![]() |
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters
ISBN: 9781430261483 / Angielski / Miękka / 156 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "This book is a must have resource guide for anyone who wants to... implement TXT within their environments. I wish we had this guide when our engineering teams were implementing TXT on our solution platforms John McAuley, EMC Corporation "This book details innovative technology that provides significant benefit to both the cloud consumer and the cloud provider when working to meet the ever increasing requirements of trust and control in the cloud. Alex Rodriguez, Expedient Data Centers "This book is an invaluable reference for understanding enhanced server security, and... "This book is a must have resource guide for anyone who wants to... implement TXT within their environments. I wish we had this guide when our eng... |
cena:
146,81 zł |
![]() |
Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013, Proceedings
ISBN: 9783642392559 / Angielski / Miękka / 305 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 27th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2013, held in Newark, NJ, USA in July 2013. The 16 revised full and 6 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on privacy, access control, cloud computing, data outsourcing, and mobile computing.
This book constitutes the refereed proceedings of the 27th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec ...
|
cena:
193,19 zł |
![]() |
Cryptography: Infosec Pro Guide
ISBN: 9780071794251 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security Smarts for the Self-Guided IT Professional
This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics such as ciphers, algorithms and key exchange, to practical applications such as digital signatures and certificates, the book delivers... Security Smarts for the Self-Guided IT Professional
This complete, practical resource for security and IT professionals presents the underpinnings ... |
cena:
168,00 zł |
![]() |
Cryptography: A Very Short Introduction
ISBN: 9780192803153 / Angielski / Miękka / 160 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is a clear and informative introduction to cryptography and data protection--subjects of considerable social and political importance. It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned. Important areas are highlighted, such as Stream Ciphers, block ciphers, public key algorithms, digital signatures, and applications such as e-commerce. This book highlights the explosive impact of cryptography on modern society, with, for example, the evolution of the internet and the introduction of more sophisticated...
This book is a clear and informative introduction to cryptography and data protection--subjects of considerable social and political importance. It ex...
|
cena:
48,62 zł |
![]() |
Implementing SSL / Tls Using Cryptography and Pki
ISBN: 9780470920411 / Angielski / Miękka / 704 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Hands-on, practical guide to implementing SSL and TLS protocols for Internet security
If you are a network professional who knows C programming, this practical book is for you. Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you have a working knowledge of cryptography. The book covers SSLv2, TLS 1.0, and TLS 1.2, including implementations of the relevant cryptographic protocols, secure hashing, certificate parsing, certificate generation, and more. Coverage includes: ...Hands-on, practical guide to implementing SSL and TLS protocols for Internet security
If you are a network professional who knows C programming, th... |
cena:
264,60 zł |
![]() |
Foundations of Cryptography: Volume 2, Basic Applications
ISBN: 9780521119917 / Angielski / Miękka / 452 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Building on the basic tools presented in the first volume, this second volume of Foundations of Cryptography contains a rigorous and systematic treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the...
Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of ...
|
cena:
359,80 zł |
![]() |
Cryptography for Dummies
ISBN: 9780764541889 / Angielski / Miękka / 336 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych.
|
cena:
162,17 zł |
![]() |
Communication System Security
ISBN: 9781439840368 / Angielski / Twarda / 750 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design. Divided into four parts, the book begins with the necessary background on practical cryptography primitives. This part describes pseudorandom sequence generators, stream and block ciphers, hash functions, and public-key cryptographic algorithms. ...Helping current and future system designers take a more productive approach in the field, Communication System Security shows how ... |
cena:
950,37 zł |
![]() |
Computer Security Literacy: Staying Safe in a Digital World
ISBN: 9781439856185 / Angielski / Miękka / 368 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital World focuses on practical security topics that users are likely to encounter on a regular basis. Written for nontechnical readers, the book provides context to routine computing tasks so that readers better understand the... Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or... |
cena:
272,21 zł |
![]() |
Introduction to Computer and Network Security: Navigating Shades of Gray
ISBN: 9781439860717 / Angielski / Twarda Termin realizacji zamówienia: ok. 5-8 dni roboczych. Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical issues related to security. Unlike most computer security books, which concentrate on software design and implementation, cryptographic tools, or networking issues, this text also explores how the interactions between hardware, software, and users affect system... Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an interact... |
cena:
426,33 zł |
![]() |
Inside Cyber Warfare: Mapping the Cyber Underworld
ISBN: 9781449310042 / Angielski / Miękka / 318 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare without truly realizing the scope of this global conflict. Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world increasingly rely on Internet attacks to gain military, political, and economic advantages over their adversaries. This updated second edition takes a detailed look at the complex domain of cyberspace, and the players and strategies involved. You ll discover how... When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare without truly ... |
cena:
188,96 zł |
![]() |
Introduction to Network Security
ISBN: 9781584885436 / Angielski / Twarda / 500 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Unlike data communications of the past, today s networks consist of numerous devices that handle the data as it passes from the sender to the receiver. However, security concerns are frequently raised in circumstances where interconnected computers use a network not controlled by any one entity or organization. Introduction to Network Security examines various network protocols, focusing on vulnerabilities, exploits, attacks, and methods to mitigate an attack. The book begins with a brief discussion of network architectures and the functions of layers in a... Unlike data communications of the past, today s networks consist of numerous devices that handle the data as it passes from the sender to the recei... |
cena:
498,25 zł |
![]() |
Understanding Cryptography: A Textbook for Students and Practitioners
ISBN: 9783642041006 / Angielski / Twarda / 392 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography is now ubiquitous moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard... Cryptography is now ubiquitous moving beyond the traditional environments, such as government communications and banking systems, we see cryptograp... |
cena:
146,81 zł |
![]() |
Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I
ISBN: 9783642400407 / Angielski / Miękka / 590 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange; multi...
The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013,...
|
cena:
193,19 zł |
![]() |
Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II
ISBN: 9783642400834 / Angielski / Miękka / 558 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange;... The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 20... |
cena:
193,19 zł |
![]() |
Financial Cryptography and Data Security: FC 2013 Workshops, Usec and Wahc 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers
ISBN: 9783642413193 / Angielski / Miękka / 239 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2013, and the third Workshop on Applied Homomorphic Cryptography, WAHC 2013, held in conjunction with the 17th International Conference on Financial Cryptology and Data Security, FC 2013, in Okinawa, Japan. The 16 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WAHC workshop...
This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2013, and the third Workshop on App...
|
cena:
177,77 zł |
![]() |
Radio Frequency Identification: Security and Privacy Issues: Security and Privacy Issues 9th International Workshop, Rfidsec 2013, Graz, Austria, July
ISBN: 9783642413315 / Angielski / Miękka / 177 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 9th Workshop on RFID Security and Privacy, RFIDsec 2013, held in Graz, Austria, in July 2013. The 11 papers presented in this volume were carefully reviewed and selected from 23 submissions. RFIDsec deals with topics of importance to improving the security and privacy of RFID, NFC, contactless technologies, and the Internet of Things. RFIDsec bridges the gap between cryptographic researchers and RFID developers.
This book constitutes the proceedings of the 9th Workshop on RFID Security and Privacy, RFIDsec 2013, held in Graz, Austria, in July 2013. The 11 pape...
|
cena:
177,77 zł |
![]() |
Advances in Information and Computer Security: 8th International Workshop on Security, Iwsec 2013, Okinawa, Japan, November 18-20, 2013, Proceedings
ISBN: 9783642413827 / Angielski / Miękka / 319 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 8th International Workshop on Security, IWSEC 2013, held in Okinawa, Japan, in November 2013. The 20 revised selected papers presented in this volume were carefully reviewed and selected from 63 submissions. They are organized in topical sections named: software and system security, cryptanalysis, privacy and cloud computing, public key cryptosystems, and security protocols.
This book constitutes the refereed proceedings of the 8th International Workshop on Security, IWSEC 2013, held in Okinawa, Japan, in November 2013. Th...
|
cena:
193,19 zł |
![]() |
Critical Information Infrastructure Security: 6th International Workshop, Critis 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Pap
ISBN: 9783642414756 / Angielski / Miękka / 227 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes revised selected papers from the 6th International Workshop on Critical Information Infrastructure Security, CRITIS 2011, held in Lucerne, Switzerland, in September 2011. The 16 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with all areas of critical infrastructure protection research.
This book constitutes revised selected papers from the 6th International Workshop on Critical Information Infrastructure Security, CRITIS 2011, held i...
|
cena:
177,77 zł |
![]() |
Secure It Systems: 18th Nordic Conference, Nordsec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings
ISBN: 9783642414879 / Angielski / Miękka / 321 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 18th Nordic Conference on Secure IT Systems, NordSec 2013, held in Ilulissat, Greenland, in October 2013. The 18 revised regular papers together with 3 short papers and one invited talk were carefully reviewed and selected from 35 submissions. The papers are organized in topical sections on formal analysis of security protocols, cyber-physical systems, security policies, information flow, security experiences, Web security, and network security.
This book constitutes the refereed proceedings of the 18th Nordic Conference on Secure IT Systems, NordSec 2013, held in Ilulissat, Greenland, in Octo...
|
cena:
193,19 zł |