![]() |
Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 13-15, 2010, Proceedings
ISBN: 9783642174544 / Angielski / Miękka / 467 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing 2010, held in Yamanaka Hot Spring, Japan, in December 2010.The 25 full papers presented were carefully reviewed and selected from 64 submissions. The contributions are organized in topical sections on: efficient software implementation; digital signatures; cryptographic protocols; key agreement; applications - code generation, time-released encryption, and cloud computing; point encoding and pairing-friendly curves; ID-based encryption schemes; and efficient hardware,...
This book constitutes the refereed proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing 2010, held in Yamanaka Hot S...
|
cena:
202,66 |
![]() |
Computers, Privacy and Data Protection: An Element of Choice
ISBN: 9789400706408 / Angielski / Twarda / 484 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This timely volume presents current developments in ICT and privacy/data protection. Readers will find an alternative view of the Data Protection Directive, the contentious debates on data sharing with the USA (SWIFT, PNR), and the judicial and political resistance against data retention.
This timely volume presents current developments in ICT and privacy/data protection. Readers will find an alternative view of the Data Protection Dire...
|
cena:
810,77 |
![]() |
Information and Communications Security: 12th International Conference, Icics 2010, Barcelona, Spain, December 15-17, 2010 Proceedings
ISBN: 9783642176494 / Angielski / Miękka / 474 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information and communication security must provide technological solutions to the tension between the accelerating growth of social, economical and g- ernmental demand for digitalization of information on the one hand, and on the other, the legal and ethical obligation to protect the individuals and organi- tions involved. These proceedings contain the papers accepted at the 2010 International Conference on Information and Communications Security (ICICS 2010), held in Barcelona, Spain, during December 15-17, and hosted by the Information Security Group of the Universitat Polit ecnica de...
Information and communication security must provide technological solutions to the tension between the accelerating growth of social, economical and g...
|
cena:
202,66 |
![]() |
Police Reform in China
ISBN: 9781439819692 / Angielski / Twarda / 416 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. An investigation of policing reform in China, this text offers an insider's perspective through the use of empirical data from the Chinese police, as well as legal literature. It documents the day-to-day operations of the Chinese police and presents an evidence-based assessment of the impact of reforms on the society.
An investigation of policing reform in China, this text offers an insider's perspective through the use of empirical data from the Chinese police, as ...
|
cena:
768,42 |
![]() |
Security Patch Management
ISBN: 9781439824993 / Angielski / Twarda / 284 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the onslaught of patches and the short timeframe to exploit them, organizations end up scrambling for a way to deploy patches successfully and quickly. This book presents all aspects of security patch management in one easy-to-understand format that is applicable regardless of the operating system, network device, or patch deployment tool. The text provides the support and guidance that managers need to integrate an effective patch management process into their environments. Emphasizing the importance of patch management, the author details how patches should be implemented on devices...
With the onslaught of patches and the short timeframe to exploit them, organizations end up scrambling for a way to deploy patches successfully and qu...
|
cena:
470,93 |
![]() |
Honeypots: A New Paradigm to Information Security
ISBN: 9781578087082 / Angielski / Twarda / 340 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses honeypots from a variety of perspectives. Case studies enhance the practical understanding of the subject along with strong theoretical foundation. The book covers the latest technology in information security and honeypots, including honeytokens, honeynets and honeyfarms. Topics include denial of service, virus, worms, phishing, and elaborates on virtual honeypots and forensics. Practical implementations as well as current state of research are discussed. A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses honeypots from a variety of perspectives. Ca... |
cena:
941,94 |
![]() |
Guide to Biometric Reference Systems and Performance Evaluation
ISBN: 9781849967716 / Angielski / Miękka / 382 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the pioneering studies of Galton and Henry on ?ngerprint-based human id- ti?cation over a hundred years ago, biometrics recognition is now permeating many sectors of our society. Even though the origins and the most frequent use of b- metrics, primarily ?ngerprints, have been in forensics and law enforcement app- cations, biometric recognition is now needed to address a number of societal pr- lems related to security risks, terror threats and ?nancial fraud. In some situations, for example, detecting duplicate enrolments (for issuing of?cial documents such as passports and driver...
With the pioneering studies of Galton and Henry on ?ngerprint-based human id- ti?cation over a hundred years ago, biometrics recognition is now permea...
|
cena:
405,36 |
![]() |
Introduction to Cryptography with Open-Source Software
ISBN: 9781439825709 / Angielski / Twarda / 461 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography with Open-Source Software illustrates algorithms and cryptosystems using examples and the open-source computer algebra system of Sage. The author, a noted educator in the field, provides a highly practical learning experience by progressing at a gentle pace, keeping mathematics at a manageable level, and including numerous end-of-chapter exercises. Focusing on the cryptosystems themselves rather than the means of breaking them, the... Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography with Open-Sou... |
cena:
470,93 |
![]() |
A Study of Black Hole Attack Solutions: On Aodv Routing Protocol in Manet
ISBN: 9780128053676 / Angielski / Miękka / 122 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the... Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastruct... |
cena:
237,91 |
![]() |
Practical Deployment of Cisco Identity Services Engine (Ise): Real-World Examples of AAA Deployments
ISBN: 9780128044575 / Angielski / Miękka / 298 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a... With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins a... |
cena:
272,62 |
![]() |
Network Infrastructure Security
ISBN: 9781441954923 / Angielski / Miękka / 266 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure Security addresses the emerging concern with better detecting and preventing routers and other network devices from being attacked or compromised. Network Infrastructure Security bridges the gap between the study of the traffic flow of networks and the study of the actual network... Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity a... |
cena:
405,36 |
![]() |
Policies and Research in Identity Management: First Ifip Wg 11.6 Working Conference on Policies and Research in Identity Management (Idman'07), Rsm Er
ISBN: 9781441946096 / Angielski / Miękka / 160 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification and access control is growing, not only in companies and organisations but also in the world at large. At the same time, such security measures have to be balanced with means for protecting the privacy of users. Identity management is put under pressure, due to the growing number of frauds who want to hide their true identity. This challenges the information security research community...
st The world of the 21 century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase ...
|
cena:
202,66 |
![]() |
Biometric System and Data Analysis: Design, Evaluation, and Data Mining
ISBN: 9781441945952 / Angielski / Miękka / 268 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Biometric systems are being used in more places and on a larger scale than ever before. As these systems mature, it is vital to ensure the practitioners responsible for development and deployment, have a strong understanding of the fundamentals of tuning biometric systems. The focus of biometric research over the past four decades has typically been on the bottom line: driving down system-wide error rates. In doing so, powerful recognition algorithms have been developed for a number of biometric modalities. These algorithms operate exceedingly well under test conditions. ...Biometric systems are being used in more places and on a larger scale than ever before. As these systems mature, it is vital to ensure the practiti... |
cena:
608,07 |
![]() |
Routledge Handbook of Surveillance Studies
ISBN: 9780415588836 / Angielski / Twarda / 472 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Surveillance is both globalized in cooperative schemes, such as sharing biometric data, and localized in the daily minutiae of social life. This innovative handbook explores the empirical, theoretical and ethical issues around surveillance and its use in daily life.
Surveillance is both globalized in cooperative schemes, such as sharing biometric data, and localized in the daily minutiae of social life. This innov...
|
cena:
1214,61 |
![]() |
Smart Cards, Tokens, Security and Applications
ISBN: 9781441944269 / Angielski / Miękka / 392 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Providing a broad overview of the many card systems and solutions in practical use today, this state-of-the art work is written by contributing authors who are active researchers and acknowledged experts in their field. A single book cannot be found to match both the breadth and depth of content. The book combines a cross-discipline overview of smart cards, tokens and related security and applications plus a technical reference to support further research and study. A step-by-step approach educates the reader and by the end of the book the reader should be able to play an educated role in... Providing a broad overview of the many card systems and solutions in practical use today, this state-of-the art work is written by contributing aut... |
cena:
486,44 |
![]() |
Cryptanalytic Attacks on Rsa
ISBN: 9781441943101 / Angielski / Miękka / 255 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and widely-used cryptographic system in today's digital world, for which its three inventors Rivest, Shamir and Adleman received the year 2002 Turing Award, the equivalent Nobel Prize in Computer Science. Cryptanalytic Attacks on RSA covers almost all major known cryptanalytic attacks and defenses of the RSA cryptographic system and its variants. Since RSA depends heavily on computational complexity theory and number... RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and... |
cena:
425,64 |
![]() |
Cyber Security Policy Guidebook
ISBN: 9781118027806 / Angielski / Twarda / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale--taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions--as well as the pros and cons--of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone. The Guidebook also delves into organizational implementation issues, and... Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, i... |
cena:
426,10 |
![]() |
Decision and Game Theory for Security: First International Conference, Gamesec 2010, Berlin, Germany, November 22-23, 2010. Proceedings
ISBN: 9783642171963 / Angielski / Miękka / 281 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the - formation age. Concurrently, security of ubiquitous communication, data, and computing poses novel research challenges. Security is a multi-faceted problem due to the complexity of underlying hardware, software, and network inter- pendencies as well as human and social factors. It involves decision making on multiple levels and multiple time scales, given the limited resources available to both malicious attackers and administrators defending...
Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the...
|
cena:
202,66 |
![]() |
Research Directions in Database Security
ISBN: 9780387977362 / Angielski / Miękka / 265 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Many commercial and defense applications require a database system that protects data of different sensitivities while still allowing users of different clearances to access the system. This book is a collection of papers covering aspects of the emerging security technology for multilevel database systems. It contains reports on such landmark systems as SeaView, LDV, ASD, Secure Sybase, the UNISYS secure distributed system, and the secure entity-relationship system GTERM. Much of the research is concerned with the relational model, although security for the entity-relationship and...
Many commercial and defense applications require a database system that protects data of different sensitivities while still allowing users of differe...
|
cena:
202,66 |
![]() |
Secure Key Establishment
ISBN: 9781441946898 / Angielski / Miękka / 216 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security. Secure Key Establishment identifies several variants of the key sharing requirement. Several variants of the widely accepted Bellare and Rogaway (1993) model are covered. A comparative study of the relative strengths of security notions between these variants of the Bellare Rogaway model and the Canetti Krawczyk model is included. An... Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered ... |
cena:
405,36 |