• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2765

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, Gritzalis, Dimitris 9783642304354 Springer
Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6,

ISBN: 9783642304354 / Angielski / Twarda / 610 str.

ISBN: 9783642304354/Angielski/Twarda/610 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dimitris Gritzalis; Steven Furnell; Marianthi Theoharidou
Constitutes the refered proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012.
Constitutes the refered proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, ...
cena: 402,53

 Lightweight Cryptography for Security and Privacy: 2nd International Workshop, Lightsec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers Avoine, Gildas 9783642403910 Springer
Lightweight Cryptography for Security and Privacy: 2nd International Workshop, Lightsec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers

ISBN: 9783642403910 / Angielski / Miękka / 143 str.

ISBN: 9783642403910/Angielski/Miękka/143 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gildas Avoine; Orhun Kara
This book constitutes the proceedings of the 2th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2013, held in Gebze, Turkey, during May 6-7, 2013. The 10 full papers presented together with 3 invited talks were carefully reviewed and selected from 27 submissions. The papers are grouped in topical sections on efficient Implementations and designs, block cipher cryptanalysis, wireless sensor networks, and cryptographic protocols.
This book constitutes the proceedings of the 2th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2013, held in G...
cena: 185,18

 Advances in Digital Forensics IX: 9th Ifip Wg 11.9 International Conference on Digital Forensics, Orlando, Fl, Usa, January 28-30, 2013, Revised Selec Peterson, Gilbert 9783642411472 Springer
Advances in Digital Forensics IX: 9th Ifip Wg 11.9 International Conference on Digital Forensics, Orlando, Fl, Usa, January 28-30, 2013, Revised Selec

ISBN: 9783642411472 / Angielski / Twarda / 398 str.

ISBN: 9783642411472/Angielski/Twarda/398 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gilbert Peterson; Sujeet Shenoi
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance - investigations of security...
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wirele...
cena: 402,53

 Trustworthy Global Computing: 7th International Symposium, Tgc 2012, Newcastle Upon Tyne, Uk, September 7-8, 2012, Revised Selected Papers Palamidessi, Catuscia 9783642411564 Springer
Trustworthy Global Computing: 7th International Symposium, Tgc 2012, Newcastle Upon Tyne, Uk, September 7-8, 2012, Revised Selected Papers

ISBN: 9783642411564 / Angielski / Miękka / 213 str.

ISBN: 9783642411564/Angielski/Miękka/213 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Catuscia Palamidessi; Mark D. Ryan
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Symposium on Trustworthy Global Computing, TGC 2012, held in Newcastle upon Tyne, UK, in September 2012. The 9 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 14 submissions. The papers cover a wide range of topics in the area of global computing and reliable computation in the so-called global computers, i.e., those computational abstractions emerging in large-scale infrastructures such as service-oriented architectures, autonomic systems...
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Symposium on Trustworthy Global Computing, TGC 2012...
cena: 185,18

 Security, Privacy, and Applied Cryptography Engineering: Third International Conference, Space 2013, Kharagpur, India, October 19-23, 2013, Proceeding Gierlichs, Benedikt 9783642412233 Springer
Security, Privacy, and Applied Cryptography Engineering: Third International Conference, Space 2013, Kharagpur, India, October 19-23, 2013, Proceeding

ISBN: 9783642412233 / Angielski / Miękka / 191 str.

ISBN: 9783642412233/Angielski/Miękka/191 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Benedikt Gierlichs; Sylvain Guilley; Debdeep Mukhopadhyay
This book constitutes the refereed proceedings of the Third International Conference on Security, Privacy and Applied Cryptography Engineering held in Kharagpur, India, in October 2013. The 12 papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections on implementations and protocols, side channel attacks and countermeasures, identity-based identification schemes, and signatures.
This book constitutes the refereed proceedings of the Third International Conference on Security, Privacy and Applied Cryptography Engineering held in...
cena: 185,18

 Provable Security: 7th International Conference, Provsec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings Susilo, Willy 9783642412264 Springer
Provable Security: 7th International Conference, Provsec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings

ISBN: 9783642412264 / Angielski / Miękka / 347 str.

ISBN: 9783642412264/Angielski/Miękka/347 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Willy Susilo; Reza Reyhanitabar
This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption.
This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in Oc...
cena: 201,24

 Privacy Enhancing Technologies: 12th International Symposium, Pets 2012, Vigo, Spain, July 11-13, 2012, Proceedings Fischer-Hübner, Simone 9783642316791 Springer
Privacy Enhancing Technologies: 12th International Symposium, Pets 2012, Vigo, Spain, July 11-13, 2012, Proceedings

ISBN: 9783642316791 / Angielski / Miękka / 319 str.

ISBN: 9783642316791/Angielski/Miękka/319 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Simone Fischer-H Bner; Matthew Wright
Constitutes the refereed proceedings of the 12th International Symposium on Privacy Enhancing Technologies, PET 2012, held in Vigo, Spain, in July 2012.
Constitutes the refereed proceedings of the 12th International Symposium on Privacy Enhancing Technologies, PET 2012, held in Vigo, Spain, in July 201...
cena: 201,24

 Critical Infrastructure Protection III: Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers Charles Palmer, Sujeet Shenoi 9783642260407 Springer-Verlag Berlin and Heidelberg GmbH &
Critical Infrastructure Protection III: Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers

ISBN: 9783642260407 / Angielski / Miękka / 257 str.

ISBN: 9783642260407/Angielski/Miękka/257 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Charles Palmer;Sujeet Shenoi
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, commercial nuclear reactors, materials and waste, postal and shipping, and government facilities. Global business and industry, governments,...
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- ...
cena: 402,53

 Transactions on Data Hiding and Multimedia Security VIII Yun Q. Shi 9783642319709 Springer-Verlag Berlin and Heidelberg GmbH &
Transactions on Data Hiding and Multimedia Security VIII

ISBN: 9783642319709 / Angielski / Miękka / 103 str.

ISBN: 9783642319709/Angielski/Miękka/103 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Q. Shi
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of...
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applica...
cena: 201,24

 Differential Cryptanalysis of the Data Encryption Standard Eli Biham Adi Shamir 9781461393160 Springer
Differential Cryptanalysis of the Data Encryption Standard

ISBN: 9781461393160 / Angielski / Miękka / 188 str.

ISBN: 9781461393160/Angielski/Miękka/188 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eli Biham; Adi Shamir
DES, the Data Encryption Standard, is the best known and most widely used civilian cryptosystem. It was developed by IBM and adopted as a US national standard in the mid 1970s, and had resisted all attacks in the last 15 years. This book presents the first successful attack which can break the full 16 round DES faster than via exhaustive search. It describes in full detail, the novel technique of Differential Cryptanalysis, and demonstrates its applicability to a wide variety of cryptosystems and hash functions, including FEAL, Khafre, REDOC-II, LOKI, Lucifer, Snefru, N-Hash, and many...
DES, the Data Encryption Standard, is the best known and most widely used civilian cryptosystem. It was developed by IBM and adopted as a US national ...
cena: 422,66

 Communications and Multimedia Security: 13th Ifip Tc 6/Tc 11 International Conference, CMS 2012, Canterbury, Uk, September 3-5, 2012, Proceedings de Decker, Bart 9783642328046 Springer
Communications and Multimedia Security: 13th Ifip Tc 6/Tc 11 International Conference, CMS 2012, Canterbury, Uk, September 3-5, 2012, Proceedings

ISBN: 9783642328046 / Angielski / Miękka / 239 str.

ISBN: 9783642328046/Angielski/Miękka/239 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bart de Decker; David W. Chadwick
This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2012, held in Canterbury, UK, in September 2012. The 6 revised full papers presented together with 8 short papers, 8 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on image and handwriting analysis, authentication and performance, biometrics, forensics and watermarking, and communications...
This book constitutes the refereed proceedings of the 13th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 201...
cena: 201,24

 Secure Data Management: 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012, Proceedings Willem Jonker, Milan Petković 9783642328725 Springer-Verlag Berlin and Heidelberg GmbH &
Secure Data Management: 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012, Proceedings

ISBN: 9783642328725 / Angielski / Miękka / 177 str.

ISBN: 9783642328725/Angielski/Miękka/177 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Willem Jonker;Milan Petkovic
This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, in August 27, 2012. The 12 revised full papers presented were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on privacy protection, access control, secure storage on the cloud, and trust on the Web.
This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, in August 27, 2012. The 1...
cena: 185,18

 Speech Dereverberation Patrick A. Naylor Nikolay D. Gaubitch 9781447125778 Springer
Speech Dereverberation

ISBN: 9781447125778 / Angielski / Miękka / 388 str.

ISBN: 9781447125778/Angielski/Miękka/388 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Patrick A. Naylor; Nikolay D. Gaubitch

Speech Dereverberation gathers together an overview, a mathematical formulation of the problem and the state-of-the-art solutions for dereverberation.

Speech Dereverberation presents current approaches to the problem of reverberation. It provides a review of topics in room acoustics and also describes performance measures for dereverberation. The algorithms are then explained with mathematical analysis and examples that enable the reader to see the strengths and weaknesses of the various techniques, as well as giving an understanding of the questions still to be addressed. Techniques...

Speech Dereverberation gathers together an overview, a mathematical formulation of the problem and the state-of-the-art solutions for dereverberati...

cena: 603,81

 Advances in Digital Forensics VIII: 8th Ifip Wg 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Peterson, Gilbert 9783642339615 Springer
Advances in Digital Forensics VIII: 8th Ifip Wg 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised

ISBN: 9783642339615 / Angielski / Twarda / 334 str.

ISBN: 9783642339615/Angielski/Twarda/334 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gilbert Peterson; Sujeet Shenoi
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance - investigations of security...
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wirele...
cena: 201,24

 Research in Cryptology: 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers Frederik Armknecht, Stefan Lucks 9783642341588 Springer-Verlag Berlin and Heidelberg GmbH &
Research in Cryptology: 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers

ISBN: 9783642341588 / Angielski / Miękka / 151 str.

ISBN: 9783642341588/Angielski/Miękka/151 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Frederik Armknecht;Stefan Lucks
This book constitutes the refereed proceedings of the 4th Western European Workshop on Research in Cryptology, WEWoRC 2011, held in Weimar Germany, in July 2011. The 10 revised full papers were carefully reviewed and selected from numerour submissions. The papers span a wide spectrum of topics from foundations of cryptology, upto secret-key cryptosystems and hash functions, public-key cryptosystems, modes of operation, cryptographic protocols, hardware and software implementation of cryptosystems and their integration into secure systems, and applications such as watermarking and code...
This book constitutes the refereed proceedings of the 4th Western European Workshop on Research in Cryptology, WEWoRC 2011, held in Weimar Germany, in...
cena: 185,18

 Comp Cryptography C Yan, Song Y. 9781118188583 John Wiley & Sons
Comp Cryptography C

ISBN: 9781118188583 / Angielski / Twarda / 432 str.

ISBN: 9781118188583/Angielski/Twarda/432 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Song Y. Yan
The only book to provide a unified view of the interplay between computational number theory and cryptography

Computational number theory and modern cryptography are two of the most important and fundamental research fields in information security. In this book, Song Y. Yang combines knowledge of these two critical fields, providing a unified view of the relationships between computational number theory and cryptography. The author takes an innovative approach, presenting mathematical ideas first, thereupon treating cryptography as an immediate application of the mathematical...

The only book to provide a unified view of the interplay between computational number theory and cryptography

Computational number th...

cena: 504,75

 Principles of Secure Network Systems Design Sumit Ghosh H. Lawson 9781461265382 Springer
Principles of Secure Network Systems Design

ISBN: 9781461265382 / Angielski / Miękka / 209 str.

ISBN: 9781461265382/Angielski/Miękka/209 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sumit Ghosh; H. Lawson
As e-commerce becomes the norm of business transactions and information be comes an essential commodity, it is vital that extensive efforts be made to examine and rectify the problems with the underlying architectures, processes, methods, that are involved in providing and and tools, as well as organizational structures, utilizing services relating to information technology. Such a holistic view of the relevant structures is required in order to identify all of the key aspects that can affect network security. Unfortunately, today's systems and practices, although they have proved to be...
As e-commerce becomes the norm of business transactions and information be comes an essential commodity, it is vital that extensive efforts be made to...
cena: 201,24

 Encryption for Digital Content Aggelos Kiayias Serdar Pehlivanoglu 9781461427216 Springer
Encryption for Digital Content

ISBN: 9781461427216 / Angielski / Miękka / 209 str.

ISBN: 9781461427216/Angielski/Miękka/209 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Aggelos Kiayias; Serdar Pehlivanoglu

Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include fingerprinting codes, traitor tracing, broadcast encryption and others. This book is an introduction to this new generation of cryptographic mechanisms as well as an attempt to provide a cohesive presentation of these techniques.

Encryption for Digital Content...

Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth...

cena: 402,53

 Street Cryptography: A Quick and Dirty Way to Maintain Your Secret Conspiracy Christopher Forrest 9781478210153 Createspace Independent Publishing Platform
Street Cryptography: A Quick and Dirty Way to Maintain Your Secret Conspiracy

ISBN: 9781478210153 / Angielski / Miękka / 88 str.

ISBN: 9781478210153/Angielski/Miękka/88 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Christopher Forrest
cena: 32,33

 Cyber-Assurance for the Internet of Things Tyson Brooks 9781119193869 Wiley-IEEE Press
Cyber-Assurance for the Internet of Things

ISBN: 9781119193869 / Angielski / Twarda / 520 str.

ISBN: 9781119193869/Angielski/Twarda/520 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tyson Brooks

Presents an Cyber-Assurance approach to the Internet of Things (IoT)

This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the text covers fundamental and advanced concepts necessary to grasp current IA issues, challenges, and solutions for the IoT. The future trends in IoT infrastructures, architectures and applications are also examined....

Presents an Cyber-Assurance approach to the Internet of Things (IoT)

This book discusses the cyber-assurance needs of the IoT environ...

cena: 556,53

Pierwsza Podprzednia  19  20  21  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia