• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2897782]
• Literatura piękna
 [1842722]

  więcej...
• Turystyka
 [74600]
• Informatyka
 [152276]
• Komiksy
 [35820]
• Encyklopedie
 [22648]
• Dziecięca
 [622709]
• Hobby
 [145677]
• AudioBooki
 [2022]
• Literatura faktu
 [230971]
• Muzyka CD
 [400]
• Słowniki
 [3022]
• Inne
 [442888]
• Kalendarze
 [431]
• Podręczniki
 [166173]
• Poradniki
 [486675]
• Religia
 [509799]
• Czasopisma
 [440]
• Sport
 [61208]
• Sztuka
 [241198]
• CD, DVD, Video
 [4211]
• Technologie
 [212783]
• Zdrowie
 [102730]
• Książkowe Klimaty
 [121]
• Zabawki
 [3050]
• Puzzle, gry
 [3900]
• Literatura w języku ukraińskim
 [273]
• Art. papiernicze i szkolne
 [10363]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2658

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia Sencar, Husrev T. 9780120471447 Academic Press
Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia

ISBN: 9780120471447 / Angielski / Twarda / 252 str.

ISBN: 9780120471447/Angielski/Twarda/252 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Husrev T. Sencar; Mahalingam Ramkumar; Ali N. Akansu

Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce.

Data Hiding Fundamentals and...

Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of servi...

cena: 314,74 zł

 Data Acquisition Techniques Using PCs Howard Austerlitz 9780120683772 Elsevier Science Publishing Co Inc
Data Acquisition Techniques Using PCs

ISBN: 9780120683772 / Angielski / Miękka / 416 str.

ISBN: 9780120683772/Angielski/Miękka/416 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Howard Austerlitz
The second edition of this highly successful text focuses on the major changes that have taken place in this field in recent times. Data Acquisition Techniques Using PCs, Second Edition, recognises that data acquisition is the core of most engineering and many life science systems in measurement and instrumentation. It will prove invaluable to scientists, engineers, students and technicians wishing to keep up with the latest technological developments.

  • Teaches the reader how to set up a PC-based system that measures, analyzes, and controls experiments and processes through...
The second edition of this highly successful text focuses on the major changes that have taken place in this field in recent times. Data Acquisitio...
cena: 456,96 zł

 Java Cryptography Extensions: Practical Guide for Programmers Jason R. Weiss (Sybase Inc., Dublin, CA) 9780127427515 Elsevier Science & Technology
Java Cryptography Extensions: Practical Guide for Programmers

ISBN: 9780127427515 / Angielski / Miękka / 176 str.

ISBN: 9780127427515/Angielski/Miękka/176 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
CA) Dublin Jason R. Weiss (Sybase Inc.
For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM

For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic...

For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see ther...
cena: 119,31 zł

 System-On-Chip Architectures and Implementations for Private-Key Data Encryption McLoone, Máire 9780306478826 Springer
System-On-Chip Architectures and Implementations for Private-Key Data Encryption

ISBN: 9780306478826 / Angielski / Twarda / 160 str.

ISBN: 9780306478826/Angielski/Twarda/160 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Maire McLoone; John V. McCanny; Mire McLoone

In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architectures for the DES and Rijndael symmetric key encryption algorithms are presented. The generic architectures can be utilised to rapidly and effortlessly generate system-on-chip cores, which support numerous application requirements, most importantly, different modes of operation and encryption and decryption capabilities. In addition, efficient silicon SHA-1, SHA-2 and HMAC hash algorithm architectures are described. A single-chip Internet...

In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architec...

cena: 405,36 zł

 Data Privacy and Security Salomon, David 9780387003115 Springer
Data Privacy and Security

ISBN: 9780387003115 / Angielski / Twarda / 465 str.

ISBN: 9780387003115/Angielski/Twarda/465 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
W. J. Ewens;Salomon; David Salomon

Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies.

Features & Benefits:

* Incorporates both data encryption and data hiding

* Supplies a wealth of exercises and solutions to help readers readily understand the material

* Presents...

Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is...

cena: 374,06 zł

 Access Control Systems: Security, Identity Management and Trust Models Benantar, Messaoud 9780387004457 Springer
Access Control Systems: Security, Identity Management and Trust Models

ISBN: 9780387004457 / Angielski / Twarda / 262 str.

ISBN: 9780387004457/Angielski/Twarda/262 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Messaoud Benantar

This essential resource for professionals and advanced students in security programming and system design introduces the foundations of programming systems security and the theory behind access control models, and addresses emerging access control mechanisms.


This essential resource for professionals and advanced students in security programming and system design introduces the foundations of programming...

cena: 405,36 zł

 Brute Force: Cracking the Data Encryption Standard Curtin, Matt 9780387201092 Copernicus Books
Brute Force: Cracking the Data Encryption Standard

ISBN: 9780387201092 / Angielski / Twarda / 292 str.

ISBN: 9780387201092/Angielski/Twarda/292 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Matt Curtin; M. Curtin

In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved to be rigorous enough. In 1973, the NBS put out an open call for a new, stronger encryption system that would become the new federal standard. Several years later, IBM responded with a system called Lucifer that came to simply be known as DES...

In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these c...

cena: 113,47 zł

 Secure Group Communications Over Data Networks Xukai Zou Byrav Ramamurthy Spyros S. Magliveras 9780387229706 Springer
Secure Group Communications Over Data Networks

ISBN: 9780387229706 / Angielski / Twarda / 172 str.

ISBN: 9780387229706/Angielski/Twarda/172 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xukai Zou; Byrav Ramamurthy; Spyros S. Magliveras
The ubiquitous nature of the Internet is enabling a new generation of - pUcations to support collaborative work among geographically distant users. Security in such an environment is of utmost importance to safeguard the pri vacy of the communication and to ensure the integrity of the applications. 'Secure group communications' (SGC) refers to a scenario in which a group of participants can receive and send messages to group members, in a way that outsiders are unable to glean any information even when they are able to intercept the messages. SGC is becoming extremely important for...
The ubiquitous nature of the Internet is enabling a new generation of - pUcations to support collaborative work among geographically distant users. Se...
cena: 405,36 zł

 Intrusion Detection and Correlation: Challenges and Solutions Kruegel, Christopher 9780387233987 Springer
Intrusion Detection and Correlation: Challenges and Solutions

ISBN: 9780387233987 / Angielski / Twarda / 118 str.

ISBN: 9780387233987/Angielski/Twarda/118 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Christopher Kruegel; Fredrik Valeur; Giovanni Vigna

Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and cryptography.

The Internet is omnipresent and companies have increasingly put critical resources online. This has given rise to the activities of cyber criminals. Virtually all organizations face increasing threats to their networks and the...

Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the proble...

cena: 405,36 zł

 Image and Video Encryption: From Digital Rights Management to Secured Personal Communication Andreas Uhl Andreas Pommer A. Uhl 9780387234021 Springer
Image and Video Encryption: From Digital Rights Management to Secured Personal Communication

ISBN: 9780387234021 / Angielski / Twarda / 161 str.

ISBN: 9780387234021/Angielski/Twarda/161 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andreas Uhl; Andreas Pommer; A. Uhl

Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....).

The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material.


Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from com...

cena: 405,36 zł

 Security in E-Learning Edgar R. Weippl 9780387243412 Springer
Security in E-Learning

ISBN: 9780387243412 / Angielski / Twarda / 185 str.

ISBN: 9780387243412/Angielski/Twarda/185 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Edgar R. Weippl

As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this topic. Security in E-Learning discusses typical threats to e-learning projects and introduces how these issues have been and should be addressed. This knowledge is essential to conduct a security risk analysis effectively, because participants need to be aware of common threats, protection mechanisms and effort/cost issues. Based on the security risk analysis, appropriate preventive measures are thoroughly discussed in this...

As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this...

cena: 405,36 zł

 Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (Teismes) Shoniregun, Charles A. 9780387243436 Springer
Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (Teismes)

ISBN: 9780387243436 / Angielski / Twarda / 196 str.

ISBN: 9780387243436/Angielski/Twarda/196 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Charles A. Shoniregun
This study investigates the impacts and risk assessment of technology-ena bled information (TET), v DEGREEShich are engaged in the process of discovering the opportunities and challenges presented by TEI to the new form of small medi um enterprises (SME) business transactions: Technology Enable Information Small Medium Enterprises (TEISME). Within the UK economy, the notion of TEISMEs is one that forms the focus for this research. Other technologies that enabled information are also discussed. For example electronic mail (e-mail), voice mail, facsimile machines (fax), teleconferencing, data...
This study investigates the impacts and risk assessment of technology-ena bled information (TET), v DEGREEShich are engaged in the process of discover...
cena: 405,36 zł

 Certification and Security in Inter-Organizational E-Services: Ifip 18th World Computer Congress, August 22-27, 2004, Toulouse, France Nardelli, Enrico 9780387250878 Springer
Certification and Security in Inter-Organizational E-Services: Ifip 18th World Computer Congress, August 22-27, 2004, Toulouse, France

ISBN: 9780387250878 / Angielski / Twarda / 149 str.

ISBN: 9780387250878/Angielski/Twarda/149 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Enrico Nardelli; Maurizio Talamo; Enrico Nardelli

Certification and Security in Inter-Organizational E-Services presents the proceeding of CSES 2004 - the 2nd International Workshop on Certification and Security in Inter-Organizational E-Services held within IFIP WCC 2004 in August, 2004, in Toulouse, France. Certification and security share a common technological basis in the reliable and efficient monitoring of executed and running processes; they likewise depend on the same fundamental organizational and economic principles. As the range of services managed and accessed through communication networks grows throughout...

Certification and Security in Inter-Organizational E-Services presents the proceeding of CSES 2004 - the 2nd International Worksho...

cena: 202,66 zł

 Network Security Policies and Procedures Douglas W. Frye 9780387309378 Springer
Network Security Policies and Procedures

ISBN: 9780387309378 / Angielski / Twarda / 244 str.

ISBN: 9780387309378/Angielski/Twarda/244 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Douglas W. Frye

Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures gives the reader a strong, multi-disciplinary understanding of how to pursue this goal.

This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on "the other side of the fence" view an organization s security and will...

Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and P...

cena: 405,36 zł

 Synchronizing Internet Protocol Security (Sipsec) Shoniregun, Charles A. 9780387327242 Springer
Synchronizing Internet Protocol Security (Sipsec)

ISBN: 9780387327242 / Angielski / Twarda / 223 str.

ISBN: 9780387327242/Angielski/Twarda/223 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Charles A. Shoniregun
The open design of the Internet has not only opened many new opp- tunities for communications, but it has also opened many new avenues for attackers against organisations network and computing resources. This book is a critical investigation of the Internet Protocol Security (IPSec) based on combination of theoretical investigation and practical implementation, which provides an in-depth understanding of the IPSec framework. The bene?ts of IPSec were exploited while the delimiting factors cannot be ignored. Infor- tion security has become a major concern in recent times as more and more...
The open design of the Internet has not only opened many new opp- tunities for communications, but it has also opened many new avenues for attackers a...
cena: 405,36 zł

 Privacy-Respecting Intrusion Detection Ulrich Flegel 9780387343464 Springer
Privacy-Respecting Intrusion Detection

ISBN: 9780387343464 / Angielski / Twarda / 307 str.

ISBN: 9780387343464/Angielski/Twarda/307 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ulrich Flegel
Computer and network security is an issue that has been studied for many years. The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di?culties in evaluating a system to determine if it provided the necessary security for particular applications. The Anderson Report, published in 1972, was the outcome of an Air Force Planning Study whose intent was to de?ne the research and development paths required to make secure computers a reality in the USAF. A major contribution of this report was the de?nition of the reference monitor concept,...
Computer and network security is an issue that has been studied for many years. The Ware Report, which was published in 1970, pointed out the need for...
cena: 405,36 zł

 Preserving Privacy in On-Line Analytical Processing (Olap) Wang, Lingyu 9780387462738 Springer
Preserving Privacy in On-Line Analytical Processing (Olap)

ISBN: 9780387462738 / Angielski / Twarda / 180 str.

ISBN: 9780387462738/Angielski/Twarda/180 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lingyu Wang; Sushil Jajodia; Duminda Wijesekera

Preserving Privacy for On-Line Analytical Processing addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. OLAP systems usually need to meet two conflicting goals. First, the sensitive data stored in underlying data warehouses must be kept secret. Second, analytical queries about the data must be allowed for decision support purposes. The main challenge is that sensitive data can be inferred from answers to seemingly innocent aggregations of the data. This volume reviews a series of methods that can precisely answer data cube-style OLAP, regarding...

Preserving Privacy for On-Line Analytical Processing addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. OL...

cena: 405,36 zł

 Principles of Secure Network Systems Design Sumit Ghosh S. Ghosh H. Lawson 9780387952130 Springer
Principles of Secure Network Systems Design

ISBN: 9780387952130 / Angielski / Twarda / 209 str.

ISBN: 9780387952130/Angielski/Twarda/209 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sumit Ghosh; S. Ghosh; H. Lawson
As e-commerce becomes the norm of business transactions and information be comes an essential commodity, it is vital that extensive efforts be made to examine and rectify the problems with the underlying architectures, processes, methods, that are involved in providing and and tools, as well as organizational structures, utilizing services relating to information technology. Such a holistic view of the relevant structures is required in order to identify all of the key aspects that can affect network security. Unfortunately, today's systems and practices, although they have proved to be...
As e-commerce becomes the norm of business transactions and information be comes an essential commodity, it is vital that extensive efforts be made to...
cena: 202,66 zł

 Guide to Elliptic Curve Cryptography Darrel R. Hankerson Alfred J. Menezes Scott A. Vanstone 9780387952734 Springer
Guide to Elliptic Curve Cryptography

ISBN: 9780387952734 / Angielski / Twarda / 311 str.

ISBN: 9780387952734/Angielski/Twarda/311 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Darrel R. Hankerson; Alfred J. Menezes; Scott A. Vanstone

After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism.

Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book...

After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and gover...

cena: 729,69 zł

 Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint Marchette, David J. 9780387952819 Springer
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint

ISBN: 9780387952819 / Angielski / Twarda / 333 str.

ISBN: 9780387952819/Angielski/Twarda/333 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David J. Marchette; D. Marchette
In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins University. That course was the genesis of this book. I had been working in the field for several years at the Naval Surface Warfare Center, in Dahlgren, Virginia, under the auspices of the SHADOW program, with some funding by the Office of Naval Research. In designing the class, I was concerned both with giving an overview of the basic problems in computer security, and with providing information that was of interest to a department of...
In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins Un...
cena: 405,36 zł

 1  2  3  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia