• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949524]
• Literatura piękna
 [1817948]

  więcej...
• Turystyka
 [70715]
• Informatyka
 [151291]
• Komiksy
 [35671]
• Encyklopedie
 [23176]
• Dziecięca
 [612440]
• Hobby
 [136066]
• AudioBooki
 [1740]
• Literatura faktu
 [226030]
• Muzyka CD
 [378]
• Słowniki
 [2918]
• Inne
 [445441]
• Kalendarze
 [1181]
• Podręczniki
 [166545]
• Poradniki
 [469898]
• Religia
 [508035]
• Czasopisma
 [502]
• Sport
 [61392]
• Sztuka
 [242759]
• CD, DVD, Video
 [3348]
• Technologie
 [219537]
• Zdrowie
 [98738]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3543]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2785

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Security and Trust in Online Social Networks Barbara Carminati Elena Ferrari Marco Viviani 9783031012112 Springer International Publishing AG
Security and Trust in Online Social Networks

ISBN: 9783031012112 / Angielski / Miękka / 110 str.

ISBN: 9783031012112/Angielski/Miękka/110 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Barbara Carminati;Elena Ferrari;Marco Viviani
The enormous success and diffusion that online social networks (OSNs) are encountering nowadays is vastly apparent. Users' social interactions now occur using online social media as communication channels; personal information and activities are easily exchanged both for recreational and business purposes in order to obtain social or economic advantages. In this scenario, OSNs are considered critical applications with respect to the security of users and their resources, for their characteristics alone: the large amount of personal information they manage, big economic upturn connected to...
The enormous success and diffusion that online social networks (OSNs) are encountering nowadays is vastly apparent. Users' social interactions now occ...
cena: 132,80

 Enhancing Information Security and Privacy by Combining Biometrics with Cryptography Sanjay Kanade Dijana Petrovska-Delacretaz Bernadette Dorizzi 9783031012075 Springer International Publishing AG
Enhancing Information Security and Privacy by Combining Biometrics with Cryptography

ISBN: 9783031012075 / Angielski / Miękka / 144 str.

ISBN: 9783031012075/Angielski/Miękka/144 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sanjay Kanade;Dijana Petrovska-Delacretaz;Bernadette Dorizzi
This book deals with "crypto-biometrics", a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages, such as, revocability, template diversity, better verification accuracy, and generation of cryptographically usable keys that are strongly linked to the user identity. In this text, a thorough review of the subject is provided and then some of the main categories are illustrated with recently proposed systems by the authors. Beginning with the basics, this text deals with various aspects of crypto-biometrics,...
This book deals with "crypto-biometrics", a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptog...
cena: 132,80

 Differential Privacy: From Theory to Practice Ninghui Li Min Lyu Dong Su 9783031012228 Springer International Publishing AG
Differential Privacy: From Theory to Practice

ISBN: 9783031012228 / Angielski / Miękka / 140 str.

ISBN: 9783031012228/Angielski/Miękka/140 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ninghui Li;Min Lyu;Dong Su
Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion for research in privacy-preserving data analysis and publishing. The DP notion offers strong privacy guarantee and has been applied to many data analysis tasks. This Synthesis Lecture is the first of two volumes on differential privacy. This lecture differs from the existing books and surveys on differential privacy in that we take an approach balancing theory and practice. We focus on empirical accuracy performances of algorithms rather than asymptotic accuracy guarantees. At the same time,...
Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion for research in privacy-preserving data analysis a...
cena: 261,63

 Mobile Platform Security N. Asokan Lucas Davi Alexandra Dmitrienko 9783031012136 Springer International Publishing AG
Mobile Platform Security

ISBN: 9783031012136 / Angielski / Miękka / 112 str.

ISBN: 9783031012136/Angielski/Miękka/112 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
N. Asokan;Lucas Davi;Alexandra Dmitrienko
Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model...
Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The cur...
cena: 132,80

 Introduction to Secure Outsourcing Computation Xiaofeng Chen   9783031012204 Springer International Publishing AG
Introduction to Secure Outsourcing Computation

ISBN: 9783031012204 / Angielski / Miękka / 79 str.

ISBN: 9783031012204/Angielski/Miękka/79 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xiaofeng Chen
With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as the outsourcing computation paradigm. Recently, the problem for securely outsourcing various expensive computations or storage has attracted considerable attention in the academic community. In this book, we focus on the latest technologies and applications of secure outsourcing computations. Specially, we introduce the state-of-the-art research for...
With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can...
cena: 132,80

 Automated Software Diversity Per Larsen Stefan Brunthaler Lucas Davi 9783031012181 Springer International Publishing AG
Automated Software Diversity

ISBN: 9783031012181 / Angielski / Miękka / 92 str.

ISBN: 9783031012181/Angielski/Miękka/92 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Per Larsen;Stefan Brunthaler;Lucas Davi
Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value flexibility and performance over convenience and safety. Programming errors in low-level code are often exploitable and can, in the worst case, give adversaries unfettered access to the compromised host system. This book provides an introduction to and overview of automatic software diversity techniques that, in one way or another, use randomization...
Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that u...
cena: 112,68

 Privacy Risk Analysis Daniel Le Metayer 9783031012211 Springer International Publishing AG
Privacy Risk Analysis

ISBN: 9783031012211 / Angielski / Miękka / 117 str.

ISBN: 9783031012211/Angielski/Miękka/117 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Daniel Le Metayer
Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis. The deployment of new information technologies can lead to significant privacy risks and a privacy impact assessment should be conducted before designing a product or system that processes personal data. However, if existing privacy impact assessment frameworks and guidelines provide a good deal of details on organizational aspects (including budget allocation, resource allocation, stakeholder consultation,...
Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conduc...
cena: 160,99

 Private Information Retrieval Elisa Bertino 9783031012099 Springer International Publishing AG
Private Information Retrieval

ISBN: 9783031012099 / Angielski / Miękka / 116 str.

ISBN: 9783031012099/Angielski/Miękka/116 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Elisa Bertino
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based service provider about the nearest car park without revealing his location to the server. The first PIR approach was introduced by Chor, Goldreich, Kushilevitz and Sudan in 1995 in a multi-server setting, where the user...
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database...
cena: 132,80

 Usable Security: History, Themes, and Challenges Simson Garfinkel Heather Richter Lipford  9783031012150 Springer International Publishing AG
Usable Security: History, Themes, and Challenges

ISBN: 9783031012150 / Angielski / Miękka / 150 str.

ISBN: 9783031012150/Angielski/Miękka/150 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Simson Garfinkel;Heather Richter Lipford
There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.'' Although usability and security were once thought to be inherently antagonistic, today there is wide consensus that systems that are not usable will inevitably suffer security failures when they are deployed into the real world. Only by simultaneously addressing both usability and security concerns will we be able to build systems that are truly secure. This book presents the historical context of the work to...
There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquia...
cena: 132,80

 Advances in Cryptology - Eurocrypt 2022: 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, N Dunkelman, Orr 9783031069437 Springer International Publishing
Advances in Cryptology - Eurocrypt 2022: 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, N

ISBN: 9783031069437 / Angielski / Miękka

ISBN: 9783031069437/Angielski/Miękka

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May – 3 June, 2022.



The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows:



Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation;



Part II: Cryptographic Protocols; Cryptographic...

The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and App...

cena: 483,04

 Advances in Cryptology - Eurocrypt 2022: 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, N Dunkelman, Orr 9783031070815 Springer International Publishing
Advances in Cryptology - Eurocrypt 2022: 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, N

ISBN: 9783031070815 / Angielski / Miękka

ISBN: 9783031070815/Angielski/Miękka

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May – 3 June, 2022.



The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows:



Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation;



Part II: Cryptographic Protocols; Cryptographic...

The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and App...

cena: 644,07

 Advances in Cryptology - Eurocrypt 2022: 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, N Dunkelman, Orr 9783031070846 Springer International Publishing
Advances in Cryptology - Eurocrypt 2022: 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, N

ISBN: 9783031070846 / Angielski / Miękka

ISBN: 9783031070846/Angielski/Miękka

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May – 3 June, 2022.



The 85 full papers included in these proceedings were accepted from a total of 372 submissions. They were organized in topical sections as follows:



Part I: Best Paper Award; Secure Multiparty Computation; Homomorphic Encryption; Obfuscation;



Part II: Cryptographic Protocols; Cryptographic...

The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and App...

cena: 644,07

 Advances in Artificial Intelligence and Security: 8th International Conference on Artificial Intelligence and Security, Icais 2022, Qinghai, China, Ju Sun, Xingming 9783031067631 Springer International Publishing AG
Advances in Artificial Intelligence and Security: 8th International Conference on Artificial Intelligence and Security, Icais 2022, Qinghai, China, Ju

ISBN: 9783031067631 / Angielski / Miękka / 756 str.

ISBN: 9783031067631/Angielski/Miękka/756 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xingming Sun;Xiaorui Zhang;Zhihua Xia
The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 115 full papers and 53 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1124 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security; multimedia forensics; Part III: encryption and...
The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on Artificial Intelligenc...
cena: 523,30

 Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography: Efficient Modular Exponential Techniques Vollala, Satyanarayana 9783030745264 Springer International Publishing
Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography: Efficient Modular Exponential Techniques

ISBN: 9783030745264 / Angielski / Miękka

ISBN: 9783030745264/Angielski/Miękka

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Satyanarayana Vollala;N. Ramasubramanian;Utkarsh Tiwari
Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly depends on the efficient implementation of modular exponentiation and modular multiplication. Since 1984, when Montgomery first introduced a method to evaluate modular multiplications, many algorithmic modifications have been done for improving the efficiency of modular multiplication, but very...
Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann k...
cena: 684,33

 ICT Systems Security and Privacy Protection: 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021, Proceedings Jøsang, Audun 9783030781224 Springer International Publishing
ICT Systems Security and Privacy Protection: 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021, Proceedings

ISBN: 9783030781224 / Angielski / Miękka

ISBN: 9783030781224/Angielski/Miękka

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.*

The 28 full papers presented were carefully reviewed and selected from 112 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on digital signatures; vulnerability management; covert channels and cryptography; application and system security; privacy; network security; machine...

This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 202...
cena: 563,56

 Applied Cryptography and Network Security: 20th International Conference, Acns 2022, Rome, Italy, June 20-23, 2022, Proceedings Ateniese, Giuseppe 9783031092336 Springer International Publishing
Applied Cryptography and Network Security: 20th International Conference, Acns 2022, Rome, Italy, June 20-23, 2022, Proceedings

ISBN: 9783031092336 / Angielski / Miękka

ISBN: 9783031092336/Angielski/Miękka

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which will take place in a hybrid mode in Rome, Italy in June 2022.

 



The 44 full papers together with 5 short papers presented in this proceeding were carefully reviewed and selected from a total of 174 submissions. They were organized in topical sections as follows: Encryption, Attacks, Cryptographic Protocols, System Security., Cryptographic Primitives, MPC, Blockchain, Block-Cyphers, and Post-Quantum Cryptography.

The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which ...
cena: 523,30

 The Personal Finance Guide for Tech Professionals: Building, Protecting, and Transferring Your Wealth Taulli, Tom 9781484282410 APress
The Personal Finance Guide for Tech Professionals: Building, Protecting, and Transferring Your Wealth

ISBN: 9781484282410 / Angielski / Miękka / 239 str.

ISBN: 9781484282410/Angielski/Miękka/239 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tom Taulli
cena: 211,90

 Crypto Basics: A Nontechnical Introduction to Creating Your Own Money for Investors and Inventors Gomzin, Slava 9781484283202 APress
Crypto Basics: A Nontechnical Introduction to Creating Your Own Money for Investors and Inventors

ISBN: 9781484283202 / Angielski / Miękka

ISBN: 9781484283202/Angielski/Miękka

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Slava Gomzin
cena: 127,12

 IAPP CIPM Certified Information Privacy Manager Study Guide Joe Shelley 9781394153800 John Wiley & Sons Inc
IAPP CIPM Certified Information Privacy Manager Study Guide

ISBN: 9781394153800 / Angielski / Miękka / 320 str.

ISBN: 9781394153800/Angielski/Miękka/320 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joe Shelley
cena: 244,89

 Side-Channel Analysis of Embedded Systems: An Efficient Algorithmic Approach Ouladj, Maamar 9783030772246 Springer International Publishing
Side-Channel Analysis of Embedded Systems: An Efficient Algorithmic Approach

ISBN: 9783030772246 / Angielski / Miękka

ISBN: 9783030772246/Angielski/Miękka

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Maamar Ouladj;Sylvain Guilley
It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis. This book tackles the analysis part, especially under situations where the targeted device is protected by random masking. The authors explain advances in the field and provide the reader with mathematical formalizations. They present all known analyses within the same notation framework, which allows the reader to rapidly understand and learn contrasting...
It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they...
cena: 201,24

Pierwsza Podprzednia  61  62  63  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia