• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]

  więcej...
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2765

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Elliptic Curves and Their Applications to Cryptography: An Introduction Enge, Andreas 9780792385899 Springer
Elliptic Curves and Their Applications to Cryptography: An Introduction

ISBN: 9780792385899 / Angielski / Twarda / 164 str.

ISBN: 9780792385899/Angielski/Twarda/164 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andreas Enge
Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic communication, and this need, given the tremendous growth of the Internet, is likely to continue growing. Elliptic curve cryptosystems represent the state of the art for such systems.
Elliptic Curves and Their Applications to Cryptography An Introduction provides a comprehensive and self-contained introduction to elliptic curves and how they are employed to secure public key cryptosystems. Even though the...
Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic...
cena: 885,61

 Secure Information Networks: Communications and Multimedia Security Ifip Tc6/Tc11 Joint Working Conference on Communications and Multimedia Securit Preneel, Bart 9780792386001 Springer
Secure Information Networks: Communications and Multimedia Security Ifip Tc6/Tc11 Joint Working Conference on Communications and Multimedia Securit

ISBN: 9780792386001 / Angielski / Twarda / 324 str.

ISBN: 9780792386001/Angielski/Twarda/324 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bart Preneel
This volume contains papers presented at the fourth working conference on Communications and Multimedia Security (CMS'99), held in Leuven, Belgium from September 20-21, 1999. The Conference, arrangedjointly by Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP), was organized by the Department of Electrical Engineering of the Katholieke Universiteit Leuven. The name "Communications and Multimedia Security" was used for the first time in 1995, when Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the...
This volume contains papers presented at the fourth working conference on Communications and Multimedia Security (CMS'99), held in Leuven, Belgium fro...
cena: 805,10

 Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial Van Tilborg, Henk C. a. 9780792386759 Kluwer Academic Publishers
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial

ISBN: 9780792386759 / Angielski / Mixed media product / 492 str.

ISBN: 9780792386759/Angielski/Mixed media product/492 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Henk C. a. Van Tilborg; Henk C. a. Van Tilborg
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable for these threats. Also, new issues have come up that were not relevant before, e. g. how to add a (digital) signature to an electronic document in such a way that the signer can not deny later on that the document was signed by him/her. Cryptology addresses the above issues. It is at the foundation of all information security. The techniques...
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern c...
cena: 201,24

 Statistical Methods in Computer Security Chen                                     William W. S. Chen Chen W. S. Chen 9780824759391 CRC
Statistical Methods in Computer Security

ISBN: 9780824759391 / Angielski / Twarda / 376 str.

ISBN: 9780824759391/Angielski/Twarda/376 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chen; William W. S. Chen; Chen W. S. Chen
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct on the Internet, considers the development of infrastructures that may prevent breaches of security and law, and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software,...
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current appl...
cena: 783,64

 Cryptology: Machines, History and Methods B. Winkel, etc. 9780890063996 Artech House Publishers
Cryptology: Machines, History and Methods

ISBN: 9780890063996 / Angielski / Twarda / 520 str.

ISBN: 9780890063996/Angielski/Twarda/520 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
B. Winkel;etc.
The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yesterday, today and tomorrow ) culled from Cryptologia (Rose-Hulman Institute of Technology, Terre Haute, IN). The articles are divided into five sectio
The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yes...
cena: 820,84

 Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26–27, 2002, Portorož, Slovenia Borka Jerman-Blazic, Tomaz Klobucar 9781402072062 Springer-Verlag New York Inc.
Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26–27, 2002, Portorož, Slovenia

ISBN: 9781402072062 / Angielski / Twarda / 312 str.

ISBN: 9781402072062/Angielski/Twarda/312 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Borka Jerman-Blazic;Tomaz Klobucar
Security, trust and confidence can certainly be considered as the most important parts of the Information Society. Being protected when working, learning, shopping or doing any kind of e-commerce is of great value to citizens, students, business people, employees and employers. Commercial companies and their clients want to do business over the Internet in a secure way; business managers when having meetings by videoconferencing tools require the exchanged information to be protected; the publishing industry is concerned with the protection of copyright; hospital patients have a right to...
Security, trust and confidence can certainly be considered as the most important parts of the Information Society. Being protected when working, learn...
cena: 402,53

 Artificial Intelligence and Security in Computing Systems: 9th International Conference, Acs '2002 Międzyzdroje, Poland October 23-25, 2002 Proce Soldek, Jerzy 9781402073960 Kluwer Academic Publishers
Artificial Intelligence and Security in Computing Systems: 9th International Conference, Acs '2002 Międzyzdroje, Poland October 23-25, 2002 Proce

ISBN: 9781402073960 / Angielski / Twarda / 302 str.

ISBN: 9781402073960/Angielski/Twarda/302 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jerzy Soldek; Leszek Drobiazgiewicz; Jerzy Soldek
Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies:

-Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments.
-Multiagent Systems include laboratory research on multiagent intelligent systems as well as upon their applications in transportation and information systems.
-Computer Security and Safety...

Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice an...
cena: 603,81

 Intrusion Detection in Distributed Systems: An Abstraction-Based Approach Peng Ning 9781402076244 Springer
Intrusion Detection in Distributed Systems: An Abstraction-Based Approach

ISBN: 9781402076244 / Angielski / Twarda / 136 str.

ISBN: 9781402076244/Angielski/Twarda/136 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peng Ning; Ning Peng Ning; Xiaoyang Sean Wang
Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.
Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect...
cena: 201,24

 Synchronizing E-Security Godfried Williams 9781402076466 Kluwer Academic Publishers
Synchronizing E-Security

ISBN: 9781402076466 / Angielski / Twarda / 96 str.

ISBN: 9781402076466/Angielski/Twarda/96 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Godfried Williams
Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies. This book presents insights into the validity and credibility of current risk assessment methods that support electronic transactions in the global economy. Synchronizing E-Security focuses on a number of case studies of IT companies, within selected countries in West Africa, Europe, Asia and the United States. The foundation of this work is based on...
Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electro...
cena: 402,53

 Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems Jerzy Pejas Andrzej Piegat 9781402077760 Springer
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems

ISBN: 9781402077760 / Angielski / Twarda / 396 str.

ISBN: 9781402077760/Angielski/Twarda/396 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jerzy Pejas; Andrzej Piegat

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research.

"Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions analyzing such areas of AI as fuzzy set theory, predicate logic, neural networks, clustering, data mining and others. It also presents applications of AI as possible solutions for problems like firm bankruptcy, soil erosion, flight control and others.

...

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading E...

cena: 805,10

 The Information Security Dictionary: Defining the Terms That Define Security for E-Business, Internet, Information and Wireless Technology Urs E. Gattiker 9781402078897 Kluwer Academic Publishers
The Information Security Dictionary: Defining the Terms That Define Security for E-Business, Internet, Information and Wireless Technology

ISBN: 9781402078897 / Angielski / Twarda / 411 str.

ISBN: 9781402078897/Angielski/Twarda/411 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Urs E. Gattiker
Something for Everyone If this book is to succeed and help readers, its cardinal virtue must be to provide a simple reference text. It should be an essential addition to an information security library. As such it should also serve the purpose of being a quick refresher for terms the reader has not seen since the days when one attended a computing science program, information security course or workshop. As a reference work, THE INFORMATION SECURITY DICTIONARY provides a relatively complete and easy-to-read explanation of common se- rity, malware, vulnerability and infrastructure protection...
Something for Everyone If this book is to succeed and help readers, its cardinal virtue must be to provide a simple reference text. It should be an es...
cena: 618,61

 Data-Driven Block Ciphers for Fast Telecommunication Systems Nikolai Moldovyan Alexander A. Moldovyan Nick Moldovyan 9781420054118 Auerbach Publications
Data-Driven Block Ciphers for Fast Telecommunication Systems

ISBN: 9781420054118 / Angielski / Twarda / 208 str.

ISBN: 9781420054118/Angielski/Twarda/208 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nikolai Moldovyan; Alexander A. Moldovyan; Nick Moldovyan
The Most Progressive and Complete Guide to DDO-Based Ciphers

Developers have long recognized that ciphers based on Permutation Networks (PNs) and Controlled Substitution-Permutation Networks (CSPNs) allow for the implementation of a variety of Data Driven Operations (DDOs). These DDOs can provide fast encryption without incurring excessive hardware costs in modern telecommunication networks. However, until now, with a few exceptions, most DDO-based ciphers have been poorly represented in available literature and have continued to remain known to only a small number of encryption experts....

The Most Progressive and Complete Guide to DDO-Based Ciphers

Developers have long recognized that ciphers based on Permutation Networks (PNs) and C...

cena: 636,71

 Handbook of Financial Cryptography and Security Burton Rosenberg 9781420059816 Chapman & Hall/CRC
Handbook of Financial Cryptography and Security

ISBN: 9781420059816 / Angielski / Twarda / 631 str.

ISBN: 9781420059816/Angielski/Twarda/631 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Burton Rosenberg

The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic techniques to auctions, electronic voting, micropayment systems, digital rights, financial portfolios, routing networks, and more.

In the first part, the book examines blind signatures and other important cryptographic techniques with respect to digital cash/e-cash. It also looks at the role of cryptography in auctions and...

The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to es...

cena: 710,17

 Cryptography in C and C++ Michael Welschenbach David Kramer 9781590595022 Apress
Cryptography in C and C++

ISBN: 9781590595022 / Angielski / Twarda / 504 str.

ISBN: 9781590595022/Angielski/Twarda/504 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Welschenbach; David Kramer
CRYPTOGRAPHY IS AN ANCIENT ART, well over two thousand years old. The need to keep certain information secret has always existed, and attempts to preserve secrets have therefore existed as well. But it is only in the last thirty years that cryptography has developed into a science that has offered us needed security in our daily lives. Whether we are talking about automated teller machines, cellular telephones, Internet commerce, or computerized ignition locks on automobiles, there is cryptography hidden within. And what is more, none of these applications would work without cryptography The...
CRYPTOGRAPHY IS AN ANCIENT ART, well over two thousand years old. The need to keep certain information secret has always existed, and attempts to pres...
cena: 402,53

 An Information Security Handbook John M. D. Hunter 9781852331801 Springer
An Information Security Handbook

ISBN: 9781852331801 / Angielski / Miękka / 226 str.

ISBN: 9781852331801/Angielski/Miękka/226 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John M. D. Hunter
Aimed primarily at final year undergraduate courses and MSc courses on Information Systems, Management of Information Systems and Design of Information Systems, this textbook aims to provide answers to five questions;
What is security? What are the security problems particular to an IT system? What can be done to reduce the security risks associated with such a system? In a given situation, what are the appropriate security countermeasures? How should one set about procuring an information system with security implications?
It looks at the different goals organisations might have in...
Aimed primarily at final year undergraduate courses and MSc courses on Information Systems, Management of Information Systems and Design of Informatio...
cena: 201,24

 Information and Communications Security: 4th International Conference, Icics 2002, Singapore, December 9-12, 2002, Proceedings Deng, Robert H. 9783540001645 Springer
Information and Communications Security: 4th International Conference, Icics 2002, Singapore, December 9-12, 2002, Proceedings

ISBN: 9783540001645 / Angielski / Miękka / 500 str.

ISBN: 9783540001645/Angielski/Miękka/500 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
R. Deng; S. Qing; F. Bao
This volume contains the proceedings of the 4th International Conference on - formation and Communications Security (ICICS2002). The three previous c- ferenceswereheldinBeijing(ICICS97), Sydney(ICICS99)andXian(ICICS01), where we had an enthusiastic and well-attended event. ICICS2002 is sponsored and organized by the Laboratories for Information Technology, Singapore, in co-operation with the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences and the International C- munications and Information Security Association (ICISA). During the past ?ve...
This volume contains the proceedings of the 4th International Conference on - formation and Communications Security (ICICS2002). The three previous c-...
cena: 201,24

 Advances in Cryptology - Asiacrypt 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown Zheng, Yuliang 9783540001713 Springer
Advances in Cryptology - Asiacrypt 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown

ISBN: 9783540001713 / Angielski / Miękka / 582 str.

ISBN: 9783540001713/Angielski/Miękka/582 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yuliang Zheng; Y. Zheng

This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002.
The 34 revised full papers presented together with two invited contributions were carefully reviewed and selected from 173 submissions on the basis of 875 review reports. The papers are organized in topical sections on public key cryptography, authentication, theory, block ciphers, distributed cryptography, cryptanalysis, public key cryptanalysis, secret sharing, digital signatures,...

This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Secu...

cena: 201,24

 Progress in Cryptology - Indocrypt 2002: Third International Conference on Cryptology in India Hyderabad, India, December 16-18, 2002 Menezes, Alfred 9783540002635 Springer
Progress in Cryptology - Indocrypt 2002: Third International Conference on Cryptology in India Hyderabad, India, December 16-18, 2002

ISBN: 9783540002635 / Angielski / Miękka / 444 str.

ISBN: 9783540002635/Angielski/Miękka/444 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
A. Menezes; P. Sarkar
The third successful completion of the INDOCRYPT conference series marks the acceptance of the series by the international research community as a forum for presenting high-quality research.It also marks the coming of age of cryptology research in India. The authors for the submitted papers were spread across 21 countries and 4 continents, which goes a long way to demonstrate the international interest and visibility of INDOCRYPT.In the previous two conferences, the submissions from India originated from only two institutes; this increased to six for the 2002 conference.Thus INDOCRYPT is well...
The third successful completion of the INDOCRYPT conference series marks the acceptance of the series by the international research community as a for...
cena: 201,24

 Cryptographic Hardware and Embedded Systems - Ches 2002: 4th International Workshop, Redwood Shores, Ca, Usa, August 13-15, 2002, Revised Papers Kaliski, Burton S. Jr. 9783540004097 Springer
Cryptographic Hardware and Embedded Systems - Ches 2002: 4th International Workshop, Redwood Shores, Ca, Usa, August 13-15, 2002, Revised Papers

ISBN: 9783540004097 / Angielski / Miękka / 618 str.

ISBN: 9783540004097/Angielski/Miękka/618 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Martin R. Prince; Burton S. Kaliski; C. K. Koc
ThesearetheproceedingsofCHES2002, theFourthWorkshoponCryptographic Hardware and Embedded Systems. After the ?rst two CHES Workshops held in Massachusetts, and the third held in Europe, this is the ?rst Workshop on the West Coast of the United States. There was a record number of submissions this year and in response the technical program was extended to 3 days. As is evident by the papers in these proceedings, there have been again many excellent submissions. Selecting the papers for this year's CHES was not an easy task, and we regret that we could not accept many contributions due to the...
ThesearetheproceedingsofCHES2002, theFourthWorkshoponCryptographic Hardware and Embedded Systems. After the ?rst two CHES Workshops held in Massachuse...
cena: 201,24

 Information Hiding: 5th International Workshop, Ih 2002, Noordwijkerhout, the Netherlands, October 7-9, 2002, Revised Papers Petitcolas, Fabien A. P. 9783540004219 Springer
Information Hiding: 5th International Workshop, Ih 2002, Noordwijkerhout, the Netherlands, October 7-9, 2002, Revised Papers

ISBN: 9783540004219 / Angielski / Miękka / 430 str.

ISBN: 9783540004219/Angielski/Miękka/430 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Karl A. P. Vind; Fabien A. P. Petitcolas; F. A. P. Ed Petitcolas
These post-proceedings contain 27 papers that were accepted for presentation at the Fifth International Workshop on Information Hiding, held 7-9 October 2002, in Noordwijkerhout, The Netherlands. The papers were selected from 78 submissions on the basis of their scienti?c excellence and novelty by the program committee. We tried to have a balanced program covering several aspects of information hiding. The program committee was composed of Ross J. Anderson (Univ- sity of Cambridge, UK), Jan Camenisch (IBM Zurich Research Laboratory, Switzerland), Ingemar J. Cox (NEC Research Institute, USA),...
These post-proceedings contain 27 papers that were accepted for presentation at the Fifth International Workshop on Information Hiding, held 7-9 Octob...
cena: 201,24

Pierwsza Podprzednia  4  5  6  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia