![]() |
Kali linux: learn now how kali linux works, how hacking with kali linux with this step by step guide for beginners and which tools
ISBN: 9781702667241 / Angielski / Miękka / 162 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
70,32 |
![]() |
Network and System Security: 13th International Conference, Nss 2019, Sapporo, Japan, December 15-18, 2019, Proceedings
ISBN: 9783030369378 / Angielski / Miękka / 731 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
201,24 |
![]() |
The Design of Rijndael: The Advanced Encryption Standard (Aes)
ISBN: 9783662607688 / Angielski / Twarda / 282 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
644,07 |
![]() |
Machine Learning Approaches in Cyber Security Analytics
ISBN: 9789811517051 / Angielski / Twarda / 209 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
603,81 |
![]() |
Puzzles on Cypercrime and God's Mathematics
ISBN: 9781705951354 / Angielski / Miękka / 42 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
51,19 |
![]() |
Boolean Functions for Cryptography and Coding Theory
ISBN: 9781108473804 / Angielski / Twarda / 574 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
354,30 |
![]() |
Information Security Applications: 20th International Conference, Wisa 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers
ISBN: 9783030393021 / Angielski / Miękka / 384 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
201,24 |
![]() |
Kali Linux: Simple and Effective Approach to Learn Kali Linux
ISBN: 9781675520512 / Angielski / Miękka / 164 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
80,88 |
![]() |
Computer Hacking: The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners
ISBN: 9781761030956 / Angielski / Miękka / 46 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
57,76 |
![]() |
Cryptography: Breakthroughs in Research and Practice
ISBN: 9781799817635 / Angielski / Twarda / 525 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
2075,69 |
![]() |
Implementing Computational Intelligence Techniques for Security Systems Design
ISBN: 9781799824183 / Angielski / Twarda / 270 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms that take advantage of approaches based on computational intelligence techniques, such as genetic algorithms, genetic programming, and so on, have been proposed to solve these issues. Implementing Computational Intelligence Techniques for Security Systems Design is an essential research book that explores the application of computational intelligence and other advanced techniques in information security, which will contribute to a better...
Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms tha...
|
cena:
1051,72 |
![]() |
Impact of Digital Transformation on Security Policies and Standards
ISBN: 9781799823674 / Angielski / Twarda / 300 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
1159,99 |
![]() |
Handbook of Research on Intrusion Detection Systems
ISBN: 9781799822424 / Angielski / Twarda / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Businesses in today's world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects...
Businesses in today's world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. Howev...
|
cena:
1433,23 |
![]() |
Topics in Cryptology - Ct-Rsa 2020: The Cryptographers' Track at the Rsa Conference 2020, San Francisco, Ca, Usa, February 24-28, 2020, Proceedings
ISBN: 9783030401856 / Angielski / Miękka / 694 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
201,24 |
![]() |
Cybersecurity: A Self-Teaching Introduction
ISBN: 9781683924982 / Angielski / Miękka / 200 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
184,93 |
![]() |
Quantum Cryptography and the Future of Cyber Security
ISBN: 9781799822547 / Angielski / Miękka / 380 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more robust security options. Quantum cryptography is sound, and its practical implementations are becoming more mature. Many applications can use quantum cryptography as a backbone, including key distribution, secure direct communications, large prime factorization, e-commerce, e-governance, quantum internet, and more. For this reason, quantum cryptography is gaining interest and importance among computer and security professionals. Quantum...
The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more...
|
cena:
1020,79 |
![]() |
Quantum Cryptography and the Future of Cyber Security
ISBN: 9781799822530 / Angielski / Twarda / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more robust security options. Quantum cryptography is sound, and its practical implementations are becoming more mature. Many applications can use quantum cryptography as a backbone, including key distribution, secure direct communications, large prime factorization, e-commerce, e-governance, quantum internet, and more. For this reason, quantum cryptography is gaining interest and importance among computer and security professionals. Quantum...
The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more...
|
cena:
1268,25 |
![]() |
Applied Approach to Privacy and Security for the Internet of Things
ISBN: 9781799824459 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities. ...
From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly suscepti...
|
cena:
1020,79 |
![]() |
Applied Approach to Privacy and Security for the Internet of Things
ISBN: 9781799824442 / Angielski / Twarda / 315 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities. ...
From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly suscepti...
|
cena:
1330,12 |
![]() |
Computer Security: Esorics 2019 International Workshops, Cybericps, Secpre, Spose, and Adiot, Luxembourg City, Luxembourg, September 26-2
ISBN: 9783030420475 / Angielski / Miękka / 440 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
201,24 |