• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2950116]
• Literatura piękna
 [1816336]

  więcej...
• Turystyka
 [70365]
• Informatyka
 [151382]
• Komiksy
 [36157]
• Encyklopedie
 [23168]
• Dziecięca
 [611655]
• Hobby
 [135936]
• AudioBooki
 [1800]
• Literatura faktu
 [225852]
• Muzyka CD
 [388]
• Słowniki
 [2970]
• Inne
 [446238]
• Kalendarze
 [1179]
• Podręczniki
 [166839]
• Poradniki
 [469514]
• Religia
 [507394]
• Czasopisma
 [506]
• Sport
 [61426]
• Sztuka
 [242327]
• CD, DVD, Video
 [3461]
• Technologie
 [219652]
• Zdrowie
 [98967]
• Książkowe Klimaty
 [123]
• Zabawki
 [2482]
• Puzzle, gry
 [3735]
• Literatura w języku ukraińskim
 [264]
• Art. papiernicze i szkolne
 [7903]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2770

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Understanding Cyber Threats Through Behavioral Intelligence Taiwo Osiyemi 9785376339084 Plexity Digital
Understanding Cyber Threats Through Behavioral Intelligence

ISBN: 9785376339084 / Angielski

ISBN: 9785376339084/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Taiwo Osiyemi
cena: 67,69

 Security Engineering: Adapting cyber resilience, engineering, and practices for modern threats and technologies (English Edition) Harvinder Sing 9789365891652 Bpb Publications
Security Engineering: Adapting cyber resilience, engineering, and practices for modern threats and technologies (English Edition)

ISBN: 9789365891652 / Angielski

ISBN: 9789365891652/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Harvinder Singh Gill
cena: 158,56

 Prison Blues: Covert Encrypted Messaging over GIT with Spot-On Encryption Suite Uni Nurf 9783769378108 Bod - Books on Demand
Prison Blues: Covert Encrypted Messaging over GIT with Spot-On Encryption Suite

ISBN: 9783769378108 / Angielski

ISBN: 9783769378108/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Uni Nurf
cena: 45,64

 Convergence of AI and Quantum: A 'rather' Personal Journey Asim Khwaja 9781919463001 Asim Khwaja
Convergence of AI and Quantum: A 'rather' Personal Journey

ISBN: 9781919463001 / Angielski

ISBN: 9781919463001/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Asim Khwaja
cena: 59,49

 Smart Contracts in Action: How Code Is Replacing Lawyers Omarh Zaydan 9789374596821 Mindful Pages
Smart Contracts in Action: How Code Is Replacing Lawyers

ISBN: 9789374596821 / Angielski / 17-02-2026

ISBN: 9789374596821/Angielski/17-02-2026

Książka dostępna od: 17-02-2026
Omarh Zaydan
Termin ukazania się książki: 17-02-2026
Książkę można już zamówić z rabatem 5%
143,60
136,42

 Suraksha ki Pathshaala -: Har Bachche Ke Liye Zaruri (सुरक्षा की पाठश Priyanka Verma 9789371222235 Diamond Pocket Books Pvt Ltd
Suraksha ki Pathshaala -: Har Bachche Ke Liye Zaruri (सुरक्षा की पाठश

ISBN: 9789371222235 / Hindi

ISBN: 9789371222235/Hindi

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Priyanka Verma
cena: 46,53

 Coding for Data and Computer Communications David Salomon D. Salomon 9780387212456 Springer
Coding for Data and Computer Communications

ISBN: 9780387212456 / Angielski / Twarda / 548 str.

ISBN: 9780387212456/Angielski/Twarda/548 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Salomon; D. Salomon

Coding is an highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basis of coding can prevent a serious and practical understanding of this important area.

"Coding for Data and Computer Communications" eschews the complex mathematics and clearly describes the core concepts, principles, and methods of channel codes ( for error correction), source codes (for compressing data), and secure codes (for cryptography, data hiding, and privacy). Conveniently organized and segmented into three associated parts for...

Coding is an highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basi...

cena: 402,53

 Privacy, Security and Trust Within the Context of Pervasive Computing Philip Robinson 9780387234618 Springer
Privacy, Security and Trust Within the Context of Pervasive Computing

ISBN: 9780387234618 / Angielski / Twarda / 171 str.

ISBN: 9780387234618/Angielski/Twarda/171 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Philip Robinson

Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria.

The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces between mechanisms in different technical and social problem spaces. An investigation of the interfaces between the notions of context, privacy, security, and trust will result in a deeper understanding of the "atomic"...

Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second i...

cena: 402,53

 Trusted Computing Platforms: Design and Applications Smith, Sean W. 9780387239163 Springer
Trusted Computing Platforms: Design and Applications

ISBN: 9780387239163 / Angielski / Twarda / 239 str.

ISBN: 9780387239163/Angielski/Twarda/239 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sean W. Smith

From early prototypes and proposed applications, this book surveys the longer history of amplifying small amounts of hardware security into broader system security

Including real case study experience with security architecture and applications on multiple types of platforms.

Examines the theory, design, implementation of the IBM 4758 secure coprocessor platform and discusses real case study applications that exploit the unique capabilities of this platform.

Examines more recent cutting-edge experimental work in this area.

Written for security architects,...

From early prototypes and proposed applications, this book surveys the longer history of amplifying small amounts of hardware security into broader...

cena: 402,53

 Multimedia Encryption and Watermarking Borko Furht Edin Muharemagic Daniel Socek 9780387244259 Springer
Multimedia Encryption and Watermarking

ISBN: 9780387244259 / Angielski / Twarda / 327 str.

ISBN: 9780387244259/Angielski/Twarda/327 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Borko Furht; Edin Muharemagic; Daniel Socek

Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which enable a secure exchange of multimedia intellectual property.

Part I, Digital Rights Management (DRM) for Multimedia, introduces DRM concepts and models for multimedia content protection, and presents the key players. Part II, Multimedia Cryptography, provides an overview of modern cryptography, with the focus on modern image, video, speech, and audio encryption techniques. This book also provides an advanced concept of visual and audio...

Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which ena...

cena: 603,81

 Communications and Multimedia Security: 8th Ifip Tc-6 Tc-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, the L Chadwick, David 9780387244853 Springer
Communications and Multimedia Security: 8th Ifip Tc-6 Tc-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, the L

ISBN: 9780387244853 / Angielski / Twarda / 290 str.

ISBN: 9780387244853/Angielski/Twarda/290 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Chadwick; Bart Preneel; Bart Preneel

Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields of Communications and Multimedia Security.

This state-of-the-art volume presents the proceedings of the Eighth Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, September 2004, in Windermere, UK. The papers presented here represent the very latest developments in security research from leading people in the field. The papers explore a wide variety of subjects including privacy protection and trust negotiation,...

Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields of C...

cena: 402,53

 Secure Data Management in Decentralized Systems Ting Yu Sushil Jajodia 9780387276946 Springer
Secure Data Management in Decentralized Systems

ISBN: 9780387276946 / Angielski / Twarda / 462 str.

ISBN: 9780387276946/Angielski/Twarda/462 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ting Yu; Sushil Jajodia
Database security is one of the classical topics in the research of information system security. Ever since the early years of database management systems, a great deal of research activity has been conducted. Fruitful results have been produced, many of which are widely adopted in commercial and military database management systems. In recent years, the research scope of database security has been greatly expanded due to the rapid development of the global internetworked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of - ganizations....
Database security is one of the classical topics in the research of information system security. Ever since the early years of database management sys...
cena: 603,81

 Electronic Postage Systems: Technology, Security, Economics Gerrit Bleumer 9780387293134 Springer-Verlag New York Inc.
Electronic Postage Systems: Technology, Security, Economics

ISBN: 9780387293134 / Angielski / Twarda / 248 str.

ISBN: 9780387293134/Angielski/Twarda/248 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gerrit Bleumer

As postal liberalization gains momentum, traditional postage meter markets are being transformed into digital meter markets for enterprise mailers. Modern technologies such as cryptography, digital signatures, hardware security devices, the Internet, 2D bar codes, and high-speed scanning equipment have come together to establish different flavors of electronic postage, addressing the needs of postal operators, private carriers and mailers.

Electronic Postage Systems: Technology, Security, Economics introduces a taxonomy of electronic postage systems and explains...

As postal liberalization gains momentum, traditional postage meter markets are being transformed into digital meter markets for enterprise mailers....

cena: 402,53

 Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks Radha Poovendran Cliff Wang Sumit Roy 9780387327211 Springer
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks

ISBN: 9780387327211 / Angielski / Twarda / 394 str.

ISBN: 9780387327211/Angielski/Twarda/394 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Radha Poovendran; Cliff Wang; Sumit Roy

This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc networks and wireless sensor networks. It is suitable as a text for computer science courses in wireless systems and security. It includes implementation studies with mica2 mote sensors. Due to the open spectrum nature of wireless communication, it is subject to attacks and intrusions. Hence the wireless network synchronization needs to be both robust and secure. Furthermore, issues such as energy constraints and mobility make the localization process even more challenging. The...

This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc networks and wireless sensor netw...

cena: 805,10

 Handbook of Database Security: Applications and Trends Gertz, Michael 9780387485324 Springer
Handbook of Database Security: Applications and Trends

ISBN: 9780387485324 / Angielski / Twarda / 577 str.

ISBN: 9780387485324/Angielski/Twarda/577 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Gertz; Sushil Jajodia
Motivation for the book Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based techno- gies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of data integrity and availability, there is an increasing interest in research and development in data privacy. This is because today s often missi- critical databases no longer contain only data used for day-to-day processing by...
Motivation for the book Database security has been gaining a great deal of importance as industry, military, and government organizations have increas...
cena: 603,81

 Vulnerability Analysis and Defense for the Internet  9780387743899 Springer
Vulnerability Analysis and Defense for the Internet

ISBN: 9780387743899 / Angielski / Twarda / 254 str.

ISBN: 9780387743899/Angielski/Twarda/254 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vulnerability Analysis is a process that defines, identifies, and classifies the vulnerabilities in a computer network or an application. Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting attacks, SQL injection attacks, format string attacks, buffer overflows, DNS amplification attacks etc. Although these attacks are not new and are well known, the number of vulnerabilities disclosed to the public jumped nearly 5 percent during the first six months of 2007. This accounts to be the fourth year report, which shows the raise in...
Vulnerability Analysis is a process that defines, identifies, and classifies the vulnerabilities in a computer network or an application. Vulnerabilit...
cena: 402,53

 Protecting Information: From Classical Error Correction to Quantum Cryptography Loepp, Susan 9780521534765 Cambridge University Press
Protecting Information: From Classical Error Correction to Quantum Cryptography

ISBN: 9780521534765 / Angielski / Miękka / 304 str.

ISBN: 9780521534765/Angielski/Miękka/304 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Susan Loepp; William Wootters
For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum computing, thus providing a context in which ideas from mathematics and physics meet. By covering such topics as Shor's quantum factoring algorithm, this text informs the reader about current thinking in quantum information theory and encourages an appreciation of the connections between mathematics and science. Of particular interest are the...
For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error ...
cena: 276,51

 Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar Golomb, Solomon W. 9780521821049 Cambridge University Press
Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar

ISBN: 9780521821049 / Angielski / Twarda / 458 str.

ISBN: 9780521821049/Angielski/Twarda/458 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Solomon W. Golomb; Guang Gong
Wireless communications, advanced radar and sonar systems, and security systems for Internet transactions are contemporary examples of systems that employ digital signals to transmit information. This volume affords comprehensive, up-to-date treatment of the methodologies and application areas throughout the range of digital communication where individual signals, and sets of signals, with favorable correlation properties play a central role. Some application areas covered include Code Division Multiple Access (CDMA) signals such as those in use for cell-phone communication; digital systems...
Wireless communications, advanced radar and sonar systems, and security systems for Internet transactions are contemporary examples of systems that em...
cena: 511,02

 Escape Velocity: Cyberculture at the End of the Century Dery, Mark 9780802135209 Grove/Atlantic
Escape Velocity: Cyberculture at the End of the Century

ISBN: 9780802135209 / Angielski / Miękka / 400 str.

ISBN: 9780802135209/Angielski/Miękka/400 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mark Dery
An Unforgettable Journey into the Dark Heart of the Information Age
In Escape Velocity Mark Dery takes is on an electrifying tour of the high-tech subcultures that both celebrate and critique our wired world: would-be cyborgs who believe the body is obsolete and dream of downloading their minds into computers, cyber-hippies who boost their brainpower with smart drugs and mind machines, on-line swingers seeking cybersex on electronic bulletin boards, techno-primitives who sport "biomechanical" tattoos of computer circuitry; and cyberpunk roboticists whose Mad Max contraptions duel to the...
An Unforgettable Journey into the Dark Heart of the Information Age
In Escape Velocity Mark Dery takes is on an electrifying tour of the high-tech...
cena: 75,60

 Applications of Data Mining in Computer Security Daniel Barbara Sushil Jajodia Daniel Barbara 9781402070549 Kluwer Academic Publishers
Applications of Data Mining in Computer Security

ISBN: 9781402070549 / Angielski / Twarda / 252 str.

ISBN: 9781402070549/Angielski/Twarda/252 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Daniel Barbara; Sushil Jajodia; Daniel Barbara

Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences. From this perspective, it was just a matter of time for the discipline to reach the important area of computer security. Applications Of Data Mining In Computer Security presents a collection of research efforts on the use of data mining in computer security.

Data mining has been loosely defined as the process of...

Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, lo...

cena: 402,53

Pierwsza Podprzednia  85  86  87  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia