• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946350]
• Literatura piękna
 [1816154]

  więcej...
• Turystyka
 [70666]
• Informatyka
 [151172]
• Komiksy
 [35576]
• Encyklopedie
 [23172]
• Dziecięca
 [611458]
• Hobby
 [135995]
• AudioBooki
 [1726]
• Literatura faktu
 [225763]
• Muzyka CD
 [378]
• Słowniki
 [2917]
• Inne
 [444280]
• Kalendarze
 [1179]
• Podręczniki
 [166508]
• Poradniki
 [469467]
• Religia
 [507199]
• Czasopisma
 [496]
• Sport
 [61352]
• Sztuka
 [242330]
• CD, DVD, Video
 [3348]
• Technologie
 [219391]
• Zdrowie
 [98638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3525]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2785

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Security Protocols XXIII: 23rd International Workshop, Cambridge, Uk, March 31 - April 2, 2015, Revised Selected Papers Christianson, Bruce 9783319260952 Springer
Security Protocols XXIII: 23rd International Workshop, Cambridge, Uk, March 31 - April 2, 2015, Revised Selected Papers

ISBN: 9783319260952 / Angielski / Miękka / 367 str.

ISBN: 9783319260952/Angielski/Miękka/367 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bruce Christianson; Petr Venda; Vashek Matya

This book constitutes the thoroughly refereed post-workshop proceedings of the 23rd International Workshop on Security Protocols, held in Cambridge, UK, in March/April 2015. After an introduction the volume presents 18 revised papers each followed by a revised transcript of the presentation and ensuing discussion at the event. The theme of this year's workshop is "Information Security in Fiction and in Fact."


This book constitutes the thoroughly refereed post-workshop proceedings of the 23rd International Workshop on Security Protocols, held in Cambridge...

cena: 201,24

 Provable Security: 9th International Conference, Provsec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings Au, Man-Ho 9783319260587 Springer
Provable Security: 9th International Conference, Provsec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings

ISBN: 9783319260587 / Angielski / Miękka / 504 str.

ISBN: 9783319260587/Angielski/Miękka/504 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Man-Ho Au; Atsuko Miyaji

This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec 2015, held in Kanazawa, Japan, in November 2015.

The 19 full papers and 7 short papers presented together with 3 invited talks were carefully reviewed and selected from 60 submissions. The papers are grouped in topical sections on fundamental, protocol, authenticated encryption and key exchange, encryption and identification, privacy and cloud, leakage-resilient cryptography and lattice cryptography, signature and broadcast encryption.


This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec 2015, held in Kanazawa, Japan, in ...

cena: 201,24

 Progress in Cryptology -- Indocrypt 2015: 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings Biryukov, Alex 9783319266169 Springer
Progress in Cryptology -- Indocrypt 2015: 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings

ISBN: 9783319266169 / Angielski / Miękka / 371 str.

ISBN: 9783319266169/Angielski/Miękka/371 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alex Biryukov; Vipul Goyal

This book constitutes the refereed proceedings of the 16th International Conference on Cryptology in India, INDOCRYPT 2015, held in Bangalore, India, in December 2015. The 19 revised full papers presented in this book were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on public key encryption; cryptanalysis; side channel attacks; information theoretic cryptography; and lightweight cryptography.


This book constitutes the refereed proceedings of the 16th International Conference on Cryptology in India, INDOCRYPT 2015, held in Bangalore, Indi...

cena: 201,24

 Dynamic Secrets in Communication Security Sheng Xiao Weibo Gong Donald Towsley 9781493902293 Springer
Dynamic Secrets in Communication Security

ISBN: 9781493902293 / Angielski / Miękka / 136 str.

ISBN: 9781493902293/Angielski/Miękka/136 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sheng Xiao; Weibo Gong; Donald Towsley
Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a...
Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a compl...
cena: 201,24

 Cryptology and Network Security: 14th International Conference, Cans 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings Reiter, Michael 9783319268224 Springer
Cryptology and Network Security: 14th International Conference, Cans 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings

ISBN: 9783319268224 / Angielski / Miękka / 257 str.

ISBN: 9783319268224/Angielski/Miękka/257 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Reiter; David Naccache

This book constitutes the refereed proceedings of the 14th International Conference on Cryptology and Network Security, CANS 2015, held in Marrakesh, Morocco, in December 2015.

The 12 full papers presented together with 6 short papers were carefully reviewed and selected from numerous submissions. The papers cover topics of interest such as internet of things and privacy; password-based authentication; attacks and malicious code; security modeling and verification; secure multi-party computation; and cryptography and VPNs.


This book constitutes the refereed proceedings of the 14th International Conference on Cryptology and Network Security, CANS 2015, held in Marrakes...

cena: 193,23

 Information Systems Security: 11th International Conference, Iciss 2015, Kolkata, India, December 16-20, 2015. Proceedings Jajoda, Sushil 9783319269603 Springer
Information Systems Security: 11th International Conference, Iciss 2015, Kolkata, India, December 16-20, 2015. Proceedings

ISBN: 9783319269603 / Angielski / Miękka / 584 str.

ISBN: 9783319269603/Angielski/Miękka/584 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sushil Jajoda; Chandan Mazumdar; Sushil Jajodia

This book constitutes the refereed proceedings of the 11th International Conference on Information Systems Security, ICISS 2015, held in Kolkata, India, in December 2015.

The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 133 submissions. The papers address the following topics: access control; attacks and mitigation; cloud security; crypto systems and protocols; information flow control; sensor networks and cognitive radio; and watermarking and steganography.


This book constitutes the refereed proceedings of the 11th International Conference on Information Systems Security, ICISS 2015, held in Kolkata, I...

cena: 201,24

 Security Standardisation Research: Second International Conference, Ssr 2015, Tokyo, Japan, December 15-16, 2015, Proceedings Chen, Liqun 9783319271514 Springer
Security Standardisation Research: Second International Conference, Ssr 2015, Tokyo, Japan, December 15-16, 2015, Proceedings

ISBN: 9783319271514 / Angielski / Miękka / 267 str.

ISBN: 9783319271514/Angielski/Miękka/267 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Liqun Chen; Shin'ichiro Matsuo

This book constitutes the refereed proceedings of the Second International Conference on Security Standardisation Research, SSR 2015, held in Tokyo, Japan, in December 2015.
The 13 papers presented in this volume were carefully reviewed and selected from 18 submissions. They are organized in topical sections named: bitcoin and payment; protocol and API; analysis on cryptographic algorithm; privacy; and trust and formal analysis.


This book constitutes the refereed proceedings of the Second International Conference on Security Standardisation Research, SSR 2015, held in Tokyo...

cena: 193,23

 Cryptography and Coding: 15th Ima International Conference, Imacc 2015, Oxford, Uk, December 15-17, 2015. Proceedings Groth, Jens 9783319272382 Springer
Cryptography and Coding: 15th Ima International Conference, Imacc 2015, Oxford, Uk, December 15-17, 2015. Proceedings

ISBN: 9783319272382 / Angielski / Miękka / 329 str.

ISBN: 9783319272382/Angielski/Miękka/329 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jens Groth
This book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC 2015, held at Oxford, UK, in December 2015. The 18 papers presented together with 1 invited talk were carefully reviewed and selected from 36 submissions. The scope of the conference was on following topics: authentication, symmetric cryptography, 2-party computation, codes, Boolean functions, information theory, and leakage resilience.
This book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC 2015, held at Oxford, UK, in December...
cena: 201,24

 GNU GSS Library: Generic Security Service Josefsson, Simon 9789888381661 Samurai Media Limited
GNU GSS Library: Generic Security Service

ISBN: 9789888381661 / Angielski / Miękka / 78 str.

ISBN: 9789888381661/Angielski/Miękka/78 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Simon Josefsson
GSS is an implementation of the Generic Security Service Application Program Interface (GSS-API). GSS-API is used by network servers to provide security services, e.g., to authenticate SMTP/IMAP clients against SMTP/IMAP servers. GSS consists of a library and a manual. GSS is developed for the GNU/Linux system, but runs on over 20 platforms including most major Unix platforms and Windows, and many kind of devices including iPAQ handhelds and S/390 mainframes.
GSS is an implementation of the Generic Security Service Application Program Interface (GSS-API). GSS-API is used by network servers to provide securi...
cena: 80,88

 GnuTLS Reference Manual Josefsson, Simon 9789888381647 Samurai Media Limited
GnuTLS Reference Manual

ISBN: 9789888381647 / Angielski / Miękka / 326 str.

ISBN: 9789888381647/Angielski/Miękka/326 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nikos Mavrogiannopoulos; Simon Josefsson; Daiki Ueno
GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures. It is aimed to be portable and efficient with focus on security and interoperability.
GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language a...
cena: 121,35

 Trust Management VII: 7th Ifip Wg 11.11 International Conference, Ifiptm 2013, Malaga, Spain, June 3-7, 2013, Proceedings Fernandez-Gago, Carmen 9783642443633 Springer
Trust Management VII: 7th Ifip Wg 11.11 International Conference, Ifiptm 2013, Malaga, Spain, June 3-7, 2013, Proceedings

ISBN: 9783642443633 / Angielski / Miękka / 288 str.

ISBN: 9783642443633/Angielski/Miękka/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Carmen Fernandez-Gago; Fabio Martinelli; Siani Pearson
This book constitutes the refereed proceedings of the 7th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2013, held in Malaga, Spain, in June 2013.
This book constitutes the refereed proceedings of the 7th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2013, held in Malaga, Spa...
cena: 201,24

 Trusted Systems: 6th International Conference, Intrust 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers Yung, Moti 9783319279978 Springer
Trusted Systems: 6th International Conference, Intrust 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers

ISBN: 9783319279978 / Angielski / Miękka / 442 str.

ISBN: 9783319279978/Angielski/Miękka/442 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Moti Yung; Liehuang Zhu; Yanjiang Yang
Normal 0 false false false EN-US X-NONE X-NONE

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014.

The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The revised full papers focus on the theory, technologies and applications of trusted systems and cover all aspects of trusted computing systems,...
Normal 0 false false false EN-US X-NONE X-NONE

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International C...

cena: 201,24

 GnuPG - Using the GNU Privacy Guard Project, The Gnupg 9789888381159 Samurai Media Limited
GnuPG - Using the GNU Privacy Guard

ISBN: 9789888381159 / Angielski / Miękka / 184 str.

ISBN: 9789888381159/Angielski/Miękka/184 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
The Gnupg Project
GNU Privacy Guard (GnuPG or GPG) is a free software replacement for the Symantec's PGP cryptographic software suite. GnuPG is compliant with RFC 4880, which is the IETF standards track specification of OpenPGP. Modern versions of PGP and Veridis' Filecrypt are interoperable with GnuPG and other OpenPGP-compliant systems.
GNU Privacy Guard (GnuPG or GPG) is a free software replacement for the Symantec's PGP cryptographic software suite. GnuPG is compliant with RFC 4880,...
cena: 101,12

 Computer Networks and Internets, Global Edition Douglas Comer 9781292061177 Pearson Education Limited
Computer Networks and Internets, Global Edition

ISBN: 9781292061177 / Angielski / Miękka / 672 str.

ISBN: 9781292061177/Angielski/Miękka/672 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Douglas Comer
cena: 539,21

 Identity and Data Security for Web Development: Best Practices Jonathan LeBlanc Tim Messerschmidt 9781491937013 O'Reilly Media
Identity and Data Security for Web Development: Best Practices

ISBN: 9781491937013 / Angielski / Miękka / 204 str.

ISBN: 9781491937013/Angielski/Miękka/204 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jonathan LeBlanc; Tim Messerschmidt

Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected.

Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for...

Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web develope...

cena: 164,92

 Applied Cryptography and Network Security: 13th International Conference, Acns 2015, New York, Ny, Usa, June 2-5, 2015, Revised Selected Papers Malkin, Tal 9783319281650 Springer
Applied Cryptography and Network Security: 13th International Conference, Acns 2015, New York, Ny, Usa, June 2-5, 2015, Revised Selected Papers

ISBN: 9783319281650 / Angielski / Miękka / 698 str.

ISBN: 9783319281650/Angielski/Miękka/698 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tal Malkin; Vladimir Kolesnikov; Allison Lewko
This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto);...
This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in N...
cena: 201,24

 Theory of Cryptography: 13th International Conference, Tcc 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I Kushilevitz, Eyal 9783662490952 Springer
Theory of Cryptography: 13th International Conference, Tcc 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I

ISBN: 9783662490952 / Angielski / Miękka / 618 str.

ISBN: 9783662490952/Angielski/Miękka/618 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eyal Kushilevitz; Tal Malkin
The two-volume set LNCS 9562 and LNCS 9563 constitutes the refereedproceedings of the 13th International Conference on Theory ofCryptography, TCC 2016, held in Tel Aviv, Israel, in January 2016.
The 45 revised full papers presented were carefully reviewed andselected from 112 submissions. The papers are organized in topicalsections on obfuscation, differential privacy, LWR and LPN, public key encryption, signatures, and VRF, complexity of cryptographic primitives, multiparty computation, zero knowledge and PCP, oblivious RAM, ABE and IBE, and codes and interactive proofs. The volume also...
The two-volume set LNCS 9562 and LNCS 9563 constitutes the refereedproceedings of the 13th International Conference on Theory ofCryptography, TCC 2016...
cena: 402,53

 Theory of Cryptography: 13th International Conference, Tcc 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II Kushilevitz, Eyal 9783662490983 Springer
Theory of Cryptography: 13th International Conference, Tcc 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II

ISBN: 9783662490983 / Angielski / Miękka / 596 str.

ISBN: 9783662490983/Angielski/Miękka/596 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eyal Kushilevitz; Tal Malkin
The two-volume set LNCS 9562 and LNCS 9563 constitutes the refereedproceedings of the 13th International Conference on Theory ofCryptography, TCC 2016, held in Tel Aviv, Israel, in January 2016.
The 45 revised full papers presented were carefully reviewed andselected from 112 submissions. The papers are organized in topicalsections on obfuscation, differential privacy, LWR and LPN, public key encryption, signatures, and VRF, complexity of cryptographic primitives, multiparty computation, zero knowledge and PCP, oblivious RAM, ABE and IBE, and codes and interactive proofs. The volume also...
The two-volume set LNCS 9562 and LNCS 9563 constitutes the refereedproceedings of the 13th International Conference on Theory ofCryptography, TCC 2016...
cena: 201,24

 Shishi - Kerberos 5 Implementation Simon Josefsson 9789888381777 Samurai Media Limited
Shishi - Kerberos 5 Implementation

ISBN: 9789888381777 / Angielski / Miękka / 280 str.

ISBN: 9789888381777/Angielski/Miękka/280 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Simon Josefsson
Shishi is an implementation of the Kerberos 5 network authentication system, as specified in RFC 4120. Shishi can be used to authenticate users in distributed systems. Shishi contains a library ('libshishi') that can be used by application developers to add support for Kerberos 5. Shishi contains a command line utility ('shishi') that is used by users to acquire and manage tickets (and more). The server side, a Key Distribution Center, is implemented by 'shishid'. Of course, a manual documenting usage aspects as well as the programming API is included. Shishi currently supports AS/TGS...
Shishi is an implementation of the Kerberos 5 network authentication system, as specified in RFC 4120. Shishi can be used to authenticate users in dis...
cena: 121,35

 Primzahltests Für Einsteiger: Zahlentheorie - Algorithmik - Kryptographie Waldecker, Rebecca 9783658112165 Springer Spektrum
Primzahltests Für Einsteiger: Zahlentheorie - Algorithmik - Kryptographie

ISBN: 9783658112165 / Niemiecki / Miękka / 211 str.

ISBN: 9783658112165/Niemiecki/Miękka/211 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rebecca Waldecker; Lasse Rempe-Gillen
In diesem Buch geht es um den AKS-Algorithmus, den ersten deterministischen Primzahltest mit polynomieller Laufzeit. Er wurde benannt nach den Informatikern Agrawal, Kayal und Saxena, die ihn 2002 entwickelt haben. Primzahlen sind Gegenstand vieler mathematischer Probleme und spielen im Zusammenhang mit Verschlusselungsmethoden eine wichtige Rolle. Das vorliegende Buch leitet den AKS-ALgorithmus in verstandlicher Art und Weise her, ohne wesentliche Vorkenntnisse zu benotigen, und ist daher bereits fur interessierte Gymnasialschuler(innen) zuganglich. Auerdem eignet sich das Buch von...
In diesem Buch geht es um den AKS-Algorithmus, den ersten deterministischen Primzahltest mit polynomieller Laufzeit. Er wurde benannt nach den Informa...
cena: 131,64

Pierwsza Podprzednia  31  32  33  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia