• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946350]
• Literatura piękna
 [1816154]

  więcej...
• Turystyka
 [70666]
• Informatyka
 [151172]
• Komiksy
 [35576]
• Encyklopedie
 [23172]
• Dziecięca
 [611458]
• Hobby
 [135995]
• AudioBooki
 [1726]
• Literatura faktu
 [225763]
• Muzyka CD
 [378]
• Słowniki
 [2917]
• Inne
 [444280]
• Kalendarze
 [1179]
• Podręczniki
 [166508]
• Poradniki
 [469467]
• Religia
 [507199]
• Czasopisma
 [496]
• Sport
 [61352]
• Sztuka
 [242330]
• CD, DVD, Video
 [3348]
• Technologie
 [219391]
• Zdrowie
 [98638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3525]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2785

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Ict Systems Security and Privacy Protection: 30th Ifip Tc 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings Federrath, Hannes 9783319387079 Springer
Ict Systems Security and Privacy Protection: 30th Ifip Tc 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings

ISBN: 9783319387079 / Angielski / Miękka / 646 str.

ISBN: 9783319387079/Angielski/Miękka/646 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hannes Federrath; Dieter Gollmann
The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.
The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security manag...
cena: 402,53

 Information Security Practice and Experience: 12th International Conference, Ispec 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings Bao, Feng 9783319491509 Springer
Information Security Practice and Experience: 12th International Conference, Ispec 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings

ISBN: 9783319491509 / Angielski / Miękka / 380 str.

ISBN: 9783319491509/Angielski/Miękka/380 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Feng Bao; Liqun Chen; Robert H. Deng
This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. They cover multiple topics in information security, from technologies to systems and applications.
This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zh...
cena: 201,24

 Feistel Ciphers: Security Proofs and Cryptanalysis Nachef, Valerie 9783319495286 Springer
Feistel Ciphers: Security Proofs and Cryptanalysis

ISBN: 9783319495286 / Angielski / Twarda / 309 str.

ISBN: 9783319495286/Angielski/Twarda/309 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Valerie Nachef; Jacques Patarin; Emmanuel Volte
This book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers are widely used in cryptography in order to obtain pseudorandom permutations and secret-key block ciphers. In Part 1, we describe Feistel ciphers and their variants. We also give a brief story of these ciphers and basic security results. In Part 2, we describe generic attacks on Feistel ciphers. In Part 3, we give results on DES and specific Feistel ciphers. Part 4 is devoted to improved security results. We also give results on...
This book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers a...
cena: 684,33

 Advances in Cryptology - Asiacrypt 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vi Cheon, Jung Hee 9783662538890 Springer
Advances in Cryptology - Asiacrypt 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vi

ISBN: 9783662538890 / Angielski / Miękka / 1055 str.

ISBN: 9783662538890/Angielski/Miękka/1055 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jung Hee Cheon; Tsuyoshi Takagi

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.

The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable...

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applicatio...

cena: 402,53

 Hijacked By Hackers Be Afraid: Be very, Very Afraid Klein, Michael 9781539525080 Createspace Independent Publishing Platform
Hijacked By Hackers Be Afraid: Be very, Very Afraid

ISBN: 9781539525080 / Angielski / Miękka / 254 str.

ISBN: 9781539525080/Angielski/Miękka/254 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Klein
Come with us on a journey through the shadowy corridors of the "Dark Web" to examine what goes on in a hacker's mind. Learn about the hacker's tricks and tools of the trade used to entice or frighten people into following their lead. You'll read stories of cyber criminals who went legit, creating quite the stir in corporations like Google and Microsoft. You'll also be introduced to hackers who have threatened our national security and compromised global systems to reveal their secrets. Most importantly, you learn about how you can protect your personal and professional data from the secret...
Come with us on a journey through the shadowy corridors of the "Dark Web" to examine what goes on in a hacker's mind. Learn about the hacker's tricks ...
cena: 64,70

 Classical Encryption: Classical Ciphers Andre Girardot 9781539569930 Createspace Independent Publishing Platform
Classical Encryption: Classical Ciphers

ISBN: 9781539569930 / Angielski / Miękka / 148 str.

ISBN: 9781539569930/Angielski/Miękka/148 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andre Girardot
In cryptography, a classical cipher is a type of cipher that was used historically but now has fallen, for the most part, into disuse. The term includes the simple systems used since Greek and Roman times; the elaborate Renaissance ciphers, World War II cryptography such as the Enigma machine and beyond.
In cryptography, a classical cipher is a type of cipher that was used historically but now has fallen, for the most part, into disuse. The term includ...
cena: 97,10

 Information Systems Security: 12th International Conference, Iciss 2016, Jaipur, India, December 16-20, 2016, Proceedings Ray, Indrajit 9783319498058 Springer
Information Systems Security: 12th International Conference, Iciss 2016, Jaipur, India, December 16-20, 2016, Proceedings

ISBN: 9783319498058 / Angielski / Miękka / 544 str.

ISBN: 9783319498058/Angielski/Miękka/544 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Indrajit Ray; Manoj Singh Gaur; Mauro Conti

This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016.

The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security.


This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, In...

cena: 201,24

 Progress in Cryptology - Indocrypt 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings Dunkelman, Orr 9783319498898 Springer
Progress in Cryptology - Indocrypt 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings

ISBN: 9783319498898 / Angielski / Miękka / 429 str.

ISBN: 9783319498898/Angielski/Miękka/429 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Orr Dunkelman; Somitra Sanadhya
This book constitutes the refereed proceedings of the 17th International Conference on Cryptology in India, INDOCRYPT 2016, held in Kolkata, India, in December 2016. The 23 revised full papers presented in this book were carefully reviewed and selected from 84 submissions. The focus of the conference includes works on Public-Key Cryptography, Cryptographic Protocols, Side-Channel Attacks, Implementation of Cryptographic Schemes, Functional Encryption, Symmetric-Key Cryptanalysis, Foundations, and New Cryptographic Constructions.
This book constitutes the refereed proceedings of the 17th International Conference on Cryptology in India, INDOCRYPT 2016, held in Kolkata, India, in...
cena: 201,24

 Information and Communications Security: 18th International Conference, Icics 2016, Singapore, Singapore, November 29 - December 2, 2016, Proceedings Lam, Kwok-Yan 9783319500102 Springer
Information and Communications Security: 18th International Conference, Icics 2016, Singapore, Singapore, November 29 - December 2, 2016, Proceedings

ISBN: 9783319500102 / Angielski / Miękka / 478 str.

ISBN: 9783319500102/Angielski/Miękka/478 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kwok-Yan Lam; Chi-Hung Chi; Sihan Qing
This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Singapore, Singapore, in November/December 2016.
The 20 revised full papers and 16 short papers presented were carefully selected from 60 submissions. The papers cover topics such as IoT security; cloud security; applied cryptography; attack behaviour analytics; authentication and authorization; engineering issues of cryptographic and security systems; privacy protection; risk evaluation and security; key management and language-based security;...
This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Si...
cena: 201,24

 Hacking University Graduation Edition: 4 Manuscripts (Computer, Mobile, Python & Linux): Hacking Computers, Mobile Devices, Apps, Game Consoles and Le Isaac D. Cody 9781539695172 Createspace Independent Publishing Platform
Hacking University Graduation Edition: 4 Manuscripts (Computer, Mobile, Python & Linux): Hacking Computers, Mobile Devices, Apps, Game Consoles and Le

ISBN: 9781539695172 / Angielski / Miękka / 416 str.

ISBN: 9781539695172/Angielski/Miękka/416 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Isaac D. Cody
The Complete Hacking University Series is here Learn everything you need to know to dominate and ensure the skills needed to hack and learn 2 popular programming languages.


This book will contain 4 manuscripts related to the topics of hacking and programming. Hacking University: Graduation edition includes Volumes 1-4 in the "Hacking Freedom and Data Driven book series." Over 300+ pages of valuable information will be included in this bundle.


The following titles are included in this book:...
The Complete Hacking University Series is here Learn everything you need to know to dominate and ensure the skills needed to hack and learn 2...
cena: 105,12

 Security Solutions and Applied Cryptography in Smart Grid Communications Mohamed Amine Ferrag Ahmed Ahmim 9781522518297 Information Science Reference
Security Solutions and Applied Cryptography in Smart Grid Communications

ISBN: 9781522518297 / Angielski / Twarda / 492 str.

ISBN: 9781522518297/Angielski/Twarda/492 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mohamed Amine Ferrag; Ahmed Ahmim
Presents the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across a range of relevant perspectives and topics, such as threat detection, authentication, and intrusion detection, this book is designed for academics, researchers, engineers and students.
Presents the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across a rang...
cena: 1101,91

 Foundations and Practice of Security: 9th International Symposium, Fps 2016, Québec City, Qc, Canada, October 24-25, 2016, Revised Selected Papers Cuppens, Frédéric 9783319519654 Springer
Foundations and Practice of Security: 9th International Symposium, Fps 2016, Québec City, Qc, Canada, October 24-25, 2016, Revised Selected Papers

ISBN: 9783319519654 / Angielski / Miękka / 361 str.

ISBN: 9783319519654/Angielski/Miękka/361 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Frederic Cuppens; Lingyu Wang; Nora Cuppens-Boulahia

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Security, FPS 2016, held in Quebec City, QC, Canada, in October 2016.

The 18 revised regular papers presented together with 5 short papers and 3 invited talks were carefully reviewed and selected from 34 submissions.

The accepted papers cover diverse research themes, ranging from classic topics, such as malware, anomaly detection, and privacy, to emerging issues, such as security and privacy in mobile computing and cloud.


This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Securit...

cena: 201,24

 Topics in Cryptology - Ct-Rsa 2017: The Cryptographers' Track at the Rsa Conference 2017, San Francisco, Ca, Usa, February 14-17, 2017, Proceedings Handschuh, Helena 9783319521527 Springer
Topics in Cryptology - Ct-Rsa 2017: The Cryptographers' Track at the Rsa Conference 2017, San Francisco, Ca, Usa, February 14-17, 2017, Proceedings

ISBN: 9783319521527 / Angielski / Miękka / 452 str.

ISBN: 9783319521527/Angielski/Miękka/452 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Helena Handschuh

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2017, CT-RSA 2017, held in San Francisco, CA, USA, in February 2017.

The 25 papers presented in this volume were carefully reviewed and selected from 77 submissions.

CT-RSA has become a major publication venue in cryptography. It covers a wide variety of topics from public-key to symmetric key cryptography and from cryptographic protocols to primitives and their implementation security. This year selected topics such as cryptocurrencies and white-box cryptography were added to...

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2017, CT-RSA 2017, held in San Francisco, CA, USA...

cena: 201,24

 Cryptographic Algorithms Gerard Swedberg 9781541040069 Createspace Independent Publishing Platform
Cryptographic Algorithms

ISBN: 9781541040069 / Angielski / Miękka / 154 str.

ISBN: 9781541040069/Angielski/Miękka/154 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gerard Swedberg
Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in practice by any adversary. It is theoretically possible to break such a system, but it is infeasible to do so by any known practical means.
Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational ...
cena: 303,46

 Electronic Voting: First International Joint Conference, E-Vote-Id 2016, Bregenz, Austria, October 18-21, 2016, Proceedings Krimmer, Robert 9783319522395 Springer
Electronic Voting: First International Joint Conference, E-Vote-Id 2016, Bregenz, Austria, October 18-21, 2016, Proceedings

ISBN: 9783319522395 / Angielski / Miękka / 233 str.

ISBN: 9783319522395/Angielski/Miękka/233 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robert Krimmer; Melanie Volkamer; Jordi Barrat

This book constitutes the thoroughly refereed conference proceedings of the First Interational Joint Conference on Electronic Voting, E-Vote-ID 2016, held in Bregenz, Austria, in October 2016.

The 14 full papers presented were carefully reviewed and selected from 57 submissions. They represent a wide range of technological proposals for different voting settings (be it in polling stations, remote voting or even mobile voting) and case studies from different countries already using electronic voting or having conducted first trial elections.


This book constitutes the thoroughly refereed conference proceedings of the First Interational Joint Conference on Electronic Voting, E-Vote-ID 201...

cena: 201,24

 Hacking the Hacker: Learn From the Experts Who Take Down Hackers Roger A. Grimes 9781119396215 John Wiley & Sons Inc
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

ISBN: 9781119396215 / Angielski / Miękka / 320 str.

ISBN: 9781119396215/Angielski/Miękka/320 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Roger A. Grimes
Hacking the Hacker is a motivational book demonstrating that the best hackers in the world are the previously unsung white hat hacker heroes who are continuously fighting the bad hackers in a never ending digital war. It contains 18 chapters dedicated to profiling many of today's most world renown computer security experts and luminaries, including why they chose their field, and describe their most notable work and contributions. Before each profile chapter will be an introductory technology chapter discussing how hackers attack a particular technology or with a specific methodology...
Hacking the Hacker is a motivational book demonstrating that the best hackers in the world are the previously unsung white hat hacker heroes wh...
cena: 105,67

 Information Security and Cryptology - Icisc 2016: 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Hong, Seokhie 9783319531762 Springer
Information Security and Cryptology - Icisc 2016: 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected

ISBN: 9783319531762 / Angielski / Miękka / 351 str.

ISBN: 9783319531762/Angielski/Miękka/351 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Seokhie Hong; Jong Hwan Park

This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016.
The 18 full papers presented in this volume were carefully reviewed and selected from 69 submissions. There were organized in topical sections named: protocols; lattice cryptography; encryption; implementation and algorithms; signatures and protocol; and analysis.


This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Se...

cena: 201,24

 The Cybersecurity Dilemma: Network Intrusions, Trust and Fear in the International System Ben Buchanan 9781849047135 C Hurst & Co Publishers Ltd
The Cybersecurity Dilemma: Network Intrusions, Trust and Fear in the International System

ISBN: 9781849047135 / Angielski / Miękka / 296 str.

ISBN: 9781849047135/Angielski/Miękka/296 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ben Buchanan
Reveals the pressure points for international relations precipitated by states' use of cyber espionage.
Reveals the pressure points for international relations precipitated by states' use of cyber espionage.
cena: 150,97

 Digital Forensics and Watermarking: 15th International Workshop, Iwdw 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers Shi, Yun Qing 9783319534640 Springer
Digital Forensics and Watermarking: 15th International Workshop, Iwdw 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers

ISBN: 9783319534640 / Angielski / Miękka / 618 str.

ISBN: 9783319534640/Angielski/Miękka/618 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yun Qing Shi; Hyoung Joong Kim; Fernando Perez-Gonzalez
This book constitutes the revised post-conference proceedings of the 14thInternational Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, Japan, in September 2016.
The 45 papers presented in this volume were carefully reviewed andselected from 70 submissions. The contributions are organized in topicalsections on digital forensics, visual cryptography, reversible data hiding, and steganography and steganalysis.

This book constitutes the revised post-conference proceedings of the 14thInternational Workshop on Digital Forensics and Watermarking, IWDW 2016, held...
cena: 201,24

 Secure and Trustworthy Transportation Cyber-Physical Systems Yunchuan Sun Houbing Song 9789811038914 Springer
Secure and Trustworthy Transportation Cyber-Physical Systems

ISBN: 9789811038914 / Angielski / Miękka / 159 str.

ISBN: 9789811038914/Angielski/Miękka/159 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yunchuan Sun; Houbing Song
This book comprehensively reviews the cyber security and privacy issues in transportation cyber-physical systems (TCPSs). It then discusses in detail the principles and metrics of evaluating safety and privacy in TCPSs and elaborates the verification and analysis of secure, robust and trustworthy TCPSs.
This book comprehensively reviews the cyber security and privacy issues in transportation cyber-physical systems (TCPSs). It then discusses in detail ...
cena: 201,24

Pierwsza Podprzednia  37  38  39  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia