• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946350]
• Literatura piękna
 [1816154]

  więcej...
• Turystyka
 [70666]
• Informatyka
 [151172]
• Komiksy
 [35576]
• Encyklopedie
 [23172]
• Dziecięca
 [611458]
• Hobby
 [135995]
• AudioBooki
 [1726]
• Literatura faktu
 [225763]
• Muzyka CD
 [378]
• Słowniki
 [2917]
• Inne
 [444280]
• Kalendarze
 [1179]
• Podręczniki
 [166508]
• Poradniki
 [469467]
• Religia
 [507199]
• Czasopisma
 [496]
• Sport
 [61352]
• Sztuka
 [242330]
• CD, DVD, Video
 [3348]
• Technologie
 [219391]
• Zdrowie
 [98638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3525]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2785

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 
Kali linux: learn now how kali linux works, how hacking with kali linux with this step by step guide for beginners and which tools

ISBN: 9781702667241 / Angielski / Miękka / 162 str.

ISBN: 9781702667241/Angielski/Miękka/162 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Adam Harris
cena: 70,32

 Network and System Security: 13th International Conference, Nss 2019, Sapporo, Japan, December 15-18, 2019, Proceedings Liu, Joseph K. 9783030369378 Springer
Network and System Security: 13th International Conference, Nss 2019, Sapporo, Japan, December 15-18, 2019, Proceedings

ISBN: 9783030369378 / Angielski / Miękka / 731 str.

ISBN: 9783030369378/Angielski/Miękka/731 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joseph K. Liu; Xinyi Huang
cena: 201,24

 The Design of Rijndael: The Advanced Encryption Standard (Aes) Daemen, Joan 9783662607688 Springer
The Design of Rijndael: The Advanced Encryption Standard (Aes)

ISBN: 9783662607688 / Angielski / Twarda / 282 str.

ISBN: 9783662607688/Angielski/Twarda/282 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joan Daemen; Vincent Rijmen
cena: 644,07

 Machine Learning Approaches in Cyber Security Analytics Tony Thomas Athira P Sabu Emmanuel 9789811517051 Springer
Machine Learning Approaches in Cyber Security Analytics

ISBN: 9789811517051 / Angielski / Twarda / 209 str.

ISBN: 9789811517051/Angielski/Twarda/209 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tony Thomas; Athira P. Vijayaraghavan; Sabu Emmanuel
cena: 603,81

 Puzzles on Cypercrime and God's Mathematics John Ting 9781705951354 Independently Published
Puzzles on Cypercrime and God's Mathematics

ISBN: 9781705951354 / Angielski / Miękka / 42 str.

ISBN: 9781705951354/Angielski/Miękka/42 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John Ting
cena: 51,19

 Boolean Functions for Cryptography and Coding Theory Claude Carlet 9781108473804 Cambridge University Press
Boolean Functions for Cryptography and Coding Theory

ISBN: 9781108473804 / Angielski / Twarda / 574 str.

ISBN: 9781108473804/Angielski/Twarda/574 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Claude Carlet
cena: 354,30

 Information Security Applications: 20th International Conference, Wisa 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers You, Ilsun 9783030393021 Springer
Information Security Applications: 20th International Conference, Wisa 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers

ISBN: 9783030393021 / Angielski / Miękka / 384 str.

ISBN: 9783030393021/Angielski/Miękka/384 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ilsun You
cena: 201,24

 Kali Linux: Simple and Effective Approach to Learn Kali Linux Ethan Thorpe 9781675520512 Independently Published
Kali Linux: Simple and Effective Approach to Learn Kali Linux

ISBN: 9781675520512 / Angielski / Miękka / 164 str.

ISBN: 9781675520512/Angielski/Miękka/164 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ethan Thorpe
cena: 80,88

 Computer Hacking: The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners Tim Warren 9781761030956 Ingram Publishing
Computer Hacking: The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners

ISBN: 9781761030956 / Angielski / Miękka / 46 str.

ISBN: 9781761030956/Angielski/Miękka/46 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tim Warren
cena: 57,76

 Cryptography: Breakthroughs in Research and Practice Information Reso Managemen 9781799817635 Information Science Reference
Cryptography: Breakthroughs in Research and Practice

ISBN: 9781799817635 / Angielski / Twarda / 525 str.

ISBN: 9781799817635/Angielski/Twarda/525 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Information Reso Management Association
cena: 2075,69

 Implementing Computational Intelligence Techniques for Security Systems Design Yousif Abdullatif Albastaki Wasan Awad  9781799824183 Business Science Reference
Implementing Computational Intelligence Techniques for Security Systems Design

ISBN: 9781799824183 / Angielski / Twarda / 270 str.

ISBN: 9781799824183/Angielski/Twarda/270 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yousif Abdullatif Albastaki;Wasan Awad
Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms that take advantage of approaches based on computational intelligence techniques, such as genetic algorithms, genetic programming, and so on, have been proposed to solve these issues. Implementing Computational Intelligence Techniques for Security Systems Design is an essential research book that explores the application of computational intelligence and other advanced techniques in information security, which will contribute to a better...
Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms tha...
cena: 1051,72

 Impact of Digital Transformation on Security Policies and Standards Gunasekaran Manogaran, Bharath Bhushan, Sam Goundar 9781799823674 Eurospan (JL)
Impact of Digital Transformation on Security Policies and Standards

ISBN: 9781799823674 / Angielski / Twarda / 300 str.

ISBN: 9781799823674/Angielski/Twarda/300 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gunasekaran Manogaran;Bharath Bhushan;Sam Goundar
cena: 1159,99

 Handbook of Research on Intrusion Detection Systems Brij B. Gupta Srivathsan Srinivasagopalan  9781799822424 Business Science Reference
Handbook of Research on Intrusion Detection Systems

ISBN: 9781799822424 / Angielski / Twarda / 400 str.

ISBN: 9781799822424/Angielski/Twarda/400 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Brij B. Gupta;Srivathsan Srinivasagopalan
Businesses in today's world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects...
Businesses in today's world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. Howev...
cena: 1433,23

 Topics in Cryptology - Ct-Rsa 2020: The Cryptographers' Track at the Rsa Conference 2020, San Francisco, Ca, Usa, February 24-28, 2020, Proceedings Jarecki, Stanislaw 9783030401856 Springer
Topics in Cryptology - Ct-Rsa 2020: The Cryptographers' Track at the Rsa Conference 2020, San Francisco, Ca, Usa, February 24-28, 2020, Proceedings

ISBN: 9783030401856 / Angielski / Miękka / 694 str.

ISBN: 9783030401856/Angielski/Miękka/694 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stanislaw Jarecki
cena: 201,24

 Cybersecurity: A Self-Teaching Introduction C. P. Gupta K. K. Goyal 9781683924982 Mercury Learning & Information
Cybersecurity: A Self-Teaching Introduction

ISBN: 9781683924982 / Angielski / Miękka / 200 str.

ISBN: 9781683924982/Angielski/Miękka/200 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
C. P. Gupta; K. K. Goyal
cena: 184,93

 Quantum Cryptography and the Future of Cyber Security Nirbhay Kumar Chaubey Bhavesh B. Prajapati  9781799822547 Business Science Reference
Quantum Cryptography and the Future of Cyber Security

ISBN: 9781799822547 / Angielski / Miękka / 380 str.

ISBN: 9781799822547/Angielski/Miękka/380 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nirbhay Kumar Chaubey;Bhavesh B. Prajapati
The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more robust security options. Quantum cryptography is sound, and its practical implementations are becoming more mature. Many applications can use quantum cryptography as a backbone, including key distribution, secure direct communications, large prime factorization, e-commerce, e-governance, quantum internet, and more. For this reason, quantum cryptography is gaining interest and importance among computer and security professionals. Quantum...
The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more...
cena: 1020,79

 Quantum Cryptography and the Future of Cyber Security Nirbhay Kumar Chaubey Bhavesh B. Prajapati  9781799822530 Business Science Reference
Quantum Cryptography and the Future of Cyber Security

ISBN: 9781799822530 / Angielski / Twarda / 320 str.

ISBN: 9781799822530/Angielski/Twarda/320 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nirbhay Kumar Chaubey;Bhavesh B. Prajapati
The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more robust security options. Quantum cryptography is sound, and its practical implementations are becoming more mature. Many applications can use quantum cryptography as a backbone, including key distribution, secure direct communications, large prime factorization, e-commerce, e-governance, quantum internet, and more. For this reason, quantum cryptography is gaining interest and importance among computer and security professionals. Quantum...
The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more...
cena: 1268,25

 Applied Approach to Privacy and Security for the Internet of Things Parag Chatterjee Emmanuel Benoist Asoke Nath 9781799824459 Business Science Reference
Applied Approach to Privacy and Security for the Internet of Things

ISBN: 9781799824459 / Angielski / Miękka / 320 str.

ISBN: 9781799824459/Angielski/Miękka/320 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Parag Chatterjee;Emmanuel Benoist;Asoke Nath
From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities. ...
From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly suscepti...
cena: 1020,79

 Applied Approach to Privacy and Security for the Internet of Things Parag Chatterjee Emmanuel Benoist Asoke Nath 9781799824442 Business Science Reference
Applied Approach to Privacy and Security for the Internet of Things

ISBN: 9781799824442 / Angielski / Twarda / 315 str.

ISBN: 9781799824442/Angielski/Twarda/315 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Parag Chatterjee;Emmanuel Benoist;Asoke Nath
From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities. ...
From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly suscepti...
cena: 1330,12

 Computer Security: Esorics 2019 International Workshops, Cybericps, Secpre, Spose, and Adiot, Luxembourg City, Luxembourg, September 26-2 Katsikas, Sokratis 9783030420475 Springer
Computer Security: Esorics 2019 International Workshops, Cybericps, Secpre, Spose, and Adiot, Luxembourg City, Luxembourg, September 26-2

ISBN: 9783030420475 / Angielski / Miękka / 440 str.

ISBN: 9783030420475/Angielski/Miękka/440 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sokratis Katsikas; Frederic Cuppens; Nora Cuppens
cena: 201,24

Pierwsza Podprzednia  52  53  54  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia