• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2743

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 An Introduction to Mathematical Cryptography Joseph H. Silverman 9781493917105 Springer-Verlag New York Inc.
An Introduction to Mathematical Cryptography

ISBN: 9781493917105 / Angielski / Twarda / 538 str.

ISBN: 9781493917105/Angielski/Twarda/538 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joseph H. Silverman

This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required of the reader; techniques from algebra, number theory, and probability are introduced and developed as required. This text provides an ideal introduction for mathematics and computer science students to the mathematical foundations of modern...

This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signat...

cena: 282,42 zł

 Identity-Based Encryption Sanjit Chatterjee Palash Sarkar 9781489996978 Springer
Identity-Based Encryption

ISBN: 9781489996978 / Angielski / Miękka / 180 str.

ISBN: 9781489996978/Angielski/Miękka/180 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sanjit Chatterjee; Palash Sarkar

Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find...

Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption ...

cena: 403,47 zł

 Sequences and Their Applications - Seta 2014: 8th International Conference, Melbourne, Vic, Australia, November 24-28, 2014, Proceedings Schmidt, Kai-Uwe 9783319123240 Springer
Sequences and Their Applications - Seta 2014: 8th International Conference, Melbourne, Vic, Australia, November 24-28, 2014, Proceedings

ISBN: 9783319123240 / Angielski / Miękka / 315 str.

ISBN: 9783319123240/Angielski/Miękka/315 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kai-Uwe Schmidt; Arne Winterhof
This book constitutes the refereed proceedings of the 8th International Conference on Sequences and Their Applications, SETA 2014, held in Melbourne, VIC, Australia, in November 2014. The 24 full papers presented together with 2 invited papers were carefully reviewed and selected from 36 submissions. The papers have been organized in topical sections on Boolean functions, perfect sequences, correlation of arrays, relative difference sets, aperiodic correlation, pseudorandom sequences and stream ciphers, crosscorrelation of sequences, prime numbers in sequences, OFDM and CDMA, and...
This book constitutes the refereed proceedings of the 8th International Conference on Sequences and Their Applications, SETA 2014, held in Melbourne, ...
cena: 201,72 zł

 Privacy and Identity Management for Life Jan Camenisch Simone Fischer-Hubner Kai Rannenberg 9783642442032 Springer
Privacy and Identity Management for Life

ISBN: 9783642442032 / Angielski / Miękka / 512 str.

ISBN: 9783642442032/Angielski/Miękka/512 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jan Camenisch; Simone Fischer-Hubner; Kai Rannenberg
At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundamental research it will contain description of best practice solutions.
At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundament...
cena: 605,23 zł

 Bent Functions: Results and Applications to Cryptography Natalia Tokareva 9780128023181 Academic Press
Bent Functions: Results and Applications to Cryptography

ISBN: 9780128023181 / Angielski / Miękka / 220 str.

ISBN: 9780128023181/Angielski/Miękka/220 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Natalia Tokareva

Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete mathematics known as Boolean bent functions. As these maximal, nonlinear Boolean functions and their generalizations have many theoretical and practical applications in combinatorics, coding theory, and cryptography, the text provides a detailed survey of their main results, presenting a systematic overview of their generalizations and applications, and considering open problems in classification and systematization of bent functions.

The text is appropriate for...

Bent Functions: Results and Applications to Cryptography offers a unique survey of the objects of discrete mathematics known as Boolean ben...

cena: 268,78 zł

 Moving Target Defense II: Application of Game Theory and Adversarial Modeling Jajodia, Sushil 9781489993168 Springer
Moving Target Defense II: Application of Game Theory and Adversarial Modeling

ISBN: 9781489993168 / Angielski / Miękka / 204 str.

ISBN: 9781489993168/Angielski/Miękka/204 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sushil Jajodia; Anup K. Ghosh; V. S. Subrahmanian

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing.

Moving Target Defense II: Application of Game Theory and Adversarial Modeling...

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their ...

cena: 403,47 zł

 Security and Privacy - Silver Linings in the Cloud: 25th Ifip Tc 11 International Information Security Conference, SEC 2010, Held as Part of Wcc 2010, Rannenberg, Kai 9783642423130 Springer
Security and Privacy - Silver Linings in the Cloud: 25th Ifip Tc 11 International Information Security Conference, SEC 2010, Held as Part of Wcc 2010,

ISBN: 9783642423130 / Angielski / Miękka / 312 str.

ISBN: 9783642423130/Angielski/Miękka/312 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kai Rannenberg; Vijay Varadharajan; Christian Weber
These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this conf- ence, which is the 25th in a series of well-established international conferences on security and privacy organized annually by Technical Committee 11 (TC-11) of IFIP. Moreover, in 2010 it is part of the IFIP World Computer Congress 2010 celebrating both the Golden Jubilee of IFIP (founded in 1960) and the Silver Jubilee of the SEC conference in the exciting city of Brisbane, Australia, during September 20-23. The call for...
These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceeding...
cena: 201,72 zł

 The Architecture of Privacy: On Engineering Technologies That Can Deliver Trustworthy Safeguards Bowman, Courtney 9781491904015 John Wiley & Sons
The Architecture of Privacy: On Engineering Technologies That Can Deliver Trustworthy Safeguards

ISBN: 9781491904015 / Angielski / Miękka / 200 str.

ISBN: 9781491904015/Angielski/Miękka/200 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Courtney Bowman; Ari Gesher; John Grant

Technology's influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products. In this practical guide, experts in data analytics, software engineering, security, and privacy policy describe how software teams can make privacy-protective features a core part of product functionality, rather than add them late in the development process.

Ideal for software engineers new to privacy, this book helps you examine privacy-protective information management architectures and their foundational...

Technology's influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design ...

cena: 117,25 zł

 Managing Information Systems Security and Privacy Denis Trcek 9783642421785 Springer
Managing Information Systems Security and Privacy

ISBN: 9783642421785 / Angielski / Miękka / 234 str.

ISBN: 9783642421785/Angielski/Miękka/234 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Denis Trcek

The book deals with the management of information systems security and privacy, based on a model that covers technological, organizational and legal views. This is the basis for a focused and methodologically structured approach that presents "the big picture" of information systems security and privacy, while targeting managers and technical profiles. The book addresses principles in the background, regardless of a particular technology or organization. It enables a reader to suit these principles to an organization's needs and to implement them accordingly by using explicit procedures...

The book deals with the management of information systems security and privacy, based on a model that covers technological, organizational and lega...

cena: 403,47 zł

 
Cloud to Edgeware: Wireless Grid Applications, Architecture and Security for the Internet of Things

ISBN: 9789814630801 / Angielski / Twarda / 350 str.

ISBN: 9789814630801/Angielski/Twarda/350 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lee W. McKnight; Tyson T. Brooks
cena: 659,85 zł

 Advances in Audio Watermarking Based on Singular Value Decomposition Pranab Kumar Dhar Tetsuya Shimamura  9783319147994 Springer
Advances in Audio Watermarking Based on Singular Value Decomposition

ISBN: 9783319147994 / Angielski / Miękka / 58 str.

ISBN: 9783319147994/Angielski/Miękka/58 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Pranab Kumar Dhar;Tetsuya Shimamura

This book introduces audio watermarking methods for copyright protection, which has drawn extensive attention for securing digital data from unauthorized copying. The book is divided into two parts. First, an audio watermarking method in discrete wavelet transform (DWT) and discrete cosine transform (DCT) domains using singular value decomposition (SVD) and quantization is introduced. This method is robust against various attacks and provides good imperceptible watermarked sounds. Then, an audio watermarking method in fast Fourier transform (FFT) domain using SVD and Cartesian-polar...

This book introduces audio watermarking methods for copyright protection, which has drawn extensive attention for securing digital data from unauth...

cena: 201,72 zł

 Arithmetic of Finite Fields: 5th International Workshop, Waifi 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers Koç, Çetin Kaya 9783319162768 Springer
Arithmetic of Finite Fields: 5th International Workshop, Waifi 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers

ISBN: 9783319162768 / Angielski / Miękka / 213 str.

ISBN: 9783319162768/Angielski/Miękka/213 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Cetin Kaya Koc; Sihem Mesnager; Erkay Sava
This book constitutes the refereed proceedings of the 5th International Workshop on the Arithmetic of Finite Field, WAIFI 2014, held in Gebze, Turkey, in September 2014. The 9 revised full papers and 43 invited talks presented were carefully reviewed and selected from 27 submissions. This workshop is a forum of mathematicians, computer scientists, engineers and physicists performing research on finite field arithmetic, interested in communicating the advances in the theory, applications, and implementations of finite fields. The workshop will help to bridge the gap between the mathematical...
This book constitutes the refereed proceedings of the 5th International Workshop on the Arithmetic of Finite Field, WAIFI 2014, held in Gebze, Turkey,...
cena: 193,68 zł

 Decentralized Applications: Harnessing Bitcoin's Blockchain Technology Raval, Siraj 9781491924549 John Wiley & Sons
Decentralized Applications: Harnessing Bitcoin's Blockchain Technology

ISBN: 9781491924549 / Angielski / Miękka / 118 str.

ISBN: 9781491924549/Angielski/Miękka/118 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Siraj Raval

Take advantage of Bitcoin's underlying technology, the blockchain, to build massively scalable, decentralized applications known as dapps. In this practical guide, author Siraj Raval explains why dapps will become more widely used--and profitable--than today's most popular web apps. You'll learn how the blockchain's cryptographically stored ledger, scarce-asset model, and peer-to-peer (P2P) technology provide a more flexible, better-incentivized structure than current software models.

Once you understand the theory behind dapps and what a thriving dapp ecosystem looks like,...

Take advantage of Bitcoin's underlying technology, the blockchain, to build massively scalable, decentralized applications known as dapps. I...

cena: 150,24 zł

 Quantum Attacks on Public-Key Cryptosystems Song y. Yan 9781489997791 Springer
Quantum Attacks on Public-Key Cryptosystems

ISBN: 9781489997791 / Angielski / Miękka / 207 str.

ISBN: 9781489997791/Angielski/Miękka/207 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Song y. Yan

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.

Quantum Attacks on Public-Key Cryptosystems presemts almost all...

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm ...

cena: 403,47 zł

 
Cyber Nation: How Venture Capital & Startups Are Protecting America from Cyber Criminals, Threats and Cyber Attacks.

ISBN: 9781514863220 / Angielski / Miękka / 148 str.

ISBN: 9781514863220/Angielski/Miękka/148 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ross Blankenship
"The Best Book on Cybersecurity and America's Top Startups " What if you could prevent the next great cyber attack? What if you knew about the next World War - an epic battle against states, governments, companies and individuals? Venture capital and cybersecurity expert, Ross Blankenship (http: //angelkings.com/invest), shows you who's on the most wanted cyber criminal list, what methods cyber hackers are using to attack networks, where these cyber attacks have taken place (Anthem, Target, Sony, and the United States' Office of Personnel Management), when these attacks...
"The Best Book on Cybersecurity and America's Top Startups " What if you could prevent the next great cyber attack? What if you knew about the ...
cena: 80,72 zł

 Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security: 10th International Conference, Icgs3 2015, London, Uk, September Jahankhani, Hamid 9783319232751 Springer
Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security: 10th International Conference, Icgs3 2015, London, Uk, September

ISBN: 9783319232751 / Angielski / Miękka / 361 str.

ISBN: 9783319232751/Angielski/Miękka/361 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hamid Jahankhani; Alex Carlile; Babak Akhgar
This book constitutes the refereed proceedings of the 10th International Conference on Global Security, Safety and Sustainability, ICGS3 2015, held in London, UK, in September 2015. The 31 revised full papers presented were carefully reviewed and selected from 57 submissions. The papers focus on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with the 21st century living style, systems and infrastructures.
This book constitutes the refereed proceedings of the 10th International Conference on Global Security, Safety and Sustainability, ICGS3 2015, held in...
cena: 201,72 zł

 Algebraic Informatics: 6th International Conference, Cai 2015, Stuttgart, Germany, September 1-4, 2015. Proceedings Maletti, Andreas 9783319230207 Springer
Algebraic Informatics: 6th International Conference, Cai 2015, Stuttgart, Germany, September 1-4, 2015. Proceedings

ISBN: 9783319230207 / Angielski / Miękka / 223 str.

ISBN: 9783319230207/Angielski/Miękka/223 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andreas Maletti

This book constitutes the refereed proceedings of the 6th International Conference on Algebraic Informatics, CAI 2015, held in Stuttgart, Germany, in September 2015.

The 15 revised full papers presented were carefully reviewed and selected from 25 submissions. The papers cover topics such as data models and coding theory; fundamental aspects of cryptography and security; algebraic and stochastic models of computing; logic and program modelling.







This book constitutes the refereed proceedings of the 6th International Conference on Algebraic Informatics, CAI 2015, held in Stuttgart, Germany, ...

cena: 193,68 zł

 Security and Privacy in Biometrics Patrizio Campisi 9781447162018 Springer
Security and Privacy in Biometrics

ISBN: 9781447162018 / Angielski / Miękka / 438 str.

ISBN: 9781447162018/Angielski/Miękka/438 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Patrizio Campisi

Biometrics-based recognition systems offer many benefits over traditional authentication approaches. However, such systems raise new challenges related to personal data protection.

This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues.

Topics and features: presents a unique focus on novel approaches and...

Biometrics-based recognition systems offer many benefits over traditional authentication approaches. However, such systems raise new challenges rel...

cena: 403,47 zł

 Trust, Privacy and Security in Digital Business: 12th International Conference, Trustbus 2015, Valencia, Spain, September 1-2, 2015, Proceedings Fischer-Hübner, Simone 9783319229058 Springer
Trust, Privacy and Security in Digital Business: 12th International Conference, Trustbus 2015, Valencia, Spain, September 1-2, 2015, Proceedings

ISBN: 9783319229058 / Angielski / Miękka / 235 str.

ISBN: 9783319229058/Angielski/Miękka/235 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Simone Fischer-Hubner; Costas Lambrinoudakis; Javier Lopez
This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2015, held in Valencia, Spain, in September 2015 in conjunction with DEXA 2015. trust and privacy issues in mobile environments; and privacy requirements and privacy audit.
This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2015,...
cena: 193,68 zł

 Information Security Theory and Practice: 9th Ifip Wg 11.2 International Conference, Wistp 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceed Akram, Raja Naeem 9783319240176 Springer
Information Security Theory and Practice: 9th Ifip Wg 11.2 International Conference, Wistp 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceed

ISBN: 9783319240176 / Angielski / Miękka / 281 str.

ISBN: 9783319240176/Angielski/Miękka/281 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Raja Akram; Sushil Jajodia
This volume constitutes the refereed proceedings of the 9th IFIP WG 11.2 International Conference(formerly Workshop) on Information Security Theory and Practices, WISTP 2015, held in Heraklion, Crete, Greece, in August 2015. The 14 revised full papers and 4 short papers presented together were carefully reviewed and selected from 52 submissions. WISTP 2015 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of elded systems, the application of security technology, the...
This volume constitutes the refereed proceedings of the 9th IFIP WG 11.2 International Conference(formerly Workshop) on Information Security Theory an...
cena: 201,72 zł

Pierwsza Podprzednia  127  128  129  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia