Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
ISBN: 9781522501053 / Angielski / Twarda / 618 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "This book identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention, featuring theoretical perspectives, best practices, and future research directions"--
"This book identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention, featuring theoretical pe...
|
|
cena:
1750,58 zł |
Introduction to Cyberdeception
ISBN: 9783319411859 / Angielski / Twarda / 334 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list.Cyberattacks have grown serious enough that understanding and...
This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on m...
|
|
cena:
273,60 zł |
Data Hiding Techniques in Windows OS: A Practical Approach to Investigation and Defense
ISBN: 9780128044490 / Angielski / Miękka / 324 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych.
|
|
cena:
189,28 zł |
Fast Software Encryption: 23rd International Conference, Fse 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers
ISBN: 9783662529928 / Angielski / Miękka / 592 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Fast Software Encryption, held in Bochum, Germany, in March 2016. The 29 revised full papers presented were carefully reviewed and selected from 86 initial submissions. The papers are organized in topical sections on operating modes; stream-cipher cryptanalysis; components; side-channels and implementations; automated tools for cryptanalysis; designs; block-cipher cryptanalysis; foundations and theory; and authenticated-encryption and hash function cryptanalysis. This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Fast Software Encryption, held in... |
|
cena:
332,24 zł |
Foundations of Security Analysis and Design VIII: Fosad 2014/2015/2016 Tutorial Lectures
ISBN: 9783319430041 / Angielski / Miękka / 163 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia and industry, interested to approach the field, investigate open problems, and follow priority lines of research. FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in comp... |
|
cena:
164,19 zł |
Ten Laws for Security
ISBN: 9783319426396 / Angielski / Twarda / 281 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing security, identifying key IP assets, authentication, and social engineering. It will be of interest to professionals and researchers engaged with information security.
In this book the author presents ten key laws governing information security. He addresses topics such as attacks, vulnerabilities, threats, designing...
|
|
cena:
273,60 zł |
Understanding Social Engineering Based Scams
ISBN: 9781493964550 / Angielski / Twarda / 130 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book describes trends in email scams and offers tools and techniques to identify such trends. It also describes automated countermeasures based on an understanding of the type of persuasive methods used by scammers. It reviews both consumer-facing scams and enterprise scams, describing in-depth case studies relating to Craigslist scams and Business Email Compromise Scams. This book provides a good starting point for practitioners, decision makers and researchers in that it includes alternatives and complementary tools to the... This book describes trends in email scams and offers tools and techniques to identify such trends. It also describes automated counterme... |
|
cena:
390,87 zł |
Elements of Cloud Computing Security: A Survey of Key Practicalities
ISBN: 9783319414102 / Angielski / Miękka / 55 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on... This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the ... |
|
cena:
195,42 zł |
Elements of Cloud Storage Security: Concepts, Designs and Optimized Practices
ISBN: 9783319449616 / Angielski / Miękka / 101 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This work provides guidelines for the practical implementation of security architecture in a particular corporate cloud. The authors are mathematicians and specialists in data modeling and security. Experience of scientific collaboration with industry inspired the authors to attempt to conceptualize the common processes and strategies in cloud security, in order to make security system deployment as simple and transparent as possible. The deployment is broken into several essential steps that allow the functionality of security architecture for any cloud to be split into a set of modules.... This work provides guidelines for the practical implementation of security architecture in a particular corporate cloud. The authors are mathematic... |
|
cena:
195,42 zł |
Guide to Wireless Network Security
ISBN: 9781489977120 / Angielski / Miękka / 848 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
586,33 zł |
Security and Cryptography for Networks: 10th International Conference, Scn 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings
ISBN: 9783319446172 / Angielski / Miękka / 606 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016. The 30 papers presented in this volume were carefully reviewed and selected from 67 submissions. They are organized in topical sections on encryption; memory protection; multi-party computation; zero-knowledge proofs; efficient protocols; outsourcing computation; digital signatures; cryptanalysis; two-party computation; secret sharing; and obfuscation. This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August... |
|
cena:
195,42 zł |
Trust and Trustworthy Computing: 9th International Conference, Trust 2016, Vienna, Austria, August 29-30, 2016, Proceedings
ISBN: 9783319455716 / Angielski / Miękka / 159 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 9th International Conference on Trust and Trustworthy Computing, TRUST 2016, held in Vienna, Austria, in August 2016. The 8 full papers presented in this volume were carefully reviewed and selected from 25 submissions. Topics discussed in this year's research contributions included topics such as anonymous and layered attestation, revocation, captchas, runtime integrity, trust networks, key migration, and PUFs. Topics discussed in this year's research contributions included topics such as anonymous and layered attestation,... This book constitutes the refereed proceedings of the 9th International Conference on Trust and Trustworthy Computing, TRUST 2016, held in Vienna, ... |
|
cena:
195,42 zł |
Financial Cryptography and Data Security: FC 2016 International Workshops, Bitcoin, Voting, and Wahc, Christ Church, Barbados, February 26, 2016, Revi
ISBN: 9783662533567 / Angielski / Miękka / 343 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of three workshops heldat the 20th International Conference on Financial Cryptography and DataSecurity, FC 2016, in Christ Church, Barbados, in February 2016.
The 22 full papers presented were carefully reviewed and selected from 49 submissions. They feature the outcome of the Second Workshop on Bitcoin and Blockchain Research, BITCOIN 2016, the First Workshop on Secure Voting Systems, VOTING 2016, and the 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2016. This book constitutes the refereed proceedings of three workshops heldat the 20th International Conference on Financial Cryptography and DataSecurity,...
|
|
cena:
195,42 zł |
Computer Security - Esorics 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Par
ISBN: 9783319457437 / Angielski / Miękka / 623 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016. The 60 revised full papers presented were carefully reviewed and selected from 285 submissions. The papers cover a wide range of topics in security and privacy, including data protection: systems security, network security, access control, authentication, and security in such emerging areas as cloud computing, cyber-physical systems, and the Internet of Things. The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORIC... |
|
cena:
195,42 zł |
Computer Security - Esorics 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Par
ISBN: 9783319457406 / Angielski / Miękka / 609 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016. The 60 revised full papers presented were carefully reviewed and selected from 285 submissions. The papers cover a wide range of topics in security and privacy, including data protection: systems security, network security, access control, authentication, and security in such emerging areas as cloud computing, cyber-physical systems, and the Internet of Things. The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORIC... |
|
cena:
195,42 zł |
Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Applications
ISBN: 9783319426426 / Angielski / Twarda / 142 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the book examines privacy-preserving data publishing with publicly-known algorithms, studying a generic strategy independent of data utility measures and syntactic privacy properties before discussing an extended approach to improve the efficiency. Next, the book explores privacy-preserving traffic padding in Web applications, first via a model to quantify privacy and cost and then by introducing...
This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the f...
|
|
cena:
390,87 zł |
Advances in Information and Computer Security: 11th International Workshop on Security, Iwsec 2016, Tokyo, Japan, September 12-14, 2016, Proceedings
ISBN: 9783319445236 / Angielski / Miękka / 335 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 11th International Workshop on Security, IWSEC 2016, held in Tokyo, Japan, in September 2016. The 15 regular papers and 4 short papers presented in this volume were carefully reviewed and selected from 53 submissions. They were organized in topical sections named: system security; searchable encryption; cryptanalysis; permutation and symmetric encryption; privacy preserving; hardware security; post-quantum cryptography; and paring computation. This book constitutes the refereed proceedings of the 11th International Workshop on Security, IWSEC 2016, held in Tokyo, Japan, in September 2016.... |
|
cena:
195,42 zł |
Constructive Side-Channel Analysis and Secure Design: 7th International Workshop, Cosade 2016, Graz, Austria, April 14-15, 2016, Revised Selected Pape
ISBN: 9783319432823 / Angielski / Miękka / 219 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes revised selected papers from the 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, held in Graz, Austria, in April 2016. This book constitutes revised selected papers from the 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2... |
|
cena:
195,42 zł |
Digital Fingerprinting
ISBN: 9781493965991 / Angielski / Twarda / 189 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more. Available techniques for assurance are limited and authentication schemes are potentially vulnerable to the theft of digital tokens or secrets. Intrusion detection can be thwarted by spoofing or impersonating devices, and forensic analysis is incapable of demonstrably tying a particular device to specific digital evidence. This book presents an innovative and effective...
This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas includi...
|
|
cena:
429,96 zł |
Cryptography: Theory and Practice
ISBN: 9781138197015 / Angielski / Twarda / 598 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
445,15 zł |