![]() |
Financial Cryptography and Data Security: FC 2016 International Workshops, Bitcoin, Voting, and Wahc, Christ Church, Barbados, February 26, 2016, Revi
ISBN: 9783662533567 / Angielski / Miękka / 343 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of three workshops heldat the 20th International Conference on Financial Cryptography and DataSecurity, FC 2016, in Christ Church, Barbados, in February 2016.
The 22 full papers presented were carefully reviewed and selected from 49 submissions. They feature the outcome of the Second Workshop on Bitcoin and Blockchain Research, BITCOIN 2016, the First Workshop on Secure Voting Systems, VOTING 2016, and the 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2016. This book constitutes the refereed proceedings of three workshops heldat the 20th International Conference on Financial Cryptography and DataSecurity,...
|
cena:
201,24 |
![]() |
Computer Security - Esorics 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Par
ISBN: 9783319457437 / Angielski / Miękka / 623 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016. The 60 revised full papers presented were carefully reviewed and selected from 285 submissions. The papers cover a wide range of topics in security and privacy, including data protection: systems security, network security, access control, authentication, and security in such emerging areas as cloud computing, cyber-physical systems, and the Internet of Things. The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORIC... |
cena:
201,24 |
![]() |
Computer Security - Esorics 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Par
ISBN: 9783319457406 / Angielski / Miękka / 609 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016. The 60 revised full papers presented were carefully reviewed and selected from 285 submissions. The papers cover a wide range of topics in security and privacy, including data protection: systems security, network security, access control, authentication, and security in such emerging areas as cloud computing, cyber-physical systems, and the Internet of Things. The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORIC... |
cena:
201,24 |
![]() |
Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Applications
ISBN: 9783319426426 / Angielski / Twarda / 142 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the book examines privacy-preserving data publishing with publicly-known algorithms, studying a generic strategy independent of data utility measures and syntactic privacy properties before discussing an extended approach to improve the efficiency. Next, the book explores privacy-preserving traffic padding in Web applications, first via a model to quantify privacy and cost and then by introducing...
This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the f...
|
cena:
402,53 |
![]() |
Advances in Information and Computer Security: 11th International Workshop on Security, Iwsec 2016, Tokyo, Japan, September 12-14, 2016, Proceedings
ISBN: 9783319445236 / Angielski / Miękka / 335 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 11th International Workshop on Security, IWSEC 2016, held in Tokyo, Japan, in September 2016. The 15 regular papers and 4 short papers presented in this volume were carefully reviewed and selected from 53 submissions. They were organized in topical sections named: system security; searchable encryption; cryptanalysis; permutation and symmetric encryption; privacy preserving; hardware security; post-quantum cryptography; and paring computation. This book constitutes the refereed proceedings of the 11th International Workshop on Security, IWSEC 2016, held in Tokyo, Japan, in September 2016.... |
cena:
201,24 |
![]() |
Constructive Side-Channel Analysis and Secure Design: 7th International Workshop, Cosade 2016, Graz, Austria, April 14-15, 2016, Revised Selected Pape
ISBN: 9783319432823 / Angielski / Miękka / 219 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes revised selected papers from the 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, held in Graz, Austria, in April 2016. This book constitutes revised selected papers from the 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2... |
cena:
201,24 |
![]() |
Digital Fingerprinting
ISBN: 9781493965991 / Angielski / Twarda / 189 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more. Available techniques for assurance are limited and authentication schemes are potentially vulnerable to the theft of digital tokens or secrets. Intrusion detection can be thwarted by spoofing or impersonating devices, and forensic analysis is incapable of demonstrably tying a particular device to specific digital evidence. This book presents an innovative and effective...
This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas includi...
|
cena:
442,79 |
![]() |
Cryptography: Theory and Practice
ISBN: 9781138197015 / Angielski / Twarda / 598 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
450,54 |
![]() |
Eleventh Hour CISSP (R): Study Guide
ISBN: 9780128112489 / Angielski / Miękka / 238 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more... Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information... |
cena:
117,50 |
![]() |
Security in Computing and Communications: 4th International Symposium, Sscc 2016, Jaipur, India, September 21-24, 2016, Proceedings
ISBN: 9789811027376 / Angielski / Miękka / 474 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 4th International Symposium on Security in Computing and Communications, SSCC 2016, held in Jaipur, India, in September 2016. The 23 revised full papers presented together with 16 short papers and an invited paper were carefully reviewed and selected from 136 submissions. The papers are organized in topical sections on cryptosystems, algorithms, primitives; security and privacy in networked systems; system and network security; steganography, visual cryptography, image forensics; applications security.
This book constitutes the refereed proceedings of the 4th International Symposium on Security in Computing and Communications, SSCC 2016, held in Jaip...
|
cena:
201,24 |
![]() |
Data Privacy Management and Security Assurance: 11th International Workshop, DPM 2016 and 5th International Workshop, Qasa 2016, Heraklion, Crete, Gre
ISBN: 9783319470719 / Angielski / Miękka / 247 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 11th International Workshop on Data Privacy Management, DPM 2016 and the 5th International Workshop on Quantitative Aspects in Security Assurance, QASA 2016, held in Heraklion, Crete, Greece, in September 2016. 9 full papers and 4 short papers out of 24 submissions are included in the DPM 2016 Workshop. They are organized around areas related to the management of privacy-sensitive informations, such as translation of high-level business goals into system-level privacy policies; administration of sensitive identifiers; data integration... This book constitutes the refereed proceedings of the 11th International Workshop on Data Privacy Management, DPM 2016 and the 5th International Wo... |
cena:
201,24 |
![]() |
Information Security: 19th International Conference, Isc 2016, Honolulu, Hi, Usa, September 3-6, 2016. Proceedings
ISBN: 9783319458700 / Angielski / Miękka / 455 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 19th International Conference on Information Security, ISC 2016, held in Honolulu, HI, USA, in September 2016. The 19 revised full papers presented together with 7 short papers were carefully reviewed and selected from 76 submissions. The conference focuses on following subjects technical aspects of information security, cryptanalysis, cryptographic protocols, network and systems security and access control, privacy and watermarking, software security, encryption, signatures and fundamentals.
This book constitutes the refereed proceedings of the 19th International Conference on Information Security, ISC 2016, held in Honolulu, HI, USA, in S...
|
cena:
201,24 |
![]() |
Information Security Theory and Practice: 10th Ifip Wg 11.2 International Conference, Wistp 2016, Heraklion, Crete, Greece, September 26-27, 2016, Pro
ISBN: 9783319459301 / Angielski / Miękka / 271 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the refereed proceedings of the 10th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2016, held in Heraklion, Crete, Greece, in September 2016. The 13 revised full papers and 5 short papers presented together in this book were carefully reviewed and selected from 29 submissions. WISTP 2016 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security... This volume constitutes the refereed proceedings of the 10th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WI... |
cena:
201,24 |
![]() |
From Hacking to Report Writing: An Introduction to Security and Penetration Testing
ISBN: 9781484222829 / Angielski / Miękka / 190 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally report security weaknesses using techniques such as SQL-injection, denial-of-service attacks, and password hacking. Although From Hacking to Report Writing will give you the technical know-how needed to carry out advanced security tests, it also... Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing... |
cena:
211,90 |
![]() |
Automated Security Management
ISBN: 9783319345369 / Angielski / Miękka / 187 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery.
In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configur...
|
cena:
201,24 |
![]() |
Security and the Networked Society
ISBN: 9783319347011 / Angielski / Miękka / 297 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information privacy. This book traces the rise into prominence of these issues while also exploring the resulting cultural reaction. The authors analysis forms the basis of a discussion on future technological directions and their potential impact on society....
This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, a...
|
cena:
254,57 |
![]() |
Advances in Digital Forensics XII: 12th Ifip Wg 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers
ISBN: 9783319462783 / Angielski / Twarda / 396 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security... Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wir... |
cena:
201,24 |
![]() |
Network and System Security: 10th International Conference, Nss 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings
ISBN: 9783319462974 / Angielski / Miękka / 540 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 10th International Conference on Network and System Security, NSS 2016, held in Taipei, Taiwan, in September 2016.
The 31 full and 4 short papers presented in this volume were carefully reviewed and selected from 105 submissions. They were organized in topical sections named: authentication mechanism; cloud computing security; data mining for security application; privacy-preserving technologies; network security and forensics; searchable encryption; security policy and access control; security protocols, symmetric key cryptography; system... This book constitutes the proceedings of the 10th International Conference on Network and System Security, NSS 2016, held in Taipei, Taiwan, in Septem...
|
cena:
201,24 |
![]() |
Applications of Secure Multiparty Computation
ISBN: 9781614995319 / Angielski / Twarda / 264 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. We generate and gather a lot of data about ourselves and others, some of it highly confidential. The collection, storage and use of this data is strictly regulated by laws, but restricting the use of data often limits the benefits which could be obtained from its analysis. Secure multi-party computation SMC, a cryptographic technology, makes it possible to execute specific programs on confidential data while ensuring that no other sensitive information from the data is leaked. SMC has been the subject of academic study for more than 30 years, but first attempts to use it for actual...
We generate and gather a lot of data about ourselves and others, some of it highly confidential. The collection, storage and use of this data is stric...
|
cena:
435,90 |
![]() |
Applications and Techniques in Information Security: 6th International Conference, Atis 2016, Cairns, Qld, Australia, October 26-28, 2016, Proceedings
ISBN: 9789811027406 / Angielski / Miękka / 163 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2016, held in Cairns, Australia, October 2016.
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2016, held...
|
cena:
201,24 |