• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2765

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Principles of Security and Trust: Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13 Martín Abadi, Steve Kremer 9783642547911 Springer-Verlag Berlin and Heidelberg GmbH &
Principles of Security and Trust: Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13

ISBN: 9783642547911 / Angielski / Miękka / 307 str.

ISBN: 9783642547911/Angielski/Miękka/307 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Martín Abadi;Steve Kremer
This book constitutes the refereed proceedings of the Third International Conference on Principles of Security and Trust, POST 2014, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, in April 2014. The 15 papers presented in this volume were carefully reviewed and selected from 55 submissions. They are organized in topical sections named: analysis of cryptographic protocols; quantitative aspects of information flow; information flow control in programming languages; cryptography in implementations and policies and attacks.
This book constitutes the refereed proceedings of the Third International Conference on Principles of Security and Trust, POST 2014, held as part of t...
cena: 201,24

 Cryptography and Coding: 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013, Proceedings Martijn Stam 9783642452383 Springer-Verlag Berlin and Heidelberg GmbH &
Cryptography and Coding: 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013, Proceedings

ISBN: 9783642452383 / Angielski / Miękka / 365 str.

ISBN: 9783642452383/Angielski/Miękka/365 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Martijn Stam
This book constitutes the proceedings of the 14th IMA International Conference on Cryptography and Coding, IMACC 2013, held at Oxford, UK, in December 2013. The 20 papers presented were carefully reviewed and selected for inclusion in this book. They are organized in topical sections named: bits and booleans; homomorphic encryption; codes and applications; cryptanalysis; protecting against leakage; hash functions; key issues and public key primitives.
This book constitutes the proceedings of the 14th IMA International Conference on Cryptography and Coding, IMACC 2013, held at Oxford, UK, in December...
cena: 201,24

 Transactions on Data Hiding and Multimedia Security IX: Special Issue on Visual Cryptography Yun Q. Shi, Feng Liu, Weiqi Yan 9783642550454 Springer-Verlag Berlin and Heidelberg GmbH &
Transactions on Data Hiding and Multimedia Security IX: Special Issue on Visual Cryptography

ISBN: 9783642550454 / Angielski / Miękka / 131 str.

ISBN: 9783642550454/Angielski/Miękka/131 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Q. Shi;Feng Liu;Weiqi Yan
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development of a new research field of multimedia security. Besides, two related disciplines, steganalysis and data forensics, are increasingly attracting researchers and becoming another new research field of...
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applicat...
cena: 201,24

 Information Security Practice and Experience: 10th International Conference, Ispec 2014, Fuzhou, China, May 5-8, 2014, Proceedings Huang, Xinyi 9783319063195 Springer
Information Security Practice and Experience: 10th International Conference, Ispec 2014, Fuzhou, China, May 5-8, 2014, Proceedings

ISBN: 9783319063195 / Angielski / Miękka / 578 str.

ISBN: 9783319063195/Angielski/Miękka/578 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xinyi Huang; Jianying Zhou
This book constitutes the proceedings of the 10th International Conference on Information Security Practice and Experience, ISPEC 2014, held in Fuzhou, China, in May 2014. The 36 papers presented in this volume were carefully reviewed and selected from 158 submissions. In addition the book contains 5 invited papers. The regular papers are organized in topical sections named: network security; system security; security practice; security protocols; cloud security; digital signature; encryption and key agreement and theory.
This book constitutes the proceedings of the 10th International Conference on Information Security Practice and Experience, ISPEC 2014, held in Fuzhou...
cena: 201,24

 Querying Over Encrypted Data in Smart Grids Wen, Mi 9783319063546 Springer
Querying Over Encrypted Data in Smart Grids

ISBN: 9783319063546 / Angielski / Miękka / 78 str.

ISBN: 9783319063546/Angielski/Miękka/78 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mi Wen; Rongxing Lu; Xiaohui Liang
This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and the existing encrypted data query techniques. Unique characteristics of smart grid impose distinguished challenges on this investigation, such as multidimensional attributes in metering data and finer grained query on each dimension. Three kinds of queries are introduced, namely, equality query, conjunctive query and range query. For the equality query over encrypted metering data, an efficient searchable encryption scheme is introduced and can be applied for...
This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and the existing encrypt...
cena: 201,24

 Information Assurance Handbook: Effective Computer Security and Risk Management Strategies Corey Schou 9780071821650 MCGRAW-HILL Professional
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies

ISBN: 9780071821650 / Angielski / Miękka / 480 str.

ISBN: 9780071821650/Angielski/Miękka/480 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Corey Schou
Best practices for protecting critical data and systems

Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning in a non-technical manner. It leads you through building an IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance...

Best practices for protecting critical data and systems

Information Assurance Handbook: Effective Computer Security and Risk Management Strategi...

cena: 281,31

 Advances in Cryptology – EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings Phong Q. Nguyen, Elisabeth Oswald 9783642552199 Springer-Verlag Berlin and Heidelberg GmbH &
Advances in Cryptology – EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings

ISBN: 9783642552199 / Angielski / Miękka / 714 str.

ISBN: 9783642552199/Angielski/Miękka/714 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Phong Q. Nguyen;Elisabeth Oswald
This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions. They deal with public key cryptanalysis, identity-based encryption, key derivation and quantum computing, secret-key analysis and implementations, obfuscation and multi linear maps, authenticated encryption, symmetric encryption, multi-party encryption, side-channel attacks, signatures and...
This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYP...
cena: 201,24

 Protecting Oracle Database 12c Wright, Paul 9781430262114 APress
Protecting Oracle Database 12c

ISBN: 9781430262114 / Angielski / Miękka / 332 str.

ISBN: 9781430262114/Angielski/Miękka/332 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Paul Wright

Protecting Oracle Database 12c helps you solve the problem of maximizing the safety, resilience, and security of an Oracle database whilst preserving performance, availability, and integration despite ongoing and new security issues in the software. The book demonstrates, through coded examples, how you can enable the consolidation features of Oracle Database 12c without increasing risk of either internal corruption or external vulnerability. In addition, new protections not publicly available are included, so that you can see how demonstrable risk improvements...

Protecting Oracle Database 12c helps you solve the problem of maximizing the safety, resilience, and security of an Oracle databa...

cena: 221,37

 Progress in Cryptology - Africacrypt 2014: 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings Pointcheval, David 9783319067339 Springer
Progress in Cryptology - Africacrypt 2014: 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings

ISBN: 9783319067339 / Angielski / Miękka / 476 str.

ISBN: 9783319067339/Angielski/Miękka/476 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Pointcheval; Damien Vergnaud
This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICA CRYPT 2014, held in Marrakesh, Morocco in May 2014. The 26 papers presented together with 1 invited talk were carefully reviewed and selected from 83 submissions. The aim of Africa crypt 2014 is to provide an international forum for practitioners and researchers from industry, academia and government from all over the world for a wide ranging discussion of all forms of cryptography and its applications as follows: Public-Key...
This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application of Cryptographic Techniques in Africa...
cena: 201,24

 Secure Data Management: 10th Vldb Workshop, Sdm 2013, Trento, Italy, August 30, 2013, Proceedings Jonker, Willem 9783319068107 Springer
Secure Data Management: 10th Vldb Workshop, Sdm 2013, Trento, Italy, August 30, 2013, Proceedings

ISBN: 9783319068107 / Angielski / Miękka / 139 str.

ISBN: 9783319068107/Angielski/Miękka/139 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Willem Jonker; Milan Petkovic
This book constitutes the refereed proceedings of the 10th VLDB Workshop on Secure Data Management held in Trento, Italy, on August 30, 2013. The 15 revised full papers and one keynote paper presented were carefully reviewed and selected from various submissions. The papers are organized in technical papers and 10 vision papers which address key challenges in secure data management and indicate interesting research questions.
This book constitutes the refereed proceedings of the 10th VLDB Workshop on Secure Data Management held in Trento, Italy, on August 30, 2013. The 15 r...
cena: 201,24

 Engineering Secure Future Internet Services and Systems: Current Research Heisel, Maritta 9783319074511 Springer
Engineering Secure Future Internet Services and Systems: Current Research

ISBN: 9783319074511 / Angielski / Miękka / 393 str.

ISBN: 9783319074511/Angielski/Miękka/393 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Maritta Heisel; Wouter Joosen; Javier Lopez
This State-of-the-Art Survey contains a selection of papers representing state-of-the-art results in the engineering of secure software-based Future Internet services and systems, produced by the NESSoS project researchers. The engineering approach of the Network of Excellence NESSoS, funded by the European Commission, is based on the principle of addressing security concerns from the very beginning in all software development phases, thus contributing to reduce the amount of software vulnerabilities and enabling the systematic treatment of security needs through the engineering process. The...
This State-of-the-Art Survey contains a selection of papers representing state-of-the-art results in the engineering of secure software-based Future I...
cena: 201,24

 Healthcare Information Security and Privacy Sean Murphy 9780071831796 MCGRAW-HILL Professional
Healthcare Information Security and Privacy

ISBN: 9780071831796 / Angielski / Miękka / 560 str.

ISBN: 9780071831796/Angielski/Miękka/560 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sean Murphy
Operational, tested information security and privacy practices for the healthcare environment

Written by an expert in the field with multiple industry certifications, this definitive resource fully addresses information security and privacy considerations and their implications within the business of patient care. The book begins with an overview of the organization, financing, and delivery of healthcare and discusses technology, terminology, and data management principles. The topic coverage continues across all aspects of information security and privacy, with a special emphasis on...

Operational, tested information security and privacy practices for the healthcare environment

Written by an expert in the field with multiple indus...

cena: 281,31

 Applied Cryptography and Network Security: 12th International Conference, Acns 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings Boureanu, Ioana 9783319075358 Springer
Applied Cryptography and Network Security: 12th International Conference, Acns 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings

ISBN: 9783319075358 / Angielski / Miękka / 586 str.

ISBN: 9783319075358/Angielski/Miękka/586 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ioana Boureanu; Philippe Owesarski; Serge Vaudenay
This book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS 2014, held in Lausanne, Switzerland, in June 2014. The 33 revised full papers included in this volume were carefully reviewed and selected from 147 submissions. They are organized in topical sections on key exchange; primitive construction; attacks (public-key cryptography); hashing; cryptanalysis and attacks (symmetric cryptography); network security; signatures; system security; and secure computation.
This book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS 2014, held in L...
cena: 201,24

 Selected Areas in Cryptography -- Sac 2013: 20th International Conference, Burnaby, Bc, Canada, August 14-16, 2013, Revised Selected Papers Lange, Tanja 9783662434130 Springer
Selected Areas in Cryptography -- Sac 2013: 20th International Conference, Burnaby, Bc, Canada, August 14-16, 2013, Revised Selected Papers

ISBN: 9783662434130 / Angielski / Miękka / 590 str.

ISBN: 9783662434130/Angielski/Miękka/590 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tanja Lange; Kristin Lauter; Petr Lison K.
The papers presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections including: lattices; discrete logarithms; stream ciphers and authenticated encryption; post-quantum (hash-based and system solving); white box crypto; block ciphers; elliptic curves, pairings and RSA; hash functions and MACs; and side-channel attacks.
The papers presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections including: lattic...
cena: 201,24

 Information Security Theory and Practice. Securing the Internet of Things: 8th Ifip Wg 11.2 International Workshop, Wistp 2014, Heraklion, Crete, Gree Naccache, David 9783662438251 Springer
Information Security Theory and Practice. Securing the Internet of Things: 8th Ifip Wg 11.2 International Workshop, Wistp 2014, Heraklion, Crete, Gree

ISBN: 9783662438251 / Angielski / Miękka / 201 str.

ISBN: 9783662438251/Angielski/Miękka/201 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Naccache; Damien Sauveron
This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held in Heraklion, Crete, Greece, in June/July 2014. The 8 revised full papers and 6 short papers presented together with 2 keynote talks were carefully reviewed and selected from 33 submissions. The papers have been organized in topical sections on cryptography and cryptanalysis, smart cards and embedded devices, and privacy.
This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 20...
cena: 201,24

 Foundations of Coding: Compression, Encryption, Error Correction Dumas, Jean–Guillaume; Roch, Jean–Louis; Tannier, Eric 9781118881446 John Wiley & Sons
Foundations of Coding: Compression, Encryption, Error Correction

ISBN: 9781118881446 / Angielski / Twarda / 376 str.

ISBN: 9781118881446/Angielski/Twarda/376 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jean–Guillaume Dumas; Jean–Louis Roch; Eric Tannier

Offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations

This book offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations. This text focuses on the ways to structure information so that its transmission will be in the safest, quickest, and most efficient and error-free manner possible. All coding operations are covered in a single framework, with initial chapters addressing early mathematical models and algorithmic...

Offers a comprehensive introduction to the fundamental structures and applications of a wide range of contemporary coding operations

...

cena: 494,67

 Practical Cryptography: Algorithms and Implementations Using C++ Azad, Saiful 9781482228892 Auerbach Publications
Practical Cryptography: Algorithms and Implementations Using C++

ISBN: 9781482228892 / Angielski / Twarda / 365 str.

ISBN: 9781482228892/Angielski/Twarda/365 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Saiful Azad; Al-Sakib Khan Pathan
Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an increased reliance on cryptography. This book discusses the theories and concepts behind modern cryptography and demonstrates how to develop and implement cryptographic algorithms using C++ programming language.
Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without...
cena: 636,71

 Information Security and Privacy: 19th Australasian Conference, Acisp 2014, Wollongong, Nsw, Australia, July 7-9, 2014. Proceedings Susilo, Willy 9783319083438 Springer
Information Security and Privacy: 19th Australasian Conference, Acisp 2014, Wollongong, Nsw, Australia, July 7-9, 2014. Proceedings

ISBN: 9783319083438 / Angielski / Miękka / 464 str.

ISBN: 9783319083438/Angielski/Miękka/464 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Willy Susilo; Yi Mu
This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in Wollongong, NSW, Australia, in July 2014. The 26 revised full papers and 6 short papers presented in this volume were carefully selected from 91 submissions. The papers are organized in topical sections on cryptanalysis; cryptographic protocols; fine-grain cryptographic protocols; key exchange, fundamentals, lattices and homomorphic encryption, and applications.
This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in...
cena: 201,24

 Smart Card Research and Advanced Applications: 12th International Conference, Cardis 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Pap Francillon, Aurélien 9783319083018 Springer
Smart Card Research and Advanced Applications: 12th International Conference, Cardis 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Pap

ISBN: 9783319083018 / Angielski / Miękka / 271 str.

ISBN: 9783319083018/Angielski/Miękka/271 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Aurelien Francillon; Pankaj Rohatgi
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Smart Card Research and Advanced Applications, CARDIS 2013, held in Berlin, Germany, in November 2013. The 17 revised full papers presented in this book were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on security technologies; attacks on masking; side channel attacks; software and protocol analysis; side channel countermeasures; and side channel and fault attacks.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Smart Card Research and Advanced App...
cena: 193,23

 Privacy Enhancing Technologies: 14th International Symposium, Pets 2014, Amsterdam, the Netherlands, July 16-18, 2014, Proceedings De Cristofaro, Emiliano 9783319085050 Springer
Privacy Enhancing Technologies: 14th International Symposium, Pets 2014, Amsterdam, the Netherlands, July 16-18, 2014, Proceedings

ISBN: 9783319085050 / Angielski / Miękka / 333 str.

ISBN: 9783319085050/Angielski/Miękka/333 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Emiliano De Cristofaro; Steven J. Murdoch
This book constitutes the refereed proceedings of the 14th International Symposium on Privacy Enhancing Technologies, PETS 2014, held in Amsterdam, The Netherlands, in July 2014. The 16 full papers presented were carefully selected from 86 submissions. Topics addressed by the papers published in these proceedings include study of privacy erosion, designs of privacy-preserving systems, censorship resistance, social networks and location privacy.
This book constitutes the refereed proceedings of the 14th International Symposium on Privacy Enhancing Technologies, PETS 2014, held in Amsterdam, Th...
cena: 201,24

Pierwsza Podprzednia  25  26  27  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia