• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946350]
• Literatura piękna
 [1816154]

  więcej...
• Turystyka
 [70666]
• Informatyka
 [151172]
• Komiksy
 [35576]
• Encyklopedie
 [23172]
• Dziecięca
 [611458]
• Hobby
 [135995]
• AudioBooki
 [1726]
• Literatura faktu
 [225763]
• Muzyka CD
 [378]
• Słowniki
 [2917]
• Inne
 [444280]
• Kalendarze
 [1179]
• Podręczniki
 [166508]
• Poradniki
 [469467]
• Religia
 [507199]
• Czasopisma
 [496]
• Sport
 [61352]
• Sztuka
 [242330]
• CD, DVD, Video
 [3348]
• Technologie
 [219391]
• Zdrowie
 [98638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3525]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2785

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Provable Security: 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings Chen, Liqun 9783319474212 Springer
Provable Security: 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings

ISBN: 9783319474212 / Angielski / Miękka / 394 str.

ISBN: 9783319474212/Angielski/Miękka/394 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Liqun Chen; Jinguang Han
This book constitutes the refereed proceedings of the 10th International Conference on Provable Security, ProvSec 2016, held in Nanjing, China, in November 2016. The 17 full papers and 6 short papers presented were carefully reviewed and selected from 79 submissions.
This book constitutes the refereed proceedings of the 10th International Conference on Provable Security, ProvSec 2016, held in Nanjing, China, in Nov...
cena: 201,24

 Innovative Security Solutions for Information Technology and Communications: 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, Bica, Ion 9783319472379 Springer
Innovative Security Solutions for Information Technology and Communications: 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10,

ISBN: 9783319472379 / Angielski / Miękka / 287 str.

ISBN: 9783319472379/Angielski/Miękka/287 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ion Bica; Reza Reyhanitabar
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Security for Information Technology and Communications, SECITC 2016, held in Bucharest, Romania, in June 2016.The 16 revised full papers were carefully reviewed and selected from 35 submissions.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Security for Information Technology a...
cena: 201,24

 Automated Firewall Analytics: Design, Configuration and Optimization Al-Shaer, Ehab 9783319363578 Springer
Automated Firewall Analytics: Design, Configuration and Optimization

ISBN: 9783319363578 / Angielski / Miękka / 132 str.

ISBN: 9783319363578/Angielski/Miękka/132 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ehab Al-Shaer
This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks.
This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewa...
cena: 402,53

 Theory of Cryptography: 14th International Conference, Tcc 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II Hirt, Martin 9783662536438 Springer
Theory of Cryptography: 14th International Conference, Tcc 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II

ISBN: 9783662536438 / Angielski / Miękka / 578 str.

ISBN: 9783662536438/Angielski/Miękka/578 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Martin Hirt; Adam Smith

The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016.

The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected from 113 submissions. The papers were organized in topical sections named: TCC test-of-time award; foundations; unconditional security; foundations of multi-party protocols; round complexity and efficiency of multi-party computation; differential privacy; delegation and IP; public-key...

The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC...

cena: 201,24

 Theory of Cryptography: 14th International Conference, Tcc 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I Hirt, Martin 9783662536407 Springer
Theory of Cryptography: 14th International Conference, Tcc 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I

ISBN: 9783662536407 / Angielski / Miękka / 692 str.

ISBN: 9783662536407/Angielski/Miękka/692 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Martin Hirt; Adam Smith

The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016.

The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected from 113 submissions. The papers were organized in topical sections named: TCC test-of-time award; foundations; unconditional security; foundations of multi-party protocols; round complexity and efficiency of multi-party computation; differential privacy; delegation and IP; public-key...

The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC...

cena: 201,24

 Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings Brumley, Billy Bob 9783319475592 Springer
Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings

ISBN: 9783319475592 / Angielski / Miękka / 269 str.

ISBN: 9783319475592/Angielski/Miękka/269 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Billy Brumley; Juha Roning

This book constitutes the proceedings of the 21st Nordic Conference on Secure IT Systems, held in Oulu, Finland, in November 2016.

The 16 full papers presented in this volume were carefully reviewed and selected from 43 submissions.

The focus of the conference is on following topics: Security, System Security, Network Security, Software Security, and Information Security.

This book constitutes the proceedings of the 21st Nordic Conference on Secure IT Systems, held in Oulu, Finland, in November 2016.

The 16 f...

cena: 201,24

 Security and Trust Management: 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings Barthe, Gilles 9783319465975 Springer
Security and Trust Management: 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings

ISBN: 9783319465975 / Angielski / Miękka / 229 str.

ISBN: 9783319465975/Angielski/Miękka/229 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gilles Barthe; Evangelos Markatos; Pierangela Samarati

This book constitutes the refereed proceedings of the 12th International Workshop on Security and Trust Management, STM 2016, held in Heraklion, Crete, Greece, in September 2016, in conjunction with the 21st European Symposium Research in Computer Security, ESORICS 2016.
The 13 full papers together with 2 short papers were carefully reviewed and selected from 34 submissions. the focus on the workshop was on following topics: access control, data protection, mobile security, privacy, security and trust policies, trust models.

This book constitutes the refereed proceedings of the 12th International Workshop on Security and Trust Management, STM 2016, held in Heraklion, C...
cena: 201,24

 Advances in Digital Forensics IX: 9th Ifip Wg 11.9 International Conference on Digital Forensics, Orlando, Fl, Usa, January 28-30, 2013, Revised Selec Peterson, Gilbert 9783662514443 Springer
Advances in Digital Forensics IX: 9th Ifip Wg 11.9 International Conference on Digital Forensics, Orlando, Fl, Usa, January 28-30, 2013, Revised Selec

ISBN: 9783662514443 / Angielski / Miękka / 398 str.

ISBN: 9783662514443/Angielski/Miękka/398 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gilbert Peterson; Sujeet Shenoi
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance - investigations of security...
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wirele...
cena: 402,53

 Elements of Quasigroup Theory and Applications Victor Shcherbacov J. D. Phillips 9781498721554 CRC Press
Elements of Quasigroup Theory and Applications

ISBN: 9781498721554 / Angielski / Twarda / 576 str.

ISBN: 9781498721554/Angielski/Twarda/576 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Victor Shcherbacov; J. D. Phillips
cena: 832,62

 Trusted Computing Platforms: Tpm2.0 in Context Proudler, Graeme 9783319356907 Springer
Trusted Computing Platforms: Tpm2.0 in Context

ISBN: 9783319356907 / Angielski / Miękka / 382 str.

ISBN: 9783319356907/Angielski/Miękka/382 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Graeme Proudler; Liqun Chen; Chris Dalton
In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future.
In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future.
cena: 644,07

 Cyber Defense and Situational Awareness Alexander Kott Cliff Wang Robert F. Erbacher 9783319380261 Springer
Cyber Defense and Situational Awareness

ISBN: 9783319380261 / Angielski / Miękka / 329 str.

ISBN: 9783319380261/Angielski/Miękka/329 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alexander Kott; Cliff Wang; Robert F. Erbacher
This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for...
This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It ...
cena: 458,27

 Cryptology and Network Security: 15th International Conference, Cans 2016, Milan, Italy, November 14-16, 2016, Proceedings Foresti, Sara 9783319489643 Springer
Cryptology and Network Security: 15th International Conference, Cans 2016, Milan, Italy, November 14-16, 2016, Proceedings

ISBN: 9783319489643 / Angielski / Miękka / 762 str.

ISBN: 9783319489643/Angielski/Miękka/762 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sara Foresti; Giuseppe Persiano
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016.The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions.
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Ital...
cena: 201,24

 The Hash Function Blake Aumasson, Jean-Philippe 9783662525975 Springer
The Hash Function Blake

ISBN: 9783662525975 / Angielski / Miękka / 228 str.

ISBN: 9783662525975/Angielski/Miękka/228 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jean-Philippe Aumasson; Willi Meier; Raphael Phan

This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers. It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using BLAKE, with a focus on software implementation.

In the first two chapters, the authors offer a short introduction to cryptographic hashing, the SHA3 competition and BLAKE. They review applications of cryptographic hashing, they describe some basic notions such as...

This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of...

cena: 432,81

 Security for Wireless Sensor Networks using Identity-Based Cryptography Harsh Kupwade Patil, Stephen A. Szygenda 9781138199538 Taylor & Francis Ltd
Security for Wireless Sensor Networks using Identity-Based Cryptography

ISBN: 9781138199538 / Angielski / Miękka / 232 str.

ISBN: 9781138199538/Angielski/Miękka/232 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Harsh Kupwade Patil;Stephen A. Szygenda

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security.
After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer...

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wirele...

cena: 230,14

 Cyber Warfare: Building the Scientific Foundation Jajodia, Sushil 9783319360072 Springer
Cyber Warfare: Building the Scientific Foundation

ISBN: 9783319360072 / Angielski / Miękka / 321 str.

ISBN: 9783319360072/Angielski/Miękka/321 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sushil Jajodia; Paulo Shakarian; V. S. Subrahmanian
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors.
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. Cyber ...
cena: 661,96

 Security Standardisation Research: Third International Conference, Ssr 2016, Gaithersburg, MD, Usa, December 5-6, 2016, Proceedings Chen, Lidong 9783319490991 Springer
Security Standardisation Research: Third International Conference, Ssr 2016, Gaithersburg, MD, Usa, December 5-6, 2016, Proceedings

ISBN: 9783319490991 / Angielski / Miękka / 275 str.

ISBN: 9783319490991/Angielski/Miękka/275 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lidong Chen; David McGrew; Chris Mitchell
cena: 201,24

 Security, Privacy and Anonymity in Computation, Communication and Storage: Spaccs 2016 International Workshops, Trustdata, Tsp, Nope, Dependsys, Bigda Wang, Guojun 9783319491448 Springer
Security, Privacy and Anonymity in Computation, Communication and Storage: Spaccs 2016 International Workshops, Trustdata, Tsp, Nope, Dependsys, Bigda

ISBN: 9783319491448 / Angielski / Miękka / 392 str.

ISBN: 9783319491448/Angielski/Miękka/392 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Guojun Wang; Indrakshi Ray; Jose M. Alcaraz Calero
This volume constitutes the refereed proceedings of six workshops held at the 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2016, held in Zhangjiajie, China, in November 2016: the 7th International Workshop on Trust, Security and Privacy for Big Data, TrustData 2016;
This volume constitutes the refereed proceedings of six workshops held at the 9th International Conference on Security, Privacy and Anonymity in Compu...
cena: 201,24

 Information Theoretic Security: 9th International Conference, Icits 2016, Tacoma, Wa, Usa, August 9-12, 2016, Revised Selected Papers Nascimento, Anderson C. a. 9783319491745 Springer
Information Theoretic Security: 9th International Conference, Icits 2016, Tacoma, Wa, Usa, August 9-12, 2016, Revised Selected Papers

ISBN: 9783319491745 / Angielski / Miękka / 301 str.

ISBN: 9783319491745/Angielski/Miękka/301 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Anderson C. a. Nascimento; Paulo Barreto

This book constitutes the thoroughly refereed proceedings fo the 9th International Conference on Information Theoretic Security, ICITS 2016, held in Tacoma, WA, USA, in August 2016. The 14 full papers presented in this volume were carefully reviewed and selected from 40 submissions. They are organized around the following topics: secret sharing; quantum cryptography; visual cryptography; cryptographic protocols; entropy, extractors and privacy.


This book constitutes the thoroughly refereed proceedings fo the 9th International Conference on Information Theoretic Security, ICITS 2016, held i...

cena: 201,24

 Advances in Cryptology - Asiacrypt 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vi Cheon, Jung Hee 9783662538869 Springer
Advances in Cryptology - Asiacrypt 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vi

ISBN: 9783662538869 / Angielski / Miękka / 941 str.

ISBN: 9783662538869/Angielski/Miękka/941 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jung Hee Cheon; Tsuyoshi Takagi

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.

The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable...

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applicatio...

cena: 402,53

 Attacking Network Protocols James Forshaw 9781593277505 John Wiley & Sons
Attacking Network Protocols

ISBN: 9781593277505 / Angielski / Miękka / 336 str.

ISBN: 9781593277505/Angielski/Miękka/336 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
James Forshaw
Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft's top bug hunter. This comprehensive guide looks at networking from an attacker's perspective to help you find, exploit, and ultimately protect vulnerabilities.

Part I starts with a rundown of networking basics and traffic capture, as it builds a foundation for analyzing a network. Part II moves on to protocol analysis, both static and dynamic; you'll learn about common protocol structures, cryptography, and protocol security, and how to reverse engineer code with IDA Pro,...

Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft's top bug hunter. This comprehens...
cena: 271,70

Pierwsza Podprzednia  37  38  39  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia