Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers
ISBN: 9783662439326 / Angielski / Miękka / 605 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Workshop on Fast Software Encryption, held in Singapore, March 11-13, 2013. The 30 revised full papers presented were carefully reviewed and selected from 97 initial submissions. The papers are organized in topical sections on block ciphers, lightweight block ciphers, tweakable block ciphers, stream ciphers, hash functions, message authentication codes, provable security, implementation aspects, lightweight authenticated encryption, automated cryptanalysis, Boolean functions.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Workshop on Fast Software Encryption, held in Sing...
|
|
cena:
193,19 zł |
Trust, Privacy, and Security in Digital Business: 11th International Conference, Trustbus 2014, Munich, Germany, September 2-3, 2014. Proceedings
ISBN: 9783319097695 / Angielski / Miękka / 191 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital Business, TrustBus 2014, held in Munich, Germany, in September 2014 in conjunction with DEXA 2014. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: trust management; trust metrics and evaluation models; privacy and trust in cloud computing; security management; and security, trust, and privacy in mobile and pervasive environments.
This book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital Business, TrustBus 2014, held in M...
|
|
cena:
185,49 zł |
Advances in Information and Computer Security: 9th International Workshop on Security, Iwsec 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings
ISBN: 9783319098425 / Angielski / Miękka / 287 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption.
This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The...
|
|
cena:
185,49 zł |
Advances in Cryptology -- Crypto 2014: 34th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 17-21, 2014, Proceedings, Part I
ISBN: 9783662443705 / Angielski / Miękka / 574 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014. The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of... The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 20... |
|
cena:
193,19 zł |
Advances in Cryptology -- CRYPTO 2014: 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II
ISBN: 9783662443804 / Angielski / Miękka / 532 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014. The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; groups and maps; lattices; asymmetric encryption and signatures; side channels and leakage resilience; obfuscation; FHE; quantum cryptography; foundations of... The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 20... |
|
cena:
193,19 zł |
Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records
ISBN: 9781430266761 / Angielski / Miękka / 194 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives and penalties tied to the HITECH Act, HIPAA, and the implementation of Electronic Health Record (EHR) systems, medical practices and healthcare systems are implementing new software at breakneck speed. Yet privacy and security considerations are often an afterthought, putting healthcare organizations at risk of fines and damage to their reputations.
Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in... Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives ...
|
|
cena:
289,80 zł |
Drugs on the Dark Net: How Cryptomarkets Are Transforming the Global Trade in Illicit Drugs
ISBN: 9781137399045 / Angielski / Twarda / 92 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This study explores the rapidly expanding world of online illicit drug trading. Since the fall of the infamous Silk Road, a new generation of cryptomarkets can be found thriving on the dark net. Martin explores how these websites defy powerful law enforcement agencies and represent the new digital front in the 'war on drugs'.
This study explores the rapidly expanding world of online illicit drug trading. Since the fall of the infamous Silk Road, a new generation of cryptoma...
|
|
cena:
251,16 zł |
Security and Cryptography for Networks: 9th International Conference, Scn 2014, Amalfi, Italy, September 3-5, 2014. Proceedings
ISBN: 9783319108780 / Angielski / Miękka / 609 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 9th International Conference on Security and Cryptography, SCN 2014, held in Amalfi, Italy, in September 2014. The 31 papers presented in this volume were carefully reviewed and selected from 95 submissions. They are organized in topical sections on key exchange; multilinear maps and obfuscation; pseudorandom function extensions; secure computation - foundations and algorithms; network security; functional encryption; cryptanalysis; secure computation - implementation; zero knowledge; message authentication; proofs of space and erasure; public-key...
This book constitutes the proceedings of the 9th International Conference on Security and Cryptography, SCN 2014, held in Amalfi, Italy, in September ...
|
|
cena:
193,19 zł |
Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine
ISBN: 9781430265719 / Angielski / Miękka / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications' secrets and users' privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security... Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the sec... |
|
cena:
146,81 zł |
Computer Security - Esorics 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I
ISBN: 9783319112022 / Angielski / Miękka / 545 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions. The papers address issues such as cryptography, formal methods and theory of security, security services, intrusion/anomaly detection and malware mitigation, security in hardware, systems security, network security, database and storage security, software and application security, human and societal...
The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESOR...
|
|
cena:
193,19 zł |
Computer Security - Esorics 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I
ISBN: 9783319112114 / Angielski / Miękka / 516 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions. The papers address issues such as cryptography, formal methods and theory of security, security services, intrusion/anomaly detection and malware mitigation, security in hardware, systems security, network security, database and storage security, software and application security, human and societal...
The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESOR...
|
|
cena:
193,19 zł |
Cryptographic Hardware and Embedded Systems -- CHES 2014: 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings
ISBN: 9783662447086 / Angielski / Miękka / 618 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, held in Busan, South Korea, in September 2014. The 33 full papers included in this volume were carefully reviewed and selected from 127 submissions. They are organized in topical sections named: side-channel attacks; new attacks and constructions; countermeasures; algorithm specific SCA; ECC implementations; implementations; hardware implementations of symmetric cryptosystems; PUFs; and RNGs and SCA issues in hardware.
This book constitutes the proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, held in Busan, Sou...
|
|
cena:
193,19 zł |
Cryptography and Security Systems: Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings
ISBN: 9783662448922 / Angielski / Miękka / 209 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Third International Conference on Cryptography and Security Systems, CSS 2014, held in Lublin, Poland, in September 2014. The 17 revised full papers presented were carefully reviewed and selected from 43 submissions. 7 of those papers concern different areas of cryptography, while the remaining 10 deal with recent problems of cryptographic protocols.
This book constitutes the refereed proceedings of the Third International Conference on Cryptography and Security Systems, CSS 2014, held in Lublin, P...
|
|
cena:
193,19 zł |
Trusted Computing Platforms: Tpm2.0 in Context
ISBN: 9783319087436 / Angielski / Twarda / 382 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.
In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe t...
|
|
cena:
618,28 zł |
The Infosec Handbook: An Introduction to Information Security
ISBN: 9781430263821 / Angielski / Miękka / 392 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.
It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to... The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the...
|
|
cena:
173,87 zł |
Automated Firewall Analytics: Design, Configuration and Optimization
ISBN: 9783319103709 / Angielski / Twarda / 132 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks. It presents methodologies, techniques and tools for researchers as well as professionals to understand the challenges and improve the state-of-the-art of managing firewalls systematically in both research and application domains. Chapters explore set-theory, managing firewall configuration globally and consistently, access control list with encryption, and authentication such as IPSec policies. The author...
This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewa...
|
|
cena:
386,41 zł |
Cyber Defense and Situational Awareness
ISBN: 9783319113906 / Angielski / Twarda / 329 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for...
This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It ...
|
|
cena:
386,41 zł |
Secure It Systems: 19th Nordic Conference, Nordsec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings
ISBN: 9783319115986 / Angielski / Miękka / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 19th Nordic Conference on Secure IT Systems, held in Tromso, Norway, in October 2014. The 15 full papers presented in this volume were carefully reviewed and selected from 42 submissions. They are organized in topical sections named: information management and data privacy; cloud, big data and virtualization security; network security and logging; attacks and defenses; and security in healthcare and biometrics. The volume also contains one full-paper invited talk.
This book constitutes the proceedings of the 19th Nordic Conference on Secure IT Systems, held in Tromso, Norway, in October 2014. The 15 full papers ...
|
|
cena:
185,49 zł |
Post-Quantum Cryptography: 6th International Workshop, Pqcrypto 2014, Waterloo, On, Canada, October 1-3, 2014. Proceedings
ISBN: 9783319116587 / Angielski / Miękka / 284 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 6th International Workshop on Post-Quantum Cryptography, PQCrypto 2014, held in Waterloo, ON, Canada, in October 2014. The 16 revised full papers presented were carefully reviewed and selected from 37 submissions. The papers cover all technical aspects of cryptographic research related to the future world with large quantum computers such as code-based cryptography, lattice-based cryptography, multivariate cryptography, isogeny-based cryptography, security proof frameworks, cryptanalysis and implementations.
This book constitutes the refereed proceedings of the 6th International Workshop on Post-Quantum Cryptography, PQCrypto 2014, held in Waterloo, ON, Ca...
|
|
cena:
193,19 zł |
Network and System Security: 8th International Conference, Nss 2014, Xi'an, China, October 15-17, 2014. Proceedings
ISBN: 9783319116976 / Angielski / Miękka / 576 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 8th International Conference on Network and System Security, NSS 2014, held in Xi'an, China, in October 2014. The 35 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 155 initial submissions. The papers are organized in topical sections on cloud computing, access control, network security, security analysis, public key cryptography, system security, privacy-preserving systems and biometrics, and key management and distribution.
This book constitutes the proceedings of the 8th International Conference on Network and System Security, NSS 2014, held in Xi'an, China, in October 2...
|
|
cena:
193,19 zł |