Elements of Quasigroup Theory and Applications
ISBN: 9781498721554 / Angielski / Twarda / 576 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
760,10 zł |
Trusted Computing Platforms: Tpm2.0 in Context
ISBN: 9783319356907 / Angielski / Miękka / 382 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future.
In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future.
|
|
cena:
623,99 zł |
Cyber Defense and Situational Awareness
ISBN: 9783319380261 / Angielski / Miękka / 329 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for...
This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It ...
|
|
cena:
541,05 zł |
Cryptology and Network Security: 15th International Conference, Cans 2016, Milan, Italy, November 14-16, 2016, Proceedings
ISBN: 9783319489643 / Angielski / Miękka / 762 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016.The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions.
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Ital...
|
|
cena:
194,97 zł |
The Hash Function Blake
ISBN: 9783662525975 / Angielski / Miękka / 228 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers. It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using BLAKE, with a focus on software implementation. In the first two chapters, the authors offer a short introduction to cryptographic hashing, the SHA3 competition and BLAKE. They review applications of cryptographic hashing, they describe some basic notions such as... This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of... |
|
cena:
589,81 zł |
Cyber Warfare: Building the Scientific Foundation
ISBN: 9783319360072 / Angielski / Miękka / 321 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors.
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. Cyber ...
|
|
cena:
757,49 zł |
Security Standardisation Research: Third International Conference, Ssr 2016, Gaithersburg, MD, Usa, December 5-6, 2016, Proceedings
ISBN: 9783319490991 / Angielski / Miękka / 275 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
194,97 zł |
Security, Privacy and Anonymity in Computation, Communication and Storage: Spaccs 2016 International Workshops, Trustdata, Tsp, Nope, Dependsys, Bigda
ISBN: 9783319491448 / Angielski / Miękka / 392 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the refereed proceedings of six workshops held at the 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2016, held in Zhangjiajie, China, in November 2016: the 7th International Workshop on Trust, Security and Privacy for Big Data, TrustData 2016;
This volume constitutes the refereed proceedings of six workshops held at the 9th International Conference on Security, Privacy and Anonymity in Compu...
|
|
cena:
194,97 zł |
Information Theoretic Security: 9th International Conference, Icits 2016, Tacoma, Wa, Usa, August 9-12, 2016, Revised Selected Papers
ISBN: 9783319491745 / Angielski / Miękka / 301 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed proceedings fo the 9th International Conference on Information Theoretic Security, ICITS 2016, held in Tacoma, WA, USA, in August 2016. The 14 full papers presented in this volume were carefully reviewed and selected from 40 submissions. They are organized around the following topics: secret sharing; quantum cryptography; visual cryptography; cryptographic protocols; entropy, extractors and privacy. This book constitutes the thoroughly refereed proceedings fo the 9th International Conference on Information Theoretic Security, ICITS 2016, held i... |
|
cena:
194,97 zł |
Advances in Cryptology - Asiacrypt 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vi
ISBN: 9783662538869 / Angielski / Miękka / 941 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable... The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applicatio... |
|
cena:
389,98 zł |
Ict Systems Security and Privacy Protection: 30th Ifip Tc 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings
ISBN: 9783319387079 / Angielski / Miękka / 646 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.
The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security manag...
|
|
cena:
389,98 zł |
Information Security Practice and Experience: 12th International Conference, Ispec 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings
ISBN: 9783319491509 / Angielski / Miękka / 380 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. They cover multiple topics in information security, from technologies to systems and applications.
This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zh...
|
|
cena:
194,97 zł |
Feistel Ciphers: Security Proofs and Cryptanalysis
ISBN: 9783319495286 / Angielski / Twarda / 309 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers are widely used in cryptography in order to obtain pseudorandom permutations and secret-key block ciphers. In Part 1, we describe Feistel ciphers and their variants. We also give a brief story of these ciphers and basic security results. In Part 2, we describe generic attacks on Feistel ciphers. In Part 3, we give results on DES and specific Feistel ciphers. Part 4 is devoted to improved security results. We also give results on...
This book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers a...
|
|
cena:
663,00 zł |
Advances in Cryptology - Asiacrypt 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vi
ISBN: 9783662538890 / Angielski / Miękka / 1055 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable... The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applicatio... |
|
cena:
389,98 zł |
Hijacked By Hackers Be Afraid: Be very, Very Afraid
ISBN: 9781539525080 / Angielski / Miękka / 254 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Come with us on a journey through the shadowy corridors of the "Dark Web" to examine what goes on in a hacker's mind. Learn about the hacker's tricks and tools of the trade used to entice or frighten people into following their lead. You'll read stories of cyber criminals who went legit, creating quite the stir in corporations like Google and Microsoft. You'll also be introduced to hackers who have threatened our national security and compromised global systems to reveal their secrets. Most importantly, you learn about how you can protect your personal and professional data from the secret...
Come with us on a journey through the shadowy corridors of the "Dark Web" to examine what goes on in a hacker's mind. Learn about the hacker's tricks ...
|
|
cena:
72,10 zł |
Classical Encryption: Classical Ciphers
ISBN: 9781539569930 / Angielski / Miękka / 148 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In cryptography, a classical cipher is a type of cipher that was used historically but now has fallen, for the most part, into disuse. The term includes the simple systems used since Greek and Roman times; the elaborate Renaissance ciphers, World War II cryptography such as the Enigma machine and beyond.
In cryptography, a classical cipher is a type of cipher that was used historically but now has fallen, for the most part, into disuse. The term includ...
|
|
cena:
108,22 zł |
Information Systems Security: 12th International Conference, Iciss 2016, Jaipur, India, December 16-20, 2016, Proceedings
ISBN: 9783319498058 / Angielski / Miękka / 544 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security. This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, In... |
|
cena:
194,97 zł |
Progress in Cryptology - Indocrypt 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings
ISBN: 9783319498898 / Angielski / Miękka / 429 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 17th International Conference on Cryptology in India, INDOCRYPT 2016, held in Kolkata, India, in December 2016. The 23 revised full papers presented in this book were carefully reviewed and selected from 84 submissions. The focus of the conference includes works on Public-Key Cryptography, Cryptographic Protocols, Side-Channel Attacks, Implementation of Cryptographic Schemes, Functional Encryption, Symmetric-Key Cryptanalysis, Foundations, and New Cryptographic Constructions.
This book constitutes the refereed proceedings of the 17th International Conference on Cryptology in India, INDOCRYPT 2016, held in Kolkata, India, in...
|
|
cena:
194,97 zł |
Information and Communications Security: 18th International Conference, Icics 2016, Singapore, Singapore, November 29 - December 2, 2016, Proceedings
ISBN: 9783319500102 / Angielski / Miękka / 478 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Singapore, Singapore, in November/December 2016.
The 20 revised full papers and 16 short papers presented were carefully selected from 60 submissions. The papers cover topics such as IoT security; cloud security; applied cryptography; attack behaviour analytics; authentication and authorization; engineering issues of cryptographic and security systems; privacy protection; risk evaluation and security; key management and language-based security;... This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Si...
|
|
cena:
194,97 zł |
Hacking University Graduation Edition: 4 Manuscripts (Computer, Mobile, Python & Linux): Hacking Computers, Mobile Devices, Apps, Game Consoles and Le
ISBN: 9781539695172 / Angielski / Miękka / 416 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Complete Hacking University Series is here Learn everything you need to know to dominate and ensure the skills needed to hack and learn 2 popular programming languages.
This book will contain 4 manuscripts related to the topics of hacking and programming. Hacking University: Graduation edition includes Volumes 1-4 in the "Hacking Freedom and Data Driven book series." Over 300+ pages of valuable information will be included in this bundle. The Complete Hacking University Series is here Learn everything you need to know to dominate and ensure the skills needed to hack and learn 2...
|
|
cena:
117,15 zł |