![]() |
Cryptography: Theory and Practice
ISBN: 9781032476049 / Angielski / Miękka / 598 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students. It offers a comprehensive primer for the subject’s fundamentals and features the most current advances. The fourth edition provides in-depth treatment of the methods and protocols that safeguard the informat
Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students. It offers a comprehensive primer for the sub...
|
cena:
230,14 |
![]() |
Introduction to Coding Theory
ISBN: 9781032477190 / Angielski / Miękka / 538 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is designed to be usable as a textbook for an undergraduate course or for an advanced graduate course in coding theory as well as a reference for researchers in discrete mathematics, engineering and theoretical computer science. This second edition has three parts: an elementary introduction to coding, theory and applications of codes,
This book is designed to be usable as a textbook for an undergraduate course or for an advanced graduate course in coding theory as well as a referenc...
|
cena:
244,84 |
![]() |
Guide to Internet Cryptography: Security Protocols and Real-World Attack Implications
ISBN: 9783031194382 / Angielski / Twarda / 530 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research.This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Internet security. It describes important Internet standards in a language close to real-world cryptographic research and covers the essential cryptographic standards used on the Internet, from WLAN encryption to TLS and e-mail security. From academic and non-academic research, the book collects...
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardiza...
|
cena:
342,14 |
![]() |
Analysis, Cryptography and Information Science
ISBN: 9789811271915 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. This compendium focuses on self-contained presentations of various developments in mathematical analysis, cryptography and information science.The volume features both original research and survey papers contributed by experts from the international community. The book has a strong interdisciplinary flavor and features the most recent developments in the topics treated.This useful reference text benefits professionals, researchers, academics and graduate students.
This compendium focuses on self-contained presentations of various developments in mathematical analysis, cryptography and information science.The vol...
|
cena:
440,80 |
![]() |
Cyber Security: The complete guide to cyber threats and protection
ISBN: 9781780175959 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
176,07 |
![]() |
Digital Forensics and Watermarking: 21st International Workshop, IWDW 2022, Guilin, China, November 18-19, 2022, Revised Selected Papers
ISBN: 9783031251146 / Angielski / Miękka / 219 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 21st International Workshop, IWDW 2022, held in Guilin, China, during November 18-19, 2022.The 14 full papers included in this book were carefully reviewed and selected from 30 submissions. They were organized in topical sections as follows: Steganology, Forensics and Security Analysis, Watermarking.
This book constitutes the refereed proceedings of the 21st International Workshop, IWDW 2022, held in Guilin, China, during November 18-19, 2022.The 1...
|
cena:
261,63 |
![]() |
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2022 International Workshops, DPM 2022 and CBT 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers
ISBN: 9783031257339 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings and revised selected papers from the ESORICS 2022 International Workshops on Data Privacy Management, Cryptocurrencies and Blockchain Technology, DPM 2022 and CBT 2022, which took place in Copenhagen, Denmark, during September 26–30, 2022.For DPM 2022, 10 full papers out of 21 submissions have been accepted for inclusion in this book. They were organized in topical sections as follows: differential privacy and data analysis; regulation, artificial intelligence, and formal verification; and leakage quantification and applications.The CBT 2022...
This book constitutes the refereed proceedings and revised selected papers from the ESORICS 2022 International Workshops on Data Privacy Management, C...
|
cena:
301,89 |
![]() |
AI-Based Metaheuristics for Information Security and Digital Media
ISBN: 9780367615420 / Angielski / Twarda / 168 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book examines the latest developments in AI-based metaheuristics algorithms with applications in information security for digital media. It highlights the importance of several security parameters, their analysis, and validations for different practical applications.
This book examines the latest developments in AI-based metaheuristics algorithms with applications in information security for digital media. It highl...
|
cena:
440,75 |
![]() |
A-Z Password Book: Individual Letter Tabs to Quickly Access Login Information
ISBN: 9780593435823 / Angielski / Miękka / 144 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
45,24 |
![]() |
The Vulnerability Researcher\'s Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities
ISBN: 9781803238876 / Angielski / Miękka / 260 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Learn the right way to discover, report, and publish security vulnerabilities to prevent exploitation of user systems and reap the rewards of receiving credit for your work Key Features Build successful strategies for planning and executing zero-day vulnerability research Find the best ways to disclose vulnerabilities while avoiding vendor conflict Learn to navigate the complicated CVE publishing process to receive credit for your research Book DescriptionVulnerability researchers are in increasingly high demand as the number of security incidents related to crime continues to rise with...
Learn the right way to discover, report, and publish security vulnerabilities to prevent exploitation of user systems and reap the rewards of receivin...
|
cena:
159,64 |
![]() |
An Introduction to Secret Sharing: A Systematic Overview and Guide for Protocol Selection
ISBN: 9783031281600 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols.This survey analyzes existing work, and systematically presents secret sharing protocols for various adversary models. It provides intuitive as well as formal descriptions of the different types of adversaries, including their computational powers and capabilities. In addition, it then offers guidance and support in selecting the appropriate type of protocol for a given application domain, present representative protocols, and provide useful references for...
This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols.This survey...
|
cena:
181,11 |
![]() |
Innovations in Digital Forensics
ISBN: 9789811273193 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digital forensics deals with the investigation of cybercrimes. With the growing deployment of cloud computing, mobile computing, and digital banking on the internet, the nature of digital forensics has evolved in recent years, and will continue to do so in the near future.This book presents state-of-the-art techniques to address imminent challenges in digital forensics. In particular, it focuses on cloud forensics, Internet-of-Things (IoT) forensics, and network forensics, elaborating on innovative techniques, including algorithms, implementation details and performance analysis, to...
Digital forensics deals with the investigation of cybercrimes. With the growing deployment of cloud computing, mobile computing, and digital banking o...
|
cena:
612,21 |
![]() |
Basics on Public Key Infrastructure (PKI)
ISBN: 9798215252864 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
64,69 |
![]() |
Blockchain Beginners: Smart Contracts: A Simple Overview and Guide To Smart Contracts
ISBN: 9798375234717 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
40,43 |
![]() |
Mobile OS Vulnerabilities: Quantitative and Qualitative Analysis
ISBN: 9781032407463 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book offers in-depth analysis of security vulnerabilities in different mobile operating systems. It provides methodology and solutions for handling Android malware and vulnerabilities and transfers the latest knowledge in machine learning and deep learning models towards this end.
This book offers in-depth analysis of security vulnerabilities in different mobile operating systems. It provides methodology and solutions for handli...
|
cena:
636,71 |
![]() |
Concise Encyclopedia of Coding Theory
ISBN: 9780367709327 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. Coding theory has grown into a discipline with many practical applications requiring various mathematical techniques in the last few decades. Most topics covered in this book are presented in short sections at an introductory level and progress from basic to advanced level, with definitions, examples, and many references.
Coding theory has grown into a discipline with many practical applications requiring various mathematical techniques in the last few decades. Most top...
|
cena:
426,05 |
![]() |
CISSP Exam Study Guide For Security Professionals: NIST Cybersecurity Framework, Risk Management, Digital Forensics & Governance
ISBN: 9781839381843 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
172,59 |
![]() |
Applications of Encryption and Watermarking for Information Security
ISBN: 9781668449455 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. In recent years, media digitalization has been booming. It has, however, led to a phenomenon of private data hacking, which was stimulated by the expansion of the data exchange system. These hackers are being countered by using new techniques, including cryptography and watermarking. Therefore, in the fields of information security, data encryption, and watermarking, there exists a need for a collection of original research in this area. Applications of Encryption and Watermarking for Information Security provides relevant theoretical frameworks and the latest empirical research findings...
In recent years, media digitalization has been booming. It has, however, led to a phenomenon of private data hacking, which was stimulated by the expa...
|
cena:
1227,01 |
![]() |
Applications of Encryption and Watermarking for Information Security
ISBN: 9781668449462 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. In recent years, media digitalization has been booming. It has, however, led to a phenomenon of private data hacking, which was stimulated by the expansion of the data exchange system. These hackers are being countered by using new techniques, including cryptography and watermarking. Therefore, in the fields of information security, data encryption, and watermarking, there exists a need for a collection of original research in this area. Applications of Encryption and Watermarking for Information Security provides relevant theoretical frameworks and the latest empirical research findings...
In recent years, media digitalization has been booming. It has, however, led to a phenomenon of private data hacking, which was stimulated by the expa...
|
cena:
922,53 |
![]() |
Information Security and Cryptology – ICISC 2022: 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022, Revised Selected Papers
ISBN: 9783031293702 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 25th International Conference, ICISC 2022, held in Seoul, South Korea, during November 30–December 2, 2022.The 24 full papers included in this book were carefully reviewed and selected from 69 submissions. They were organized in topical sections as follows: Public Key Encryption with Hierarchical Authorized Keyword Search, Implicit Key-stretching Security of Encryption Schemes.
This book constitutes the refereed proceedings of the 25th International Conference, ICISC 2022, held in Seoul, South Korea, during November 30–Dece...
|
cena:
362,27 |