• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2765

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Critical Information Infrastructure Security: 6th International Workshop, Critis 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Pap Bologna, Sandro 9783642414756 Springer
Critical Information Infrastructure Security: 6th International Workshop, Critis 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Pap

ISBN: 9783642414756 / Angielski / Miękka / 227 str.

ISBN: 9783642414756/Angielski/Miękka/227 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sandro Bologna; Bernhard Hammerli; Dimitris Gritzalis
This book constitutes revised selected papers from the 6th International Workshop on Critical Information Infrastructure Security, CRITIS 2011, held in Lucerne, Switzerland, in September 2011. The 16 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with all areas of critical infrastructure protection research.
This book constitutes revised selected papers from the 6th International Workshop on Critical Information Infrastructure Security, CRITIS 2011, held i...
cena: 185,18

 Secure It Systems: 18th Nordic Conference, Nordsec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings Riis Nielsen, Hanne 9783642414879 Springer
Secure It Systems: 18th Nordic Conference, Nordsec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings

ISBN: 9783642414879 / Angielski / Miękka / 321 str.

ISBN: 9783642414879/Angielski/Miękka/321 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hanne Riis Nielsen; Dieter Gollmann
This book constitutes the refereed proceedings of the 18th Nordic Conference on Secure IT Systems, NordSec 2013, held in Ilulissat, Greenland, in October 2013. The 18 revised regular papers together with 3 short papers and one invited talk were carefully reviewed and selected from 35 submissions. The papers are organized in topical sections on formal analysis of security protocols, cyber-physical systems, security policies, information flow, security experiences, Web security, and network security.
This book constitutes the refereed proceedings of the 18th Nordic Conference on Secure IT Systems, NordSec 2013, held in Ilulissat, Greenland, in Octo...
cena: 201,24

 Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats Jajodia, Sushil 9781461429913 Springer
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats

ISBN: 9781461429913 / Angielski / Miękka / 184 str.

ISBN: 9781461429913/Angielski/Miękka/184 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sushil Jajodia; Anup K. Ghosh; Vipin Swarup

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network...

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the f...

cena: 362,27

 Automated Security Management Ehab Al-Shaer Xinming Ou Geoffrey Xie 9783319014326 Springer
Automated Security Management

ISBN: 9783319014326 / Angielski / Twarda / 187 str.

ISBN: 9783319014326/Angielski/Twarda/187 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ehab Al-Shaer; Xinming Ou; Geoffrey Xie
In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security...
In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configur...
cena: 201,24

 Trusted Systems: 5th International Conference, Intrust 2013, Graz, Austria, December 4-5, 2013, Proceedings Bloem, Roderick 9783319034904 Springer
Trusted Systems: 5th International Conference, Intrust 2013, Graz, Austria, December 4-5, 2013, Proceedings

ISBN: 9783319034904 / Angielski / Miękka / 103 str.

ISBN: 9783319034904/Angielski/Miękka/103 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Roderick Bloem; Peter Lipp
This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted Systems, INTRUST 2013, held in Graz, Austria, in December 2013. The revised full papers focus on the theory, technologies and applications of trusted systems. They cover all aspects of trusted computing systems, including trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies.
This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Trusted Systems, INTRUST 2013, held in Gra...
cena: 201,24

 Progress in Cryptology - Indocrypt 2013: 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings Paul, Goutam 9783319035147 Springer
Progress in Cryptology - Indocrypt 2013: 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings

ISBN: 9783319035147 / Angielski / Miękka / 319 str.

ISBN: 9783319035147/Angielski/Miękka/319 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Goutam Paul; Paul Vaudenay
This book constitutes the refereed proceedings of the 14th International Conference on Cryptology in India, INDOCRYPT 2013, held in Mumbai, India, in December 2013. The 15 revised full papers presented together with 6 short papers the abstracts of 3 invited talks were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on provable security; hash functions and signatures; side channel attacks; symmetric key cryptanalysis; key exchange and secret sharing; efficient implementation and hardware; and coding theory in cryptography.
This book constitutes the refereed proceedings of the 14th International Conference on Cryptology in India, INDOCRYPT 2013, held in Mumbai, India, in ...
cena: 201,24

 Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part I Kazue Sako, Palash Sarkar 9783642420320 Springer-Verlag Berlin and Heidelberg GmbH &
Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part I

ISBN: 9783642420320 / Angielski / Miękka / 546 str.

ISBN: 9783642420320/Angielski/Miękka/546 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kazue Sako;Palash Sarkar
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography...
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Crypt...
cena: 201,24

 Advances in Cryptology -- ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part II Kazue Sako, Palash Sarkar 9783642420443 Springer-Verlag Berlin and Heidelberg GmbH &
Advances in Cryptology -- ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part II

ISBN: 9783642420443 / Angielski / Miękka / 542 str.

ISBN: 9783642420443/Angielski/Miękka/542 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kazue Sako;Palash Sarkar
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography...
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Crypt...
cena: 201,24

 Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age Steven Levy 9780140244328 Penguin Putnam
Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age

ISBN: 9780140244328 / Angielski / Miękka / 368 str.

ISBN: 9780140244328/Angielski/Miękka/368 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Steven Levy
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto," in action. From Stephen Levy--the author who made "hackers" a household word--comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important...
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto," in action. From Stephe...
cena: 96,34

 Security of Industrial Control Systems and Cyber Physical Systems: First Workshop, Cyberics 2015 and First Workshop, Wos-CPS 2015 Vienna, Austria, Sep Bécue, Adrien 9783319403847 Springer
Security of Industrial Control Systems and Cyber Physical Systems: First Workshop, Cyberics 2015 and First Workshop, Wos-CPS 2015 Vienna, Austria, Sep

ISBN: 9783319403847 / Angielski / Miękka / 169 str.

ISBN: 9783319403847/Angielski/Miękka/169 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Adrien Becue; Nora Cuppens-Boulahia; Frederic Cuppens

This book constitutes the refereed proceedings of the First Conference on Cybersecurity of Industrial Control Systems, CyberICS 2015, and the First Workshop on the Security of Cyber Physical Systems, WOS-CPS 2015, held in Vienna, Austria, in September 2015 in conjunction with ESORICS 2015, the 20th annual European Symposium on Research in Computer Security.

The 6 revised full papers and 2 short papers of CyberICS 2015 presented together with 3 revised full papers of WOS-CPS 2015 were carefully reviewed and selected from 28 initial submissions. CyberICS 2015 focuses on topics covering...

This book constitutes the refereed proceedings of the First Conference on Cybersecurity of Industrial Control Systems, CyberICS 2015, and the First...

cena: 201,24

 Information Security and Privacy: 21st Australasian Conference, Acisp 2016, Melbourne, Vic, Australia, July 4-6, 2016, Proceedings, Part II Liu, Joseph K. 9783319403663 Springer
Information Security and Privacy: 21st Australasian Conference, Acisp 2016, Melbourne, Vic, Australia, July 4-6, 2016, Proceedings, Part II

ISBN: 9783319403663 / Angielski / Miękka / 517 str.

ISBN: 9783319403663/Angielski/Miękka/517 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joseph K. Liu; Ron Steinfeld

The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016.

The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully reviewed and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital...

The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Pri...

cena: 201,24

 Information Security and Privacy: 21st Australasian Conference, Acisp 2016, Melbourne, Vic, Australia, July 4-6, 2016, Proceedings, Part I Liu, Joseph K. 9783319402529 Springer
Information Security and Privacy: 21st Australasian Conference, Acisp 2016, Melbourne, Vic, Australia, July 4-6, 2016, Proceedings, Part I

ISBN: 9783319402529 / Angielski / Miękka / 543 str.

ISBN: 9783319402529/Angielski/Miękka/543 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joseph K. Liu; Ron Steinfeld

The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016. The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully revised and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital...

The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Pri...

cena: 201,24

 Applied Cryptography and Network Security: 14th International Conference, Acns 2016, Guildford, Uk, June 19-22, 2016. Proceedings Manulis, Mark 9783319395548 Springer
Applied Cryptography and Network Security: 14th International Conference, Acns 2016, Guildford, Uk, June 19-22, 2016. Proceedings

ISBN: 9783319395548 / Angielski / Miękka / 668 str.

ISBN: 9783319395548/Angielski/Miękka/668 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mark Manulis; Ahmad-Reza Sadeghi; Steve Schneider
This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in Guildford, UK. in June 2016. 5. The 35 revised full papers included in this volume and presented together with 2 invited talks, were carefully reviewed and selected from 183 submissions.ACNS is an annual conference focusing on innovative research and current developments that advance the areas of applied cryptography, cyber security and privacy.

This book constitutes the refereed proceedings of the 14th International Conference on Applied Cryptography and Network Security, ACNS 2016, held in G...
cena: 201,24

 Information Security and Cryptology: 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers Lin, Dongdai 9783319388977 Springer
Information Security and Cryptology: 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers

ISBN: 9783319388977 / Angielski / Miękka / 490 str.

ISBN: 9783319388977/Angielski/Miękka/490 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dongdai Lin; Xiao Feng Wang; Moti Yung

This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Information Security and Cryptology, Inscrypt 2015, held in Beijing, China in November 2015.

The 27 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on hash function; signature schemes; symmetric ciphers; elliptic curve and cryptographic fundamentals; Web and applications security; cloud security; key management and public key encryption; zero knowledge and secure computations; software...

This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Information Security and Cryptolo...

cena: 201,24

 Applications and Techniques in Information Security: 6th International Conference, Atis 2015, Beijing, China, November 4-6, 2015, Proceedings Niu, Wenjia 9783662486825 Springer
Applications and Techniques in Information Security: 6th International Conference, Atis 2015, Beijing, China, November 4-6, 2015, Proceedings

ISBN: 9783662486825 / Angielski / Miękka / 398 str.

ISBN: 9783662486825/Angielski/Miękka/398 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Wenjia Niu; Gang Li; Jiqiang Liu
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held...
cena: 201,24

 Advanced Concepts for Intelligent Vision Systems: 16th International Conference, Acivs 2015, Catania, Italy, October 26-29, 2015. Proceedings Battiato, Sebastiano 9783319259024 Springer
Advanced Concepts for Intelligent Vision Systems: 16th International Conference, Acivs 2015, Catania, Italy, October 26-29, 2015. Proceedings

ISBN: 9783319259024 / Angielski / Miękka / 897 str.

ISBN: 9783319259024/Angielski/Miękka/897 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sebastiano Battiato; Jacques Blanc-Talon; Giovanni Gallo
This book constitutes the thoroughly refereed proceedings of the 16th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2015, held Catania, Italy, in October 2015. The 76 revised full papers were carefully selected from 129 submissions. Acivs 2015 is a conference focusing on techniques for building adaptive, intelligent, safe and secure imaging systems. The focus of the conference is on following topic: low-level Image processing, video processing and camera networks, motion and tracking, security, forensics and biometrics, depth and 3D, image quality...
This book constitutes the thoroughly refereed proceedings of the 16th International Conference on Advanced Concepts for Intelligent Vision Systems, AC...
cena: 201,24

 System-On-Chip Architectures and Implementations for Private-Key Data Encryption McLoone, Máire 9781461348979 Springer
System-On-Chip Architectures and Implementations for Private-Key Data Encryption

ISBN: 9781461348979 / Angielski / Miękka / 160 str.

ISBN: 9781461348979/Angielski/Miękka/160 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Maire McLoone; John V. McCanny

In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architectures for the DES and Rijndael symmetric key encryption algorithms are presented. The generic architectures can be utilised to rapidly and effortlessly generate system-on-chip cores, which support numerous application requirements, most importantly, different modes of operation and encryption and decryption capabilities. In addition, efficient silicon SHA-1, SHA-2 and HMAC hash algorithm architectures are described. A single-chip Internet...

In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architec...

cena: 402,53

 Intrusion Detection in Distributed Systems: An Abstraction-Based Approach Peng Ning 9781461350910 Springer
Intrusion Detection in Distributed Systems: An Abstraction-Based Approach

ISBN: 9781461350910 / Angielski / Miękka / 136 str.

ISBN: 9781461350910/Angielski/Miękka/136 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peng Ning; Sushil Jajodia; Xiaoyang Sean Wang
Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.
Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect...
cena: 201,24

 Advanced Communications and Multimedia Security: Ifip Tc6 / Tc11 Sixth Joint Working Conference on Communications and Multimedia Security September 26 Jerman-Blazic, Borka 9781475744057 Springer
Advanced Communications and Multimedia Security: Ifip Tc6 / Tc11 Sixth Joint Working Conference on Communications and Multimedia Security September 26

ISBN: 9781475744057 / Angielski / Miękka / 312 str.

ISBN: 9781475744057/Angielski/Miękka/312 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Borka Jerman-Blazic; Tomaz Klobucar
Advanced Communications and Multimedia Security presents a state-of-the-art review of current perspectives as well as the latest developments in the area of communications and multimedia security. It examines requirements, issues and solutions pertinent to securing information networks, and identifies future security-related research challenges. A wide spectrum of topics is discussed, including:
-Applied cryptography;
-Biometry;
-Communication systems security;
-Applications security; Mobile security;
-Distributed systems security;
-Digital...
Advanced Communications and Multimedia Security presents a state-of-the-art review of current perspectives as well as the latest deve...
cena: 402,53

 Communications and Multimedia Security Issues of the New Century: Ifip Tc6 / Tc11 Fifth Joint Working Conference on Communications and Multimedia Secu Steinmetz, Ralf 9781475748116 Springer
Communications and Multimedia Security Issues of the New Century: Ifip Tc6 / Tc11 Fifth Joint Working Conference on Communications and Multimedia Secu

ISBN: 9781475748116 / Angielski / Miękka / 432 str.

ISBN: 9781475748116/Angielski/Miękka/432 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ralf Steinmetz; Jana Dittmann; Martin Steinebach
The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany. The conference is arranged jointly by the Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP) The name "Communications and Multimedia Security" was first used in 1995, Reinhard Posch organized the first in this series of...
The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001...
cena: 805,10

Pierwsza Podprzednia  22  23  24  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia