![]() |
Malware + Robotics + Human-Computer Interaction
ISBN: 9781530177752 / Angielski / Miękka / 76 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Is Malware what you want to learn? Always wondered how Malware works? Does it interest you how viruses compromise your computer? Purchase Malware to discover everything you need to know about tech threats. Step by step to increase your malware skill set. Learn how to detect threats on your computer systems. All your basic knowledge in one purchase You need to get it now to know whats inside as it cant be shared here Purchase Malware TODAY AND ENJOY TWO FREE BOOKS AS A BONUSIs Malware what you want to learn? Always wondered how Malware works? Does it interest you how viruses compromise your computer? P... |
cena:
38,64 |
![]() |
Quality Assurance + Cryptography + Human-Computer Interaction
ISBN: 9781530178094 / Angielski / Miękka / 80 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Is Cryptography what you want to learn? Always wondered about its history from Modern to Traditional Cryptography? Does it interest you how Cryptosystems work? Purchase Cryptography to discover everything you need to know about it Step by step to increase your skill set in its basics. Learn the pros and cons. All your basic knowledge in one purchase You need to get it now to know whats inside as it cant be shared here Purchase Cryptography TODAY AND RECEIVE TWO FREE BOOKSIs Cryptography what you want to learn? Always wondered about its history from Modern to Traditional Cryptography? Does it interest you how Cryp... |
cena:
36,87 |
![]() |
Quality Assurance + Cryptography + Raspberry Pi 2
ISBN: 9781530179961 / Angielski / Miękka / 82 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Is Cryptography what you want to learn? Always wondered about its history from Modern to Traditional Cryptography? Does it interest you how Cryptosystems work? Purchase Cryptography to discover everything you need to know about it Step by step to increase your skill set in its basics. Learn the pros and cons. All your basic knowledge in one purchase You need to get it now to know whats inside as it cant be shared here Purchase Cryptography TODAY AND RECEIVE 2 FREE BOOKS TODAYIs Cryptography what you want to learn? Always wondered about its history from Modern to Traditional Cryptography? Does it interest you how Cryp... |
cena:
36,82 |
![]() |
Risks and Security of Internet and Systems: 10th International Conference, Crisis 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Sel
ISBN: 9783319318103 / Angielski / Miękka / 307 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Risks and Security of Internet Systems, CRiSIS 2015, held in Mytilene, Lesbos Island, Greece, in July 2015. The 18 full papers presented were selected from 50 submissions. The papers sessions that have covered a broad range of topics: trust and privacy issues, privacy policies and policy based protocols, risk management, risk analysis and vulnerability assessment, cloud systems and cryptography, and attack and security measures. This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Risks and Security of Internet Sy... |
cena:
201,24 |
![]() |
Information Security Applications: 16th International Workshop, Wisa 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers
ISBN: 9783319318745 / Angielski / Miękka / 438 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-workshop proceedings of the 16th International Workshop on Information Security Applications, WISA 2015, held on Jeju Island, Korea, in August 2015.
The 35 revised full papers presented in this volume were carefully reviewed and selected from 78 submissions. The papers are organized in topical sections such as hardware security; cryptography, side channel attacks and countermeasures; security and threat analysis; IoT security; network security; cryptography; application security. This book constitutes the thoroughly refereed post-workshop proceedings of the 16th International Workshop on Information Security Applications, WI... |
cena:
201,24 |
![]() |
Digital-Forensics and Watermarking: 14th International Workshop, Iwdw 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers
ISBN: 9783319319599 / Angielski / Miękka / 448 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes revised selected papers from the 14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015, held in Tokyo, Japan, in October 2015.
The 35 papers presented in this volume were carefully reviewed and selected from 54 submissions. The contributions are organized in topical sections named: digital forensics; steganography and steganalysis; digital watermarking; reversible data hiding; and visual cryptography. This book constitutes revised selected papers from the 14th International Workshop on Digital-Forensics and Watermarking, IWDW 2015, held in Tokyo,... |
cena:
201,24 |
![]() |
Advances in Digital Forensics X: 10th Ifip Wg 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers
ISBN: 9783662526088 / Angielski / Miękka / 335 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security...
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wirele...
|
cena:
201,24 |
![]() |
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, Dimva 2016, San Sebastián, Spain, July 7-8, 2016, Pr
ISBN: 9783319406664 / Angielski / Miękka / 442 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastian, Spain, in July 2016. The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web... This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Asses... |
cena:
201,24 |
![]() |
Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
ISBN: 9781522501053 / Angielski / Twarda / 618 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "This book identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention, featuring theoretical perspectives, best practices, and future research directions"--
"This book identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention, featuring theoretical pe...
|
cena:
1556,96 |
![]() |
Introduction to Cyberdeception
ISBN: 9783319411859 / Angielski / Twarda / 334 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list.Cyberattacks have grown serious enough that understanding and...
This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on m...
|
cena:
281,76 |
![]() |
Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense
ISBN: 9780128044490 / Angielski / Miękka / 324 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych.
|
cena:
181,17 |
![]() |
Fast Software Encryption: 23rd International Conference, Fse 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers
ISBN: 9783662529928 / Angielski / Miękka / 592 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Fast Software Encryption, held in Bochum, Germany, in March 2016. The 29 revised full papers presented were carefully reviewed and selected from 86 initial submissions. The papers are organized in topical sections on operating modes; stream-cipher cryptanalysis; components; side-channels and implementations; automated tools for cryptanalysis; designs; block-cipher cryptanalysis; foundations and theory; and authenticated-encryption and hash function cryptanalysis. This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Fast Software Encryption, held in... |
cena:
342,14 |
![]() |
Foundations of Security Analysis and Design VIII: Fosad 2014/2015/2016 Tutorial Lectures
ISBN: 9783319430041 / Angielski / Miękka / 163 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia and industry, interested to approach the field, investigate open problems, and follow priority lines of research. FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in comp... |
cena:
169,08 |
![]() |
Ten Laws for Security
ISBN: 9783319426396 / Angielski / Twarda / 281 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. It will be of interest to professionals and researchers engaged with information security.
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing...
|
cena:
281,76 |
![]() |
Understanding Social Engineering Based Scams
ISBN: 9781493964550 / Angielski / Twarda / 130 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book describes trends in email scams and offers tools and techniques to identify such trends. It also describes automated countermeasures based on an understanding of the type of persuasive methods used by scammers. It reviews both consumer-facing scams and enterprise scams, describing in-depth case studies relating to Craigslist scams and Business Email Compromise Scams. This book provides a good starting point for practitioners, decision makers and researchers in that it includes alternatives and complementary tools to the... This book describes trends in email scams and offers tools and techniques to identify such trends. It also describes automated counterme... |
cena:
402,53 |
![]() |
Elements of Cloud Computing Security: A Survey of Key Practicalities
ISBN: 9783319414102 / Angielski / Miękka / 55 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on... This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the ... |
cena:
201,24 |
![]() |
Elements of Cloud Storage Security: Concepts, Designs and Optimized Practices
ISBN: 9783319449616 / Angielski / Miękka / 101 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This work provides guidelines for the practical implementation of security architecture in a particular corporate cloud. The authors are mathematicians and specialists in data modeling and security. Experience of scientific collaboration with industry inspired the authors to attempt to conceptualize the common processes and strategies in cloud security, in order to make security system deployment as simple and transparent as possible. The deployment is broken into several essential steps that allow the functionality of security architecture for any cloud to be split into a set of modules.... This work provides guidelines for the practical implementation of security architecture in a particular corporate cloud. The authors are mathematic... |
cena:
201,24 |
![]() |
Guide to Wireless Network Security
ISBN: 9781489977120 / Angielski / Miękka / 848 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
603,81 |
![]() |
Security and Cryptography for Networks: 10th International Conference, Scn 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings
ISBN: 9783319446172 / Angielski / Miękka / 606 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016. The 30 papers presented in this volume were carefully reviewed and selected from 67 submissions. They are organized in topical sections on encryption; memory protection; multi-party computation; zero-knowledge proofs; efficient protocols; outsourcing computation; digital signatures; cryptanalysis; two-party computation; secret sharing; and obfuscation. This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August... |
cena:
201,24 |
![]() |
Trust and Trustworthy Computing: 9th International Conference, Trust 2016, Vienna, Austria, August 29-30, 2016, Proceedings
ISBN: 9783319455716 / Angielski / Miękka / 159 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 9th International Conference on Trust and Trustworthy Computing, TRUST 2016, held in Vienna, Austria, in August 2016. The 8 full papers presented in this volume were carefully reviewed and selected from 25 submissions. Topics discussed in this year's research contributions included topics such as anonymous and layered attestation, revocation, captchas, runtime integrity, trust networks, key migration, and PUFs. Topics discussed in this year's research contributions included topics such as anonymous and layered attestation,... This book constitutes the refereed proceedings of the 9th International Conference on Trust and Trustworthy Computing, TRUST 2016, held in Vienna, ... |
cena:
201,24 |