• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2765

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Hardware Security: Design, Threats, and Safeguards Mukhopadhyay, Debdeep 9781439895832 CRC Press
Hardware Security: Design, Threats, and Safeguards

ISBN: 9781439895832 / Angielski / Twarda / 590 str.

ISBN: 9781439895832/Angielski/Twarda/590 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Debdeep Mukhopadhyay; Rajat Subhra Chakraborty

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC).

Gain a Comprehensive...

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical prin...

cena: 661,20

 Anonymous Security Systems and Applications: Requirements and Solutions Tamura, Shinsuke 9781466616493 Information Science Reference
Anonymous Security Systems and Applications: Requirements and Solutions

ISBN: 9781466616493 / Angielski / Twarda / 266 str.

ISBN: 9781466616493/Angielski/Twarda/266 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shinsuke Tamura
As modern technologies, such as credit cards, social networking, and online user accounts, become part of the consumer lifestyle, information about an individual's purchasing habits, associations, or other information has become increasingly less private. As a result, the details of consumers' lives can now be accessed and shared among third party entities whose motivations lie beyond the grasp, and even understanding, of the original owners. Anonymous Security Systems and Applications: Requirements and Solutions outlines the benefits and drawbacks of anonymous security technologies designed...
As modern technologies, such as credit cards, social networking, and online user accounts, become part of the consumer lifestyle, information about an...
cena: 999,40

 Post-Quantum Cryptography Using Complexity Dr Michael James D 9781469959139 Createspace
Post-Quantum Cryptography Using Complexity

ISBN: 9781469959139 / Angielski / Miękka / 144 str.

ISBN: 9781469959139/Angielski/Miękka/144 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael James De Mare
This is the version of Michael James de Mare's PhD thesis submitted to his Ph.D. defense in 2009. It includes the Dragonfire cipher and a primitive version of 3SAT-based cryptography. Subsequent research into 3SAT revealed the appropriate constants to make 3SAT-based cryptography work.
This is the version of Michael James de Mare's PhD thesis submitted to his Ph.D. defense in 2009. It includes the Dragonfire cipher and a primitive ve...
cena: 64,70

 Critical Information Infrastructure Security: 5th International Workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010, Revised Papers Xenakis, Christos 9783642216930 Springer
Critical Information Infrastructure Security: 5th International Workshop, CRITIS 2010, Athens, Greece, September 23-24, 2010, Revised Papers

ISBN: 9783642216930 / Angielski / Miękka / 160 str.

ISBN: 9783642216930/Angielski/Miękka/160 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Christos Xenakis; Stephen Wolthusen
This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Critical Information Infrastructure Security, CRITIS 2010, held in Athens, Greece in September 2010. The 12 revised full papers and two poster papers presented went through two rounds of reviewing and improvement and were selected from 30 submissions. The papers included address various techniques to realize the security of systems, communications, and data.
This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Critical Information Infrastructure Security, CRIT...
cena: 201,24

 Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers Joux, Antoine 9783642217012 Springer
Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers

ISBN: 9783642217012 / Angielski / Miękka / 415 str.

ISBN: 9783642217012/Angielski/Miękka/415 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Antoine Joux
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, that was held in Lyngby, Denmark, in February 2011. The 22 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 106 initial submissions. The papers are organized in topical sections on differential cryptanalysis, hash functions, security and models, stream ciphers, block ciphers and modes, as well as linear and differential cryptanalysis.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, that was hel...
cena: 201,24

 Studies in Complexity and Cryptography: Miscellanea on the Interplay Between Randomness and Computation Goldreich, Oded 9783642226694 Springer
Studies in Complexity and Cryptography: Miscellanea on the Interplay Between Randomness and Computation

ISBN: 9783642226694 / Angielski / Miękka / 564 str.

ISBN: 9783642226694/Angielski/Miękka/564 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Oded Goldreich; Lidor Avigad; Mihir Bellare
This book presents a collection of 36 pieces of scientific work in the areas of complexity theory and foundations of cryptography: 20 research contributions, 13 survey articles, and 3 programmatic and reflective viewpoint statements. These so far formally unpublished pieces were written by Oded Goldreich, some in collaboration with other scientists.
The articles included in this book essentially reflect the topical scope of the scientific career of Oded Goldreich now spanning three decades. In particular the topics dealt with include average-case complexity, complexity of approximation,...
This book presents a collection of 36 pieces of scientific work in the areas of complexity theory and foundations of cryptography: 20 research contrib...
cena: 362,27

 Advances in Cryptology -- Crypto 2011: 31st Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 14-18, 2011, Proceedings Rogaway, Phillip 9783642227912 Springer
Advances in Cryptology -- Crypto 2011: 31st Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 14-18, 2011, Proceedings

ISBN: 9783642227912 / Angielski / Miękka / 782 str.

ISBN: 9783642227912/Angielski/Miękka/782 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Phillip Rogaway
Constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 2011. This volume also contains the abstract of one invited talk.
Constitutes the refereed proceedings of the 31st Annual International Cryptology Conference, CRYPTO 2011, held in Santa Barbara, CA, USA in August 201...
cena: 201,24

 Trust, Privacy and Security in Digital Business: 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011, Proceedings Steven Furnell, Costas Lambrinoudakis, Günther Pernul 9783642228896 Springer-Verlag Berlin and Heidelberg GmbH &
Trust, Privacy and Security in Digital Business: 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011, Proceedings

ISBN: 9783642228896 / Angielski / Miękka / 223 str.

ISBN: 9783642228896/Angielski/Miękka/223 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Steven Furnell;Costas Lambrinoudakis;Günther Pernul
Offers proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2011. This title features papers that are organized in the following topical sections: identity and trust management; security and privacy models for pervasive information systems; and, reliability and security of content and data.
Offers proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2011. This title features papers that are or...
cena: 201,24

 Computer Security – ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings Vijay Atluri, Claudia Diaz 9783642238215 Springer-Verlag Berlin and Heidelberg GmbH &
Computer Security – ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings

ISBN: 9783642238215 / Angielski / Miękka / 686 str.

ISBN: 9783642238215/Angielski/Miękka/686 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vijay Atluri;Claudia Diaz
Constitutes the refereed proceedings of the 16th European Symposium on Computer Security, ESORICS 2011, held in Leuven, Belgium, in September 2011. This book features the articles that are organized in topical sections on wireless security; Web security; forensics, biometrics and software protection; access control; and, privacy.
Constitutes the refereed proceedings of the 16th European Symposium on Computer Security, ESORICS 2011, held in Leuven, Belgium, in September 2011. Th...
cena: 201,24

 Cryptographic Hardware and Embedded Systems -- CHES 2011: 13th International Workshop, Nara, Japan, September 28 - October 1, 2011, Proceedings Preneel, Bart 9783642239502 Springer
Cryptographic Hardware and Embedded Systems -- CHES 2011: 13th International Workshop, Nara, Japan, September 28 - October 1, 2011, Proceedings

ISBN: 9783642239502 / Angielski / Miękka / 524 str.

ISBN: 9783642239502/Angielski/Miękka/524 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bart Preneel; Tsuyoshi Takagi
This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections named: FPGA implementation; AES; elliptic curve cryptosystems; lattices; side channel attacks; fault attacks; lightweight symmetric algorithms, PUFs; public-key cryptosystems; and hash functions.
This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japa...
cena: 201,24

 Information Security and Cryptology - ICISC 2010: 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers Rhee, Kyung-Hyune 9783642242083 Springer
Information Security and Cryptology - ICISC 2010: 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers

ISBN: 9783642242083 / Angielski / Miękka / 434 str.

ISBN: 9783642242083/Angielski/Miękka/434 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kyung-Hyune Rhee; Daehun Nyang
Constitutes the refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2010. This book includes the papers that are organized in topical sections on cryptanalysis, cryptographic algorithms, implementation, and network and mobile security.
Constitutes the refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, held in Seoul, Korea...
cena: 201,24

 Advances in Digital Forensics VII: 7th Ifip Wg 11.9 International Conference on Digital Forensics, Orlando, Fl, Usa, January 31 - February 2, 2011, Re Peterson, Gilbert 9783642242113 Springer
Advances in Digital Forensics VII: 7th Ifip Wg 11.9 International Conference on Digital Forensics, Orlando, Fl, Usa, January 31 - February 2, 2011, Re

ISBN: 9783642242113 / Angielski / Twarda / 290 str.

ISBN: 9783642242113/Angielski/Twarda/290 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gilbert Peterson; Sujeet Shenoi
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. This title describes research results and applications in the discipline of digital forensics. It highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. This title describes resear...
cena: 201,24

 Provable Security: 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011, Proceedings Boyen, Xavier 9783642243158 Springer
Provable Security: 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011, Proceedings

ISBN: 9783642243158 / Angielski / Miękka / 397 str.

ISBN: 9783642243158/Angielski/Miękka/397 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xavier Boyen; Xiaofeng Chen
This book constitutes the refereed proceedings of the 5th Provable Security Conference held in Xi'an, China, in October 2011. The 22 full papers presented together with 4 short papers and 2 invited talks were carefully reviewed and selected from 75 submissions. The papers are divided in topical sections on cryptographic primitives; encryption; cryptographic protocols; security models and framework; and, key agreement.
This book constitutes the refereed proceedings of the 5th Provable Security Conference held in Xi'an, China, in October 2011. The 22 full papers prese...
cena: 201,24

 Security Aspects in Information Technology: First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall 9783642245855 Springer-Verlag Berlin and Heidelberg GmbH &
Security Aspects in Information Technology: First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings

ISBN: 9783642245855 / Angielski / Miękka / 187 str.

ISBN: 9783642245855/Angielski/Miękka/187 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marc Joye;Debdeep Mukhopadhyay;Michael Tunstall
This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking held in Haldia, India, in October 2011. The 14 full papers presented together with the abstracts of two invited lectures were carefully reviewed and selected from 112 submissions. The papers address all current aspects in cryptography, security aspects in high performance computing and in networks as well. The papers are divided in topical sections on embedded security; digital rights management; cryptographic protocols;...
This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information Technology, High-Performance C...
cena: 201,24

 Communications and Multimedia Security: 12th IFIP TC 6/TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21, 2011, Proceedings de Decker, Bart 9783642247118 Springer
Communications and Multimedia Security: 12th IFIP TC 6/TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21, 2011, Proceedings

ISBN: 9783642247118 / Angielski / Miękka / 249 str.

ISBN: 9783642247118/Angielski/Miękka/249 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bart de Decker; Jorn Lapon; Vincent Naessens
Constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2010, held in Ghent, Belgium, in October 2011. This title includes sections on usability, architecture and framework security, mobile identity management, secure hardware platforms, and biometrics.
Constitutes the refereed proceedings of the 12th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2010, held in...
cena: 201,24

 Information Security: 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, Proceedings Lai, Xuejia 9783642248603 Springer
Information Security: 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, Proceedings

ISBN: 9783642248603 / Angielski / Miękka / 388 str.

ISBN: 9783642248603/Angielski/Miękka/388 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xuejia Lai; Jianying Zhou; Hui Li
This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.
This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in Octobe...
cena: 201,24

 High Performance Networking, Computing, and Communication Systems: Second International Conference ICHCC 2011, Singapore, May 5-6, 2011, Selected Pape Wu, Yanwen 9783642250019 Springer
High Performance Networking, Computing, and Communication Systems: Second International Conference ICHCC 2011, Singapore, May 5-6, 2011, Selected Pape

ISBN: 9783642250019 / Angielski / Miękka / 636 str.

ISBN: 9783642250019/Angielski/Miękka/636 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yanwen Wu
This book constitutes the refereed post-proceedings of the Second International Conference on High Performance Networking, Computing, and Communication systems, ICHCC 2011, held in Singapore in May 2011. The conference was held together with the Second International Conference on Theoretical and Mathematical Foundations of Computer Science, ICTMF 2011, which proceedings are published in CCIS 164. The 84 revised selected papers presented were carefully reviewed and selected for inclusion in the book. The topics covered range from computational science, engineering and technology to digital...
This book constitutes the refereed post-proceedings of the Second International Conference on High Performance Networking, Computing, and Communicatio...
cena: 402,53

 Advances in Information and Computer Security: 6th International Workshop on Security, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings Tetsu Iwata, Masakatsu Nishigaki 9783642251405 Springer-Verlag Berlin and Heidelberg GmbH &
Advances in Information and Computer Security: 6th International Workshop on Security, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings

ISBN: 9783642251405 / Angielski / Miękka / 231 str.

ISBN: 9783642251405/Angielski/Miękka/231 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tetsu Iwata;Masakatsu Nishigaki
This book constitutes the refereed proceedings of the 6th International Workshop on Security, IWSEC 2011, held in Tokyo, Japan, in November 2011. The 14 revised full papers presented in this volume were carefully reviewed and selected from 45 submissions. They address all current issues in information and computer security such as foundations of security, security in networks and ubiquitous computing systems, and security in real life applications. The papers are organized in topical sections on software protection and reliability; cryptographic protocol; pairing and identity based signature;...
This book constitutes the refereed proceedings of the 6th International Workshop on Security, IWSEC 2011, held in Tokyo, Japan, in November 2011. The ...
cena: 201,24

 Rfid Security and Privacy: 7th International Workshop, Rfidsec 2011, Amherst, Ma, Usa, June 26-28, 2011, Revised Selected Papers Juels, Ari 9783642252853 Springer
Rfid Security and Privacy: 7th International Workshop, Rfidsec 2011, Amherst, Ma, Usa, June 26-28, 2011, Revised Selected Papers

ISBN: 9783642252853 / Angielski / Miękka / 260 str.

ISBN: 9783642252853/Angielski/Miękka/260 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ari Juels; Christof Paar
Constitutes the refereed post-workshop proceedings of the 7th International Workshop Radio Frequency Identification: Security and Privacy Issues (RFIDSec) 2011, held in Amherst, Massachusetts, USA, in June 2011.
Constitutes the refereed post-workshop proceedings of the 7th International Workshop Radio Frequency Identification: Security and Privacy Issues (RFID...
cena: 201,24

 Cryptology and Network Security: 10th International Conference, CANS 2011 Sanya, China, December 10-12, 2011 Proceedings Lin, Dongdai 9783642255120 Springer
Cryptology and Network Security: 10th International Conference, CANS 2011 Sanya, China, December 10-12, 2011 Proceedings

ISBN: 9783642255120 / Angielski / Miękka / 313 str.

ISBN: 9783642255120/Angielski/Miękka/313 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dongdai Lin; Gene Tsudik; Xiaoyun Wang
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmetric cryptanalysis, symmetric ciphers, public key cryptography, protocol attacks, and privacy techniques.
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, Chin...
cena: 201,24

Pierwsza Podprzednia  19  20  21  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia