![]() |
Kryptographie in C Und C++: Zahlentheoretische Grundlagen, Computer-Arithmetik Mit Großen Zahlen, Kryptographische Tools
ISBN: 9783642626463 / Niemiecki / Miękka / 409 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Das Buch bietet einen umfassenden Uberblick uber die Grundlagen moderner kryptographischer Verfahren und ihre programmtechnische Entwicklung mit Hilfe einer leistungsfahigen Erweiterung der Programmiersprachen C und C++. Es prasentiert fundierte und einsetzbare Funktionen und Methoden mit professioneller Stabilitat und Performanz. Ihre Umsetzung wird an einer objektorientierten Implementierung des RSA-Kryptosystems demonstriert. Der zum neuen amerikanischen Advanced Encryption Standard (AES) erklarte Algorithmus "Rijndael" wird ausfuhrlich mit vielen Hinweisen fur die Implementierung...
Das Buch bietet einen umfassenden Uberblick uber die Grundlagen moderner kryptographischer Verfahren und ihre programmtechnische Entwicklung mit Hilfe...
|
cena:
180,55 zł |
![]() |
Advances in Digital Forensics VII: 7th Ifip Wg 11.9 International Conference on Digital Forensics, Orlando, Fl, Usa, January 31 - February 2, 2011, Re
ISBN: 9783642269691 / Angielski / Miękka / 290 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security...
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wirele...
|
cena:
193,19 zł |
![]() |
Cyberspace Safety and Security: 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings
ISBN: 9783319035833 / Angielski / Miękka / 480 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in November 2013. The 30 full papers presented in this volume were carefully reviewed and selected from 105 submissions. In addition the book contains 6 workshop papers. The papers are organized in topical sections named: data and applications security; network and communications security; software and systems security; and cloud security and cyberspace safety.
This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in N...
|
cena:
193,19 zł |
![]() |
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
ISBN: 9781118825099 / Angielski / Miękka / 912 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Memory forensics provides cutting edge technology to help investigate digital attacks
Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows,... Memory forensics provides cutting edge technology to help investigate digital attacks
Memory forensics is the art of analyzing computer memo... |
cena:
281,19 zł |
![]() |
Security and Privacy in Communication Networks: 9th International Icst Conference, Securecomm 2013, Revised Selected Papers
ISBN: 9783319042824 / Angielski / Miękka / 420 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are grouped in topical sections on: security and privacy in mobile, sensor and ad hoc networks; malware, botnets and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer and cloud computing; encryption and key management; security in software and...
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communic...
|
cena:
193,19 zł |
![]() |
Information Theoretic Security: 7th International Conference, Icits 2013, Singapore, November 28-30, 2013, Proceedings
ISBN: 9783319042671 / Angielski / Miękka / 259 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissions. Topics of interest are: unconditional security, quantum cryptography, authentication codes, wiretap channels, randomness extraction, codes and cryptography, lattices and cryptography, secret sharing, multiparty Computation, bounded storage model, oblivious transfer, nonlocality and nonsignaling, quantum information theory, network coding...
This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November...
|
cena:
193,19 zł |
![]() |
A Framework for Designing Cryptographic Key Management Systems
ISBN: 9781494446055 / Angielski / Miękka / 128 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This Framework for Designing Cryptographic Key Management Systems (CKMS) contains topics that should be considered by a CKMS designer when developing a CKMS design specification. For each topic, there are one or more documentation requirements that need to be addressed by the design specification. Thus, any CKMS that addresses each of these requirements would have a design specification that is compliant with this Framework
This Framework for Designing Cryptographic Key Management Systems (CKMS) contains topics that should be considered by a CKMS designer when developing ...
|
cena:
66,11 zł |
![]() |
Recommendation for Block Cipher Modes of Operation Methods and Techniques
ISBN: 9781495211041 / Angielski / Miękka / 70 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR). Used with an underlying block cipher algorithm that is approved in a Federal Information Processing Standard (FIPS), these modes can provide cryptographic protection for sensitive, but unclassified, computer data.
This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebo...
|
cena:
61,70 zł |
![]() |
Topics in Cryptology -- Ct-Rsa 2014: The Cryptographer's Track at the Rsa Conference 2014, San Francisco, Ca, Usa, February 25-28, 2014, Proceedings
ISBN: 9783319048512 / Angielski / Miękka / 501 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2014, CT-RSA 2014, held in San Francisco, CA, USA, in February 2014. The 25 papers presented in this volume were carefully reviewed and selected from 66 submissions. They are organized in topical sections on non-integral asymmetric functions, public-key encryption, hardware implementations, side-channel attacks, symmetric encryption and cryptanalysis, digital signatures, protocols, hash function cryptanalysis, and applications of cryptographic primitives.
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2014, CT-RSA 2014, held in San Francisco, CA, USA, i...
|
cena:
193,19 zł |
![]() |
Pairing-Based Cryptography -- Pairing 2013: 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers
ISBN: 9783319048727 / Angielski / Miękka / 251 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 6th International Conference on Pairing-Based Cryptography, Pairing 2013, held in Beijing, China, in November 2013. The 14 full papers presented were carefully reviewed and selected from 59 submissions. As in previous years, the focus of Pairing 2013 is on all aspects of pairing-based cryptography, including: cryptographic primitives and protocols, mathematical foundations, software and hardware implementation, as well as applied security. This book constitutes the refereed proceedings of the 6th International Conference on Pairing-Based Cryptography, Pairing 2013, held in Beijing, Ch... |
cena:
193,19 zł |
![]() |
Theory of Cryptography: 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings
ISBN: 9783642542411 / Angielski / Miękka / 739 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 11th Theory of Cryptography Conference, TCC 2014, held in San Diego, CA, USA, in February 2014. The 30 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on obfuscation, applications of obfuscation, zero knowledge, black-box separations, secure computation, coding and cryptographic applications, leakage, encryption, hardware-aided secure protocols, and encryption and signatures.
This book constitutes the refereed proceedings of the 11th Theory of Cryptography Conference, TCC 2014, held in San Diego, CA, USA, in February 2014. ...
|
cena:
193,19 zł |
![]() |
Information Security Applications: 14th International Workshop, Wisa 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers
ISBN: 9783319051482 / Angielski / Miękka / 273 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed proceedings of the 14th International Workshop on Information Security Applications, WISA 2013, held on Jeju Island, Korea, in August 2013. The 15 revised full papers and 2 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections such as cryptography, social network security, mobile security, network security, future applications and privacy.
This book constitutes the thoroughly refereed proceedings of the 14th International Workshop on Information Security Applications, WISA 2013, held on ...
|
cena:
193,19 zł |
![]() |
Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised)
ISBN: 9781495447501 / Angielski / Miękka / 116 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This Recommendation specifies key establishment schemes using discrete logarithm cryptography, based on standards developed by the Accredited Standards Committee (ASC) X9, Inc.: ANS X9.42 (Agreement of Symmetric Keys Using Discrete Logarithm Cryptography) and ANS X9.63 (Key Agreement and Key Transport Using Elliptic Curve Cryptography).
This Recommendation specifies key establishment schemes using discrete logarithm cryptography, based on standards developed by the Accredited Standard...
|
cena:
51,82 zł |
![]() |
Foundations and Practice of Security: 6th International Symposium, Fps 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers
ISBN: 9783319053011 / Angielski / Miękka / 444 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the carefully refereed post-proceedings of the 6th Symposium on Foundations and Practice of Security, FPS 2013, held in La Rochelle, France, in October 2013. The 25 revised full papers presented together with a keynote address were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on security protocols, formal methods, physical security, attack classification and assessment, access control, cipher attacks, ad-hoc and sensor networks, resilience and intrusion detection.
This book constitutes the carefully refereed post-proceedings of the 6th Symposium on Foundations and Practice of Security, FPS 2013, held in La Roche...
|
cena:
193,19 zł |
![]() |
Recent Trends in Computer Networks and Distributed Systems Security: Second International Conference, Snds 2014, Trivandrum, India, March 13-14, 2014.
ISBN: 9783642545245 / Angielski / Miękka / 564 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Second International Conference on Security in Computer Networks and Distributed Systems, SNDS 2014, held in Trivandrum, India, in March 2014. The 32 revised full papers presented together with 9 short papers and 8 workshop papers were carefully reviewed and selected from 129 submissions. The papers are organized in topical sections on security and privacy in networked systems; multimedia security; cryptosystems, algorithms, primitives; system and network security; short papers. The workshop papers were presented at the following...
This book constitutes the refereed proceedings of the Second International Conference on Security in Computer Networks and Distributed Systems, SNDS 2...
|
cena:
193,19 zł |
![]() |
Public-Key Cryptography -- PKC 2014: 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings
ISBN: 9783642546303 / Angielski / Miękka / 686 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols. This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, he... |
cena:
193,19 zł |
![]() |
A Cryptography Primer: Secrets and Promises
ISBN: 9781107017887 / Angielski / Twarda / 186 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs,...
Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application ma...
|
cena:
489,80 zł |
![]() |
A Cryptography Primer: Secrets and Promises
ISBN: 9781107603455 / Angielski / Miękka / 186 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs,...
Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application ma...
|
cena:
189,87 zł |
![]() |
Principles of Security and Trust: Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13
ISBN: 9783642547911 / Angielski / Miękka / 307 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Third International Conference on Principles of Security and Trust, POST 2014, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, in April 2014. The 15 papers presented in this volume were carefully reviewed and selected from 55 submissions. They are organized in topical sections named: analysis of cryptographic protocols; quantitative aspects of information flow; information flow control in programming languages; cryptography in implementations and policies and attacks.
This book constitutes the refereed proceedings of the Third International Conference on Principles of Security and Trust, POST 2014, held as part of t...
|
cena:
193,19 zł |
![]() |
Cryptography and Coding: 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013, Proceedings
ISBN: 9783642452383 / Angielski / Miękka / 365 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 14th IMA International Conference on Cryptography and Coding, IMACC 2013, held at Oxford, UK, in December 2013. The 20 papers presented were carefully reviewed and selected for inclusion in this book. They are organized in topical sections named: bits and booleans; homomorphic encryption; codes and applications; cryptanalysis; protecting against leakage; hash functions; key issues and public key primitives.
This book constitutes the proceedings of the 14th IMA International Conference on Cryptography and Coding, IMACC 2013, held at Oxford, UK, in December...
|
cena:
193,19 zł |