• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - General

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]

  więcej...
• Turystyka
 [52246]
• Informatyka
 [151406]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - General

ilość książek w kategorii: 5420

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 13-15, 2010, Proceedings Joye, Marc 9783642174544 Not Avail
Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 13-15, 2010, Proceedings

ISBN: 9783642174544 / Angielski / Miękka / 467 str.

ISBN: 9783642174544/Angielski/Miękka/467 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marc Joye; Atsuko Miyaji; Akira Otsuka
This book constitutes the refereed proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing 2010, held in Yamanaka Hot Spring, Japan, in December 2010.The 25 full papers presented were carefully reviewed and selected from 64 submissions. The contributions are organized in topical sections on: efficient software implementation; digital signatures; cryptographic protocols; key agreement; applications - code generation, time-released encryption, and cloud computing; point encoding and pairing-friendly curves; ID-based encryption schemes; and efficient hardware,...
This book constitutes the refereed proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing 2010, held in Yamanaka Hot S...
cena: 202,66

 Computers, Privacy and Data Protection: An Element of Choice Gutwirth, Serge 9789400706408 Not Avail
Computers, Privacy and Data Protection: An Element of Choice

ISBN: 9789400706408 / Angielski / Twarda / 484 str.

ISBN: 9789400706408/Angielski/Twarda/484 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Serge Gutwirth; Yves Poullet; Paul De Hert
This timely volume presents current developments in ICT and privacy/data protection. Readers will find an alternative view of the Data Protection Directive, the contentious debates on data sharing with the USA (SWIFT, PNR), and the judicial and political resistance against data retention.
This timely volume presents current developments in ICT and privacy/data protection. Readers will find an alternative view of the Data Protection Dire...
cena: 810,77

 Information and Communications Security: 12th International Conference, Icics 2010, Barcelona, Spain, December 15-17, 2010 Proceedings Soriano, Miguel 9783642176494 Not Avail
Information and Communications Security: 12th International Conference, Icics 2010, Barcelona, Spain, December 15-17, 2010 Proceedings

ISBN: 9783642176494 / Angielski / Miękka / 474 str.

ISBN: 9783642176494/Angielski/Miękka/474 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Miguel Soriano; Sihan Qing; Javier Lopez
Information and communication security must provide technological solutions to the tension between the accelerating growth of social, economical and g- ernmental demand for digitalization of information on the one hand, and on the other, the legal and ethical obligation to protect the individuals and organi- tions involved. These proceedings contain the papers accepted at the 2010 International Conference on Information and Communications Security (ICICS 2010), held in Barcelona, Spain, during December 15-17, and hosted by the Information Security Group of the Universitat Polit ecnica de...
Information and communication security must provide technological solutions to the tension between the accelerating growth of social, economical and g...
cena: 202,66

 Police Reform in China Kam C. Wong 9781439819692 CRC Press
Police Reform in China

ISBN: 9781439819692 / Angielski / Twarda / 416 str.

ISBN: 9781439819692/Angielski/Twarda/416 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Professor Kam C. Wong
An investigation of policing reform in China, this text offers an insider's perspective through the use of empirical data from the Chinese police, as well as legal literature. It documents the day-to-day operations of the Chinese police and presents an evidence-based assessment of the impact of reforms on the society.
An investigation of policing reform in China, this text offers an insider's perspective through the use of empirical data from the Chinese police, as ...
cena: 768,42

 Security Patch Management Felicia M. Wetter 9781439824993 CRC Press
Security Patch Management

ISBN: 9781439824993 / Angielski / Twarda / 284 str.

ISBN: 9781439824993/Angielski/Twarda/284 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Felicia M. Wetter
With the onslaught of patches and the short timeframe to exploit them, organizations end up scrambling for a way to deploy patches successfully and quickly. This book presents all aspects of security patch management in one easy-to-understand format that is applicable regardless of the operating system, network device, or patch deployment tool. The text provides the support and guidance that managers need to integrate an effective patch management process into their environments. Emphasizing the importance of patch management, the author details how patches should be implemented on devices...
With the onslaught of patches and the short timeframe to exploit them, organizations end up scrambling for a way to deploy patches successfully and qu...
cena: 470,93

 Honeypots: A New Paradigm to Information Security Joshi, R. C. 9781578087082 Science Publishers
Honeypots: A New Paradigm to Information Security

ISBN: 9781578087082 / Angielski / Twarda / 340 str.

ISBN: 9781578087082/Angielski/Twarda/340 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
R. C. Joshi; Anjali Sardana

A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses honeypots from a variety of perspectives. Case studies enhance the practical understanding of the subject along with strong theoretical foundation. The book covers the latest technology in information security and honeypots, including honeytokens, honeynets and honeyfarms. Topics include denial of service, virus, worms, phishing, and elaborates on virtual honeypots and forensics. Practical implementations as well as current state of research are discussed.

A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses honeypots from a variety of perspectives. Ca...

cena: 941,94

 Guide to Biometric Reference Systems and Performance Evaluation Dijana Petrovska-Delacretaz Gerard Chollet Bernadette Dorizzi 9781849967716 Springer
Guide to Biometric Reference Systems and Performance Evaluation

ISBN: 9781849967716 / Angielski / Miękka / 382 str.

ISBN: 9781849967716/Angielski/Miękka/382 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dijana Petrovska-Delacretaz; Gerard Chollet; Bernadette Dorizzi
With the pioneering studies of Galton and Henry on ?ngerprint-based human id- ti?cation over a hundred years ago, biometrics recognition is now permeating many sectors of our society. Even though the origins and the most frequent use of b- metrics, primarily ?ngerprints, have been in forensics and law enforcement app- cations, biometric recognition is now needed to address a number of societal pr- lems related to security risks, terror threats and ?nancial fraud. In some situations, for example, detecting duplicate enrolments (for issuing of?cial documents such as passports and driver...
With the pioneering studies of Galton and Henry on ?ngerprint-based human id- ti?cation over a hundred years ago, biometrics recognition is now permea...
cena: 405,36

 Introduction to Cryptography with Open-Source Software Alasdair McAndrew 9781439825709 CRC Press
Introduction to Cryptography with Open-Source Software

ISBN: 9781439825709 / Angielski / Twarda / 461 str.

ISBN: 9781439825709/Angielski/Twarda/461 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alasdair McAndrew

Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography with Open-Source Software illustrates algorithms and cryptosystems using examples and the open-source computer algebra system of Sage. The author, a noted educator in the field, provides a highly practical learning experience by progressing at a gentle pace, keeping mathematics at a manageable level, and including numerous end-of-chapter exercises.

Focusing on the cryptosystems themselves rather than the means of breaking them, the...

Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography with Open-Sou...

cena: 470,93

 A Study of Black Hole Attack Solutions: On Aodv Routing Protocol in Manet I. S. Amiri Elahe Fazeldehkordi Oluwatobi Ayodeji Akanbi 9780128053676 Syngress Publishing
A Study of Black Hole Attack Solutions: On Aodv Routing Protocol in Manet

ISBN: 9780128053676 / Angielski / Miękka / 122 str.

ISBN: 9780128053676/Angielski/Miękka/122 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
I. S. Amiri; Elahe Fazeldehkordi; Oluwatobi Ayodeji Akanbi

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the...

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastruct...

cena: 237,91

 Practical Deployment of Cisco Identity Services Engine (Ise): Real-World Examples of AAA Deployments Andy Richter Jeremy Wood 9780128044575 Syngress Publishing
Practical Deployment of Cisco Identity Services Engine (Ise): Real-World Examples of AAA Deployments

ISBN: 9780128044575 / Angielski / Miękka / 298 str.

ISBN: 9780128044575/Angielski/Miękka/298 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andy Richter; Jeremy Wood

With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a...

With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins a...

cena: 272,62

 Network Infrastructure Security Springer 9781441954923 Springer
Network Infrastructure Security

ISBN: 9781441954923 / Angielski / Miękka / 266 str.

ISBN: 9781441954923/Angielski/Miękka/266 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Springer

Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure Security addresses the emerging concern with better detecting and preventing routers and other network devices from being attacked or compromised.

Network Infrastructure Security bridges the gap between the study of the traffic flow of networks and the study of the actual network...

Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity a...

cena: 405,36

 Policies and Research in Identity Management: First Ifip Wg 11.6 Working Conference on Policies and Research in Identity Management (Idman'07), Rsm Er De Leeuw, Elisabeth 9781441946096 Springer
Policies and Research in Identity Management: First Ifip Wg 11.6 Working Conference on Policies and Research in Identity Management (Idman'07), Rsm Er

ISBN: 9781441946096 / Angielski / Miękka / 160 str.

ISBN: 9781441946096/Angielski/Miękka/160 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Elisabeth De Leeuw; Simone Fischer-Hubner; Jimmy C. Tseng
st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification and access control is growing, not only in companies and organisations but also in the world at large. At the same time, such security measures have to be balanced with means for protecting the privacy of users. Identity management is put under pressure, due to the growing number of frauds who want to hide their true identity. This challenges the information security research community...
st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase ...
cena: 202,66

 Biometric System and Data Analysis: Design, Evaluation, and Data Mining Dunstone, Ted 9781441945952 Springer
Biometric System and Data Analysis: Design, Evaluation, and Data Mining

ISBN: 9781441945952 / Angielski / Miękka / 268 str.

ISBN: 9781441945952/Angielski/Miękka/268 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Springer

Biometric systems are being used in more places and on a larger scale than ever before. As these systems mature, it is vital to ensure the practitioners responsible for development and deployment, have a strong understanding of the fundamentals of tuning biometric systems. The focus of biometric research over the past four decades has typically been on the bottom line: driving down system-wide error rates. In doing so, powerful recognition algorithms have been developed for a number of biometric modalities. These algorithms operate exceedingly well under test conditions.

...

Biometric systems are being used in more places and on a larger scale than ever before. As these systems mature, it is vital to ensure the practiti...

cena: 608,07

 Routledge Handbook of Surveillance Studies David Lyon Kevin Haggerty Kirstie Ball 9780415588836 Routledge
Routledge Handbook of Surveillance Studies

ISBN: 9780415588836 / Angielski / Twarda / 472 str.

ISBN: 9780415588836/Angielski/Twarda/472 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Lyon; Kevin Haggerty; Kirstie Ball
Surveillance is both globalized in cooperative schemes, such as sharing biometric data, and localized in the daily minutiae of social life. This innovative handbook explores the empirical, theoretical and ethical issues around surveillance and its use in daily life.
Surveillance is both globalized in cooperative schemes, such as sharing biometric data, and localized in the daily minutiae of social life. This innov...
cena: 1214,61

 Smart Cards, Tokens, Security and Applications Keith Mayes Konstantinos Markantonakis 9781441944269 Springer
Smart Cards, Tokens, Security and Applications

ISBN: 9781441944269 / Angielski / Miękka / 392 str.

ISBN: 9781441944269/Angielski/Miękka/392 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Keith Mayes; Konstantinos Markantonakis

Providing a broad overview of the many card systems and solutions in practical use today, this state-of-the art work is written by contributing authors who are active researchers and acknowledged experts in their field. A single book cannot be found to match both the breadth and depth of content. The book combines a cross-discipline overview of smart cards, tokens and related security and applications plus a technical reference to support further research and study. A step-by-step approach educates the reader and by the end of the book the reader should be able to play an educated role in...

Providing a broad overview of the many card systems and solutions in practical use today, this state-of-the art work is written by contributing aut...

cena: 486,44

 Cryptanalytic Attacks on Rsa Yan, Song Y. 9781441943101 Springer
Cryptanalytic Attacks on Rsa

ISBN: 9781441943101 / Angielski / Miękka / 255 str.

ISBN: 9781441943101/Angielski/Miękka/255 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Song Y. Yan

RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and widely-used cryptographic system in today's digital world, for which its three inventors Rivest, Shamir and Adleman received the year 2002 Turing Award, the equivalent Nobel Prize in Computer Science.

Cryptanalytic Attacks on RSA covers almost all major known cryptanalytic attacks and defenses of the RSA cryptographic system and its variants. Since RSA depends heavily on computational complexity theory and number...

RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and...

cena: 425,64

 Cyber Security Policy Guidebook Jennifer L. Bayuk 9781118027806 John Wiley & Sons
Cyber Security Policy Guidebook

ISBN: 9781118027806 / Angielski / Twarda / 288 str.

ISBN: 9781118027806/Angielski/Twarda/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jennifer L. Bayuk

Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale--taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions--as well as the pros and cons--of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone. The Guidebook also delves into organizational implementation issues, and...

Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, i...

cena: 426,10

 Decision and Game Theory for Security: First International Conference, Gamesec 2010, Berlin, Germany, November 22-23, 2010. Proceedings Alpcan, Tansu 9783642171963 Springer
Decision and Game Theory for Security: First International Conference, Gamesec 2010, Berlin, Germany, November 22-23, 2010. Proceedings

ISBN: 9783642171963 / Angielski / Miękka / 281 str.

ISBN: 9783642171963/Angielski/Miękka/281 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tansu Alpcan; Levente Buttyan; John S. Baras
Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the - formation age. Concurrently, security of ubiquitous communication, data, and computing poses novel research challenges. Security is a multi-faceted problem due to the complexity of underlying hardware, software, and network inter- pendencies as well as human and social factors. It involves decision making on multiple levels and multiple time scales, given the limited resources available to both malicious attackers and administrators defending...
Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the...
cena: 202,66

 Research Directions in Database Security Teresa F. Lunt 9780387977362 Springer
Research Directions in Database Security

ISBN: 9780387977362 / Angielski / Miękka / 265 str.

ISBN: 9780387977362/Angielski/Miękka/265 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Teresa F. Lunt
Many commercial and defense applications require a database system that protects data of different sensitivities while still allowing users of different clearances to access the system. This book is a collection of papers covering aspects of the emerging security technology for multilevel database systems. It contains reports on such landmark systems as SeaView, LDV, ASD, Secure Sybase, the UNISYS secure distributed system, and the secure entity-relationship system GTERM. Much of the research is concerned with the relational model, although security for the entity-relationship and...
Many commercial and defense applications require a database system that protects data of different sensitivities while still allowing users of differe...
cena: 202,66

 Secure Key Establishment Kim-Kwang Raymond Choo 9781441946898 Not Avail
Secure Key Establishment

ISBN: 9781441946898 / Angielski / Miękka / 216 str.

ISBN: 9781441946898/Angielski/Miękka/216 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kim-Kwang Raymond Choo

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.

Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare Rogaway model and the Canetti Krawczyk model is included. An...

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered ...

cena: 405,36

Pierwsza Podprzednia  22  23  24  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia