• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2765

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Cryptology and Network Security: 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi 9783642176180 Springer-Verlag Berlin and Heidelberg GmbH &
Cryptology and Network Security: 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings

ISBN: 9783642176180 / Angielski / Miękka / 355 str.

ISBN: 9783642176180/Angielski/Miękka/355 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Swee-Huay Heng;Rebecca N. Wright;Bok-Min Goi
The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12-14, 2010. The conference was co-organized by the Multimedia University (MMU), Malaysia, and Universiti Tunku Abdul Rahman (UTAR), Malaysia. The conference received 64 submissions from 22 countries, out of which 21 were accepted after a careful and thorough review process. These proceedings also contain abstracts for two invited talks. All submissions were reviewed by at least three members of the Program Committee; those authored or co-authored by Program...
The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12-14, 2010. The co...
cena: 201,24

 Digital Watermarking: 9th International Workshop, Iwdw 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers Kim, Hyoung-Joong 9783642184048 Not Avail
Digital Watermarking: 9th International Workshop, Iwdw 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers

ISBN: 9783642184048 / Angielski / Miękka / 317 str.

ISBN: 9783642184048/Angielski/Miękka/317 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hyoung-Joong Kim
This book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held in Seoul, Korea, in October 2010. The 26 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on forensics, visual cryptography, robust watermarking, steganography, fingerprinting, and steganalysis.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held i...
cena: 201,24

 Transactions on Computational Science XI: Special Issue on Security in Computing, Part II Gavrilova, Marina L. 9783642176968 Not Avail
Transactions on Computational Science XI: Special Issue on Security in Computing, Part II

ISBN: 9783642176968 / Angielski / Miękka / 294 str.

ISBN: 9783642176968/Angielski/Miękka/294 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marina L. Gavrilova
Transactions on Computational Science XI reflects recent developments in the field of Computational Science. Each chapter addresses a range of hot topics within the sphere of security research, including new architectures, novel hardware implementations, and more.
Transactions on Computational Science XI reflects recent developments in the field of Computational Science. Each chapter addresses a range of hot top...
cena: 201,24

 Computational Number Theory Abhijit Das 9781439866153 CRC Press
Computational Number Theory

ISBN: 9781439866153 / Angielski / Twarda / 614 str.

ISBN: 9781439866153/Angielski/Twarda/614 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Abhijit Das

Developed from the author s popular graduate-level course, Computational Number Theory presents a complete treatment of number-theoretic algorithms. Avoiding advanced algebra, this self-contained text is designed for advanced undergraduate and beginning graduate students in engineering. It is also suitable for researchers new to the field and practitioners of cryptography in industry.

Requiring no prior experience with number theory or sophisticated algebraic tools, the book covers many computational aspects of number theory and highlights important and...

Developed from the author s popular graduate-level course, Computational Number Theory presents a complete treatment of number-the...

cena: 587,73

 
Communication and Cyberspace

ISBN: 9781572733947 / Angielski

ISBN: 9781572733947/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
A study of communication in the electronic environment known as cyberspace. It features essays on theoretical contexts, discussion and research on cybernetworks and cyberspaces, studies of new senses of space and navigation (cybernautics) and explorations of cybercommunication and cyberculture.
A study of communication in the electronic environment known as cyberspace. It features essays on theoretical contexts, discussion and research on cyb...
cena: 141,98

 Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011, Proceedings Aggelos Kiayias 9783642190735 Springer-Verlag Berlin and Heidelberg GmbH &
Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011, Proceedings

ISBN: 9783642190735 / Angielski / Miękka / 417 str.

ISBN: 9783642190735/Angielski/Miękka/417 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Aggelos Kiayias
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2011, CT-RSA 2011, held in San Francisco, CA, USA, in February 2011.
The 24 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on secure two-party computation, cryptographic primitives, side channel attacks, authenticated key agreement, proofs of security, block ciphers, security notions, public-key encryption, crypto tools and parameters, and digital signatures.
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2011, CT-RSA 2011, held in San Francisco, CA, USA, i...
cena: 201,24

 Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting Tuyls, Pim 9781849966931 Springer
Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting

ISBN: 9781849966931 / Angielski / Miękka / 340 str.

ISBN: 9781849966931/Angielski/Miękka/340 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Pim Tuyls; Boris Skoric; Tom Kevenaar

Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data. It provides a comprehensive overview of the theory of extracting cryptographic keys from noisy data, and describes applications in the field of biometrics, secure key storage, and anti-counterfeiting.

Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained ove...

cena: 402,53

 Security and Privacy in the Age of Ubiquitous Computing: Ifip Tc11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, J Sasaki, Ryoichi 9781441938190 Springer
Security and Privacy in the Age of Ubiquitous Computing: Ifip Tc11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, J

ISBN: 9781441938190 / Angielski / Miękka / 612 str.

ISBN: 9781441938190/Angielski/Miękka/612 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ryoichi Sasaki; Sihan Qing; Eiji Okamoto
Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In addition, we need to deal with new issues such as security in the P2P environment, privacy issues in the use of smart cards, and RFID systems. Security and Privacy in the Age of Ubiquitous Computing addresses these issues and more by exploring a wide scope of topics. The volume presents a selection of papers from the proceedings of the 20th IFIP International Information Security Conference held from May 30 to June 1,...
Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In ad...
cena: 603,81

 Rfid Security and Privacy: Concepts, Protocols, and Architectures Henrici, Dirk 9783642097928 Springer
Rfid Security and Privacy: Concepts, Protocols, and Architectures

ISBN: 9783642097928 / Angielski / Miękka / 269 str.

ISBN: 9783642097928/Angielski/Miękka/269 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dirk Henrici
In the beginning of 2003, I found a short article about the privacy implications of RFID technology in a newspaper. It raised my interest, and after reading some early research papers on the topic, I thought: "There must exist better solutions. " I c- cerned myself with the topic in my spare time. After having developed my rst - lutions, I asked my supervisor, Prof. Dr. Paul Muller ], whether I could write a paper about my results. As the topic did not t into any running project or at least the overall research directions of his group, he could have answered no. But instead, he encouraged me...
In the beginning of 2003, I found a short article about the privacy implications of RFID technology in a newspaper. It raised my interest, and after r...
cena: 603,81

 Public-Key Cryptography Arto Salomaa 9783642082542 Springer
Public-Key Cryptography

ISBN: 9783642082542 / Angielski / Miękka / 275 str.

ISBN: 9783642082542/Angielski/Miękka/275 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Arto Salomaa
Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essence and advantages, various public-key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis. The second edition has been revised and enlarged especially in its treatment of cryptographic protocols. From a review of the first edition: "This is a comprehensive review ... there can be...
Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications...
cena: 201,24

 Rfid Security: Techniques, Protocols and System-On-Chip Design Kitsos, Paris 9781441945570 Springer
Rfid Security: Techniques, Protocols and System-On-Chip Design

ISBN: 9781441945570 / Angielski / Miękka / 446 str.

ISBN: 9781441945570/Angielski/Miękka/446 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Paris Kitsos; Yan Zhang

RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardware implementations for cryptography algorithms and security techniques in RFID. The volume is structured in three parts. Part 1 deals with RFID fundamentals, including system architectures and applications. Part 2 addresses RFID security protocols and techniques with a comprehensive collection of the recent state-of-art protocols and techniques to secure RFID avoiding all potential security forces and cracks. Finally, the book discusses hardware...

RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardwa...

cena: 603,81

 Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies Zubairi, Junaid Ahmed 9781609608514 Information Science Publishing
Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies

ISBN: 9781609608514 / Angielski / Twarda / 338 str.

ISBN: 9781609608514/Angielski/Twarda/338 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Junaid Ahmed Zubairi; Athar Mahboob
Cyber security, encompassing both information and network security, is of utmost importance in today's information age. Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies details the latest and most important advances in security standards. First, it introduces the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter...
Cyber security, encompassing both information and network security, is of utmost importance in today's information age. Cyber Security Standards, Prac...
cena: 995,01

 Geometries, Codes and Cryptography G. Longo M. Marchi A. Sgarro 9783211822050 Springer
Geometries, Codes and Cryptography

ISBN: 9783211822050 / Angielski / Miękka / 228 str.

ISBN: 9783211822050/Angielski/Miękka/228 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
G. Longo; M. Marchi; A. Sgarro
The general problem studied by information theory is the reliable transmission of information through unreliable channels. Channels can be unreliable either because they are disturbed by noise or because unauthorized receivers intercept the information transmitted. In the first case, the theory of error-control codes provides techniques for correcting at least part of the errors caused by noise. In the second case cryptography offers the most suitable methods for coping with the many problems linked with secrecy and authentication. Now, both error-control and cryptography schemes can be...
The general problem studied by information theory is the reliable transmission of information through unreliable channels. Channels can be unreliable ...
cena: 201,24

 Post-Quantum Cryptography Daniel J. Bernstein Johannes Buchmann Erik Dahmen 9783642100192 Springer
Post-Quantum Cryptography

ISBN: 9783642100192 / Angielski / Miękka / 246 str.

ISBN: 9783642100192/Angielski/Miękka/246 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Daniel J. Bernstein; Johannes Buchmann; Erik Dahmen

Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems.

Leading experts have joined forces for the first time to explain the state of the art in quantum computing, hash-based cryptography, code-based cryptography, lattice-based cryptography, and multivariate cryptography. Mathematical...

Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader ...

cena: 644,07

 Security and Privacy in Mobile Information and Communication Systems: Second International Icst Conference, Mobisec 2010, Catania, Sicily, Italy, May Schmidt, Andreas U. 9783642175015 Springer
Security and Privacy in Mobile Information and Communication Systems: Second International Icst Conference, Mobisec 2010, Catania, Sicily, Italy, May

ISBN: 9783642175015 / Angielski / Miękka / 176 str.

ISBN: 9783642175015/Angielski/Miękka/176 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andreas U. Schmidt
MobiSec 2010 was the second ICST conference on security and privacy in mobile information and communication systems. With the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication.
MobiSec 2010 was the second ICST conference on security and privacy in mobile information and communication systems. With the vast area of mobile tech...
cena: 201,24

 Advances in Cryptology -- Crypto '91: Proceedings Feigenbaum, Joan 9783540551881 Not Avail
Advances in Cryptology -- Crypto '91: Proceedings

ISBN: 9783540551881 / Angielski / Miękka / 484 str.

ISBN: 9783540551881/Angielski/Miękka/484 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joan Feigenbaum
Presents the proceedings of the 11th in a series of workshops on cryptology sponsored by the International Association for Cryptologic Research. All theoretical and practical aspects of cryptology are represented.
Presents the proceedings of the 11th in a series of workshops on cryptology sponsored by the International Association for Cryptologic Research. All t...
cena: 201,24

 A Classical Introduction to Cryptography Exercise Book Thomas Baigneres Pascal Junod Yi Lu 9781441939128 Springer
A Classical Introduction to Cryptography Exercise Book

ISBN: 9781441939128 / Angielski / Miękka / 254 str.

ISBN: 9781441939128/Angielski/Miękka/254 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thomas Baigneres; Pascal Junod; Yi Lu
TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerland Serge Vaudenay EPFL, Switzerland Springer - Thomas Baignbres Pascal Junod EPFL - I&C - LASEC Lausanne, Switzerland Lausanne, Switzerland Yi Lu Jean Monnerat EPFL - I&C - LASEC EPFL-I&C-LASEC Lausanne, Switzerland Lausanne, Switzerland Serge Vaudenay Lausanne, Switzerland Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY...
TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerlan...
cena: 173,06

 Primality Testing and Integer Factorization in Public-Key Cryptography Song Y. Yan 9781441945860 Not Avail
Primality Testing and Integer Factorization in Public-Key Cryptography

ISBN: 9781441945860 / Angielski / Miękka / 371 str.

ISBN: 9781441945860/Angielski/Miękka/371 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Song Y. Yan

The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P). There is still no polynomial-time algorithm for IFP. Many practical public-key cryptosystems and protocols such as RSA (Rivest-Shamir-Adleman) rely their security on computational intractability of IFP.

Primality Testing and Integer Factorization in Public Key Cryptography, Second Edition, provides a survey of recent progress in primality testing and integer...

The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm,...

cena: 603,81

 Fast Software Encryption: 5th International Workshop, Fse '98, Paris, France, March 23-25, 1998, Proceedings G. Goos J. Hartmanis J. Va 9783540642657 Springer
Fast Software Encryption: 5th International Workshop, Fse '98, Paris, France, March 23-25, 1998, Proceedings

ISBN: 9783540642657 / Angielski / Miękka / 297 str.

ISBN: 9783540642657/Angielski/Miękka/297 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
G. Goos; J. Hartmanis; J. Van Leeuwen
This book constitutes the refereed proceedings of the 5th International Workshop on Fast Software Encryption, FSE '98, held in Paris, France, in March 1998. The 20 revised full papers presented were carefully reviewed and selected from a total of 39 submissions. The volume is divided in topical sections on cryptanalysis, new stream ciphers, design construction analysis, hash functions, pseudo-random generators, new block ciphers, and modes of operation.
This book constitutes the refereed proceedings of the 5th International Workshop on Fast Software Encryption, FSE '98, held in Paris, France, in March...
cena: 201,24

 Ethics and Policy of Biometrics: Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, Hong Kong, January Kumar, Ajay 9783642125942 Springer
Ethics and Policy of Biometrics: Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, Hong Kong, January

ISBN: 9783642125942 / Angielski / Miękka / 168 str.

ISBN: 9783642125942/Angielski/Miękka/168 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ajay Kumar; David Zhang

This volume constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, held in Hong Kong, during January 4-5, 2010. The 25 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on Privacy Protection and Challenges, Legal Challenges, Engineering and Social Challenges, Ethical and Medical Concerns, Policy Issues and Deployments in Asia, Challenges in Large Scale Biometrics Identification.

This volume constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Ethics and Policy of Biometric...

cena: 201,24

Pierwsza Podprzednia  16  17  18  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia