• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946350]
• Literatura piękna
 [1816154]

  więcej...
• Turystyka
 [70666]
• Informatyka
 [151172]
• Komiksy
 [35576]
• Encyklopedie
 [23172]
• Dziecięca
 [611458]
• Hobby
 [135995]
• AudioBooki
 [1726]
• Literatura faktu
 [225763]
• Muzyka CD
 [378]
• Słowniki
 [2917]
• Inne
 [444280]
• Kalendarze
 [1179]
• Podręczniki
 [166508]
• Poradniki
 [469467]
• Religia
 [507199]
• Czasopisma
 [496]
• Sport
 [61352]
• Sztuka
 [242330]
• CD, DVD, Video
 [3348]
• Technologie
 [219391]
• Zdrowie
 [98638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3525]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2785

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Financial Cryptography and Data Security: FC 2016 International Workshops, Bitcoin, Voting, and Wahc, Christ Church, Barbados, February 26, 2016, Revi Clark, Jeremy 9783662533567 Springer
Financial Cryptography and Data Security: FC 2016 International Workshops, Bitcoin, Voting, and Wahc, Christ Church, Barbados, February 26, 2016, Revi

ISBN: 9783662533567 / Angielski / Miękka / 343 str.

ISBN: 9783662533567/Angielski/Miękka/343 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jeremy Clark; Sarah Meiklejohn; Peter Ryan
This book constitutes the refereed proceedings of three workshops heldat the 20th International Conference on Financial Cryptography and DataSecurity, FC 2016, in Christ Church, Barbados, in February 2016.
The 22 full papers presented were carefully reviewed and selected from 49 submissions. They feature the outcome of the Second Workshop on Bitcoin and Blockchain Research, BITCOIN 2016, the First Workshop on Secure Voting Systems, VOTING 2016, and the 4th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2016.
This book constitutes the refereed proceedings of three workshops heldat the 20th International Conference on Financial Cryptography and DataSecurity,...
cena: 201,24

 Computer Security - Esorics 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Par Askoxylakis, Ioannis 9783319457437 Springer
Computer Security - Esorics 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Par

ISBN: 9783319457437 / Angielski / Miękka / 623 str.

ISBN: 9783319457437/Angielski/Miękka/623 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ioannis Askoxylakis; Sotiris Ioannidis; Sokratis Katsikas

The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016.

The 60 revised full papers presented were carefully reviewed and selected from 285 submissions. The papers cover a wide range of topics in security and privacy, including data protection: systems security, network security, access control, authentication, and security in such emerging areas as cloud computing, cyber-physical systems, and the Internet of Things.


The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORIC...

cena: 201,24

 Computer Security - Esorics 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Par Askoxylakis, Ioannis 9783319457406 Springer
Computer Security - Esorics 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Par

ISBN: 9783319457406 / Angielski / Miękka / 609 str.

ISBN: 9783319457406/Angielski/Miękka/609 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ioannis Askoxylakis; Sotiris Ioannidis; Sokratis Katsikas

The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016.

The 60 revised full papers presented were carefully reviewed and selected from 285 submissions. The papers cover a wide range of topics in security and privacy, including data protection: systems security, network security, access control, authentication, and security in such emerging areas as cloud computing, cyber-physical systems, and the Internet of Things.


The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORIC...

cena: 201,24

 Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Applications Liu, Wen Ming 9783319426426 Springer
Preserving Privacy Against Side-Channel Leaks: From Data Publishing to Web Applications

ISBN: 9783319426426 / Angielski / Twarda / 142 str.

ISBN: 9783319426426/Angielski/Twarda/142 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Wen Ming Liu; Lingyu Wang
This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains. First, the book examines privacy-preserving data publishing with publicly-known algorithms, studying a generic strategy independent of data utility measures and syntactic privacy properties before discussing an extended approach to improve the efficiency. Next, the book explores privacy-preserving traffic padding in Web applications, first via a model to quantify privacy and cost and then by introducing...
This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the f...
cena: 402,53

 Advances in Information and Computer Security: 11th International Workshop on Security, Iwsec 2016, Tokyo, Japan, September 12-14, 2016, Proceedings Ogawa, Kazuto 9783319445236 Springer
Advances in Information and Computer Security: 11th International Workshop on Security, Iwsec 2016, Tokyo, Japan, September 12-14, 2016, Proceedings

ISBN: 9783319445236 / Angielski / Miękka / 335 str.

ISBN: 9783319445236/Angielski/Miękka/335 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kazuto Ogawa; Katsunari Yoshioka

This book constitutes the refereed proceedings of the 11th International Workshop on Security, IWSEC 2016, held in Tokyo, Japan, in September 2016. The 15 regular papers and 4 short papers presented in this volume were carefully reviewed and selected from 53 submissions. They were organized in topical sections named: system security; searchable encryption; cryptanalysis; permutation and symmetric encryption; privacy preserving; hardware security; post-quantum cryptography; and paring computation.


This book constitutes the refereed proceedings of the 11th International Workshop on Security, IWSEC 2016, held in Tokyo, Japan, in September 2016....

cena: 201,24

 Constructive Side-Channel Analysis and Secure Design: 7th International Workshop, Cosade 2016, Graz, Austria, April 14-15, 2016, Revised Selected Pape Standaert, François-Xavier 9783319432823 Springer
Constructive Side-Channel Analysis and Secure Design: 7th International Workshop, Cosade 2016, Graz, Austria, April 14-15, 2016, Revised Selected Pape

ISBN: 9783319432823 / Angielski / Miękka / 219 str.

ISBN: 9783319432823/Angielski/Miękka/219 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Francois-Xavier Standaert; Elisabeth Oswald

This book constitutes revised selected papers from the 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, held in Graz, Austria, in April 2016.
The 12 papers presented in this volume were carefully reviewed and selected from 32 submissions. They were organized in topical sections named: security and physical attacks; side-channel analysis (case studies); fault analysis; and side-channel analysis (tools).


This book constitutes revised selected papers from the 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2...

cena: 201,24

 Digital Fingerprinting Ryan M. Gerdes Yong Guan Sneha Kumar Kasera 9781493965991 Springer
Digital Fingerprinting

ISBN: 9781493965991 / Angielski / Twarda / 189 str.

ISBN: 9781493965991/Angielski/Twarda/189 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ryan M. Gerdes; Yong Guan; Sneha Kumar Kasera
This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more. Available techniques for assurance are limited and authentication schemes are potentially vulnerable to the theft of digital tokens or secrets. Intrusion detection can be thwarted by spoofing or impersonating devices, and forensic analysis is incapable of demonstrably tying a particular device to specific digital evidence. This book presents an innovative and effective...
This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas includi...
cena: 442,79

 Cryptography: Theory and Practice Douglas Robert Stinson Maura Paterson 9781138197015 CRC Press
Cryptography: Theory and Practice

ISBN: 9781138197015 / Angielski / Twarda / 598 str.

ISBN: 9781138197015/Angielski/Twarda/598 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Douglas Robert Stinson; Maura Paterson
cena: 450,54

 Eleventh Hour CISSP (R): Study Guide Eric (Fellow, SANS Institute, Bethesda, MD, USA; Chief Technology Officer, Backshore Communications LLC., Peaks Island, 9780128112489 Syngress Media,U.S.
Eleventh Hour CISSP (R): Study Guide

ISBN: 9780128112489 / Angielski / Miękka / 238 str.

ISBN: 9780128112489/Angielski/Miękka/238 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
USA; Chief Techn MD Bethesda SANS Institute Eric (Fellow

Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted.

The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more...

Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information...

cena: 117,50

 Security in Computing and Communications: 4th International Symposium, Sscc 2016, Jaipur, India, September 21-24, 2016, Proceedings Mueller, Peter 9789811027376 Springer
Security in Computing and Communications: 4th International Symposium, Sscc 2016, Jaipur, India, September 21-24, 2016, Proceedings

ISBN: 9789811027376 / Angielski / Miękka / 474 str.

ISBN: 9789811027376/Angielski/Miękka/474 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peter Mueller; Sabu M. Thampi; MD Zakirul Alam Bhuiyan
This book constitutes the refereed proceedings of the 4th International Symposium on Security in Computing and Communications, SSCC 2016, held in Jaipur, India, in September 2016. The 23 revised full papers presented together with 16 short papers and an invited paper were carefully reviewed and selected from 136 submissions. The papers are organized in topical sections on cryptosystems, algorithms, primitives; security and privacy in networked systems; system and network security; steganography, visual cryptography, image forensics; applications security.
This book constitutes the refereed proceedings of the 4th International Symposium on Security in Computing and Communications, SSCC 2016, held in Jaip...
cena: 201,24

 Data Privacy Management and Security Assurance: 11th International Workshop, DPM 2016 and 5th International Workshop, Qasa 2016, Heraklion, Crete, Gre Livraga, Giovanni 9783319470719 Springer
Data Privacy Management and Security Assurance: 11th International Workshop, DPM 2016 and 5th International Workshop, Qasa 2016, Heraklion, Crete, Gre

ISBN: 9783319470719 / Angielski / Miękka / 247 str.

ISBN: 9783319470719/Angielski/Miękka/247 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Giovanni Livraga; Vicenc Torra; Alessandro Aldini

This book constitutes the refereed proceedings of the 11th International Workshop on Data Privacy Management, DPM 2016 and the 5th International Workshop on Quantitative Aspects in Security Assurance, QASA 2016, held in Heraklion, Crete, Greece, in September 2016. 9 full papers and 4 short papers out of 24 submissions are included in the DPM 2016 Workshop. They are organized around areas related to the management of privacy-sensitive informations, such as translation of high-level business goals into system-level privacy policies; administration of sensitive identifiers; data integration...

This book constitutes the refereed proceedings of the 11th International Workshop on Data Privacy Management, DPM 2016 and the 5th International Wo...

cena: 201,24

 Information Security: 19th International Conference, Isc 2016, Honolulu, Hi, Usa, September 3-6, 2016. Proceedings Bishop, Matt 9783319458700 Springer
Information Security: 19th International Conference, Isc 2016, Honolulu, Hi, Usa, September 3-6, 2016. Proceedings

ISBN: 9783319458700 / Angielski / Miękka / 455 str.

ISBN: 9783319458700/Angielski/Miękka/455 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Matt Bishop; Anderson C. a. Nascimento
This book constitutes the refereed proceedings of the 19th International Conference on Information Security, ISC 2016, held in Honolulu, HI, USA, in September 2016. The 19 revised full papers presented together with 7 short papers were carefully reviewed and selected from 76 submissions. The conference focuses on following subjects technical aspects of information security, cryptanalysis, cryptographic protocols, network and systems security and access control, privacy and watermarking, software security, encryption, signatures and fundamentals.
This book constitutes the refereed proceedings of the 19th International Conference on Information Security, ISC 2016, held in Honolulu, HI, USA, in S...
cena: 201,24

 Information Security Theory and Practice: 10th Ifip Wg 11.2 International Conference, Wistp 2016, Heraklion, Crete, Greece, September 26-27, 2016, Pro Foresti, Sara 9783319459301 Springer
Information Security Theory and Practice: 10th Ifip Wg 11.2 International Conference, Wistp 2016, Heraklion, Crete, Greece, September 26-27, 2016, Pro

ISBN: 9783319459301 / Angielski / Miękka / 271 str.

ISBN: 9783319459301/Angielski/Miękka/271 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sara Foresti; Javier Lopez

This volume constitutes the refereed proceedings of the 10th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2016, held in Heraklion, Crete, Greece, in September 2016. The 13 revised full papers and 5 short papers presented together in this book were carefully reviewed and selected from 29 submissions.

WISTP 2016 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security...

This volume constitutes the refereed proceedings of the 10th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WI...

cena: 201,24

 From Hacking to Report Writing: An Introduction to Security and Penetration Testing Svensson, Robert 9781484222829 Apress
From Hacking to Report Writing: An Introduction to Security and Penetration Testing

ISBN: 9781484222829 / Angielski / Miękka / 190 str.

ISBN: 9781484222829/Angielski/Miękka/190 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robert Svensson

Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally report security weaknesses using techniques such as SQL-injection, denial-of-service attacks, and password hacking.

Although From Hacking to Report Writing will give you the technical know-how needed to carry out advanced security tests, it also...

Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing...

cena: 211,90

 Automated Security Management Ehab Al-Shaer Xinming Ou Geoffrey Xie 9783319345369 Springer
Automated Security Management

ISBN: 9783319345369 / Angielski / Miękka / 187 str.

ISBN: 9783319345369/Angielski/Miękka/187 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ehab Al-Shaer; Xinming Ou; Geoffrey Xie
In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery.
In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configur...
cena: 201,24

 Security and the Networked Society Mark Gregory David Glance 9783319347011 Springer
Security and the Networked Society

ISBN: 9783319347011 / Angielski / Miękka / 297 str.

ISBN: 9783319347011/Angielski/Miękka/297 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mark Gregory; David Glance
This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information privacy. This book traces the rise into prominence of these issues while also exploring the resulting cultural reaction. The authors analysis forms the basis of a discussion on future technological directions and their potential impact on society....
This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, a...
cena: 254,57

 Advances in Digital Forensics XII: 12th Ifip Wg 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers Peterson, Gilbert 9783319462783 Springer
Advances in Digital Forensics XII: 12th Ifip Wg 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers

ISBN: 9783319462783 / Angielski / Twarda / 396 str.

ISBN: 9783319462783/Angielski/Twarda/396 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gilbert Peterson; Sujeet Shenoi

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security...

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wir...

cena: 201,24

 Network and System Security: 10th International Conference, Nss 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings Chen, Jiageng 9783319462974 Springer
Network and System Security: 10th International Conference, Nss 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings

ISBN: 9783319462974 / Angielski / Miękka / 540 str.

ISBN: 9783319462974/Angielski/Miękka/540 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jiageng Chen; Vincenzo Piuri; Chunhua Su
This book constitutes the proceedings of the 10th International Conference on Network and System Security, NSS 2016, held in Taipei, Taiwan, in September 2016.
The 31 full and 4 short papers presented in this volume were carefully reviewed and selected from 105 submissions. They were organized in topical sections named: authentication mechanism; cloud computing security; data mining for security application; privacy-preserving technologies; network security and forensics; searchable encryption; security policy and access control; security protocols, symmetric key cryptography; system...
This book constitutes the proceedings of the 10th International Conference on Network and System Security, NSS 2016, held in Taipei, Taiwan, in Septem...
cena: 201,24

 Applications of Secure Multiparty Computation Peeter Laud, Liina Kamm 9781614995319 IOS Press
Applications of Secure Multiparty Computation

ISBN: 9781614995319 / Angielski / Twarda / 264 str.

ISBN: 9781614995319/Angielski/Twarda/264 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peeter Laud;Liina Kamm
We generate and gather a lot of data about ourselves and others, some of it highly confidential. The collection, storage and use of this data is strictly regulated by laws, but restricting the use of data often limits the benefits which could be obtained from its analysis. Secure multi-party computation SMC, a cryptographic technology, makes it possible to execute specific programs on confidential data while ensuring that no other sensitive information from the data is leaked. SMC has been the subject of academic study for more than 30 years, but first attempts to use it for actual...
We generate and gather a lot of data about ourselves and others, some of it highly confidential. The collection, storage and use of this data is stric...
cena: 435,90

 Applications and Techniques in Information Security: 6th International Conference, Atis 2016, Cairns, Qld, Australia, October 26-28, 2016, Proceedings Batten, Lynn 9789811027406 Springer
Applications and Techniques in Information Security: 6th International Conference, Atis 2016, Cairns, Qld, Australia, October 26-28, 2016, Proceedings

ISBN: 9789811027406 / Angielski / Miękka / 163 str.

ISBN: 9789811027406/Angielski/Miękka/163 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lynn Batten; Gang Li
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2016, held in Cairns, Australia, October 2016.
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2016, held...
cena: 201,24

Pierwsza Podprzednia  34  35  36  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia