• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946350]
• Literatura piękna
 [1816154]

  więcej...
• Turystyka
 [70666]
• Informatyka
 [151172]
• Komiksy
 [35576]
• Encyklopedie
 [23172]
• Dziecięca
 [611458]
• Hobby
 [135995]
• AudioBooki
 [1726]
• Literatura faktu
 [225763]
• Muzyka CD
 [378]
• Słowniki
 [2917]
• Inne
 [444280]
• Kalendarze
 [1179]
• Podręczniki
 [166508]
• Poradniki
 [469467]
• Religia
 [507199]
• Czasopisma
 [496]
• Sport
 [61352]
• Sztuka
 [242330]
• CD, DVD, Video
 [3348]
• Technologie
 [219391]
• Zdrowie
 [98638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3525]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2785

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Malware + Robotics + Human-Computer Interaction Solis Tech 9781530177752 Createspace Independent Publishing Platform
Malware + Robotics + Human-Computer Interaction

ISBN: 9781530177752 / Angielski / Miękka / 76 str.

ISBN: 9781530177752/Angielski/Miękka/76 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Solis Tech

Is Malware what you want to learn? Always wondered how Malware works? Does it interest you how viruses compromise your computer?

Purchase Malware to discover everything you need to know about tech threats.

Step by step to increase your malware skill set. Learn how to detect threats on your computer systems. All your basic knowledge in one purchase

You need to get it now to know whats inside as it cant be shared here

Purchase Malware TODAY AND ENJOY TWO FREE BOOKS AS A BONUS

Is Malware what you want to learn? Always wondered how Malware works? Does it interest you how viruses compromise your computer?

P...

cena: 38,64

 Quality Assurance + Cryptography + Human-Computer Interaction Solis Tech 9781530178094 Createspace Independent Publishing Platform
Quality Assurance + Cryptography + Human-Computer Interaction

ISBN: 9781530178094 / Angielski / Miękka / 80 str.

ISBN: 9781530178094/Angielski/Miękka/80 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Solis Tech

Is Cryptography what you want to learn? Always wondered about its history from Modern to Traditional Cryptography? Does it interest you how Cryptosystems work?

Purchase Cryptography to discover everything you need to know about it

Step by step to increase your skill set in its basics. Learn the pros and cons. All your basic knowledge in one purchase

You need to get it now to know whats inside as it cant be shared here

Purchase Cryptography TODAY AND RECEIVE TWO FREE BOOKS

Is Cryptography what you want to learn? Always wondered about its history from Modern to Traditional Cryptography? Does it interest you how Cryp...

cena: 36,87

 Quality Assurance + Cryptography + Raspberry Pi 2 Solis Tech 9781530179961 Createspace Independent Publishing Platform
Quality Assurance + Cryptography + Raspberry Pi 2

ISBN: 9781530179961 / Angielski / Miękka / 82 str.

ISBN: 9781530179961/Angielski/Miękka/82 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Solis Tech

Is Cryptography what you want to learn? Always wondered about its history from Modern to Traditional Cryptography? Does it interest you how Cryptosystems work?

Purchase Cryptography to discover everything you need to know about it

Step by step to increase your skill set in its basics. Learn the pros and cons. All your basic knowledge in one purchase

You need to get it now to know whats inside as it cant be shared here

Purchase Cryptography TODAY AND RECEIVE 2 FREE BOOKS TODAY

Is Cryptography what you want to learn? Always wondered about its history from Modern to Traditional Cryptography? Does it interest you how Cryp...

cena: 36,82

 Risks and Security of Internet and Systems: 10th International Conference, Crisis 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Sel Lambrinoudakis, Costas 9783319318103 Springer
Risks and Security of Internet and Systems: 10th International Conference, Crisis 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Sel

ISBN: 9783319318103 / Angielski / Miękka / 307 str.

ISBN: 9783319318103/Angielski/Miękka/307 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Costas Lambrinoudakis; Alban Gabillon

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Risks and Security of Internet Systems, CRiSIS 2015, held in Mytilene, Lesbos Island, Greece, in July 2015.

The 18 full papers presented were selected from 50 submissions. The papers sessions that have covered a broad range of topics: trust and privacy issues, privacy policies and policy based protocols, risk management, risk analysis and vulnerability assessment, cloud systems and cryptography, and attack and security measures.


This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Risks and Security of Internet Sy...

cena: 201,24

 Information Security Applications: 16th International Workshop, Wisa 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers Kim, Ho-Won 9783319318745 Springer
Information Security Applications: 16th International Workshop, Wisa 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers

ISBN: 9783319318745 / Angielski / Miękka / 438 str.

ISBN: 9783319318745/Angielski/Miękka/438 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ho-Won Kim; Dooho Choi

This book constitutes the thoroughly refereed post-workshop proceedings of the 16th International Workshop on Information Security Applications, WISA 2015, held on Jeju Island, Korea, in August 2015.

The 35 revised full papers presented in this volume were carefully reviewed and selected from 78 submissions. The papers are organized in topical sections such as hardware security; cryptography, side channel attacks and countermeasures; security and threat analysis; IoT security; network security; cryptography; application security.


This book constitutes the thoroughly refereed post-workshop proceedings of the 16th International Workshop on Information Security Applications, WI...

cena: 201,24

 Digital-Forensics and Watermarking: 14th International Workshop, Iwdw 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers Shi, Yun-Qing 9783319319599 Springer
Digital-Forensics and Watermarking: 14th International Workshop, Iwdw 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers

ISBN: 9783319319599 / Angielski / Miękka / 448 str.

ISBN: 9783319319599/Angielski/Miękka/448 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun-Qing Shi; Hyoung Joong Kim; Fernando Perez-Gonzalez

This book constitutes revised selected papers from the 14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015, held in Tokyo, Japan, in October 2015.

The 35 papers presented in this volume were carefully reviewed and selected from 54 submissions. The contributions are organized in topical sections named: digital forensics; steganography and steganalysis; digital watermarking; reversible data hiding; and visual cryptography.


This book constitutes revised selected papers from the 14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015, held in Tokyo,...

cena: 201,24

 Advances in Digital Forensics X: 10th Ifip Wg 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers Peterson, Gilbert 9783662526088 Springer
Advances in Digital Forensics X: 10th Ifip Wg 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers

ISBN: 9783662526088 / Angielski / Miękka / 335 str.

ISBN: 9783662526088/Angielski/Miękka/335 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gilbert Peterson; Sujeet Shenoi
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security...
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wirele...
cena: 201,24

 Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, Dimva 2016, San Sebastián, Spain, July 7-8, 2016, Pr Caballero, Juan 9783319406664 Springer
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, Dimva 2016, San Sebastián, Spain, July 7-8, 2016, Pr

ISBN: 9783319406664 / Angielski / Miękka / 442 str.

ISBN: 9783319406664/Angielski/Miękka/442 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Juan Caballero; Urko Zurutuza; Ricardo J. Rodriguez

This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastian, Spain, in July 2016.

The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web...

This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Asses...

cena: 201,24

 Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security Brij Gupta Dharma P. Agrawal Shingo Yamaguchi 9781522501053 Information Science Reference
Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security

ISBN: 9781522501053 / Angielski / Twarda / 618 str.

ISBN: 9781522501053/Angielski/Twarda/618 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Brij Gupta; Dharma P. Agrawal; Shingo Yamaguchi
"This book identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention, featuring theoretical perspectives, best practices, and future research directions"--
"This book identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention, featuring theoretical pe...
cena: 1556,96

 Introduction to Cyberdeception Neil C. Rowe Julian Rrushi 9783319411859 Springer
Introduction to Cyberdeception

ISBN: 9783319411859 / Angielski / Twarda / 334 str.

ISBN: 9783319411859/Angielski/Twarda/334 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Neil C. Rowe; Julian Rrushi
This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list.Cyberattacks have grown serious enough that understanding and...
This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on m...
cena: 281,76

 Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense Hassan, Nihad 9780128044490 Syngress Publishing
Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense

ISBN: 9780128044490 / Angielski / Miękka / 324 str.

ISBN: 9780128044490/Angielski/Miękka/324 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nihad Ahmad Hassan; Rami Hijazi
  • "This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run's on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. As a practitioner in the Digital Age, I can see this book siting on the shelves of Cyber Security...
  • "This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. How...
cena: 181,17

 Fast Software Encryption: 23rd International Conference, Fse 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers Peyrin, Thomas 9783662529928 Springer
Fast Software Encryption: 23rd International Conference, Fse 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers

ISBN: 9783662529928 / Angielski / Miękka / 592 str.

ISBN: 9783662529928/Angielski/Miękka/592 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thomas Peyrin

This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Fast Software Encryption, held in Bochum, Germany, in March 2016. The 29 revised full papers presented were carefully reviewed and selected from 86 initial submissions. The papers are organized in topical sections on operating modes; stream-cipher cryptanalysis; components; side-channels and implementations; automated tools for cryptanalysis; designs; block-cipher cryptanalysis; foundations and theory; and authenticated-encryption and hash function cryptanalysis.


This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Fast Software Encryption, held in...

cena: 342,14

 Foundations of Security Analysis and Design VIII: Fosad 2014/2015/2016 Tutorial Lectures Aldini, Alessandro 9783319430041 Springer
Foundations of Security Analysis and Design VIII: Fosad 2014/2015/2016 Tutorial Lectures

ISBN: 9783319430041 / Angielski / Miękka / 163 str.

ISBN: 9783319430041/Angielski/Miękka/163 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alessandro Aldini; Javier Lopez; Fabio Martinelli

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia and industry, interested to approach the field, investigate open problems, and follow priority lines of research.
This book presents thoroughly revised versions of four tutorial lectures given by leading researchers during three International Schools on Foundations...

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in comp...

cena: 169,08

 Ten Laws for Security Eric Diehl 9783319426396 Springer
Ten Laws for Security

ISBN: 9783319426396 / Angielski / Twarda / 281 str.

ISBN: 9783319426396/Angielski/Twarda/281 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eric Diehl
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. It will be of interest to professionals and researchers engaged with information security.
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing...
cena: 281,76

 Understanding Social Engineering Based Scams Markus Jakobsson 9781493964550 Springer
Understanding Social Engineering Based Scams

ISBN: 9781493964550 / Angielski / Twarda / 130 str.

ISBN: 9781493964550/Angielski/Twarda/130 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Markus Jakobsson

This book describes trends in email scams and offers tools and techniques

to identify such trends. It also describes automated countermeasures

based on an understanding of the type of persuasive methods used by

scammers. It reviews both consumer-facing scams and enterprise scams,

describing in-depth case studies relating to Craigslist scams and Business

Email Compromise Scams. This book provides a good starting point for

practitioners, decision makers and researchers in that it includes

alternatives and complementary tools to the...


This book describes trends in email scams and offers tools and techniques

to identify such trends. It also describes automated counterme...

cena: 402,53

 Elements of Cloud Computing Security: A Survey of Key Practicalities Alani, Mohammed M. 9783319414102 Springer
Elements of Cloud Computing Security: A Survey of Key Practicalities

ISBN: 9783319414102 / Angielski / Miękka / 55 str.

ISBN: 9783319414102/Angielski/Miękka/55 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mohammed M. Alani

This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on...

This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the ...

cena: 201,24

 Elements of Cloud Storage Security: Concepts, Designs and Optimized Practices Galibus, Tatiana 9783319449616 Springer
Elements of Cloud Storage Security: Concepts, Designs and Optimized Practices

ISBN: 9783319449616 / Angielski / Miękka / 101 str.

ISBN: 9783319449616/Angielski/Miękka/101 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tatiana Galibus; Viktor Krasnoproshin; Robson De Oliveira Albuquerque

This work provides guidelines for the practical implementation of security architecture in a particular corporate cloud. The authors are mathematicians and specialists in data modeling and security. Experience of scientific collaboration with industry inspired the authors to attempt to conceptualize the common processes and strategies in cloud security, in order to make security system deployment as simple and transparent as possible. The deployment is broken into several essential steps that allow the functionality of security architecture for any cloud to be split into a set of modules....

This work provides guidelines for the practical implementation of security architecture in a particular corporate cloud. The authors are mathematic...

cena: 201,24

 Guide to Wireless Network Security John R Vacca (TechWrite, Pomeroy, Ohio,    9781489977120 Springer
Guide to Wireless Network Security

ISBN: 9781489977120 / Angielski / Miękka / 848 str.

ISBN: 9781489977120/Angielski/Miękka/848 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ohio Pomeroy John R Vacca (TechWrite
cena: 603,81

 Security and Cryptography for Networks: 10th International Conference, Scn 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings Zikas, Vassilis 9783319446172 Springer
Security and Cryptography for Networks: 10th International Conference, Scn 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings

ISBN: 9783319446172 / Angielski / Miękka / 606 str.

ISBN: 9783319446172/Angielski/Miękka/606 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vassilis Zirkas; Roberto De Prisco

This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016.

The 30 papers presented in this volume were carefully reviewed and selected from 67 submissions. They are organized in topical sections on encryption; memory protection; multi-party computation; zero-knowledge proofs; efficient protocols; outsourcing computation; digital signatures; cryptanalysis; two-party computation; secret sharing; and obfuscation.


This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August...

cena: 201,24

 Trust and Trustworthy Computing: 9th International Conference, Trust 2016, Vienna, Austria, August 29-30, 2016, Proceedings Franz, Michael 9783319455716 Springer
Trust and Trustworthy Computing: 9th International Conference, Trust 2016, Vienna, Austria, August 29-30, 2016, Proceedings

ISBN: 9783319455716 / Angielski / Miękka / 159 str.

ISBN: 9783319455716/Angielski/Miękka/159 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Franz; Panos Papadimitratos

This book constitutes the refereed proceedings of the 9th International Conference on Trust and Trustworthy Computing, TRUST 2016, held in Vienna, Austria, in August 2016.

The 8 full papers presented in this volume were carefully reviewed and selected from 25 submissions. Topics discussed in this year's research contributions included topics such as anonymous and layered attestation, revocation, captchas, runtime integrity, trust networks, key migration, and PUFs. Topics discussed in this year's research contributions included topics such as anonymous and layered attestation,...

This book constitutes the refereed proceedings of the 9th International Conference on Trust and Trustworthy Computing, TRUST 2016, held in Vienna, ...

cena: 201,24

Pierwsza Podprzednia  34  35  36  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia