![]() |
Financial Cryptography and Data Security: 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers
ISBN: 9783662454718 / Angielski / Miękka / 506 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC 2014), held in Christ Church, Barbados, in March 2014. The 19 revised full papers and 12 short papers were carefully selected and reviewed from 165 abstract registrations and 138 full papers submissions. The papers are grouped in the following topical sections: payment systems, case studies, cloud and virtualization, elliptic curve cryptography, privacy-preserving systems, authentication and visual encryption, network security, mobile...
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Secu...
|
cena:
201,24 |
![]() |
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security
ISBN: 9781430265832 / Angielski / Miękka / 392 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of... A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security ... |
cena:
181,11 |
![]() |
The Manager's Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web
ISBN: 9781484201497 / Angielski / Miękka / 232 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively. Often, security vulnerabilities are difficult to understand and quantify because they are the result of intricate programming deficiencies and highly technical issues. Author and noted industry expert Ron Lepofsky breaks down the technical barrier and identifies many real-world examples of security vulnerabilities commonly... The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every... |
cena:
402,53 |
![]() |
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
ISBN: 9781484203682 / Angielski / Miękka / 180 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In nontechnical language and engaging style, 10 Don'ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and phishing attacks and emerging threats that exploit cloud based storage and mobile apps. It's a wonderful thing to be able to use any of your cloud-synced assortment of desktop, portable, mobile, and wearable computing devices to work from home, shop at work,... In nontechnical language and engaging style, 10 Don'ts on Your Digital Devices explains to non-techie users of PCs and handheld devices ex... |
cena:
132,80 |
![]() |
Homomorphic Encryption and Applications
ISBN: 9783319122281 / Angielski / Miękka / 126 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is presented in an instructional and practical style, with concrete examples to enhance the reader's understanding. This volume achieves a balance between the theoretical and the practical components of modern information security. Readers will learn key principles of homomorphic encryption as well as...
This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private i...
|
cena:
301,89 |
![]() |
Security Protocols XXII: 22nd International Workshop, Cambridge, Uk, March 19-21, 2014, Revised Selected Papers
ISBN: 9783319123998 / Angielski / Miękka / 373 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-workshop proceedings of the 22nd International Workshop on Security Protocols, held in Cambridge, UK, in March 2014.After an introduction the volume presents 18 revised papers each followed by a revised transcript of the presentation and ensuing discussion at the event. The theme of this year's workshop is "Collaborating with the Enemy."
"
This book constitutes the thoroughly refereed post-workshop proceedings of the 22nd International Workshop on Security Protocols, held in Cambridge... |
cena:
201,24 |
![]() |
Information Security: 17th International Conference, Isc 2014, Hong Kong, China, October 12-14, 2014, Proceedings
ISBN: 9783319132563 / Angielski / Miękka / 570 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014. This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in... |
cena:
201,24 |
![]() |
Advances in Digital Forensics VIII: 8th Ifip Wg 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised
ISBN: 9783642428432 / Angielski / Miękka / 334 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security...
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wirele...
|
cena:
201,24 |
![]() |
Information Security and Cryptology: 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers
ISBN: 9783319120867 / Angielski / Miękka / 408 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptology, Inscrypt 2013, held in Guangzhou, China, in November 2013. The 21 revised full papers presented together with 4 short papers were carefully reviewed and selected from 93 submissions. The papers cover the topics of Boolean function and block cipher, sequence and stream cipher, applications: systems and theory, computational number theory, public key cryptography, has function, side-channel and leakage, and application and system... This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptolog... |
cena:
201,24 |
![]() |
Advances in Cryptology -- ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II
ISBN: 9783662456071 / Angielski / Miękka / 528 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero...
The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryp...
|
cena:
201,24 |
![]() |
Advances in Cryptology -- ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings
ISBN: 9783662456101 / Angielski / Miękka / 574 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero...
The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryp...
|
cena:
201,24 |
![]() |
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
ISBN: 9781430260820 / Angielski / Miękka / 536 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker... Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the ... |
cena:
385,31 |
![]() |
An Easy Introduction to Cryptography
ISBN: 9781503013582 / Angielski / Miękka / 56 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Beginning with the origins of the subject, we then understand some common definitions. Then start with basic methods of encryption- briefly discuss their flaws, cover some more "interesting" examples which will readily lead us onto one of the most influential discoveries of the 20th century; public key cryptography, most notably RSA.
Beginning with the origins of the subject, we then understand some common definitions. Then start with basic methods of encryption- briefly discuss th...
|
cena:
40,43 |
![]() |
Applications and Techniques in Information Security: International Conference, Atis 2014, Melbourne, Australia, November 26-28, 2014. Proceedings
ISBN: 9783662456699 / Angielski / Miękka / 266 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014, held in Melbourne, Australia, in November 2014. The 16 revised full papers and 8 short papers presented were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on applications; curbing cyber crimes; data privacy; digital forensics; security implementations.
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2014, held...
|
cena:
201,24 |
![]() |
Trust Management IV: 4th Ifip Wg 11.11 International Conference, Ifiptm 2010, Morioka, Japan, June 16-18, 2010, Proceedings
ISBN: 9783642422348 / Angielski / Miękka / 276 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan during June 16-18, 2010. IFIPTM 2010 provided a truly global platform for the reporting of research, development, policy, and practice in the interdependent arrears of privacy, se- rity, and trust. Building on the traditions inherited from the highly succe- ful iTrust conference series, the IFIPTM 2007 conference in Moncton, New Brunswick, Canada, the IFIPTM 2008 conference in Trondheim, Norway, and the IFIPTM 2009 conference at Purdue...
This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan...
|
cena:
201,24 |
![]() |
Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (Teismes)
ISBN: 9781461498919 / Angielski / Miękka / 196 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This study investigates the impacts and risk assessment of technology-ena bled information (TET), v DEGREEShich are engaged in the process of discovering the opportunities and challenges presented by TEI to the new form of small medi um enterprises (SME) business transactions: Technology Enable Information Small Medium Enterprises (TEISME). Within the UK economy, the notion of TEISMEs is one that forms the focus for this research. Other technologies that enabled information are also discussed. For example electronic mail (e-mail), voice mail, facsimile machines (fax), teleconferencing, data...
This study investigates the impacts and risk assessment of technology-ena bled information (TET), v DEGREEShich are engaged in the process of discover...
|
cena:
402,53 |
![]() |
Security Standardisation Research: First International Conference, Ssr 2014, London, Uk, December 16-17, 2014. Proceedings
ISBN: 9783319140537 / Angielski / Miękka / 257 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the First International Conference on Security Standardisation Research, SSR 2014, which was held in London, UK, in December 2014. The 14 full papers presented in this volume were carefully reviewed and selected from 22 submissions. The papers cover a range of topics in the field of security standardisation research, including cryptographic evaluation, standards development, analysis with formal methods, potential future areas of standardisation, and improving existing standards.
This book constitutes the proceedings of the First International Conference on Security Standardisation Research, SSR 2014, which was held in London, ...
|
cena:
193,23 |
![]() |
Understanding Cryptography: A Textbook for Students and Practitioners
ISBN: 9783642446498 / Angielski / Miękka / 372 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography is now ubiquitous moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard... Cryptography is now ubiquitous moving beyond the traditional environments, such as government communications and banking systems, we see cryptograp... |
cena:
152,93 |
![]() |
Introduction to Certificateless Cryptography
ISBN: 9781482248609 / Angielski / Twarda / 314 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC. As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as w... |
cena:
416,26 |
![]() |
Cyber Warfare: Building the Scientific Foundation
ISBN: 9783319140384 / Angielski / Twarda / 321 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially...
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is ...
|
cena:
523,30 |