![]() |
Understanding Cyber Threats Through Behavioral Intelligence
ISBN: 9785376339084 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
67,69 |
![]() |
Security Engineering: Adapting cyber resilience, engineering, and practices for modern threats and technologies (English Edition)
ISBN: 9789365891652 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
158,56 |
![]() |
Prison Blues: Covert Encrypted Messaging over GIT with Spot-On Encryption Suite
ISBN: 9783769378108 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
45,64 |
![]() |
Convergence of AI and Quantum: A 'rather' Personal Journey
ISBN: 9781919463001 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
59,49 |
![]() |
Smart Contracts in Action: How Code Is Replacing Lawyers
ISBN: 9789374596821 / Angielski / 17-02-2026 Książka dostępna od: 17-02-2026 |
|
Termin ukazania się książki: 17-02-2026
Książkę można już zamówić z rabatem 5% |
|
136,42 |
![]() |
Suraksha ki Pathshaala -: Har Bachche Ke Liye Zaruri (सुरक्षा की पाठश
ISBN: 9789371222235 / Hindi Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
46,53 |
![]() |
Coding for Data and Computer Communications
ISBN: 9780387212456 / Angielski / Twarda / 548 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Coding is an highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basis of coding can prevent a serious and practical understanding of this important area. "Coding for Data and Computer Communications" eschews the complex mathematics and clearly describes the core concepts, principles, and methods of channel codes ( for error correction), source codes (for compressing data), and secure codes (for cryptography, data hiding, and privacy). Conveniently organized and segmented into three associated parts for... Coding is an highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basi... |
cena:
402,53 |
![]() |
Privacy, Security and Trust Within the Context of Pervasive Computing
ISBN: 9780387234618 / Angielski / Twarda / 171 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria. The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces between mechanisms in different technical and social problem spaces. An investigation of the interfaces between the notions of context, privacy, security, and trust will result in a deeper understanding of the "atomic"... Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second i... |
cena:
402,53 |
![]() |
Trusted Computing Platforms: Design and Applications
ISBN: 9780387239163 / Angielski / Twarda / 239 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. From early prototypes and proposed applications, this book surveys the longer history of amplifying small amounts of hardware security into broader system security Including real case study experience with security architecture and applications on multiple types of platforms. Examines the theory, design, implementation of the IBM 4758 secure coprocessor platform and discusses real case study applications that exploit the unique capabilities of this platform. Examines more recent cutting-edge experimental work in this area. Written for security architects,... From early prototypes and proposed applications, this book surveys the longer history of amplifying small amounts of hardware security into broader... |
cena:
402,53 |
![]() |
Multimedia Encryption and Watermarking
ISBN: 9780387244259 / Angielski / Twarda / 327 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which enable a secure exchange of multimedia intellectual property. Part I, Digital Rights Management (DRM) for Multimedia, introduces DRM concepts and models for multimedia content protection, and presents the key players. Part II, Multimedia Cryptography, provides an overview of modern cryptography, with the focus on modern image, video, speech, and audio encryption techniques. This book also provides an advanced concept of visual and audio... Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which ena... |
cena:
603,81 |
![]() |
Communications and Multimedia Security: 8th Ifip Tc-6 Tc-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, the L
ISBN: 9780387244853 / Angielski / Twarda / 290 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields of Communications and Multimedia Security. This state-of-the-art volume presents the proceedings of the Eighth Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, September 2004, in Windermere, UK. The papers presented here represent the very latest developments in security research from leading people in the field. The papers explore a wide variety of subjects including privacy protection and trust negotiation,... Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields of C... |
cena:
402,53 |
![]() |
Secure Data Management in Decentralized Systems
ISBN: 9780387276946 / Angielski / Twarda / 462 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Database security is one of the classical topics in the research of information system security. Ever since the early years of database management systems, a great deal of research activity has been conducted. Fruitful results have been produced, many of which are widely adopted in commercial and military database management systems. In recent years, the research scope of database security has been greatly expanded due to the rapid development of the global internetworked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of - ganizations....
Database security is one of the classical topics in the research of information system security. Ever since the early years of database management sys...
|
cena:
603,81 |
![]() |
Electronic Postage Systems: Technology, Security, Economics
ISBN: 9780387293134 / Angielski / Twarda / 248 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As postal liberalization gains momentum, traditional postage meter markets are being transformed into digital meter markets for enterprise mailers. Modern technologies such as cryptography, digital signatures, hardware security devices, the Internet, 2D bar codes, and high-speed scanning equipment have come together to establish different flavors of electronic postage, addressing the needs of postal operators, private carriers and mailers. Electronic Postage Systems: Technology, Security, Economics introduces a taxonomy of electronic postage systems and explains... As postal liberalization gains momentum, traditional postage meter markets are being transformed into digital meter markets for enterprise mailers.... |
cena:
402,53 |
![]() |
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
ISBN: 9780387327211 / Angielski / Twarda / 394 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc networks and wireless sensor networks. It is suitable as a text for computer science courses in wireless systems and security. It includes implementation studies with mica2 mote sensors. Due to the open spectrum nature of wireless communication, it is subject to attacks and intrusions. Hence the wireless network synchronization needs to be both robust and secure. Furthermore, issues such as energy constraints and mobility make the localization process even more challenging. The... This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc networks and wireless sensor netw... |
cena:
805,10 |
![]() |
Handbook of Database Security: Applications and Trends
ISBN: 9780387485324 / Angielski / Twarda / 577 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Motivation for the book Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based techno- gies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of data integrity and availability, there is an increasing interest in research and development in data privacy. This is because today s often missi- critical databases no longer contain only data used for day-to-day processing by...
Motivation for the book Database security has been gaining a great deal of importance as industry, military, and government organizations have increas...
|
cena:
603,81 |
![]() |
Vulnerability Analysis and Defense for the Internet
ISBN: 9780387743899 / Angielski / Twarda / 254 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Vulnerability Analysis is a process that defines, identifies, and classifies the vulnerabilities in a computer network or an application. Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting attacks, SQL injection attacks, format string attacks, buffer overflows, DNS amplification attacks etc. Although these attacks are not new and are well known, the number of vulnerabilities disclosed to the public jumped nearly 5 percent during the first six months of 2007. This accounts to be the fourth year report, which shows the raise in...
Vulnerability Analysis is a process that defines, identifies, and classifies the vulnerabilities in a computer network or an application. Vulnerabilit...
|
cena:
402,53 |
![]() |
Protecting Information: From Classical Error Correction to Quantum Cryptography
ISBN: 9780521534765 / Angielski / Miękka / 304 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum computing, thus providing a context in which ideas from mathematics and physics meet. By covering such topics as Shor's quantum factoring algorithm, this text informs the reader about current thinking in quantum information theory and encourages an appreciation of the connections between mathematics and science. Of particular interest are the...
For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error ...
|
cena:
276,51 |
![]() |
Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar
ISBN: 9780521821049 / Angielski / Twarda / 458 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Wireless communications, advanced radar and sonar systems, and security systems for Internet transactions are contemporary examples of systems that employ digital signals to transmit information. This volume affords comprehensive, up-to-date treatment of the methodologies and application areas throughout the range of digital communication where individual signals, and sets of signals, with favorable correlation properties play a central role. Some application areas covered include Code Division Multiple Access (CDMA) signals such as those in use for cell-phone communication; digital systems...
Wireless communications, advanced radar and sonar systems, and security systems for Internet transactions are contemporary examples of systems that em...
|
cena:
511,02 |
![]() |
Escape Velocity: Cyberculture at the End of the Century
ISBN: 9780802135209 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. An Unforgettable Journey into the Dark Heart of the Information Age
In Escape Velocity Mark Dery takes is on an electrifying tour of the high-tech subcultures that both celebrate and critique our wired world: would-be cyborgs who believe the body is obsolete and dream of downloading their minds into computers, cyber-hippies who boost their brainpower with smart drugs and mind machines, on-line swingers seeking cybersex on electronic bulletin boards, techno-primitives who sport "biomechanical" tattoos of computer circuitry; and cyberpunk roboticists whose Mad Max contraptions duel to the... An Unforgettable Journey into the Dark Heart of the Information Age
In Escape Velocity Mark Dery takes is on an electrifying tour of the high-tech... |
cena:
75,60 |
![]() |
Applications of Data Mining in Computer Security
ISBN: 9781402070549 / Angielski / Twarda / 252 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences. From this perspective, it was just a matter of time for the discipline to reach the important area of computer security. Applications Of Data Mining In Computer Security presents a collection of research efforts on the use of data mining in computer security. Data mining has been loosely defined as the process of... Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, lo... |
cena:
402,53 |