• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946350]
• Literatura piękna
 [1816154]

  więcej...
• Turystyka
 [70666]
• Informatyka
 [151172]
• Komiksy
 [35576]
• Encyklopedie
 [23172]
• Dziecięca
 [611458]
• Hobby
 [135995]
• AudioBooki
 [1726]
• Literatura faktu
 [225763]
• Muzyka CD
 [378]
• Słowniki
 [2917]
• Inne
 [444280]
• Kalendarze
 [1179]
• Podręczniki
 [166508]
• Poradniki
 [469467]
• Religia
 [507199]
• Czasopisma
 [496]
• Sport
 [61352]
• Sztuka
 [242330]
• CD, DVD, Video
 [3348]
• Technologie
 [219391]
• Zdrowie
 [98638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3525]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2785

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Privacy and Identity Management for Life: 5th Ifip Wg 9.2, 9.6/11.4, 11.6, 11.7/Primelife International Summer School, Nice, France, September 7-11, 2 Bezzi, Michele 9783642422539 Springer
Privacy and Identity Management for Life: 5th Ifip Wg 9.2, 9.6/11.4, 11.6, 11.7/Primelife International Summer School, Nice, France, September 7-11, 2

ISBN: 9783642422539 / Angielski / Miękka / 314 str.

ISBN: 9783642422539/Angielski/Miękka/314 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michele Bezzi; Penny Duquenoy; Simone Fischer-Hubner
NewInternetdevelopmentsposegreaterandgreaterprivacydilemmas. Inthe- formation Society, the need for individuals to protect their autonomy and retain control over their personal information is becoming more and more important. Today, informationandcommunicationtechnologies andthepeopleresponsible for making decisions about them, designing, and implementing them scarcely consider those requirements, thereby potentially putting individuals privacy at risk. The increasingly collaborative character of the Internet enables anyone to compose services and contribute and distribute information. It may...
NewInternetdevelopmentsposegreaterandgreaterprivacydilemmas. Inthe- formation Society, the need for individuals to protect their autonomy and retain c...
cena: 201,24

 Certification and Security in Inter-Organizational E-Services: Ifip 18th World Computer Congress, August 22-27, 2004, Toulouse, France Nardelli, Enrico 9781461498094 Springer
Certification and Security in Inter-Organizational E-Services: Ifip 18th World Computer Congress, August 22-27, 2004, Toulouse, France

ISBN: 9781461498094 / Angielski / Miękka / 149 str.

ISBN: 9781461498094/Angielski/Miękka/149 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Enrico Nardelli;Maurizio Talamo

Certification and Security in Inter-Organizational E-Services presents the proceeding of CSES 2004 - the 2nd International Workshop on Certification and Security in Inter-Organizational E-Services held within IFIP WCC 2004 in August, 2004, in Toulouse, France. Certification and security share a common technological basis in the reliable and efficient monitoring of executed and running processes; they likewise depend on the same fundamental organizational and economic principles. As the range of services managed and accessed through communication networks grows throughout...

Certification and Security in Inter-Organizational E-Services presents the proceeding of CSES 2004 - the 2nd International Worksho...

cena: 201,24

 Communications and Multimedia Security: 8th Ifip Tc-6 Tc-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, the L Chadwick, David 9781461498933 Springer
Communications and Multimedia Security: 8th Ifip Tc-6 Tc-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, the L

ISBN: 9781461498933 / Angielski / Miękka / 290 str.

ISBN: 9781461498933/Angielski/Miękka/290 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Chadwick; Bart Preneel

Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields of Communications and Multimedia Security.

This state-of-the-art volume presents the proceedings of the Eighth Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, September 2004, in Windermere, UK. The papers presented here represent the very latest developments in security research from leading people in the field. The papers explore a wide variety of subjects including privacy protection and trust negotiation,...

Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields of C...

cena: 402,53

 The Hash Function Blake Aumasson, Jean-Philippe 9783662447567 Springer
The Hash Function Blake

ISBN: 9783662447567 / Angielski / Twarda / 228 str.

ISBN: 9783662447567/Angielski/Twarda/228 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jean-Philippe Aumasson; Luca Henzen; Willi Meier

This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers. It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using BLAKE, with a focus on software implementation.

In the first two chapters, the authors offer a short introduction to cryptographic hashing, the SHA3 competition and BLAKE. They review applications of cryptographic hashing, they describe some basic notions such as...

This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of...

cena: 342,14

 Information Security Applications: 15th International Workshop, Wisa 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers Rhee, Kyung-Hyune 9783319150864 Springer
Information Security Applications: 15th International Workshop, Wisa 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers

ISBN: 9783319150864 / Angielski / Miękka / 406 str.

ISBN: 9783319150864/Angielski/Miękka/406 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rhee Kyung Hyune; Jeong Hyune Yi; Kyung-Hyune Rhee
This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications, WISA 2014, held on Jeju Island, Korea, in August 2014. The 30 revised full papers presented in this volume were carefully reviewed and selected from 69 submissions. The papers are organized in topical sections such as malware detection; mobile security; vulnerability analysis; applied cryptography; network security; cryptography; hardware security; and critical infrastructure security and policy.
This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications, WISA 2014, held on ...
cena: 201,24

 Applications of Cryptography and Network Security Stephen Mason 9781632400659 Clanrye International
Applications of Cryptography and Network Security

ISBN: 9781632400659 / Angielski / Twarda / 380 str.

ISBN: 9781632400659/Angielski/Twarda/380 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stephen Mason
Cryptography is the essential and efficient ingredient to the recipe of security solutions. With the arrival of new age communication systems and high speed networks in the future, cryptography will have a key role to play. This book talks about the crucial security challenges that the computing world is facing today and also discusses several techniques to fight against such attacks. The chapters in this book discuss various facets of cryptography and their applications. It will cater to the needs of researchers, engineers, graduates and PhD students working in this field. It will also be...
Cryptography is the essential and efficient ingredient to the recipe of security solutions. With the arrival of new age communication systems and high...
cena: 577,84

 Computing Security & Cryptography Handbook Stephen Mason 9781632401137 Clanrye International
Computing Security & Cryptography Handbook

ISBN: 9781632401137 / Angielski / Twarda / 244 str.

ISBN: 9781632401137/Angielski/Twarda/244 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stephen Mason
This book presents some critical security challenges that are faced in today's computing world. It discusses, in detail, the defense mechanisms against these kinds of attacks with the help of classical and modern approaches of cryptography and other defense mechanisms. The book not only deals with theoretical and fundamental aspects of cryptography, but also talks in length about different applications of cryptographic protocols and techniques in designing computing and network security solutions. This book will prove itself to be beneficial for researchers, engineers, graduate and doctoral...
This book presents some critical security challenges that are faced in today's computing world. It discusses, in detail, the defense mechanisms agains...
cena: 462,23

 Integrated Research in Steganography Audrey Coon 9781632403131 Clanrye International
Integrated Research in Steganography

ISBN: 9781632403131 / Angielski / Twarda / 102 str.

ISBN: 9781632403131/Angielski/Twarda/102 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Audrey Coon
Steganography involves the art of concealing one message or data file within another. Stenographic technologies form an essential part of the future of internet privacy and security. This book emphasizes a novel field of study in steganography. They are the underlying science and art of communicating which keep the existence of the communication hidden. This book provides a broad overview of this technology by introducing distinct and latest concepts of steganography and steganalysis. The book also briefly covers the history of steganography and evaluates steganalysis methods considering...
Steganography involves the art of concealing one message or data file within another. Stenographic technologies form an essential part of the future o...
cena: 288,82

 Protocols and Procedures of Cryptography and Network Security Stephen Mason 9781632404237 Clanrye International
Protocols and Procedures of Cryptography and Network Security

ISBN: 9781632404237 / Angielski / Twarda / 156 str.

ISBN: 9781632404237/Angielski/Twarda/156 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stephen Mason
This book provides an overview on various methodologies and procedures of cryptography. In the times of escalating worldwide development of electronic data storage and communications, efficient security of information has become a crucial need. The most efficient tool for the protection of information is cryptography, used in a combination with other tools for assuring the security of information in all of its applications, including user authentication, data integrity and confidentiality. This book is a compilation of in-depth research work in the field of cryptography. It describes some of...
This book provides an overview on various methodologies and procedures of cryptography. In the times of escalating worldwide development of electronic...
cena: 365,89

 Artificial Immune System: Applications in Computer Security Tan, Ying 9781119076285 Wiley-IEEE Computer Society PR
Artificial Immune System: Applications in Computer Security

ISBN: 9781119076285 / Angielski / Twarda / 208 str.

ISBN: 9781119076285/Angielski/Twarda/208 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yinglan Tan
This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security
  • Covers all of the current achievements in computer security based on immune principles, which were obtained by the Computational Intelligence Laboratory of Peking University, China
  • Includes state-of-the-art information on designing and developing artificial immune systems (AIS) and AIS-based solutions to computer security issues
  • Presents new...
This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extrac...
cena: 468,89

 Applied Cryptography: Protocols, Algorithms and Source Code in C Bruce Schneier 9781119096726 John Wiley & Sons Inc
Applied Cryptography: Protocols, Algorithms and Source Code in C

ISBN: 9781119096726 / Angielski / Twarda / 784 str.

ISBN: 9781119096726/Angielski/Twarda/784 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bruce Schneier

From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols...

From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptograph...

cena: 291,87

 Information Security and Cryptology - Icisc 2014: 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers Lee, Jooyoung 9783319159423 Springer
Information Security and Cryptology - Icisc 2014: 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers

ISBN: 9783319159423 / Angielski / Miękka / 448 str.

ISBN: 9783319159423/Angielski/Miękka/448 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jooyoung Lee; Jongsung Kim
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology, ICISC 2014, held in Seoul, South Korea in December 2014. The 27 revised full papers presented were carefully selected from 91 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on RSA security, digital signature, public key cryptography, block ciphers, network security, mobile...
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptology,...
cena: 201,24

 Public-Key Cryptography -- Pkc 2015: 18th Iacr International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, Usa, Marc Katz, Jonathan 9783662464465 Springer
Public-Key Cryptography -- Pkc 2015: 18th Iacr International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, Usa, Marc

ISBN: 9783662464465 / Angielski / Miękka / 824 str.

ISBN: 9783662464465/Angielski/Miękka/824 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jonathan Katz
This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015. The 36 papers presented in this volume were carefully reviewed and selected from 118 submissions. They are organized in topical sections named: public-key encryption; e-cash; cryptanalysis; digital signatures; password-based authentication; pairint-based cryptography; efficient constructions; cryptography with imperfect keys; interactive proofs; lattice-based cryptography; and identity-based,...
This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held ...
cena: 201,24

 Theory of Cryptography: 12th International Conference, Tcc 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I Dodis, Yevgeniy 9783662464939 Springer
Theory of Cryptography: 12th International Conference, Tcc 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I

ISBN: 9783662464939 / Angielski / Miękka / 660 str.

ISBN: 9783662464939/Angielski/Miękka/660 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yevgeniy Dodis; Jesper Buus Nielsen

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015.
The 52 revised full papers presented were carefully reviewed and
selected from 137 submissions. The papers are organized in topical
sections on foundations, symmetric key, multiparty computation,
concurrent and resettable security, non-malleable codes and tampering, privacy amplification, encryption an key exchange, pseudorandom functions and applications, proofs and verifiable...

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC...

cena: 201,24

 Theory of Cryptography: 12th International Conference, Tcc 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II Dodis, Yevgeniy 9783662464960 Springer
Theory of Cryptography: 12th International Conference, Tcc 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II

ISBN: 9783662464960 / Angielski / Miękka / 700 str.

ISBN: 9783662464960/Angielski/Miękka/700 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yevgeniy Dodis; Jesper Buus Nielsen

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015.
The 52 revised full papers presented were carefully reviewed and
selected from 137 submissions. The papers are organized in topical
sections on foundations, symmetric key, multiparty computation,
concurrent and resettable security, non-malleable codes and tampering, privacy amplification, encryption an key exchange, pseudorandom functions and applications, proofs and verifiable...

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC...

cena: 201,24

 Secure Multiparty Computation and Secret Sharing Ronald Cramer Ivan Damgaard Jesper Buus Nielsen 9781107043053 Cambridge University Press
Secure Multiparty Computation and Secret Sharing

ISBN: 9781107043053 / Angielski / Twarda / 381 str.

ISBN: 9781107043053/Angielski/Twarda/381 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ronald Cramer; Ivan Damgaard; Jesper Buus Nielsen
In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties handle confidential data if they do not trust everyone involved? This text is the first to present a comprehensive treatment of unconditionally secure techniques for multiparty computation (MPC) and secret sharing. In a secure MPC, each party possesses some private data, while secret sharing provides a way for one party to spread information on a secret such that all parties together hold full information, yet no single party has all the...
In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties ...
cena: 326,46

 Lightweight Cryptography for Security and Privacy: Third International Workshop, Lightsec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selecte Eisenbarth, Thomas 9783319163628 Springer
Lightweight Cryptography for Security and Privacy: Third International Workshop, Lightsec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selecte

ISBN: 9783319163628 / Angielski / Miękka / 169 str.

ISBN: 9783319163628/Angielski/Miękka/169 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thomas Eisenbarth; Erdinc Ozturk
This book constitutes the refereed post-conference proceedings of the Third International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2014, held in Istanbul, Turkey, in September 2014. The 10 full papers presented were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: efficient implementations and designs; attacks; and protocols.
This book constitutes the refereed post-conference proceedings of the Third International Workshop on Lightweight Cryptography for Security and Privac...
cena: 161,03

 Principles of Security and Trust: 4th International Conference, Post 2015, Held as Part of the European Joint Conferences on Theory and Practice of So Focardi, Riccardo 9783662466650 Springer-Verlag Berlin and Heidelberg Gmbh &
Principles of Security and Trust: 4th International Conference, Post 2015, Held as Part of the European Joint Conferences on Theory and Practice of So

ISBN: 9783662466650 / Angielski / Miękka / 365 str.

ISBN: 9783662466650/Angielski/Miękka/365 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This book constitutes the refereed proceedings of the 4th International Conference on Principles of Security and Trust, POST 2015, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, in London, UK, in April 2015. The 17 regular papers presented in this volume were carefully reviewed and selected from 57 submissions. In addition, one invited talk is included. The papers have been organized in topical sections on information flow and security types, risk assessment and security policies, protocols, hardware and physical security and privacy and...
This book constitutes the refereed proceedings of the 4th International Conference on Principles of Security and Trust, POST 2015, held as part of the...
cena: 201,24

 Fast Software Encryption: 21st International Workshop, Fse 2014, London, Uk, March 3-5, 2014. Revised Selected Papers Cid, Carlos 9783662467053 Springer-Verlag Berlin and Heidelberg Gmbh &
Fast Software Encryption: 21st International Workshop, Fse 2014, London, Uk, March 3-5, 2014. Revised Selected Papers

ISBN: 9783662467053 / Angielski / Miękka / 636 str.

ISBN: 9783662467053/Angielski/Miękka/636 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on Fast Software Encryption, held in London, UK, March 3-5, 2014. The 31 revised full papers presented were carefully reviewed and selected from 99 initial submissions. The papers are organized in topical sections on designs; cryptanalysis; authenticated encryption; foundations and theory; stream ciphers; hash functions; advanced constructions.
This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on Fast Software Encryption, held in Lond...
cena: 201,24

 Leakage Resilient Password Systems Yingjiu Li Qiang Yan Robert H. Deng 9783319175027 Springer International Publishing AG
Leakage Resilient Password Systems

ISBN: 9783319175027 / Angielski / Miękka / 64 str.

ISBN: 9783319175027/Angielski/Miękka/64 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yingjiu Li;Qiang Yan;Robert H. Deng
This book investigates tradeoff between security and usability in designing leakage resilient password systems (LRP) and introduces two practical LRP systems named Cover Pad and ShadowKey. It demonstrates that existing LRP systems are subject to both brute force attacks and statistical attacks and that these attacks cannot be effectively mitigated without sacrificing the usability of LRP systems. Quantitative analysis proves that a secure LRP system in practical settings imposes a considerable amount of cognitive workload unless certain secure channels are involved. The book introduces a...
This book investigates tradeoff between security and usability in designing leakage resilient password systems (LRP) and introduces two practical LRP ...
cena: 201,24

Pierwsza Podprzednia  28  29  30  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia