![]() |
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats
ISBN: 9781461429913 / Angielski / Miękka / 184 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network... Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the f... |
cena:
347,77 zł |
![]() |
Automated Security Management
ISBN: 9783319014326 / Angielski / Twarda / 187 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security...
In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configur...
|
cena:
193,19 zł |
![]() |
Trusted Systems: 5th International Conference, Intrust 2013, Graz, Austria, December 4-5, 2013, Proceedings
ISBN: 9783319034904 / Angielski / Miękka / 103 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted Systems, INTRUST 2013, held in Graz, Austria, in December 2013. The revised full papers focus on the theory, technologies and applications of trusted systems. They cover all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies.
This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted Systems, INTRUST 2013, held in Gra...
|
cena:
193,19 zł |
![]() |
Progress in Cryptology - Indocrypt 2013: 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings
ISBN: 9783319035147 / Angielski / Miękka / 319 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 14th International Conference on Cryptology in India, INDOCRYPT 2013, held in Mumbai, India, in December 2013. The 15 revised full papers presented together with 6 short papers the abstracts of 3 invited talks were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on provable security; hash functions and signatures; side channel attacks; symmetric key cryptanalysis; key exchange and secret sharing; efficient implementation and hardware; and coding theory in cryptography.
This book constitutes the refereed proceedings of the 14th International Conference on Cryptology in India, INDOCRYPT 2013, held in Mumbai, India, in ...
|
cena:
193,19 zł |
![]() |
Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part I
ISBN: 9783642420320 / Angielski / Miękka / 546 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography...
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Crypt...
|
cena:
193,19 zł |
![]() |
Advances in Cryptology -- ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part II
ISBN: 9783642420443 / Angielski / Miękka / 542 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography...
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Crypt...
|
cena:
193,19 zł |
![]() |
Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age
ISBN: 9780140244328 / Angielski / Miękka / 368 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto," in action. From Stephen Levy--the author who made "hackers" a household word--comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"nerds and visionaries turned freedom fightersteamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important...
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto," in action. From Stephe...
|
cena:
105,00 zł |
![]() |
Security of Industrial Control Systems and Cyber Physical Systems: First Workshop, Cyberics 2015 and First Workshop, Wos-CPS 2015 Vienna, Austria, Sep
ISBN: 9783319403847 / Angielski / Miękka / 169 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the First Conference on Cybersecurity of Industrial Control Systems, CyberICS 2015, and the First Workshop on the Security of Cyber Physical Systems, WOS-CPS 2015, held in Vienna, Austria, in September 2015 in conjunction with ESORICS 2015, the 20th annual European Symposium on Research in Computer Security. The 6 revised full papers and 2 short papers of CyberICS 2015 presented together with 3 revised full papers of WOS-CPS 2015 were carefully reviewed and selected from 28 initial submissions. CyberICS 2015 focuses on topics covering...This book constitutes the refereed proceedings of the First Conference on Cybersecurity of Industrial Control Systems, CyberICS 2015, and the First... |
cena:
193,19 zł |
![]() |
Information Security and Privacy: 21st Australasian Conference, Acisp 2016, Melbourne, Vic, Australia, July 4-6, 2016, Proceedings, Part II
ISBN: 9783319403663 / Angielski / Miękka / 517 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016. The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully reviewed and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital... The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Pri... |
cena:
193,19 zł |
![]() |
Information Security and Privacy: 21st Australasian Conference, Acisp 2016, Melbourne, Vic, Australia, July 4-6, 2016, Proceedings, Part I
ISBN: 9783319402529 / Angielski / Miękka / 543 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016. The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully revised and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital... The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Pri... |
cena:
193,19 zł |
![]() |
Applied Cryptography and Network Security: 14th International Conference, Acns 2016, Guildford, Uk, June 19-22, 2016. Proceedings
ISBN: 9783319395548 / Angielski / Miękka / 668 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions.ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy.
This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in G...
|
cena:
193,19 zł |
![]() |
Information Security and Cryptology: 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers
ISBN: 9783319388977 / Angielski / Miękka / 490 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Information Security and Cryptology, Inscrypt 2015, held in Beijing, China in November 2015. The 27 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on hash function; signature schemes; symmetric ciphers; elliptic curve and cryptographic fundamentals; Web and applications security; cloud security; key management and public key encryption; zero knowledge and secure computations; software... This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Information Security and Cryptolo... |
cena:
193,19 zł |
![]() |
Applications and Techniques in Information Security: 6th International Conference, Atis 2015, Beijing, China, November 4-6, 2015, Proceedings
ISBN: 9783662486825 / Angielski / Miękka / 398 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held...
|
cena:
193,19 zł |
![]() |
Advanced Concepts for Intelligent Vision Systems: 16th International Conference, Acivs 2015, Catania, Italy, October 26-29, 2015. Proceedings
ISBN: 9783319259024 / Angielski / Miękka / 897 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed proceedings of the 16th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2015, held Catania, Italy, in October 2015. The 76 revised full papers were carefully selected from 129 submissions. Acivs 2015 is a conference focusing on techniques for building adaptive, intelligent, safe and secure imaging systems. The focus of the conference is on following topic: low-level Image processing, video processing and camera networks, motion and tracking, security, forensics and biometrics, depth and 3D, image quality...
This book constitutes the thoroughly refereed proceedings of the 16th International Conference on Advanced Concepts for Intelligent Vision Systems, AC...
|
cena:
193,19 zł |
![]() |
System-On-Chip Architectures and Implementations for Private-Key Data Encryption
ISBN: 9781461348979 / Angielski / Miękka / 160 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architectures for the DES and Rijndael symmetric key encryption algorithms are presented. The generic architectures can be utilised to rapidly and effortlessly generate system-on-chip cores, which support numerous application requirements, most importantly, different modes of operation and encryption and decryption capabilities. In addition, efficient silicon SHA-1, SHA-2 and HMAC hash algorithm architectures are described. A single-chip Internet... In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architec... |
cena:
386,41 zł |
![]() |
Intrusion Detection in Distributed Systems: An Abstraction-Based Approach
ISBN: 9781461350910 / Angielski / Miękka / 136 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.
Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect...
|
cena:
193,19 zł |
![]() |
Advanced Communications and Multimedia Security: Ifip Tc6 / Tc11 Sixth Joint Working Conference on Communications and Multimedia Security September 26
ISBN: 9781475744057 / Angielski / Miękka / 312 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Advanced Communications and Multimedia Security presents a state-of-the-art review of current perspectives as well as the latest developments in the area of communications and multimedia security. It examines requirements, issues and solutions pertinent to securing information networks, and identifies future security-related research challenges. A wide spectrum of topics is discussed, including:
-Applied cryptography; -Biometry; -Communication systems security; -Applications security; Mobile security; -Distributed systems security; -Digital... Advanced Communications and Multimedia Security presents a state-of-the-art review of current perspectives as well as the latest deve...
|
cena:
386,41 zł |
![]() |
Communications and Multimedia Security Issues of the New Century: Ifip Tc6 / Tc11 Fifth Joint Working Conference on Communications and Multimedia Secu
ISBN: 9781475748116 / Angielski / Miękka / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany. The conference is arranged jointly by the Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP) The name "Communications and Multimedia Security" was first used in 1995, Reinhard Posch organized the first in this series of...
The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001...
|
cena:
772,86 zł |
![]() |
Cryptology and Network Security: 12th International Conference, Cans 2013, Paraty, Brazil, November 20-22, 2013, Proceedings
ISBN: 9783319029368 / Angielski / Miękka / 349 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013. The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation. This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, ... |
cena:
193,19 zł |
![]() |
Digital-Forensics and Watermarking: 11th International Workshop, Iwdw 2012, Shanghai, China, October 31--November 3, 2012, Revised Selected Papers
ISBN: 9783642400988 / Angielski / Miękka / 536 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography.
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, he...
|
cena:
193,19 zł |