• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949524]
• Literatura piękna
 [1817948]

  więcej...
• Turystyka
 [70715]
• Informatyka
 [151291]
• Komiksy
 [35671]
• Encyklopedie
 [23176]
• Dziecięca
 [612440]
• Hobby
 [136066]
• AudioBooki
 [1740]
• Literatura faktu
 [226030]
• Muzyka CD
 [378]
• Słowniki
 [2918]
• Inne
 [445441]
• Kalendarze
 [1181]
• Podręczniki
 [166545]
• Poradniki
 [469898]
• Religia
 [508035]
• Czasopisma
 [502]
• Sport
 [61392]
• Sztuka
 [242759]
• CD, DVD, Video
 [3348]
• Technologie
 [219537]
• Zdrowie
 [98738]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3543]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2785

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Responsible Graph Neural Networks Nour Moustafa Mohamed Abdel-Basset Mohamed Hawash 9781032359885 CRC Press
Responsible Graph Neural Networks

ISBN: 9781032359885 / Angielski / Miękka / 330 str.

ISBN: 9781032359885/Angielski/Miękka/330 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nour Moustafa; Mohamed Abdel-Basset; Mohamed Hawash
More frequent and complex cyber threats require robust, automated, and rapid responses from cyber-security specialists. This book offers a complete study in the area of graph learning in cyber, emphasizing graph neural networks (GNNs) and their cyber-security applications.

Three parts examine the basics, methods and practices, and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber-security applications. The second part explains three different categories of graph learning, including deterministic,...
More frequent and complex cyber threats require robust, automated, and rapid responses from cyber-security specialists. This book offers a complete st...
cena: 239,94

 Responsible Graph Neural Networks Nour Moustafa Mohamed Abdel-Basset Mohamed Hawash 9781032359892 CRC Press
Responsible Graph Neural Networks

ISBN: 9781032359892 / Angielski / Twarda / 330 str.

ISBN: 9781032359892/Angielski/Twarda/330 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nour Moustafa; Mohamed Abdel-Basset; Mohamed Hawash
More frequent and complex cyber threats require robust, automated, and rapid responses from cyber-security specialists. This book offers a complete study in the area of graph learning in cyber, emphasizing graph neural networks (GNNs) and their cyber-security applications.

Three parts examine the basics, methods and practices, and advanced topics. The first part presents a grounding in graph data structures and graph embedding and gives a taxonomic view of GNNs and cyber-security applications. The second part explains three different categories of graph learning, including deterministic,...
More frequent and complex cyber threats require robust, automated, and rapid responses from cyber-security specialists. This book offers a complete st...
cena: 426,05

 Blockchain, Artificial Intelligence, and the Internet of Things: Possibilities and Opportunities Pethuru Raj Ashutosh Kumar Dubey Abhishek Kumar 9783030776398 Springer
Blockchain, Artificial Intelligence, and the Internet of Things: Possibilities and Opportunities

ISBN: 9783030776398 / Angielski / Miękka / 213 str.

ISBN: 9783030776398/Angielski/Miękka/213 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Pethuru Raj; Ashutosh Kumar Dubey; Abhishek Kumar
This book provides basic concepts and deep knowledge about various security mechanisms that can be implemented in IoT through Blockchain technology. This book aids readers in gaining insight and knowledge about providing security and solutions to different challenges in IoT using Blockchain technology. This book primarily focuses on challenges to addressing the integration of the IoT with Blockchain with respect to potential benefits for IoT. This book gives descriptive analysis of Blockchain integrated with IoT applications and platforms for the development of IoT solutions along with...
This book provides basic concepts and deep knowledge about various security mechanisms that can be implemented in IoT through Blockchain technology. T...
cena: 221,37

 Information Security and Privacy: 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28–30, 2022, Proceedings Khoa Nguyen Guomin Yang Fuchun Guo 9783031223006 Springer
Information Security and Privacy: 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28–30, 2022, Proceedings

ISBN: 9783031223006 / Angielski / Miękka / 530 str.

ISBN: 9783031223006/Angielski/Miękka/530 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Khoa Nguyen; Guomin Yang; Fuchun Guo
This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.The 25 full papers presented were carefully revised and selected from 62 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.
This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongon...
cena: 362,27

 Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II Eike Kiltz Vaikuntanathan Vinod 9783031223648 Springer
Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II

ISBN: 9783031223648 / Angielski / Miękka / 811 str.

ISBN: 9783031223648/Angielski/Miękka/811 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eike Kiltz; Vaikuntanathan Vinod
The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. The total of 60 full papers presented in this three-volume set was carefully reviewed and selected from 139 submissions. They cover topics on post-quantum cryptography; interactive proofs; quantum cryptography; secret-sharing and applications; succinct proofs; identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption;...
The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryp...
cena: 684,33

 Triangle Mesh Watermarking and Steganography Hang Zhou Kejiang Chen Zehua Ma 9789811977190 Springer
Triangle Mesh Watermarking and Steganography

ISBN: 9789811977190 / Angielski / Twarda / 188 str.

ISBN: 9789811977190/Angielski/Twarda/188 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hang Zhou; Kejiang Chen; Zehua Ma
This book provides a systematic overview of watermarking and steganography methods for triangle meshes related to computer graphics and security. The significance of this research has been well recognized by the growing body of work on watermarking, steganography and steganalysis of 3D meshes. With the evolution of the CAD industry and real-world end-user applications such as virtual reality (VR) and 3D printing, 3D meshes have attracted world-wide attention. Besides, the flexible data structure of 3D geometry provides enough space to embed secret information, making it ideal for applications...
This book provides a systematic overview of watermarking and steganography methods for triangle meshes related to computer graphics and security. The ...
cena: 684,33

 Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World Kevin E. Foltz William R. Simpson Institute for Defense Analyses 9780367532963 CRC Press
Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World

ISBN: 9780367532963 / Angielski / Miękka / 314 str.

ISBN: 9780367532963/Angielski/Miękka/314 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kevin E. Foltz; William R. Simpson;Institute for Defense Analyses
Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors’ first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions.
Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors’ first book on Enterprise Level Security (ELS), which...
cena: 216,48

 Cyber Operations: A Case Study Approach Jerry M. (United States Office of the Secretary of Defense (OSD)) Couretas 9781119712091 John Wiley & Sons Inc
Cyber Operations: A Case Study Approach

ISBN: 9781119712091 / Angielski / Twarda / 300 str.

ISBN: 9781119712091/Angielski/Twarda/300 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jerry M. (United States Office of the Secretary of Defense (
cena: 507,82

 Math for Security: From Graphs and Geometry to Spatial Analysis Daniel Reilly 9781718502567 No Starch Press,US
Math for Security: From Graphs and Geometry to Spatial Analysis

ISBN: 9781718502567 / Angielski / Miękka / 256 str.

ISBN: 9781718502567/Angielski/Miękka/256 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Daniel Reilly
Applied Math for Security is one of the first math-based guides specifically geared for information security practitioners. Readers will learn how to use concepts from various fields of mathematics - like graph theory, computational geometry, and statistics - to create and implement ready-to-use security tools. The book is written in a lively, conversational style that engages readers from the get-go. Chapters are enriched with code examples written in Python, and feature hands-on 'proof of concept' projects that involve developing math-based applications to solve real-world problems....
Applied Math for Security is one of the first math-based guides specifically geared for information security practitioners. Readers will learn how to...
cena: 241,50

 Security, Privacy, and Applied Cryptography Engineering: 12th International Conference, SPACE 2022, Jaipur, India, December 9–12, 2022, Proceedings Lejla Batina Stjepan Picek Mainack Mondal 9783031228285 Springer
Security, Privacy, and Applied Cryptography Engineering: 12th International Conference, SPACE 2022, Jaipur, India, December 9–12, 2022, Proceedings

ISBN: 9783031228285 / Angielski / Miękka / 343 str.

ISBN: 9783031228285/Angielski/Miękka/343 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lejla Batina; Stjepan Picek; Mainack Mondal
This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9–12, 2022.The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy.
This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE ...
cena: 301,89

 Progress in Cryptology - Indocrypt 2022: 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings Isobe, Takanori 9783031229114 Springer
Progress in Cryptology - Indocrypt 2022: 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings

ISBN: 9783031229114 / Angielski / Miękka / 722 str.

ISBN: 9783031229114/Angielski/Miękka/722 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bimal Roy
The volume constitutes the proceedings of the 23rd International Conference on Cryptology, INDOCRYPT 2022, which was held during December 11–14, 2022. The conference took place in Kolkata, India.The 31 full papers included in this book were carefully reviewed and selected from 74 submissions. They were organized in topical sections as follows: symmetric key cryptology;protocols and implementation;cryptanalysis;boolean functions;quantum cryptography and cryptanalysis;post quantum cryptography
The volume constitutes the proceedings of the 23rd International Conference on Cryptology, INDOCRYPT 2022, which was held during December 11–14, 202...
cena: 442,79

 Advances in Cryptology – ASIACRYPT 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2022, Proceedings, Part I Shweta Agrawal Dongdai Lin 9783031229626 Springer
Advances in Cryptology – ASIACRYPT 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2022, Proceedings, Part I

ISBN: 9783031229626 / Angielski / Miękka / 811 str.

ISBN: 9783031229626/Angielski/Miękka/811 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shweta Agrawal; Dongdai Lin
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022.The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows:Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and...
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Appl...
cena: 483,04

 Advances in Cryptology – ASIACRYPT 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2022, Proceedings, Part II Shweta Agrawal Dongdai Lin 9783031229657 Springer
Advances in Cryptology – ASIACRYPT 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2022, Proceedings, Part II

ISBN: 9783031229657 / Angielski / Miękka / 695 str.

ISBN: 9783031229657/Angielski/Miękka/695 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shweta Agrawal; Dongdai Lin
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022.The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows:Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and...
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Appl...
cena: 402,53

 Advances in Cryptology – ASIACRYPT 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2022, Proceedings, Part III Shweta Agrawal Dongdai Lin 9783031229688 Springer
Advances in Cryptology – ASIACRYPT 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2022, Proceedings, Part III

ISBN: 9783031229688 / Angielski / Miękka / 788 str.

ISBN: 9783031229688/Angielski/Miękka/788 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shweta Agrawal; Dongdai Lin
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022.The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows:Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and...
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Appl...
cena: 442,79

 Network and System Security: 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9–12, 2022, Proceedings Xingliang Yuan Guangdong Bai Cristina Alcaraz 9783031230196 Springer
Network and System Security: 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9–12, 2022, Proceedings

ISBN: 9783031230196 / Angielski / Miękka / 747 str.

ISBN: 9783031230196/Angielski/Miękka/747 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xingliang Yuan; Guangdong Bai; Cristina Alcaraz
This book constitutes the refereed proceedings of the 16th International Conference on Network and System Security, NSS 2022, held in Denarau Island, Fiji, on December 9-12, 2022.The 23 full and 18 short papers presented in this book were carefully reviewed and selected from 83 submissions. They focus on theoretical and practical aspects of network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.
This book constitutes the refereed proceedings of the 16th International Conference on Network and System Security, NSS 2022, held in Denarau Island, ...
cena: 442,79

 Trusted Computing Platforms: Design and Applications Sean W. Smith 9787302131748 Springer
Trusted Computing Platforms: Design and Applications

ISBN: 9787302131748 / Angielski / Miękka / 260 str.

ISBN: 9787302131748/Angielski/Miękka/260 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sean W. Smith
cena: 425,33

 Kryptografie fur Dummies 2e HW Lang 9783527720934 Wiley-VCH Verlag GmbH
Kryptografie fur Dummies 2e

ISBN: 9783527720934 / Niemiecki / Miękka / 400 str.

ISBN: 9783527720934/Niemiecki/Miękka/400 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
HW Lang
cena: 111,83

 Attribute-based Encryption (ABE): Foundations and Applications within Blockchain and Cloud Environments Daniel Adu Worae 9781119989356 John Wiley & Sons Inc
Attribute-based Encryption (ABE): Foundations and Applications within Blockchain and Cloud Environments

ISBN: 9781119989356 / Angielski / Twarda / 200 str.

ISBN: 9781119989356/Angielski/Twarda/200 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Qi Xia; Jianbin Gao; Isaac Obiri
cena: 489,51

 Combinatorics and Number Theory of Counting Sequences Istvan Mezo 9781032475356 CRC Press
Combinatorics and Number Theory of Counting Sequences

ISBN: 9781032475356 / Angielski / Miękka / 498 str.

ISBN: 9781032475356/Angielski/Miękka/498 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Istvan Mezo
Combinatorialists are seldom aware of number theoretical tools, and number theorists rarely aware of possible combinatorial applications. This book is accessible for both of the groups. The first part introduces important counting sequences. The second part shows how these sequences can be generalized to study new combinatorial problems
Combinatorialists are seldom aware of number theoretical tools, and number theorists rarely aware of possible combinatorial applications. This book is...
cena: 237,10

 Cryptology: Classical and Modern Richard Klima Richard E. Klima Neil Sigmon 9781032475929 CRC Press
Cryptology: Classical and Modern

ISBN: 9781032475929 / Angielski / Miękka / 496 str.

ISBN: 9781032475929/Angielski/Miękka/496 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Richard Klima; Richard E. Klima; Neil Sigmon
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenère, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the...
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical met...
cena: 230,14

Pierwsza Podprzednia  64  65  66  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia