• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2765

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Trust and Trustworthy Computing: 6th International Conference, Trust 2013, London, Uk, June 17-19, 2013, Proceedings Huth, Michael 9783642389078 Springer
Trust and Trustworthy Computing: 6th International Conference, Trust 2013, London, Uk, June 17-19, 2013, Proceedings

ISBN: 9783642389078 / Angielski / Miękka / 278 str.

ISBN: 9783642389078/Angielski/Miękka/278 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Huth; N. Asokan; Srdjan Capkun
This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track.
This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK,...
cena: 185,18

 Applied Cryptography and Network Security: 11th International Conference, Acns 2013, Banff, Ab, Canada, June 25-28, 2013. Proceedings Jacobson, Michael 9783642389795 Springer
Applied Cryptography and Network Security: 11th International Conference, Acns 2013, Banff, Ab, Canada, June 25-28, 2013. Proceedings

ISBN: 9783642389795 / Angielski / Miękka / 572 str.

ISBN: 9783642389795/Angielski/Miękka/572 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Jacobson; Michael Locasto; Payman Mohassel
This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in Banff, Canada, in June 2013. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sections on Cloud Cryptography; Secure Computation; Hash Function and Block Cipher; Signature; System Attack; Secure Implementation - Hardware; Secure Implementation - Software; Group-oriented Systems; Key Exchange and Leakage Resilience; Cryptographic Proof; Cryptosystems.
This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and Network Security, ACNS 2013, held in B...
cena: 201,24

 Trustworthy Execution on Mobile Devices Amit Vasudevan Jonathan M. McCune James Newsome 9781461481898 Springer
Trustworthy Execution on Mobile Devices

ISBN: 9781461481898 / Angielski / Miękka / 85 str.

ISBN: 9781461481898/Angielski/Miękka/85 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Amit Vasudevan; Jonathan M. McCune; James Newsome
This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.
This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mob...
cena: 201,24

 Principles of Security and Trust: Second International Conference, Post 2013, Held as Part of the European Joint Conferences on Theory and Practice of Basin, David 9783642368295 Springer
Principles of Security and Trust: Second International Conference, Post 2013, Held as Part of the European Joint Conferences on Theory and Practice of

ISBN: 9783642368295 / Angielski / Miękka / 287 str.

ISBN: 9783642368295/Angielski/Miękka/287 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Basin; John C. Mitchell
This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2013, in Rome, Italy, in March 2013. The 14 papers included in this volume were carefully reviewed and selected from 59 submissions. They deal with the theoretical and foundational aspects of security and trust such as new theoretical results, practical applications of existing foundational ideas, and innovative theoretical approaches stimulated by pressing practical...
This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of ...
cena: 201,24

 E-Voting and Identity: 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, Proceedings James Heather, Steve Schneider, Vanessa Teague 9783642391842 Springer-Verlag Berlin and Heidelberg GmbH &
E-Voting and Identity: 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, Proceedings

ISBN: 9783642391842 / Angielski / Miękka / 211 str.

ISBN: 9783642391842/Angielski/Miękka/211 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
James Heather;Steve Schneider;Vanessa Teague
This book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, Vote ID 2013, held in Guildford, UK, during July 17-19, 2013. The 12 revised full papers presented were carefully selected from 26 submissions. The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying algorithms, human perceptions of verifiability, formal models of verifiability and, of course, attacks on systems formerly advertised as verifiable.
This book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, Vote ID 2013, held ...
cena: 185,18

 Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters Futral, William 9781430261483 Apress
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters

ISBN: 9781430261483 / Angielski / Miękka / 156 str.

ISBN: 9781430261483/Angielski/Miękka/156 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
William Futral; James Greene

"This book is a must have resource guide for anyone who wants to... implement TXT within their environments. I wish we had this guide when our engineering teams were implementing TXT on our solution platforms

John McAuley, EMC Corporation

"This book details innovative technology that provides significant benefit to both the cloud consumer and the cloud provider when working to meet the ever increasing requirements of trust and control in the cloud.

Alex Rodriguez, Expedient Data Centers

"This book is an invaluable reference for understanding enhanced server security, and...

"This book is a must have resource guide for anyone who wants to... implement TXT within their environments. I wish we had this guide when our eng...

cena: 152,93

 Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013, Proceedings Lingyu Wang, Basit Shafiq 9783642392559 Springer-Verlag Berlin and Heidelberg GmbH &
Data and Applications Security and Privacy XXVII: 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013, Proceedings

ISBN: 9783642392559 / Angielski / Miękka / 305 str.

ISBN: 9783642392559/Angielski/Miękka/305 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lingyu Wang;Basit Shafiq
This book constitutes the refereed proceedings of the 27th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2013, held in Newark, NJ, USA in July 2013. The 16 revised full and 6 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on privacy, access control, cloud computing, data outsourcing, and mobile computing.
This book constitutes the refereed proceedings of the 27th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec ...
cena: 201,24

 Cryptography: Infosec Pro Guide Oriyano, Sean-Philip 9780071794251 0
Cryptography: Infosec Pro Guide

ISBN: 9780071794251 / Angielski / Miękka / 320 str.

ISBN: 9780071794251/Angielski/Miękka/320 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sean Philip Oriyano
Security Smarts for the Self-Guided IT Professional

This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics such as ciphers, algorithms and key exchange, to practical applications such as digital signatures and certificates, the book delivers...

Security Smarts for the Self-Guided IT Professional

This complete, practical resource for security and IT professionals presents the underpinnings ...

cena: 154,14

 Implementing SSL / TLS Using Cryptography and PKI Joshua Davies 9780470920411 John Wiley & Sons Inc
Implementing SSL / TLS Using Cryptography and PKI

ISBN: 9780470920411 / Angielski / Miękka / 704 str.

ISBN: 9780470920411/Angielski/Miękka/704 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joshua Davies
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security

If you are a network professional who knows C programming, this practical book is for you. Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you have a working knowledge of cryptography. The book covers SSLv2, TLS 1.0, and TLS 1.2, including implementations of the relevant cryptographic protocols, secure hashing, certificate parsing, certificate generation, and more.

Coverage includes:

...
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security

If you are a network professional who knows C programming, th...

cena: 242,77

 Foundations of Cryptography: Volume 2, Basic Applications Oded Goldreich 9780521119917 0
Foundations of Cryptography: Volume 2, Basic Applications

ISBN: 9780521119917 / Angielski / Miękka / 452 str.

ISBN: 9780521119917/Angielski/Miękka/452 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Oded Goldreich
Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Building on the basic tools presented in the first volume, this second volume of Foundations of Cryptography contains a rigorous and systematic treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the...
Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of ...
cena: 348,51

 Cryptography for Dummies Cobb, Chey 9780764541889 0
Cryptography for Dummies

ISBN: 9780764541889 / Angielski / Miękka / 336 str.

ISBN: 9780764541889/Angielski/Miękka/336 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chey Cobb
  • Cryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping, stock trading, and banking
  • This invaluable introduction to the basics of encryption covers everything from the terminology used in the field to specific technologies to the pros and cons of different implementations
  • Discusses specific technologies that incorporate cryptography in their design, such as authentication methods, wireless encryption, e-commerce, and smart cards
  • Based entirely on real-world issues and situations, the...
  • Cryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping, stock trad...
cena: 146,88

 Communication System Security Lidong Chen 9781439840368 0
Communication System Security

ISBN: 9781439840368 / Angielski / Twarda / 750 str.

ISBN: 9781439840368/Angielski/Twarda/750 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lidong Chen

Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design.

Divided into four parts, the book begins with the necessary background on practical cryptography primitives. This part describes pseudorandom sequence generators, stream and block ciphers, hash functions, and public-key cryptographic algorithms.

...

Helping current and future system designers take a more productive approach in the field, Communication System Security shows how ...

cena: 979,55

 Computer Security Literacy: Staying Safe in a Digital World Jacobson, Douglas 9781439856185 0
Computer Security Literacy: Staying Safe in a Digital World

ISBN: 9781439856185 / Angielski / Miękka / 368 str.

ISBN: 9781439856185/Angielski/Miękka/368 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Douglas Jacobson

Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital World focuses on practical security topics that users are likely to encounter on a regular basis.

Written for nontechnical readers, the book provides context to routine computing tasks so that readers better understand the...

Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or...

cena: 254,64

 Introduction to Computer and Network Security: Navigating Shades of Gray Brooks, Richard R. 9781439860717 0
Introduction to Computer and Network Security: Navigating Shades of Gray

ISBN: 9781439860717 / Angielski / Twarda

ISBN: 9781439860717/Angielski/Twarda

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Richard R. Brooks

Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues

Taking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical issues related to security. Unlike most computer security books, which concentrate on software design and implementation, cryptographic tools, or networking issues, this text also explores how the interactions between hardware, software, and users affect system...

Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues

Taking an interact...

cena: 450,54

 Introduction to Network Security Douglas Jacobson 9781584885436 0
Introduction to Network Security

ISBN: 9781584885436 / Angielski / Twarda / 500 str.

ISBN: 9781584885436/Angielski/Twarda/500 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Douglas Jacobson

Unlike data communications of the past, today s networks consist of numerous devices that handle the data as it passes from the sender to the receiver. However, security concerns are frequently raised in circumstances where interconnected computers use a network not controlled by any one entity or organization. Introduction to Network Security examines various network protocols, focusing on vulnerabilities, exploits, attacks, and methods to mitigate an attack.

The book begins with a brief discussion of network architectures and the functions of layers in a...

Unlike data communications of the past, today s networks consist of numerous devices that handle the data as it passes from the sender to the recei...

cena: 514,26

 Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I Ran Canetti, Juan A. Garay 9783642400407 Springer-Verlag Berlin and Heidelberg GmbH &
Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I

ISBN: 9783642400407 / Angielski / Miękka / 590 str.

ISBN: 9783642400407/Angielski/Miękka/590 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ran Canetti;Juan A. Garay
The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange; multi...
The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013,...
cena: 201,24

 Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II Ran Canetti, Juan A. Garay 9783642400834 Springer-Verlag Berlin and Heidelberg GmbH &
Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II

ISBN: 9783642400834 / Angielski / Miękka / 558 str.

ISBN: 9783642400834/Angielski/Miękka/558 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ran Canetti;Juan A. Garay

The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange;...

The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 20...

cena: 201,24

 Financial Cryptography and Data Security: FC 2013 Workshops, Usec and Wahc 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers Adams, Andrew A. 9783642413193 Springer
Financial Cryptography and Data Security: FC 2013 Workshops, Usec and Wahc 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers

ISBN: 9783642413193 / Angielski / Miękka / 239 str.

ISBN: 9783642413193/Angielski/Miękka/239 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andrew A. Adams; Michael Brenner; Matthew Smith
This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2013, and the third Workshop on Applied Homomorphic Cryptography, WAHC 2013, held in conjunction with the 17th International Conference on Financial Cryptology and Data Security, FC 2013, in Okinawa, Japan. The 16 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WAHC workshop...
This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2013, and the third Workshop on App...
cena: 185,18

 Radio Frequency Identification: Security and Privacy Issues: Security and Privacy Issues 9th International Workshop, Rfidsec 2013, Graz, Austria, July Hutter, Michael 9783642413315 Springer
Radio Frequency Identification: Security and Privacy Issues: Security and Privacy Issues 9th International Workshop, Rfidsec 2013, Graz, Austria, July

ISBN: 9783642413315 / Angielski / Miękka / 177 str.

ISBN: 9783642413315/Angielski/Miękka/177 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Hutter; Jorn-Marc Schmidt
This book constitutes the proceedings of the 9th Workshop on RFID Security and Privacy, RFIDsec 2013, held in Graz, Austria, in July 2013. The 11 papers presented in this volume were carefully reviewed and selected from 23 submissions. RFIDsec deals with topics of importance to improving the security and privacy of RFID, NFC, contactless technologies, and the Internet of Things. RFIDsec bridges the gap between cryptographic researchers and RFID developers.
This book constitutes the proceedings of the 9th Workshop on RFID Security and Privacy, RFIDsec 2013, held in Graz, Austria, in July 2013. The 11 pape...
cena: 185,18

 Advances in Information and Computer Security: 8th International Workshop on Security, Iwsec 2013, Okinawa, Japan, November 18-20, 2013, Proceedings Sakiyama, Kazuo 9783642413827 Springer
Advances in Information and Computer Security: 8th International Workshop on Security, Iwsec 2013, Okinawa, Japan, November 18-20, 2013, Proceedings

ISBN: 9783642413827 / Angielski / Miękka / 319 str.

ISBN: 9783642413827/Angielski/Miękka/319 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kazuo Sakiyama; Masayuki Terada
This book constitutes the refereed proceedings of the 8th International Workshop on Security, IWSEC 2013, held in Okinawa, Japan, in November 2013. The 20 revised selected papers presented in this volume were carefully reviewed and selected from 63 submissions. They are organized in topical sections named: software and system security, cryptanalysis, privacy and cloud computing, public key cryptosystems, and security protocols.
This book constitutes the refereed proceedings of the 8th International Workshop on Security, IWSEC 2013, held in Okinawa, Japan, in November 2013. Th...
cena: 201,24

Pierwsza Podprzednia  22  23  24  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia