![]() |
Provable Security: 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings
ISBN: 9783319474212 / Angielski / Miękka / 394 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 10th International Conference on Provable Security, ProvSec 2016, held in Nanjing, China, in November 2016. The 17 full papers and 6 short papers presented were carefully reviewed and selected from 79 submissions.
This book constitutes the refereed proceedings of the 10th International Conference on Provable Security, ProvSec 2016, held in Nanjing, China, in Nov...
|
cena:
201,24 |
![]() |
Innovative Security Solutions for Information Technology and Communications: 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10,
ISBN: 9783319472379 / Angielski / Miękka / 287 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Security for Information Technology and Communications, SECITC 2016, held in Bucharest, Romania, in June 2016.The 16 revised full papers were carefully reviewed and selected from 35 submissions.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Security for Information Technology a...
|
cena:
201,24 |
![]() |
Automated Firewall Analytics: Design, Configuration and Optimization
ISBN: 9783319363578 / Angielski / Miękka / 132 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewalls in large-scale enterpriser networks.
This book provides a comprehensive and in-depth study of automated firewall policy analysis for designing, configuring and managing distributed firewa...
|
cena:
402,53 |
![]() |
Theory of Cryptography: 14th International Conference, Tcc 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II
ISBN: 9783662536438 / Angielski / Miękka / 578 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016. The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected from 113 submissions. The papers were organized in topical sections named: TCC test-of-time award; foundations; unconditional security; foundations of multi-party protocols; round complexity and efficiency of multi-party computation; differential privacy; delegation and IP; public-key... The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC... |
cena:
201,24 |
![]() |
Theory of Cryptography: 14th International Conference, Tcc 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I
ISBN: 9783662536407 / Angielski / Miękka / 692 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016. The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected from 113 submissions. The papers were organized in topical sections named: TCC test-of-time award; foundations; unconditional security; foundations of multi-party protocols; round complexity and efficiency of multi-party computation; differential privacy; delegation and IP; public-key... The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC... |
cena:
201,24 |
![]() |
Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings
ISBN: 9783319475592 / Angielski / Miękka / 269 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 21st Nordic Conference on Secure IT Systems, held in Oulu, Finland, in November 2016. The 16 full papers presented in this volume were carefully reviewed and selected from 43 submissions. The focus of the conference is on following topics: Security, System Security, Network Security, Software Security, and Information Security.
This book constitutes the proceedings of the 21st Nordic Conference on Secure IT Systems, held in Oulu, Finland, in November 2016. The 16 f... |
cena:
201,24 |
![]() |
Security and Trust Management: 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings
ISBN: 9783319465975 / Angielski / Miękka / 229 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 12th International Workshop on Security and Trust Management, STM 2016, held in Heraklion, Crete, Greece, in September 2016, in conjunction with the 21st European Symposium Research in Computer Security, ESORICS 2016. The 13 full papers together with 2 short papers were carefully reviewed and selected from 34 submissions. the focus on the workshop was on following topics: access control, data protection, mobile security, privacy, security and trust policies, trust models. This book constitutes the refereed proceedings of the 12th International Workshop on Security and Trust Management, STM 2016, held in Heraklion, C... |
cena:
201,24 |
![]() |
Advances in Digital Forensics IX: 9th Ifip Wg 11.9 International Conference on Digital Forensics, Orlando, Fl, Usa, January 28-30, 2013, Revised Selec
ISBN: 9783662514443 / Angielski / Miękka / 398 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance - investigations of security...
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wirele...
|
cena:
402,53 |
![]() |
Elements of Quasigroup Theory and Applications
ISBN: 9781498721554 / Angielski / Twarda / 576 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
832,62 |
![]() |
Trusted Computing Platforms: Tpm2.0 in Context
ISBN: 9783319356907 / Angielski / Miękka / 382 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future.
In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future.
|
cena:
644,07 |
![]() |
Cyber Defense and Situational Awareness
ISBN: 9783319380261 / Angielski / Miękka / 329 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for...
This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It ...
|
cena:
458,27 |
![]() |
Cryptology and Network Security: 15th International Conference, Cans 2016, Milan, Italy, November 14-16, 2016, Proceedings
ISBN: 9783319489643 / Angielski / Miękka / 762 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016.The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions.
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Ital...
|
cena:
201,24 |
![]() |
The Hash Function Blake
ISBN: 9783662525975 / Angielski / Miękka / 228 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers. It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using BLAKE, with a focus on software implementation. In the first two chapters, the authors offer a short introduction to cryptographic hashing, the SHA3 competition and BLAKE. They review applications of cryptographic hashing, they describe some basic notions such as... This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of... |
cena:
432,81 |
![]() |
Security for Wireless Sensor Networks using Identity-Based Cryptography
ISBN: 9781138199538 / Angielski / Miękka / 232 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security. Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wirele... |
cena:
230,14 |
![]() |
Cyber Warfare: Building the Scientific Foundation
ISBN: 9783319360072 / Angielski / Miękka / 321 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors.
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. Cyber ...
|
cena:
661,96 |
![]() |
Security Standardisation Research: Third International Conference, Ssr 2016, Gaithersburg, MD, Usa, December 5-6, 2016, Proceedings
ISBN: 9783319490991 / Angielski / Miękka / 275 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
201,24 |
![]() |
Security, Privacy and Anonymity in Computation, Communication and Storage: Spaccs 2016 International Workshops, Trustdata, Tsp, Nope, Dependsys, Bigda
ISBN: 9783319491448 / Angielski / Miękka / 392 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the refereed proceedings of six workshops held at the 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2016, held in Zhangjiajie, China, in November 2016: the 7th International Workshop on Trust, Security and Privacy for Big Data, TrustData 2016;
This volume constitutes the refereed proceedings of six workshops held at the 9th International Conference on Security, Privacy and Anonymity in Compu...
|
cena:
201,24 |
![]() |
Information Theoretic Security: 9th International Conference, Icits 2016, Tacoma, Wa, Usa, August 9-12, 2016, Revised Selected Papers
ISBN: 9783319491745 / Angielski / Miękka / 301 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed proceedings fo the 9th International Conference on Information Theoretic Security, ICITS 2016, held in Tacoma, WA, USA, in August 2016. The 14 full papers presented in this volume were carefully reviewed and selected from 40 submissions. They are organized around the following topics: secret sharing; quantum cryptography; visual cryptography; cryptographic protocols; entropy, extractors and privacy. This book constitutes the thoroughly refereed proceedings fo the 9th International Conference on Information Theoretic Security, ICITS 2016, held i... |
cena:
201,24 |
![]() |
Advances in Cryptology - Asiacrypt 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vi
ISBN: 9783662538869 / Angielski / Miękka / 941 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable... The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applicatio... |
cena:
402,53 |
![]() |
Attacking Network Protocols
ISBN: 9781593277505 / Angielski / Miękka / 336 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft's top bug hunter. This comprehensive guide looks at networking from an attacker's perspective to help you find, exploit, and ultimately protect vulnerabilities. Part I starts with a rundown of networking basics and traffic capture, as it builds a foundation for analyzing a network. Part II moves on to protocol analysis, both static and dynamic; you'll learn about common protocol structures, cryptography, and protocol security, and how to reverse engineer code with IDA Pro,...
Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft's top bug hunter. This comprehens...
|
cena:
271,70 |