Advances in Computers : Information Security
ISBN: 9780120121601 / Angielski / Twarda / 340 str. Termin realizacji zamówienia: ok. 58 dni roboczych. Advances in Computers covers new developments in computer technology. Most chapters present an overview of a current subfield within computers, with many citations, and often include new developments in the field by the authors of the individual chapters. Topics include hardware, software, theoretical underpinnings of computing, and novel applications of computers. This current volume emphasizes information security issues and includes topics like certifying computer professionals, noninvasive attacks ("cognitive hacking"), computer files as legal evidence ("computer forensics")... Advances in Computers covers new developments in computer technology. Most chapters present an overview of a current subfield within compute... 

cena:
1371,42 zł 
Data Hiding Fundamentals and Applications : Content Security in Digital Multimedia
ISBN: 9780120471447 / Angielski / Twarda / 252 str. Termin realizacji zamówienia: ok. 58 dni roboczych. Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce. Data Hiding Fundamentals and... Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of servi... 

cena:
336,38 zł 
Secure Group Communications Over Data Networks
ISBN: 9780387229706 / Angielski / Twarda / 172 str. Termin realizacji zamówienia: ok. 58 dni roboczych. The ubiquitous nature of the Internet is enabling a new generation of  pUcations to support collaborative work among geographically distant users. Security in such an environment is of utmost importance to safeguard the pri vacy of the communication and to ensure the integrity of the applications. 'Secure group communications' (SGC) refers to a scenario in which a group of participants can receive and send messages to group members, in a way that outsiders are unable to glean any information even when they are able to intercept the messages. SGC is becoming extremely important for...
The ubiquitous nature of the Internet is enabling a new generation of  pUcations to support collaborative work among geographically distant users. Se...


cena:
483,38 zł 
Image and Video Encryption: From Digital Rights Management to Secured Personal Communication
ISBN: 9780387234021 / Angielski / Twarda / 161 str. Termin realizacji zamówienia: ok. 58 dni roboczych. Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....). The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material. Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from com... 

cena:
546,43 zł 
Computer Security and Cryptography
ISBN: 9780471947837 / Angielski / Twarda / 544 str. Termin realizacji zamówienia: ok. 58 dni roboczych. Gain the skills and knowledge needed to create effective data security systems
This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain handson experience in cryptanalysis and learn how to create effective cryptographic systems. The author contributed to the design and analysis of the Data Encryption Standard... Gain the skills and knowledge needed to create effective data security systems
This book updates readers with all the tools, techniques, and... 

cena:
632,32 zł 
Foundations of Cryptography: Volume 1, Basic Tools
ISBN: 9780521035361 / Angielski / Miękka / 396 str. Termin realizacji zamówienia: ok. 58 dni roboczych. Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. It focuses on the basic mathematical tools: computational difficulty (oneway functions), pseudorandomness and zeroknowledge proofs. Rather than describing adhoc approaches, this book emphasizes the clarification of fundamental concepts and the demonstration of the feasibility of solving...
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. This book prese...


cena:
249,56 zł 
Complexity and Cryptography : An Introduction
ISBN: 9780521617710 / Angielski / Miękka / 306 str. Termin realizacji zamówienia: ok. 58 dni roboczych. Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and webbased business processes. Understanding the principles on which it is based is an important topic that requires a knowledge of both computational complexity and a range of topics in pure mathematics. This book provides that knowledge, combining an informal style with strong proofs of the key results to provide an accessible introduction. It includes many examples and exercises, and is based on a highly successful course developed and taught over many years.
Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and webbased business processes. Und...


cena:
233,28 zł 
Protecting Information : From Classical Error Correction to Quantum Cryptography
ISBN: 9780521827409 / Angielski / Twarda / 304 str. Termin realizacji zamówienia: ok. 58 dni roboczych. For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum computing, thus providing a context in which ideas from mathematics and physics meet. By covering such topics as Shor's quantum factoring algorithm, this text informs the reader about current thinking in quantum information theory and encourages an appreciation of the connections between mathematics and science. Of particular interest are the...
For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error ...


cena:
412,36 zł 
Quantum Cryptography and SecretKey Distillation
ISBN: 9780521864855 / Angielski / Twarda / 276 str. Termin realizacji zamówienia: ok. 58 dni roboczych. Quantum cryptography (or quantum key distribution) is a stateoftheart technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This 2006 text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secretkey distillation. The book starts with an overview chapter, progressing to classical cryptography, information theory (classical and quantum), and applications of quantum cryptography. The discussion moves to secretkey distillation, privacy...
Quantum cryptography (or quantum key distribution) is a stateoftheart technique that exploits properties of quantum mechanics to guarantee the secu...


cena:
463,79 zł 
Pseudorandomness and Cryptographic Applications
ISBN: 9780691025469 / Angielski / Miękka / 248 str. Termin realizacji zamówienia: ok. 58 dni roboczych. A pseudorandom generator is an easytocompute function that stretches a short random string into a much longer string that "looks" just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construction of a private key cryptosystem that is secure against chosen plaintext attack. There do not seem to be natural examples of functions that are pseudorandom generators. On the other hand, there do seem to be a variety of natural examples of another basic primitive: the oneway function. A function is oneway if it is easy to... A pseudorandom generator is an easytocompute function that stretches a short random string into a much longer string that "looks" just like a ran... 

cena:
380,42 zł 
Statistical Methods in Computer Security
ISBN: 9780824759391 / Angielski / Twarda / 376 str. Termin realizacji zamówienia: ok. 58 dni roboczych. Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blueribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct on the Internet, considers the development of infrastructures that may prevent breaches of security and law, and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software,...
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current appl...


cena:
742,56 zł 
Cryptology : Machines, History and Methods
ISBN: 9780890063996 / Angielski / Twarda / 520 str. Termin realizacji zamówienia: ok. 58 dni roboczych. The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yesterday, today and tomorrow ) culled from Cryptologia (RoseHulman Institute of Technology, Terre Haute, IN). The articles are divided into five sectio
The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yes...


cena:
1013,19 zł 
DataDriven Block Ciphers for Fast Telecommunication Systems
ISBN: 9781420054118 / Angielski / Twarda / 208 str. Termin realizacji zamówienia: ok. 58 dni roboczych. The Most Progressive and Complete Guide to DDOBased Ciphers
Developers have long recognized that ciphers based on Permutation Networks (PNs) and Controlled SubstitutionPermutation Networks (CSPNs) allow for the implementation of a variety of Data Driven Operations (DDOs). These DDOs can provide fast encryption without incurring excessive hardware costs in modern telecommunication networks. However, until now, with a few exceptions, most DDObased ciphers have been poorly represented in available literature and have continued to remain known to only a small number of encryption experts.... The Most Progressive and Complete Guide to DDOBased Ciphers
Developers have long recognized that ciphers based on Permutation Networks (PNs) and C... 

cena:
651,17 zł 
Handbook of Financial Cryptography and Security
ISBN: 9781420059816 / Angielski / Twarda / 631 str. Termin realizacji zamówienia: ok. 58 dni roboczych. The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic techniques to auctions, electronic voting, micropayment systems, digital rights, financial portfolios, routing networks, and more. In the first part, the book examines blind signatures and other important cryptographic techniques with respect to digital cash/ecash. It also looks at the role of cryptography in auctions and... The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to es... 

cena:
759,70 zł 
Cryptography in C and C++
ISBN: 9781590595022 / Angielski / Twarda / 504 str. Termin realizacji zamówienia: ok. 58 dni roboczych. CRYPTOGRAPHY IS AN ANCIENT ART, well over two thousand years old. The need to keep certain information secret has always existed, and attempts to preserve secrets have therefore existed as well. But it is only in the last thirty years that cryptography has developed into a science that has offered us needed security in our daily lives. Whether we are talking about automated teller machines, cellular telephones, Internet commerce, or computerized ignition locks on automobiles, there is cryptography hidden within. And what is more, none of these applications would work without cryptography The...
CRYPTOGRAPHY IS AN ANCIENT ART, well over two thousand years old. The need to keep certain information secret has always existed, and attempts to pres...


cena:
315,23 zł 
Cryptography for Developers
ISBN: 9781597491044 / Angielski / Miękka / 423 str. Termin realizacji zamówienia: ok. 58 dni roboczych. The only guide for software developers who must learn and implement cryptography safely and cost effectively.
Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, oneway hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes... The only guide for software developers who must learn and implement cryptography safely and cost effectively.
Cryptography for Developers b... 

cena:
252,33 zł 
Primality Testing in Polynomial Time : From Randomized Algorithms to "Primes is in P"
ISBN: 9783540403449 / Angielski / Miękka / 150 str. Termin realizacji zamówienia: ok. 58 dni roboczych. On August 6, 2002, a paper with the title "PRIMES is in P," by M. Agrawal, N. Kayal, and N. Saxena, appeared on the website of the Indian Institute of Technology at Kanpur, India. In this paper it was shown that the "primality problem"hasa"deterministic algorithm" that runs in "polynomial time." Finding out whether a given number n is a prime or not is a problem that was formulated in ancient times, and has caught the interest of mathema ciansagainandagainfor centuries. Onlyinthe 20thcentury, with theadvent of cryptographic systems that actually used large prime numbers, did it turn out to...
On August 6, 2002, a paper with the title "PRIMES is in P," by M. Agrawal, N. Kayal, and N. Saxena, appeared on the website of the Indian Institute of...


cena:
210,14 zł 
Advances in Cryptology  CRYPTO 2002 : 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 1822, 2002. Proceedings
ISBN: 9783540440505 / Angielski / Miękka / 630 str. Termin realizacji zamówienia: ok. 58 dni roboczych. Crypto 2002, the 22nd Annual Crypto Conference, was sponsored by IACR, the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara. It is published as Vol. 2442 of the Lecture Notes in Computer Science (LNCS) of Springer Verlag. Note that 2002, 22 and 2442 are all palindromes... (Don't nod ) Theconferencereceived175submissions, ofwhich40wereaccepted;twos missionsweremergedintoasinglepaper, yieldingthetotalof39papersaccepted...
Crypto 2002, the 22nd Annual Crypto Conference, was sponsored by IACR, the International Association for Cryptologic Research, in cooperation with the...


cena:
504,40 zł 
Information and Communication Security : Second International Conference, ICICS '99, Sydney, Australia, November 911, 1999, Proceedings
ISBN: 9783540666820 / Angielski / Miękka / 328 str. Termin realizacji zamówienia: ok. 58 dni roboczych. ICICS 99, the Second International Conference on Information and C munication Security, was held in Sydney, Australia, 911 November 1999. The conference was sponsored by the Distributed System and Network Security  search Unit, University of Western Sydney, Nepean, the Australian Computer Society, IEEE Computer Chapter (NSW), and Harvey World Travel. I am g teful to all these organizations for their support of the conference. The conference brought together researchers, designers, implementors and users of information security systems and technologies. A range of aspects was addressed...
ICICS 99, the Second International Conference on Information and C munication Security, was held in Sydney, Australia, 911 November 1999. The confer...


cena:
336,25 zł 
Applied Cryptography and Network Security : 5th International Conference, ACNS 2007, Zhuhai, China, June 58, 2007, Proceedings
ISBN: 9783540727378 / Angielski / Miękka / 520 str. Termin realizacji zamówienia: ok. 58 dni roboczych. This book constitutes the refereed proceedings of the 5th International Conference on Applied Cryptography and Network Security, ACNS 2007, held in Zhuhai, China, June 2007. The 31 revised full papers cover signature schemes, computer and network security, cryptanalysis, grouporiented security, cryptographic protocols, anonymous authentication, identitybased cryptography, and security in wireless, adhoc, and peertopeer networks. This book constitutes the refereed proceedings of the 5th International Conference on Applied Cryptography and Network Security, ACNS 2007, held in... 

cena:
420,33 zł 