• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2765

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security: Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, Armando, Alessandro 9783642160738 Not Avail
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security: Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28,

ISBN: 9783642160738 / Angielski / Miękka / 185 str.

ISBN: 9783642160738/Angielski/Miękka/185 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alessandro Armando; Gavin Lowe
ThisvolumecontainstheworkshopproceedingsofARSPA-WITS2010, theJoint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, held during March 27 28, 2010 in Paphos (Cyprus). ARSPA-WITS2010o?eredaforumfordiscussingnewresultsintheoriesofc- putersecurity, openquestionsandfundamentalconcernsaboutexistingtheories, and issues related to the development and application of automated reas- ing techniques and tools for the formal speci?cation and analysis of security protocols. There were 28 submissions. All the submissions were thoroughly evaluated on the...
ThisvolumecontainstheworkshopproceedingsofARSPA-WITS2010, theJoint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Th...
cena: 241,50

 Web Application Security: Iberic Web Application Security Conference, Ibwas 2009, Madrid, Spain, December 10-11, 2009. Revised Selected Papers Serrao, Carlos 9783642161193 Not Avail
Web Application Security: Iberic Web Application Security Conference, Ibwas 2009, Madrid, Spain, December 10-11, 2009. Revised Selected Papers

ISBN: 9783642161193 / Angielski / Miękka / 83 str.

ISBN: 9783642161193/Angielski/Miękka/83 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Carlos Serrao; Vicente Aguilera; Fabio Cerullo
IBWAS 2009, the Iberic Conference on Web Applications Security, was the first international conference organized by both the OWASP Portuguese and Spanish ch- ters in order to join the international Web application security academic and industry communities to present and discuss the major aspects of Web applications security. There is currently a change in the information systems development paradigm. The emergence of Web 2. 0 technologies led to the extensive deployment and use of W- based applications and Web services as a way to develop new and flexible information systems. Such systems...
IBWAS 2009, the Iberic Conference on Web Applications Security, was the first international conference organized by both the OWASP Portuguese and Span...
cena: 201,24

 Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, Proceedings Jha, Somesh 9783642155116 Not Avail
Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, Proceedings

ISBN: 9783642155116 / Angielski / Miękka / 524 str.

ISBN: 9783642155116/Angielski/Miękka/524 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Somesh Jha; Robin Sommer; Christian Kreibich
This book constitutes the refereed proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection, RAID 2010, held in Ottawa, Canada, in September 2010. The 24 revised full papers presented together with 15 revised poster papers were carefully reviewed and selected from 102 submissions. The papers are organized in topical sections on network protection, high performance, malware detection and defence, evaluation, forensics, anomaly detection as well as web security.
This book constitutes the refereed proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection, RAID 2010, held in Ottaw...
cena: 201,24

 Secure Data Management: 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010, Proceedings Jonker, Willem 9783642155451 Not Avail
Secure Data Management: 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010, Proceedings

ISBN: 9783642155451 / Angielski / Miękka / 172 str.

ISBN: 9783642155451/Angielski/Miękka/172 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Willem Jonker; Milan Petkovic
A book that constitutes the proceedings of the 7th VLDB Workshop on Secure Data Management that was held in Singapore in September 17, 2010.
A book that constitutes the proceedings of the 7th VLDB Workshop on Secure Data Management that was held in Singapore in September 17, 2010.
cena: 201,24

 Data Privacy and Security David Salomon 9781441918161 Springer-Verlag New York Inc.
Data Privacy and Security

ISBN: 9781441918161 / Angielski / Miękka / 465 str.

ISBN: 9781441918161/Angielski/Miękka/465 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Salomon

Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies.

Features & Benefits:

* Incorporates both data encryption and data hiding

* Supplies a wealth of exercises and solutions to help readers readily understand the material

* Presents...

Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is...

cena: 322,01

 Brute Force: Cracking the Data Encryption Standard Curtin, Matt 9781441918956 Not Avail
Brute Force: Cracking the Data Encryption Standard

ISBN: 9781441918956 / Angielski / Miękka / 292 str.

ISBN: 9781441918956/Angielski/Miękka/292 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Matt Curtin

In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved to be rigorous enough. In 1973, the NBS put out an open call for a new, stronger encryption system that would become the new federal standard. Several years later, IBM responded with a system called Lucifer that came to simply be known as DES...

In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these c...

cena: 112,68

 Secure Group Communications Over Data Networks Xukai Zou Byrav Ramamurthy Spyros S. Magliveras 9781441919939 Not Avail
Secure Group Communications Over Data Networks

ISBN: 9781441919939 / Angielski / Miękka / 172 str.

ISBN: 9781441919939/Angielski/Miękka/172 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xukai Zou; Byrav Ramamurthy; Spyros S. Magliveras
The ubiquitous nature of the Internet is enabling a new generation of - pUcations to support collaborative work among geographically distant users. Security in such an environment is of utmost importance to safeguard the pri vacy of the communication and to ensure the integrity of the applications. 'Secure group communications' (SGC) refers to a scenario in which a group of participants can receive and send messages to group members, in a way that outsiders are unable to glean any information even when they are able to intercept the messages. SGC is becoming extremely important for...
The ubiquitous nature of the Internet is enabling a new generation of - pUcations to support collaborative work among geographically distant users. Se...
cena: 402,53

 Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint Marchette, David J. 9781441929372 Not Avail
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint

ISBN: 9781441929372 / Angielski / Miękka / 333 str.

ISBN: 9781441929372/Angielski/Miękka/333 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David J. Marchette
In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins University. That course was the genesis of this book. I had been working in the field for several years at the Naval Surface Warfare Center, in Dahlgren, Virginia, under the auspices of the SHADOW program, with some funding by the Office of Naval Research. In designing the class, I was concerned both with giving an overview of the basic problems in computer security, and with providing information that was of interest to a department of...
In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins Un...
cena: 402,53

 Cryptographic Security Architecture: Design and Verification Gutmann, Peter 9781441929808 Not Avail
Cryptographic Security Architecture: Design and Verification

ISBN: 9781441929808 / Angielski / Miękka / 320 str.

ISBN: 9781441929808/Angielski/Miękka/320 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peter Gutmann

A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar cryptovariables. It is the foundation for enforcing computer security policies and controls and preempting system misuse.

This book provides a comprehensive design for a portable, flexible high-security cryptographic architecture, with particular emphasis on incorporating rigorous security models and practices. "Cryptographic Security Architecture" unveils an alternative means of building a trustworthy system based on concepts...

A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar ...

cena: 402,53

 Intrusion Detection and Correlation: Challenges and Solutions Kruegel, Christopher 9781441936240 Not Avail
Intrusion Detection and Correlation: Challenges and Solutions

ISBN: 9781441936240 / Angielski / Miękka / 118 str.

ISBN: 9781441936240/Angielski/Miękka/118 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Christopher Kruegel; Fredrik Valeur; Giovanni Vigna

Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and cryptography.

The Internet is omnipresent and companies have increasingly put critical resources online. This has given rise to the activities of cyber criminals. Virtually all organizations face increasing threats to their networks and the...

Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the proble...

cena: 402,53

 Image and Video Encryption: From Digital Rights Management to Secured Personal Communication Uhl, Andreas 9781441936257 Not Avail
Image and Video Encryption: From Digital Rights Management to Secured Personal Communication

ISBN: 9781441936257 / Angielski / Miękka / 161 str.

ISBN: 9781441936257/Angielski/Miękka/161 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andreas Uhl; Andreas Pommer

Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....).

The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material.


Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from com...

cena: 402,53

 Multimedia Encryption and Watermarking Borko Furht Edin Muharemagic Daniel Socek 9781441937438 Not Avail
Multimedia Encryption and Watermarking

ISBN: 9781441937438 / Angielski / Miękka / 327 str.

ISBN: 9781441937438/Angielski/Miękka/327 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Borko Furht; Edin Muharemagic; Daniel Socek

Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which enable a secure exchange of multimedia intellectual property.

Part I, Digital Rights Management (DRM) for Multimedia, introduces DRM concepts and models for multimedia content protection, and presents the key players. Part II, Multimedia Cryptography, provides an overview of modern cryptography, with the focus on modern image, video, speech, and audio encryption techniques. This book also provides an advanced concept of visual and audio...

Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which ena...

cena: 603,81

 A Classical Introduction to Cryptography: Applications for Communications Security Vaudenay, Serge 9781441937971 Not Avail
A Classical Introduction to Cryptography: Applications for Communications Security

ISBN: 9781441937971 / Angielski / Miękka / 336 str.

ISBN: 9781441937971/Angielski/Miękka/336 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Serge Vaudenay

A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes.

This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra and number theory for cryptologists; public key cryptography and cryptanalysis of these schemes; and other cryptographic protocols, e.g. secret sharing, zero-knowledge proofs and undeniable signature...

A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication securit...

cena: 322,01

 Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems Jerzy Pejas Andrzej Piegat 9781441954381 Not Avail
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems

ISBN: 9781441954381 / Angielski / Miękka / 396 str.

ISBN: 9781441954381/Angielski/Miękka/396 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jerzy Pejas; Andrzej Piegat

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research.

"Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions analyzing such areas of AI as fuzzy set theory, predicate logic, neural networks, clustering, data mining and others. It also presents applications of AI as possible solutions for problems like firm bankruptcy, soil erosion, flight control and others.

...

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading E...

cena: 805,10

 Digitale Signaturen Andreas Bertsch 9783540423515 Springer
Digitale Signaturen

ISBN: 9783540423515 / Angielski / Twarda / 280 str.

ISBN: 9783540423515/Angielski/Twarda/280 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andreas Bertsch
Digitale Signaturen basieren auf kryptographischen Algorithmen. Nationale Gesetze zielen auf die beweisrechtliche Gleichstellung digitaler/elektronischer Signaturen mit handschriftlichen Unterschriften. Die Falschungssicherheit digitaler Signaturen ist dabei eine wesentliche Voraussetzung. Im Buch werden die bekannten Verfahren der Gultigkeitsprufung digitaler Signaturen vorgestellt, Probleme analysiert und neue Losungsansatze vorgeschlagen. Dabei werden die Vorgaben des Signaturgesetzes und X.509 berucksichtigt. Die Theorie uber Abgabe und Zugang von Erklarungen des BGB wird dem Verfahren...
Digitale Signaturen basieren auf kryptographischen Algorithmen. Nationale Gesetze zielen auf die beweisrechtliche Gleichstellung digitaler/elektronisc...
cena: 263,32

 Advances in Cryptology - Crypto '89: Proceedings Brassard, Gilles 9780387973173 Springer, Berlin
Advances in Cryptology - Crypto '89: Proceedings

ISBN: 9780387973173 / Angielski / Miękka / 634 str.

ISBN: 9780387973173/Angielski/Miękka/634 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gilles Brassard
CRYPTO is a conference devoted to all aspects of cryptologic research. It is held each year at the University of California at Santa Barbara. Annual meetings on this topic also take place in Europe and are regularly published in this Lecture Notes series under the name of EUROCRYPT. This volume presents the proceedings of the ninth CRYPTO meeting. The papers are organized into sections with the following themes: Why is cryptography harder than it looks?, pseudo-randomness and sequences, cryptanalysis and implementation, signature and authentication, threshold schemes and key management, key...
CRYPTO is a conference devoted to all aspects of cryptologic research. It is held each year at the University of California at Santa Barbara. Annual m...
cena: 201,24

 Decrypted Secrets: Methods and Maxims of Cryptology Bauer, Friedrich L. 9783642063831 Springer
Decrypted Secrets: Methods and Maxims of Cryptology

ISBN: 9783642063831 / Angielski / Miękka / 525 str.

ISBN: 9783642063831/Angielski/Miękka/525 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Friedrich L. Bauer

In today's unsafe and increasingly wired world cryptology plays a vital role in protecting communication channels, databases, and software from unwanted intruders. This revised and extended third edition of the classic reference work on cryptology now contains many new technical and biographical details. The first part treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis, where particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a...

In today's unsafe and increasingly wired world cryptology plays a vital role in protecting communication channels, databases, and software from unw...

cena: 805,10

 Intelligence and Security Informatics: Techniques and Applications Chen, Hsinchun 9783642088704 Springer
Intelligence and Security Informatics: Techniques and Applications

ISBN: 9783642088704 / Angielski / Miękka / 460 str.

ISBN: 9783642088704/Angielski/Miękka/460 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hsinchun Chen; Christopher C. Yang
The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) conference series (http: //www. isiconference. org) have drawn significant attention in the recent years. Intelligence and Security Informatics is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The ISI conference series have brought together academic researchers, law enforcement and intelligence experts, -...
The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (P...
cena: 603,81

 Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore Abe, Masayuki 9783642173721 Not Avail
Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore

ISBN: 9783642173721 / Angielski / Miękka / 634 str.

ISBN: 9783642173721/Angielski/Miękka/634 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Masayuki Abe
ASIACRYPT 2010 was held in the Swiss otel Merchant Court in Singapore, d- ing December 5-9, 2010. The conference was sponsored by the International Association for Cryptologic Research (IACR) in cooperation with the Coding and Cryptography Research Group of Nanyang Technological University. It was also supported by the Singapore Tourism Board, and co-sponsored by the - tional Research Foundation of Singapore, Lee Foundation, IBM Singapore Ltd., O'Connor'sSingaporeLtd., Pu?ersoftLtd., PrivylinkLtd., Hewlett-PackardS- gaporeLtd., JardineOneSolutionLtd., andSingaporeMathematicalSociety.San Ling...
ASIACRYPT 2010 was held in the Swiss otel Merchant Court in Singapore, d- ing December 5-9, 2010. The conference was sponsored by the International As...
cena: 201,24

 Security Technology, Disaster Recovery and Business Continuity: International Conferences, Sectech and Drbc 2010, Held as Part of the Future Generatio Fang, Wai-Chi 9783642176098 Not Avail
Security Technology, Disaster Recovery and Business Continuity: International Conferences, Sectech and Drbc 2010, Held as Part of the Future Generatio

ISBN: 9783642176098 / Angielski / Miękka / 300 str.

ISBN: 9783642176098/Angielski/Miękka/300 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Wai-Chi Fang; Muhammad Khurram Khan; Kirk P. Arnett
Welcome to the proceedings of the 2010 International Conferences on Security Te- nology (SecTech 2010), and Disaster Recovery and Business Continuity (DRBC 2010) - two of the partnering events of the Second International Mega-Conference on Future Generation Information Technology (FGIT 2010). SecTech and DRBC bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of security and disaster recovery methodologies, including their links to c- putational sciences, mathematics and information...
Welcome to the proceedings of the 2010 International Conferences on Security Te- nology (SecTech 2010), and Disaster Recovery and Business Continuity ...
cena: 201,24

Pierwsza Podprzednia  13  14  15  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia