![]() |
Ict Systems Security and Privacy Protection: 30th Ifip Tc 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings
ISBN: 9783319387079 / Angielski / Miękka / 646 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.
The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security manag...
|
cena:
402,53 |
![]() |
Information Security Practice and Experience: 12th International Conference, Ispec 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings
ISBN: 9783319491509 / Angielski / Miękka / 380 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. They cover multiple topics in information security, from technologies to systems and applications.
This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zh...
|
cena:
201,24 |
![]() |
Feistel Ciphers: Security Proofs and Cryptanalysis
ISBN: 9783319495286 / Angielski / Twarda / 309 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers are widely used in cryptography in order to obtain pseudorandom permutations and secret-key block ciphers. In Part 1, we describe Feistel ciphers and their variants. We also give a brief story of these ciphers and basic security results. In Part 2, we describe generic attacks on Feistel ciphers. In Part 3, we give results on DES and specific Feistel ciphers. Part 4 is devoted to improved security results. We also give results on...
This book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers a...
|
cena:
684,33 |
![]() |
Advances in Cryptology - Asiacrypt 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vi
ISBN: 9783662538890 / Angielski / Miękka / 1055 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable... The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applicatio... |
cena:
402,53 |
![]() |
Hijacked By Hackers Be Afraid: Be very, Very Afraid
ISBN: 9781539525080 / Angielski / Miękka / 254 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Come with us on a journey through the shadowy corridors of the "Dark Web" to examine what goes on in a hacker's mind. Learn about the hacker's tricks and tools of the trade used to entice or frighten people into following their lead. You'll read stories of cyber criminals who went legit, creating quite the stir in corporations like Google and Microsoft. You'll also be introduced to hackers who have threatened our national security and compromised global systems to reveal their secrets. Most importantly, you learn about how you can protect your personal and professional data from the secret...
Come with us on a journey through the shadowy corridors of the "Dark Web" to examine what goes on in a hacker's mind. Learn about the hacker's tricks ...
|
cena:
64,70 |
![]() |
Classical Encryption: Classical Ciphers
ISBN: 9781539569930 / Angielski / Miękka / 148 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In cryptography, a classical cipher is a type of cipher that was used historically but now has fallen, for the most part, into disuse. The term includes the simple systems used since Greek and Roman times; the elaborate Renaissance ciphers, World War II cryptography such as the Enigma machine and beyond.
In cryptography, a classical cipher is a type of cipher that was used historically but now has fallen, for the most part, into disuse. The term includ...
|
cena:
97,10 |
![]() |
Information Systems Security: 12th International Conference, Iciss 2016, Jaipur, India, December 16-20, 2016, Proceedings
ISBN: 9783319498058 / Angielski / Miękka / 544 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security. This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, In... |
cena:
201,24 |
![]() |
Progress in Cryptology - Indocrypt 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings
ISBN: 9783319498898 / Angielski / Miękka / 429 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 17th International Conference on Cryptology in India, INDOCRYPT 2016, held in Kolkata, India, in December 2016. The 23 revised full papers presented in this book were carefully reviewed and selected from 84 submissions. The focus of the conference includes works on Public-Key Cryptography, Cryptographic Protocols, Side-Channel Attacks, Implementation of Cryptographic Schemes, Functional Encryption, Symmetric-Key Cryptanalysis, Foundations, and New Cryptographic Constructions.
This book constitutes the refereed proceedings of the 17th International Conference on Cryptology in India, INDOCRYPT 2016, held in Kolkata, India, in...
|
cena:
201,24 |
![]() |
Information and Communications Security: 18th International Conference, Icics 2016, Singapore, Singapore, November 29 - December 2, 2016, Proceedings
ISBN: 9783319500102 / Angielski / Miękka / 478 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Singapore, Singapore, in November/December 2016.
The 20 revised full papers and 16 short papers presented were carefully selected from 60 submissions. The papers cover topics such as IoT security; cloud security; applied cryptography; attack behaviour analytics; authentication and authorization; engineering issues of cryptographic and security systems; privacy protection; risk evaluation and security; key management and language-based security;... This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Si...
|
cena:
201,24 |
![]() |
Hacking University Graduation Edition: 4 Manuscripts (Computer, Mobile, Python & Linux): Hacking Computers, Mobile Devices, Apps, Game Consoles and Le
ISBN: 9781539695172 / Angielski / Miękka / 416 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Complete Hacking University Series is here Learn everything you need to know to dominate and ensure the skills needed to hack and learn 2 popular programming languages.
This book will contain 4 manuscripts related to the topics of hacking and programming. Hacking University: Graduation edition includes Volumes 1-4 in the "Hacking Freedom and Data Driven book series." Over 300+ pages of valuable information will be included in this bundle. The Complete Hacking University Series is here Learn everything you need to know to dominate and ensure the skills needed to hack and learn 2...
|
cena:
105,12 |
![]() |
Security Solutions and Applied Cryptography in Smart Grid Communications
ISBN: 9781522518297 / Angielski / Twarda / 492 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Presents the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across a range of relevant perspectives and topics, such as threat detection, authentication, and intrusion detection, this book is designed for academics, researchers, engineers and students.
Presents the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across a rang...
|
cena:
1101,91 |
![]() |
Foundations and Practice of Security: 9th International Symposium, Fps 2016, Québec City, Qc, Canada, October 24-25, 2016, Revised Selected Papers
ISBN: 9783319519654 / Angielski / Miękka / 361 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Security, FPS 2016, held in Quebec City, QC, Canada, in October 2016.
The 18 revised regular papers presented together with 5 short papers and 3 invited talks were carefully reviewed and selected from 34 submissions. The accepted papers cover diverse research themes, ranging from classic topics, such as malware, anomaly detection, and privacy, to emerging issues, such as security and privacy in mobile computing and cloud. This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Securit... |
cena:
201,24 |
![]() |
Topics in Cryptology - Ct-Rsa 2017: The Cryptographers' Track at the Rsa Conference 2017, San Francisco, Ca, Usa, February 14-17, 2017, Proceedings
ISBN: 9783319521527 / Angielski / Miękka / 452 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2017, CT-RSA 2017, held in San Francisco, CA, USA, in February 2017. The 25 papers presented in this volume were carefully reviewed and selected from 77 submissions. CT-RSA has become a major publication venue in cryptography. It covers a wide variety of topics from public-key to symmetric key cryptography and from cryptographic protocols to primitives and their implementation security. This year selected topics such as cryptocurrencies and white-box cryptography were added to... This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2017, CT-RSA 2017, held in San Francisco, CA, USA... |
cena:
201,24 |
![]() |
Cryptographic Algorithms
ISBN: 9781541040069 / Angielski / Miękka / 154 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in practice by any adversary. It is theoretically possible to break such a system, but it is infeasible to do so by any known practical means.
Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational ...
|
cena:
303,46 |
![]() |
Electronic Voting: First International Joint Conference, E-Vote-Id 2016, Bregenz, Austria, October 18-21, 2016, Proceedings
ISBN: 9783319522395 / Angielski / Miękka / 233 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed conference proceedings of the First Interational Joint Conference on Electronic Voting, E-Vote-ID 2016, held in Bregenz, Austria, in October 2016. The 14 full papers presented were carefully reviewed and selected from 57 submissions. They represent a wide range of technological proposals for different voting settings (be it in polling stations, remote voting or even mobile voting) and case studies from different countries already using electronic voting or having conducted first trial elections. This book constitutes the thoroughly refereed conference proceedings of the First Interational Joint Conference on Electronic Voting, E-Vote-ID 201... |
cena:
201,24 |
![]() |
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
ISBN: 9781119396215 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Hacking the Hacker is a motivational book demonstrating that the best hackers in the world are the previously unsung white hat hacker heroes who are continuously fighting the bad hackers in a never ending digital war. It contains 18 chapters dedicated to profiling many of today's most world renown computer security experts and luminaries, including why they chose their field, and describe their most notable work and contributions. Before each profile chapter will be an introductory technology chapter discussing how hackers attack a particular technology or with a specific methodology...
Hacking the Hacker is a motivational book demonstrating that the best hackers in the world are the previously unsung white hat hacker heroes wh...
|
cena:
105,67 |
![]() |
Information Security and Cryptology - Icisc 2016: 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected
ISBN: 9783319531762 / Angielski / Miękka / 351 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016. This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Se... |
cena:
201,24 |
![]() |
The Cybersecurity Dilemma: Network Intrusions, Trust and Fear in the International System
ISBN: 9781849047135 / Angielski / Miękka / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Reveals the pressure points for international relations precipitated by states' use of cyber espionage.
Reveals the pressure points for international relations precipitated by states' use of cyber espionage.
|
cena:
150,97 |
![]() |
Digital Forensics and Watermarking: 15th International Workshop, Iwdw 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers
ISBN: 9783319534640 / Angielski / Miękka / 618 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the revised post-conference proceedings of the 14thInternational Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, Japan, in September 2016.
The 45 papers presented in this volume were carefully reviewed andselected from 70 submissions. The contributions are organized in topicalsections on digital forensics, visual cryptography, reversible data hiding, and steganography and steganalysis. This book constitutes the revised post-conference proceedings of the 14thInternational Workshop on Digital Forensics and Watermarking, IWDW 2016, held...
|
cena:
201,24 |
![]() |
Secure and Trustworthy Transportation Cyber-Physical Systems
ISBN: 9789811038914 / Angielski / Miękka / 159 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book comprehensively reviews the cyber security and privacy issues in transportation cyber-physical systems (TCPSs). It then discusses in detail the principles and metrics of evaluating safety and privacy in TCPSs and elaborates the verification and analysis of secure, robust and trustworthy TCPSs.
This book comprehensively reviews the cyber security and privacy issues in transportation cyber-physical systems (TCPSs). It then discusses in detail ...
|
cena:
201,24 |