBN: 9783642030826/Niemiecki/Twarda/184 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Wolfgang W. Osterhage

Die Verlinkung von Computern und ihren Komponenten hat mit den Moglichkeiten der drahtlosen Kommunikation eine neue Qualitat erreicht sowohl fur private Nutzer als auch fur Organisationen. Diese Entwicklung fuhrt zu neuen Herausforderungen fur die IT- Sicherheit: dies steht im Mittelpunkt des Buches. Die gesamte Bandbreite der drahtlosen Kommunikation wird abgedeckt (WLAN, Bluetooth, Mobiltelefonie), mit detaillierten Beschreibungen der Technologie, der Standards, der Verschlusselung und Konfiguration.

Um einen Komplettcheck seiner drahtlosen Anwendungen zu gewahrleisten, benotigt...

Die Verlinkung von Computern und ihren Komponenten hat mit den Moglichkeiten der drahtlosen Kommunikation eine neue Qualitat erreicht sowohl fur pr...

cena: 216,43

 Security Awareness: Neue Wege Zur Erfolgreichen Mitarbeiter-Sensibilisierung Helisch, Michael 9783834806680 Vieweg+Teubner
Security Awareness: Neue Wege Zur Erfolgreichen Mitarbeiter-Sensibilisierung

ISBN: 9783834806680 / Niemiecki / Miękka / 317 str.

ISBN: 9783834806680/Niemiecki/Miękka/317 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Helisch; Dietmar Pokoyski
Security Awareness - was ist das eigentlich und brauche ich das uberhaupt? Von der OLDSCHOOL in die NEXT GENERATION: Welche Methode ist erfolgversprechend? Welche Rolle spielen Unternehmens- und Sicherheitskultur? Wie hilft das Wissen um weiche Faktoren wie z.B. Didaktik oder Tiefenpsychologie? Warum ist die eine Kampagne ein Erfolg, eine andere womoglich ein Flop? Was kann man aus erfolgreichen und eher weniger erfolgreichen Awareness-Manahmen lernen?
Erstmals bietet ein deutschsprachiges Buch einen ganzheitlichen, systemischen Uberblick uber die methodischen Grundlagen der Security...
Security Awareness - was ist das eigentlich und brauche ich das uberhaupt? Von der OLDSCHOOL in die NEXT GENERATION: Welche Methode ist erfolgversprec...
cena: 322,76

Pierwsza Podprzednia  19  20  21  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia