![]() |
Security Standardisation Research: Second International Conference, Ssr 2015, Tokyo, Japan, December 15-16, 2015, Proceedings
ISBN: 9783319271514 / Angielski / Miękka / 267 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Second International Conference on Security Standardisation Research, SSR 2015, held in Tokyo, Japan, in December 2015. This book constitutes the refereed proceedings of the Second International Conference on Security Standardisation Research, SSR 2015, held in Tokyo... |
cena:
185,49 zł |
![]() |
Cryptography and Coding: 15th Ima International Conference, Imacc 2015, Oxford, Uk, December 15-17, 2015. Proceedings
ISBN: 9783319272382 / Angielski / Miękka / 329 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC 2015, held at Oxford, UK, in December 2015. The 18 papers presented together with 1 invited talk were carefully reviewed and selected from 36 submissions. The scope of the conference was on following topics: authentication, symmetric cryptography, 2-party computation, codes, Boolean functions, information theory, and leakage resilience.
This book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC 2015, held at Oxford, UK, in December...
|
cena:
193,19 zł |
![]() |
GNU GSS Library: Generic Security Service
ISBN: 9789888381661 / Angielski / Miękka / 78 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. GSS is an implementation of the Generic Security Service Application Program Interface (GSS-API). GSS-API is used by network servers to provide security services, e.g., to authenticate SMTP/IMAP clients against SMTP/IMAP servers. GSS consists of a library and a manual. GSS is developed for the GNU/Linux system, but runs on over 20 platforms including most major Unix platforms and Windows, and many kind of devices including iPAQ handhelds and S/390 mainframes.
GSS is an implementation of the Generic Security Service Application Program Interface (GSS-API). GSS-API is used by network servers to provide securi...
|
cena:
88,16 zł |
![]() |
GnuTLS Reference Manual
ISBN: 9789888381647 / Angielski / Miękka / 326 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and other required structures. It is aimed to be portable and efficient with focus on security and interoperability.
GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language a...
|
cena:
132,26 zł |
![]() |
Trust Management VII: 7th Ifip Wg 11.11 International Conference, Ifiptm 2013, Malaga, Spain, June 3-7, 2013, Proceedings
ISBN: 9783642443633 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 7th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2013, held in Malaga, Spain, in June 2013.
This book constitutes the refereed proceedings of the 7th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2013, held in Malaga, Spa...
|
cena:
193,19 zł |
![]() |
Trusted Systems: 6th International Conference, Intrust 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers
ISBN: 9783319279978 / Angielski / Miękka / 442 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Normal 0 false false false EN-US X-NONE X-NONE
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The revised full papers focus on the theory, technologies and applications of trusted systems and cover all aspects of trusted computing systems,...Normal 0 false false false EN-US X-NONE X-NONE
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International C... |
cena:
193,19 zł |
![]() |
GnuPG - Using the GNU Privacy Guard
ISBN: 9789888381159 / Angielski / Miękka / 184 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. GNU Privacy Guard (GnuPG or GPG) is a free software replacement for the Symantec's PGP cryptographic software suite. GnuPG is compliant with RFC 4880, which is the IETF standards track specification of OpenPGP. Modern versions of PGP and Veridis' Filecrypt are interoperable with GnuPG and other OpenPGP-compliant systems.
GNU Privacy Guard (GnuPG or GPG) is a free software replacement for the Symantec's PGP cryptographic software suite. GnuPG is compliant with RFC 4880,...
|
cena:
110,21 zł |
![]() |
Computer Networks and Internets, Global Edition
ISBN: 9781292061177 / Angielski / Miękka / 672 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
519,10 zł |
![]() |
Progress in Data Encryption Research
ISBN: 9781629482583 / Angielski / Twarda / 158 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
1001,69 zł |
![]() |
Identity and Data Security for Web Development: Best Practices
ISBN: 9781491937013 / Angielski / Miękka / 204 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected. Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for... Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web develope... |
cena:
172,99 zł |
![]() |
Applied Cryptography and Network Security: 13th International Conference, Acns 2015, New York, Ny, Usa, June 2-5, 2015, Revised Selected Papers
ISBN: 9783319281650 / Angielski / Miękka / 698 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto);...
This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in N...
|
cena:
193,19 zł |
![]() |
Theory of Cryptography: 13th International Conference, Tcc 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I
ISBN: 9783662490952 / Angielski / Miękka / 618 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set LNCS 9562 and LNCS 9563 constitutes the refereedproceedings of the 13th International Conference on Theory ofCryptography, TCC 2016, held in Tel Aviv, Israel, in January 2016.
The 45 revised full papers presented were carefully reviewed andselected from 112 submissions. The papers are organized in topicalsections on obfuscation, differential privacy, LWR and LPN, public key encryption, signatures, and VRF, complexity of cryptographic primitives, multiparty computation, zero knowledge and PCP, oblivious RAM, ABE and IBE, and codes and interactive proofs. The volume also... The two-volume set LNCS 9562 and LNCS 9563 constitutes the refereedproceedings of the 13th International Conference on Theory ofCryptography, TCC 2016...
|
cena:
386,41 zł |
![]() |
Theory of Cryptography: 13th International Conference, Tcc 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II
ISBN: 9783662490983 / Angielski / Miękka / 596 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set LNCS 9562 and LNCS 9563 constitutes the refereedproceedings of the 13th International Conference on Theory ofCryptography, TCC 2016, held in Tel Aviv, Israel, in January 2016.
The 45 revised full papers presented were carefully reviewed andselected from 112 submissions. The papers are organized in topicalsections on obfuscation, differential privacy, LWR and LPN, public key encryption, signatures, and VRF, complexity of cryptographic primitives, multiparty computation, zero knowledge and PCP, oblivious RAM, ABE and IBE, and codes and interactive proofs. The volume also... The two-volume set LNCS 9562 and LNCS 9563 constitutes the refereedproceedings of the 13th International Conference on Theory ofCryptography, TCC 2016...
|
cena:
193,19 zł |
![]() |
Shishi - Kerberos 5 Implementation
ISBN: 9789888381777 / Angielski / Miękka / 280 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Shishi is an implementation of the Kerberos 5 network authentication system, as specified in RFC 4120. Shishi can be used to authenticate users in distributed systems. Shishi contains a library ('libshishi') that can be used by application developers to add support for Kerberos 5. Shishi contains a command line utility ('shishi') that is used by users to acquire and manage tickets (and more). The server side, a Key Distribution Center, is implemented by 'shishid'. Of course, a manual documenting usage aspects as well as the programming API is included. Shishi currently supports AS/TGS...
Shishi is an implementation of the Kerberos 5 network authentication system, as specified in RFC 4120. Shishi can be used to authenticate users in dis...
|
cena:
132,26 zł |
![]() |
Primzahltests Für Einsteiger: Zahlentheorie - Algorithmik - Kryptographie
ISBN: 9783658112165 / Niemiecki / Miękka / 211 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In diesem Buch geht es um den AKS-Algorithmus, den ersten deterministischen Primzahltest mit polynomieller Laufzeit. Er wurde benannt nach den Informatikern Agrawal, Kayal und Saxena, die ihn 2002 entwickelt haben. Primzahlen sind Gegenstand vieler mathematischer Probleme und spielen im Zusammenhang mit Verschlusselungsmethoden eine wichtige Rolle. Das vorliegende Buch leitet den AKS-ALgorithmus in verstandlicher Art und Weise her, ohne wesentliche Vorkenntnisse zu benotigen, und ist daher bereits fur interessierte Gymnasialschuler(innen) zuganglich. Auerdem eignet sich das Buch von...
In diesem Buch geht es um den AKS-Algorithmus, den ersten deterministischen Primzahltest mit polynomieller Laufzeit. Er wurde benannt nach den Informa...
|
cena:
126,37 zł |
![]() |
Principles of Security and Trust: 5th International Conference, Post 2016, Held as Part of the European Joint Conferences on Theory and Practice of So
ISBN: 9783662496343 / Angielski / Miękka / 277 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 5th International Conference on Principles of Security and Trust, POST 2016, which took place in Eindhoven, The Netherlands, in April 2016, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016. This book constitutes the proceedings of the 5th International Conference on Principles of Security and Trust, POST 2016, which took place in Eindh... |
cena:
193,19 zł |
![]() |
Security and Privacy in Communication Networks: 11th International Conference, Securecomm 2015, Dallas, Tx, Usa, October 26-29, 2015, Revised Selected
ISBN: 9783319288642 / Angielski / Miękka / 741 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Security and Privacy in Communication Networks, SecureComm 2015, held in Dallas, TX, USA, in October 2015. The 29 regular and 10 poster papers presented were carefully reviewed and selected from 107 submissions. It also presents 9 papers accepted of the workshop on Applications and Techniques in Cyber Security, ATCS 2015.
The papers are grouped in the following topics: mobile, system, and software security; cloud security; privacy and side channels; Web... This volume constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Security and Privacy in Communi... |
cena:
193,19 zł |
![]() |
Lightweight Cryptography for Security and Privacy: 4th International Workshop, Lightsec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected
ISBN: 9783319290775 / Angielski / Miękka / 165 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed post-conference proceedings of the 4th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2015, held in Bochum, Germany, in September 2015. The 9 full papers presented were carefully reviewed and selected from 17 submissions. The papers are organized in the following topical sections: cryptanalysis, lightweight constructions, implementation challenges.
This book constitutes the refereed post-conference proceedings of the 4th International Workshop on Lightweight Cryptography for Security and Priva... |
cena:
154,58 zł |
![]() |
Cryptography and Information Security in the Balkans: Second International Conference, Balkancryptsec 2015, Koper, Slovenia, September 3-4, 2015, Revi
ISBN: 9783319291710 / Angielski / Miękka / 207 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book contains revised selected papers from the Second International Conference on Cryptology and Information Security in the Balkans, BalkanCryptSec 2015, held in Koper, Slovenia, in September 2015. The 12 papers presented in this volume were carefully reviewed and selected from 27 submissions. They are organized in topical sections named: symmetric key cryptography; cryptanalysis; security and protocols; and implementation and verifiable encryption.This book contains revised selected papers from the Second International Conference on Cryptology and Information Security in the Balkans, BalkanCr... |
cena:
193,19 zł |
![]() |
Topics in Cryptology - Ct-Rsa 2016: The Cryptographers' Track at the Rsa Conference 2016, San Francisco, Ca, Usa, February 29 - March 4, 2016, Proceed
ISBN: 9783319294841 / Angielski / Miękka / 465 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2016, CT-RSA 2016, held in San Francisco, CA, USA, in February/March 2016. The 26 papers presented in this volume were carefully reviewed and selected from 76 submissions. The focus of the track is on following subjects: secure key exchange schemes, authenticated encryption, searchable symmetric encryption, digital signatures with new functionality, secure multi party computation, how to verify procedures, side-channel attacks on elliptic curve cryptography, hardware attacks and... This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2016, CT-RSA 2016, held in San Francisco, CA, USA... |
cena:
193,19 zł |