![]() |
Software Similarity and Classification
ISBN: 9781447129080 / Angielski / Miękka / 88 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft detection, plagiarism detection, and software clone detection. Extracting program features, processing those features into suitable representations, and constructing distance metrics to define similarity and dissimilarity are the key methods to identify software variants, clones, derivatives, and classes of software. Software Similarity and Classification reviews the literature of those core concepts, in addition to relevant literature in each...
Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft...
|
cena:
203,61 |
![]() |
Step by Step Procedure: A little Handbook for System Administrator
ISBN: 9781461068303 / Angielski / Miękka / 368 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. How & To Whom it helps for? This book is dedicated for the pupil's those who are seeking to learn knowledge in both IT/Non-IT departments and students. Which might be really very helpful while they are sinking under pressure, this book includes with most common features which consists with four chapters. Chapter 01 includes Microsoft Windows default support tools and some third party tools used by a System administrator. Chapter 02 includes with most common windows boot errors and problems which we face today. Here I've explained you how to fix them and their causes to prevent it, with simple...
How & To Whom it helps for? This book is dedicated for the pupil's those who are seeking to learn knowledge in both IT/Non-IT departments and students...
|
cena:
144,32 |
![]() |
Cloud-Computing-Security
ISBN: 9781461194064 / Angielski / Miękka / 354 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Includes: * Introduction to Cloud Computing * Cloud Computing Security * Methodology of Cloud Computing Risk Assessment * Attacks Against the Cloud * Proposed Cloud Computing Security Requirements Baseline * Reporting and Continuous Monitoring * Assessment and Authorization Process * Tools of Cloud Computing Risk Assessment * Conclusion * Abbreviations, Glossary and References
Includes: * Introduction to Cloud Computing * Cloud Computing Security * Methodology of Cloud Computing Risk Assessment * Attacks Against the Cloud * ...
|
cena:
164,89 |
![]() |
Quantitative Security Risk Assessment of Enterprise Networks
ISBN: 9781461418597 / Angielski / Miękka / 28 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Protection of enterprise networks from malicious intrusions is critical to the economy and security of our nation. This article gives an overview of the techniques and challenges for security risk analysis of enterprise networks. A standard model for security analysis will enable us to answer questions such as "are we more secure than yesterday" or "how does the security of one network configuration compare with another one." In this article, we will present a methodology for quantitative security risk analysis that is based on the model of attack graphs and the Common Vulnerability Scoring...
Protection of enterprise networks from malicious intrusions is critical to the economy and security of our nation. This article gives an overview of t...
|
cena:
203,61 |
![]() |
Spyware
ISBN: 9781466221680 / Angielski / Miękka / 92 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Spyware is any piece of software that secretly installs itself on your computer and starts tracking and recording your computer activities. In general, spyware comes secretly bundled within freeware and shareware software that is downloaded from the Internet. Spyware programs work in the background without your knowledge and collect essential information related to you. This may include your usernames, passwords, bank account numbers, and any other personal and confidential information. This information is usually sent to external sources for malicious purposes. Unlike viruses, spyware...
Spyware is any piece of software that secretly installs itself on your computer and starts tracking and recording your computer activities. In general...
|
cena:
82,34 |
![]() |
Disruptive Technologies, Innovation and Global Redesign: Emerging Implications
ISBN: 9781466601345 / Angielski / Twarda / 604 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the last few years, most parts of the world have morphed into an electronically interdependent economic unit where a disruption in one marketplace affects the others. New technologies have emerged, transforming the ways we do business and, consequently, redesigning the world. Innovation in disruptive technologies pushes new and more agile firms to set new benchmarks and forces established companies to revisit existing models or re-invent themselves to stay competitive. Disruptive Technologies, Innovation and Global Redesign: Emerging Implications provides case studies as well as practical...
In the last few years, most parts of the world have morphed into an electronically interdependent economic unit where a disruption in one marketplace ...
|
cena:
940,13 |
![]() |
Crime Prevention Technologies and Applications for Advancing Criminal Investigation
ISBN: 9781466617582 / Angielski / Twarda / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The tools of crime constantly evolve, and law enforcement and forensic investigators must understand advanced forensic techniques to ensure that the most complete evidence is brought to trial. Paramount also the need for investigators to ensure that evidence adheres to the boundaries of the legal system, a place where policy often lags behind new innovations. Crime Prevention Technologies and Applications for Advancing Criminal Investigation addresses the use of electronic devices and software for crime prevention, investigation, and the application of a broad spectrum of sciences to answer...
The tools of crime constantly evolve, and law enforcement and forensic investigators must understand advanced forensic techniques to ensure that the m...
|
cena:
1018,47 |
![]() |
Ethical Impact of Technological Advancements and Applications in Society
ISBN: 9781466617735 / Angielski / Twarda / 358 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the modern era each new innovation poses its own special ethical dilemma. How can human society adapt to these new forms of expression, commerce, government, citizenship, and learning while holding onto its ethical and moral principles? Ethical Impact of Technological Advancements and Applications in Society explores the ethical challenges of these innovations, providing cutting-edge analysis of designs, developments, impacts, policies, theories, and methodologies related to ethical aspects of technology in society. It advances scholarship on both in established areas such as computer...
In the modern era each new innovation poses its own special ethical dilemma. How can human society adapt to these new forms of expression, commerce, g...
|
cena:
1018,47 |
![]() |
Web and Information Security
ISBN: 9781591405887 / Angielski / Twarda / 318 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Web and Information Security consists of a collection of papers written by leading experts in the field that describe state-of-the-art topics pertaining to Web and information systems security. In particular, security for the semantic Web, privacy, security policy management and emerging topics such as secure semantic grids and secure multimedia systems are also discussed. As well as covering basic concepts of Web and information system security, this book provides new insights into the semantic Web field and its related security challenges. Web and Information Security is valuable as a...
Web and Information Security consists of a collection of papers written by leading experts in the field that describe state-of-the-art topics pertaini...
|
cena:
467,25 |
![]() |
Steganography
ISBN: 9781594576676 / Angielski / Miękka / 120 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Steganography is a process which involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process which can be used for example by civil rights organizations in repressive states to communicate their message to the outside world without their own government being aware of it. Less virtuously it can be used by terrorists to communicate with one another without anyone else's knowledge. In both cases the objective is not to make it difficult to...
Steganography is a process which involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be se...
|
cena:
41,19 |
![]() |
Software Security Engineering: Design & Applications
ISBN: 9781614701286 / Angielski / Twarda / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Provides design guidelines on software security which can benefit practitioners, researchers, learners, and educators. This book discusses such topics as: systematic approaches to engineering; building and assuring software security throughout software lifecycle; software security based requirements engineering; and, design for software security.
Provides design guidelines on software security which can benefit practitioners, researchers, learners, and educators. This book discusses such topics...
|
cena:
508,67 |
![]() |
Strategies for Trusted Identities & Infrastructure in Cyberspace
ISBN: 9781614701743 / Angielski / Twarda / 147 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cyberspace provides a platform for innovation and prosperity and the means to improve general welfare around the globe. This book explores the national strategies for cyberspace policy review and trusted identities in cyberspace striving to enhance online choice, efficiency, security and privacy.
Cyberspace provides a platform for innovation and prosperity and the means to improve general welfare around the globe. This book explores the nationa...
|
cena:
673,26 |
![]() |
Cryptography: Protocols, Design & Applications
ISBN: 9781621007791 / Angielski / Twarda / 242 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
1023,70 |
![]() |
Decision and Game Theory for Security: Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, Proceedings
ISBN: 9783642252792 / Angielski / Miękka / 259 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Second International Conference on Decision and Game Theory for Security, GameSec 2011, held in College Park, Maryland, USA, in November 2011. The 16 revised full papers and 2 plenary keynotes presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on attacks, adversaries, and game theory, wireless adhoc and sensor networks, network games, security insurance, security and trust in social networks and security investments.
This book constitutes the refereed proceedings of the Second International Conference on Decision and Game Theory for Security, GameSec 2011, held in ...
|
cena:
203,61 |
![]() |
Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP
ISBN: 9781785482281 / Angielski / Twarda / 224 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP explores many areas that can help computer science students and developers integrate security into their applications. The Internet is not secure, but it's very friendly as a tool for storing and manipulating data. Customer confidence in Internet software is based on it's ability to prevent damage and attacks, but secure software is complicated, depending on several factors, including good risk estimation, good code architecture, cyphering, web server configuration, coding to prevent the most common... Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP explores many areas that can help computer science stude... |
cena:
448,88 |
![]() |
Security for Mobility
ISBN: 9780863413377 / Angielski / Twarda / 466 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As the mobile phone becomes ubiquitous and the divisions between PCs, personal digital assistants, mobiles phones and other mobile devices becomes blurred, the security both of the information handled by these devices and the devices themselves becomes increasingly important. The book covers many aspects of security for mobility including current developments, underlying technologies, network security, mobile code issues, application security and the future.
As the mobile phone becomes ubiquitous and the divisions between PCs, personal digital assistants, mobiles phones and other mobile devices becomes blu...
|
cena:
578,55 |
![]() |
Error-Correcting Codes, Finite Geometries and Cryptography
ISBN: 9780821849569 / Angielski / Miękka / 244 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The volume features cutting-edge theoretical results on the Reed-Muller and Reed-Solomon codes, classical linear codes, codes from nets and block designs, LDPC codes, perfect quantum and orthogonal codes, iterative decoding, magnetic storage and digital memory devices, and MIMO channels. There are new contributions on privacy reconciliation, resilient functions, cryptographic hash functions, and new work on quantum coins. Related original work in finite geometries concerns two-weight codes coming from partial spreads, (0,1) matrices with forbidden configurations, AndrU embeddings, and...
The volume features cutting-edge theoretical results on the Reed-Muller and Reed-Solomon codes, classical linear codes, codes from nets and block desi...
|
cena:
553,61 |
![]() |
Applied Cryptology, Cryptographic Protocols, and Computer Security Models
ISBN: 9780821800416 / Angielski / Miękka / 192 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
533,66 |
![]() |
Non-commutative Cryptography and Complexity of Group-theoretic Problems
ISBN: 9780821853603 / Angielski / Twarda / 413 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It explores how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It also shows that there is remarkable feedback from cryptography to combinatorial group theory because some of the problems motivated by cryptography appear to be new to group theory, and they open many interesting research avenues within group theory. In particular, a lot...
This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, ...
|
cena:
548,63 |
![]() |
Principles of Memory Dump Analysis: The Collected Seminars
ISBN: 9781906717667 / Angielski / Miękka / 284 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is a collection of Software Diagnostics Services webinar transcripts about memory dump analysis methodology developed by Software Diagnostics Institute. Includes 6 seminars on physical memory dump analysis, cloud memory dump analysis, patterns, tools, processes and best practices for software trace and memory dump analysis, pattern-oriented software forensics, a pattern language for memory forensics, and mobile software diagnostics.
This is a collection of Software Diagnostics Services webinar transcripts about memory dump analysis methodology developed by Software Diagnostics Ins...
|
cena:
439,82 |