• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949524]
• Literatura piękna
 [1817948]

  więcej...
• Turystyka
 [70715]
• Informatyka
 [151291]
• Komiksy
 [35671]
• Encyklopedie
 [23176]
• Dziecięca
 [612440]
• Hobby
 [136066]
• AudioBooki
 [1740]
• Literatura faktu
 [226030]
• Muzyka CD
 [378]
• Słowniki
 [2918]
• Inne
 [445441]
• Kalendarze
 [1181]
• Podręczniki
 [166545]
• Poradniki
 [469898]
• Religia
 [508035]
• Czasopisma
 [502]
• Sport
 [61392]
• Sztuka
 [242759]
• CD, DVD, Video
 [3348]
• Technologie
 [219537]
• Zdrowie
 [98738]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3543]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2785

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Cryptography: Theory and Practice Douglas Robert Stinson Maura Paterson 9781032476049 CRC Press
Cryptography: Theory and Practice

ISBN: 9781032476049 / Angielski / Miękka / 598 str.

ISBN: 9781032476049/Angielski/Miękka/598 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Douglas Robert Stinson; Maura Paterson
Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students. It offers a comprehensive primer for the subject’s fundamentals and features the most current advances. The fourth edition provides in-depth treatment of the methods and protocols that safeguard the informat
Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students. It offers a comprehensive primer for the sub...
cena: 230,14

 Introduction to Coding Theory Jurgen Bierbrauer 9781032477190 CRC Press
Introduction to Coding Theory

ISBN: 9781032477190 / Angielski / Miękka / 538 str.

ISBN: 9781032477190/Angielski/Miękka/538 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jurgen Bierbrauer
This book is designed to be usable as a textbook for an undergraduate course or for an advanced graduate course in coding theory as well as a reference for researchers in discrete mathematics, engineering and theoretical computer science. This second edition has three parts: an elementary introduction to coding, theory and applications of codes,
This book is designed to be usable as a textbook for an undergraduate course or for an advanced graduate course in coding theory as well as a referenc...
cena: 244,84

 Guide to Internet Cryptography: Security Protocols and Real-World Attack Implications J?rg Schwenk 9783031194382 Springer
Guide to Internet Cryptography: Security Protocols and Real-World Attack Implications

ISBN: 9783031194382 / Angielski / Twarda / 530 str.

ISBN: 9783031194382/Angielski/Twarda/530 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jörg Schwenk
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research.This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Internet security. It describes important Internet standards in a language close to real-world cryptographic research and covers the essential cryptographic standards used on the Internet, from WLAN encryption to TLS and e-mail security. From academic and non-academic research, the book collects...
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardiza...
cena: 342,14

 Analysis, Cryptography and Information Science Panos M. Pardalos Nicholas J. Daras Michael Th Rassias 9789811271915 World Scientific Publishing Company
Analysis, Cryptography and Information Science

ISBN: 9789811271915 / Angielski

ISBN: 9789811271915/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Panos M. Pardalos; Nicholas J. Daras; Michael Th Rassias
This compendium focuses on self-contained presentations of various developments in mathematical analysis, cryptography and information science.The volume features both original research and survey papers contributed by experts from the international community. The book has a strong interdisciplinary flavor and features the most recent developments in the topics treated.This useful reference text benefits professionals, researchers, academics and graduate students.
This compendium focuses on self-contained presentations of various developments in mathematical analysis, cryptography and information science.The vol...
cena: 440,80

 Cyber Security: The complete guide to cyber threats and protection David Sutton 9781780175959 BCS Learning & Development Limited
Cyber Security: The complete guide to cyber threats and protection

ISBN: 9781780175959 / Angielski

ISBN: 9781780175959/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Sutton
cena: 176,07

 Digital Forensics and Watermarking: 21st International Workshop, IWDW 2022, Guilin, China, November 18-19, 2022, Revised Selected Papers Xianfeng Zhao Zhenjun Tang Pedro Comesana-Alfaro 9783031251146 Springer
Digital Forensics and Watermarking: 21st International Workshop, IWDW 2022, Guilin, China, November 18-19, 2022, Revised Selected Papers

ISBN: 9783031251146 / Angielski / Miękka / 219 str.

ISBN: 9783031251146/Angielski/Miękka/219 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xianfeng Zhao; Zhenjun Tang; Pedro Comesana-Alfaro
This book constitutes the refereed proceedings of the 21st International Workshop, IWDW 2022, held in Guilin, China, during November 18-19, 2022.The 14 full papers included in this book were carefully reviewed and selected from 30 submissions. They were organized in topical sections as follows: Steganology, Forensics and Security Analysis, Watermarking.
This book constitutes the refereed proceedings of the 21st International Workshop, IWDW 2022, held in Guilin, China, during November 18-19, 2022.The 1...
cena: 261,63

 Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2022 International Workshops, DPM 2022 and CBT 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers Joaquin Garcia-Alfaro Guillermo Navarro-Arribas Nicola Dragoni 9783031257339 Springer
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2022 International Workshops, DPM 2022 and CBT 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers

ISBN: 9783031257339 / Angielski

ISBN: 9783031257339/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joaquin Garcia-Alfaro; Guillermo Navarro-Arribas; Nicola Dragoni
This book constitutes the refereed proceedings and revised selected papers from the ESORICS 2022 International Workshops on Data Privacy Management, Cryptocurrencies and Blockchain Technology, DPM 2022 and CBT 2022, which took place in Copenhagen, Denmark, during September 26–30, 2022.For DPM 2022, 10 full papers out of 21 submissions have been accepted for inclusion in this book. They were organized in topical sections as follows: differential privacy and data analysis; regulation, artificial intelligence, and formal verification; and leakage quantification and applications.The CBT 2022...
This book constitutes the refereed proceedings and revised selected papers from the ESORICS 2022 International Workshops on Data Privacy Management, C...
cena: 301,89

 AI-Based Metaheuristics for Information Security and Digital Media Apoorva S. Shastri Mangal Singh Anand J. Kulkarni 9780367615420 CRC Press
AI-Based Metaheuristics for Information Security and Digital Media

ISBN: 9780367615420 / Angielski / Twarda / 168 str.

ISBN: 9780367615420/Angielski/Twarda/168 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Apoorva S. Shastri; Mangal Singh; Anand J. Kulkarni
This book examines the latest developments in AI-based metaheuristics algorithms with applications in information security for digital media. It highlights the importance of several security parameters, their analysis, and validations for different practical applications.
This book examines the latest developments in AI-based metaheuristics algorithms with applications in information security for digital media. It highl...
cena: 440,75

 A-Z Password Book: Individual Letter Tabs to Quickly Access Login Information Zeitgeist 9780593435823 Zeitgeist
A-Z Password Book: Individual Letter Tabs to Quickly Access Login Information

ISBN: 9780593435823 / Angielski / Miękka / 144 str.

ISBN: 9780593435823/Angielski/Miękka/144 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Zeitgeist
cena: 45,24

 The Vulnerability Researcher\'s Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities Benjamin Strout 9781803238876 Packt Publishing
The Vulnerability Researcher\'s Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities

ISBN: 9781803238876 / Angielski / Miękka / 260 str.

ISBN: 9781803238876/Angielski/Miękka/260 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Benjamin Strout
Learn the right way to discover, report, and publish security vulnerabilities to prevent exploitation of user systems and reap the rewards of receiving credit for your work Key Features Build successful strategies for planning and executing zero-day vulnerability research Find the best ways to disclose vulnerabilities while avoiding vendor conflict Learn to navigate the complicated CVE publishing process to receive credit for your research Book DescriptionVulnerability researchers are in increasingly high demand as the number of security incidents related to crime continues to rise with...
Learn the right way to discover, report, and publish security vulnerabilities to prevent exploitation of user systems and reap the rewards of receivin...
cena: 159,64

 An Introduction to Secret Sharing: A Systematic Overview and Guide for Protocol Selection Stephan Krenn Thomas Lor?nser 9783031281600 Springer
An Introduction to Secret Sharing: A Systematic Overview and Guide for Protocol Selection

ISBN: 9783031281600 / Angielski

ISBN: 9783031281600/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stephan Krenn; Thomas Lorünser
This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols.This survey analyzes existing work, and systematically presents secret sharing protocols for various adversary models. It provides intuitive as well as formal descriptions of the different types of adversaries, including their computational powers and capabilities. In addition, it then offers guidance and support in selecting the appropriate type of protocol for a given application domain, present representative protocols, and provide useful references for...
This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols.This survey...
cena: 181,11

 Innovations in Digital Forensics Suryadipta Majumdar Paria Shirani Lingyu Wang 9789811273193 World Scientific Publishing Company
Innovations in Digital Forensics

ISBN: 9789811273193 / Angielski

ISBN: 9789811273193/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Suryadipta Majumdar; Paria Shirani; Lingyu Wang
Digital forensics deals with the investigation of cybercrimes. With the growing deployment of cloud computing, mobile computing, and digital banking on the internet, the nature of digital forensics has evolved in recent years, and will continue to do so in the near future.This book presents state-of-the-art techniques to address imminent challenges in digital forensics. In particular, it focuses on cloud forensics, Internet-of-Things (IoT) forensics, and network forensics, elaborating on innovative techniques, including algorithms, implementation details and performance analysis, to...
Digital forensics deals with the investigation of cybercrimes. With the growing deployment of cloud computing, mobile computing, and digital banking o...
cena: 612,21

 
Basics on Public Key Infrastructure (PKI)

ISBN: 9798215252864 / Angielski

ISBN: 9798215252864/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
A Scholtens
cena: 64,69

 Blockchain Beginners: Smart Contracts: A Simple Overview and Guide To Smart Contracts Nan00t's Lab   9798375234717 Independently Published
Blockchain Beginners: Smart Contracts: A Simple Overview and Guide To Smart Contracts

ISBN: 9798375234717 / Angielski

ISBN: 9798375234717/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nan00t's Lab
cena: 40,43

 Mobile OS Vulnerabilities: Quantitative and Qualitative Analysis Shivi Garg Niyati Baliyan 9781032407463 Taylor & Francis Ltd
Mobile OS Vulnerabilities: Quantitative and Qualitative Analysis

ISBN: 9781032407463 / Angielski

ISBN: 9781032407463/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shivi Garg; Niyati Baliyan
This book offers in-depth analysis of security vulnerabilities in different mobile operating systems. It provides methodology and solutions for handling Android malware and vulnerabilities and transfers the latest knowledge in machine learning and deep learning models towards this end.
This book offers in-depth analysis of security vulnerabilities in different mobile operating systems. It provides methodology and solutions for handli...
cena: 636,71

 Concise Encyclopedia of Coding Theory W. Cary Huffman Jon-Lark Kim Patrick Sol? 9780367709327 CRC Press
Concise Encyclopedia of Coding Theory

ISBN: 9780367709327 / Angielski

ISBN: 9780367709327/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
W. Cary Huffman; Jon-Lark Kim; Patrick Solé
Coding theory has grown into a discipline with many practical applications requiring various mathematical techniques in the last few decades. Most topics covered in this book are presented in short sections at an introductory level and progress from basic to advanced level, with definitions, examples, and many references.
Coding theory has grown into a discipline with many practical applications requiring various mathematical techniques in the last few decades. Most top...
cena: 426,05

 CISSP Exam Study Guide For Security Professionals: NIST Cybersecurity Framework, Risk Management, Digital Forensics & Governance Richie Miller 9781839381843 Pastor Publishing Ltd
CISSP Exam Study Guide For Security Professionals: NIST Cybersecurity Framework, Risk Management, Digital Forensics & Governance

ISBN: 9781839381843 / Angielski

ISBN: 9781839381843/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Richie Miller
cena: 172,59

 Applications of Encryption and Watermarking for Information Security Boussif Mohamed   9781668449455 IGI Global
Applications of Encryption and Watermarking for Information Security

ISBN: 9781668449455 / Angielski

ISBN: 9781668449455/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Boussif Mohamed
In recent years, media digitalization has been booming. It has, however, led to a phenomenon of private data hacking, which was stimulated by the expansion of the data exchange system. These hackers are being countered by using new techniques, including cryptography and watermarking. Therefore, in the fields of information security, data encryption, and watermarking, there exists a need for a collection of original research in this area. Applications of Encryption and Watermarking for Information Security provides relevant theoretical frameworks and the latest empirical research findings...
In recent years, media digitalization has been booming. It has, however, led to a phenomenon of private data hacking, which was stimulated by the expa...
cena: 1227,01

 Applications of Encryption and Watermarking for Information Security Boussif Mohamed   9781668449462 IGI Global
Applications of Encryption and Watermarking for Information Security

ISBN: 9781668449462 / Angielski

ISBN: 9781668449462/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Boussif Mohamed
In recent years, media digitalization has been booming. It has, however, led to a phenomenon of private data hacking, which was stimulated by the expansion of the data exchange system. These hackers are being countered by using new techniques, including cryptography and watermarking. Therefore, in the fields of information security, data encryption, and watermarking, there exists a need for a collection of original research in this area. Applications of Encryption and Watermarking for Information Security provides relevant theoretical frameworks and the latest empirical research findings...
In recent years, media digitalization has been booming. It has, however, led to a phenomenon of private data hacking, which was stimulated by the expa...
cena: 922,53

 Information Security and Cryptology – ICISC 2022: 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022, Revised Selected Papers Seung-Hyun Seo Hwajeong Seo 9783031293702 Springer
Information Security and Cryptology – ICISC 2022: 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022, Revised Selected Papers

ISBN: 9783031293702 / Angielski

ISBN: 9783031293702/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Seung-Hyun Seo; Hwajeong Seo
This book constitutes the refereed proceedings of the 25th International Conference, ICISC 2022, held in Seoul, South Korea, during November 30–December 2, 2022.The 24 full papers included in this book were carefully reviewed and selected from 69 submissions. They were organized in topical sections as follows: ​Public Key Encryption with Hierarchical Authorized Keyword Search, Implicit Key-stretching Security of Encryption Schemes.
This book constitutes the refereed proceedings of the 25th International Conference, ICISC 2022, held in Seoul, South Korea, during November 30–Dece...
cena: 362,27

Pierwsza Podprzednia  64  65  66  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia