• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2950116]
• Literatura piękna
 [1816336]

  więcej...
• Turystyka
 [70365]
• Informatyka
 [151382]
• Komiksy
 [36157]
• Encyklopedie
 [23168]
• Dziecięca
 [611655]
• Hobby
 [135936]
• AudioBooki
 [1800]
• Literatura faktu
 [225852]
• Muzyka CD
 [388]
• Słowniki
 [2970]
• Inne
 [446238]
• Kalendarze
 [1179]
• Podręczniki
 [166839]
• Poradniki
 [469514]
• Religia
 [507394]
• Czasopisma
 [506]
• Sport
 [61426]
• Sztuka
 [242327]
• CD, DVD, Video
 [3461]
• Technologie
 [219652]
• Zdrowie
 [98967]
• Książkowe Klimaty
 [123]
• Zabawki
 [2482]
• Puzzle, gry
 [3735]
• Literatura w języku ukraińskim
 [264]
• Art. papiernicze i szkolne
 [7903]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2770

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 The German Enigma Cipher Machine Winkel, Brian J. 9781580539968 Artech House Publishers
The German Enigma Cipher Machine

ISBN: 9781580539968 / Angielski / Twarda / 454 str.

ISBN: 9781580539968/Angielski/Twarda/454 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Brian J. Winkel; Cipher A. Deavours; Louis Kruh
This new, one-of-a-kind volume contains original essays, historical and technical papers, and translations of historical materials and retrospectives concerning the German Enigma Cipher machine. Readers get a comprehensive view of the Enigma machine's development, uses, role in World War II Allied intelligence, and cryptoanalysis.
This new, one-of-a-kind volume contains original essays, historical and technical papers, and translations of historical materials and retrospectives ...
cena: 535,29

 Cryptography for Developers Tom St Denis (senior software developer and cryptographer for the Advanced Micro Devices Corporation.) 9781597491044 Syngress Media,U.S.
Cryptography for Developers

ISBN: 9781597491044 / Angielski / Miękka / 400 str.

ISBN: 9781597491044/Angielski/Miękka/400 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tom St Denis (senior software developer and cryptographer fo
The only guide for software developers who must learn and implement cryptography safely and cost effectively.

Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes...

The only guide for software developers who must learn and implement cryptography safely and cost effectively.

Cryptography for Developers b...

cena: 360,60

 Cryptography and Security Services: Mechanisms and Applications Mogollon, Manuel 9781599048376 Cybertech Publishing
Cryptography and Security Services: Mechanisms and Applications

ISBN: 9781599048376 / Angielski / Twarda / 490 str.

ISBN: 9781599048376/Angielski/Twarda/490 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Manuel Mogollon
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms.
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing securi...
cena: 502,49

 Foundations of Computer Security David Salomon D. Salomon 9781846281938 Springer
Foundations of Computer Security

ISBN: 9781846281938 / Angielski / Twarda / 369 str.

ISBN: 9781846281938/Angielski/Twarda/369 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Salomon; D. Salomon

Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its comprehensive treatment of all the major areas of computer security aims to give readers a complete foundation in the field of Computer Security. Exercises are given throughout the book and are intended to strengthening the reader s knowledge - answers...

Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is i...

cena: 201,24

 Computer Insecurity: Risking the System Furnell, Steven M. 9781852339432 Springer
Computer Insecurity: Risking the System

ISBN: 9781852339432 / Angielski / Miękka / 256 str.

ISBN: 9781852339432/Angielski/Miękka/256 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Steven Furnell

Security is one of the most significant issues facing the owners and users of computer systems in the Internet age, and recent years have convincingly illustrated that the problem is increasing in both scale and cost.

Computer Insecurity: Risking the System approaches its topic from the perspective of vulnerability how can your system be attacked? Covering technical issues and human factors, the comprehensively researched text makes reference to numerous real-life security incidents, which help to provide persuasive practical evidence of the problems and the impacts that...

Security is one of the most significant issues facing the owners and users of computer systems in the Internet age, and recent years have convincin...

cena: 402,53

 Cisco Security Professional's Guide to Secure Intrusion Detection Systems Syngress 9781932266696 Syngress Media,U.S.
Cisco Security Professional's Guide to Secure Intrusion Detection Systems

ISBN: 9781932266696 / Angielski / Miękka / 656 str.

ISBN: 9781932266696/Angielski/Miękka/656 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Syngress

Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads in the IDS market segment, with major upgrades having happened in February of 2003.

Cisco Security Professional's Guide to Secure Intrusion Detection Systems is a comprehensive, up-to-date guide to the hardware and software that comprise the Cisco IDS. Cisco Security Professional's Guide to Secure Intrusion Detection Systems does more than show network engineers how to set up and manage this line of best selling products...

Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads...

cena: 339,43

 Information Systems Security: First International Conference, Iciss 2005, Kolkata, India, December 19-21, 2005, Proceedings Jajodia, Sushil 9783540307068 Springer
Information Systems Security: First International Conference, Iciss 2005, Kolkata, India, December 19-21, 2005, Proceedings

ISBN: 9783540307068 / Angielski / Miękka / 342 str.

ISBN: 9783540307068/Angielski/Miękka/342 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
S. Jajoda; Sushil Jajodia
Constitutes the refereed proceedings of the First International Conference on Information Systems Security, ICISS 2005. This book discusses the state of the research and practice in information systems security. It covers such topics as: authentication and access control, mobile code security, key management and cryptographic protocols, and more.
Constitutes the refereed proceedings of the First International Conference on Information Systems Security, ICISS 2005. This book discusses the state ...
cena: 201,24

 Computer Safety, Reliability, and Security: 19th International Conference, SAFECOMP 2000, Rotterdam, The Netherlands, October 24-27, 2000 Proceedings Floor Koornneef, Meine van der Meulen 9783540411864 Springer-Verlag Berlin and Heidelberg GmbH &
Computer Safety, Reliability, and Security: 19th International Conference, SAFECOMP 2000, Rotterdam, The Netherlands, October 24-27, 2000 Proceedings

ISBN: 9783540411864 / Angielski / Miękka / 438 str.

ISBN: 9783540411864/Angielski/Miękka/438 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Floor Koornneef;Meine van der Meulen
This title constitutes the refereed proceedings of the 19th International Conference on Computer Safety, Reliability, and Security. The 33 revised full papers presented together with three invited papers are organized in topical sections on verification and validation software process improvement formal methods safety guidelines, standards and certification hardware aspects safety assessment design for safety and transport and infrastructure.
This title constitutes the refereed proceedings of the 19th International Conference on Computer Safety, Reliability, and Security. The 33 revised ful...
cena: 201,24

 Sequences and Their Applications - Seta 2006: 4th International Conference, Beijing, China, September 24-28, 2006, Proceedings Gong, Guang 9783540445234 Springer
Sequences and Their Applications - Seta 2006: 4th International Conference, Beijing, China, September 24-28, 2006, Proceedings

ISBN: 9783540445234 / Angielski / Miękka / 450 str.

ISBN: 9783540445234/Angielski/Miękka/450 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Guang Gong; Tor Helleseth; Hong-Yeop Song

This book constitutes the refereed proceedings of the 4th International Conference on Sequences and Their Applications, SETA 2006. The book presents 32 revised full papers together with 4 invited lectures. The papers are organized in topical sections on linear complexity of sequences, correlation of sequences, stream ciphers and transforms, topics in complexities of sequences, multi-sequence synthesis, sequences and combinatorics, FCSR sequences, aperiodic correlation and applications, and boolean functions, and more.


This book constitutes the refereed proceedings of the 4th International Conference on Sequences and Their Applications, SETA 2006. The book present...

cena: 201,24

 Fault Diagnosis and Tolerance in Cryptography: Third International Workshop, Fdtc 2006, Yokohama, Japan, October 10, 2006, Proceedings Breveglieri, Luca 9783540462507 Springer
Fault Diagnosis and Tolerance in Cryptography: Third International Workshop, Fdtc 2006, Yokohama, Japan, October 10, 2006, Proceedings

ISBN: 9783540462507 / Angielski / Miękka / 258 str.

ISBN: 9783540462507/Angielski/Miękka/258 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Luca Breveglieri
In recent years applied cryptography has developed considerably to satisfy the - creasing security requirements of various information technology disciplines, such as telecommunications, networking, database systems, mobile applications and others. Cryptosystems are inherently computationally complex and in order to satisfy the high throughput requirements of many applications, they are often implemented by means of either VLSI devices (cryptographic accelerators) or highly optimized software routines (cryptographic libraries) and are used via suitable (network) protocols. The sophistication...
In recent years applied cryptography has developed considerably to satisfy the - creasing security requirements of various information technology disc...
cena: 201,24

 Communications and Multimedia Security: 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings Herbert Leitold, Evangelos Markatos 9783540478201 Springer-Verlag Berlin and Heidelberg GmbH &
Communications and Multimedia Security: 10th IFIP TC-6 TC 11 International Conference, CMS 2006, Heraklion Crete, Greece, October 19-21, 2006, Proceedings

ISBN: 9783540478201 / Angielski / Miękka / 260 str.

ISBN: 9783540478201/Angielski/Miękka/260 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Herbert Leitold;Evangelos Markatos
Duringthelastfewyearsweseenetworkandinformationsystemsecurityplaying an increasingly important role in our everyday lives. As our computers continue to get infested by all sorts of malware, and as our networks continue to choke with spam and malicious tra?c, we see more and more people losing their co- dence in information technologies as they get signi?cantly concernedabout their security as well as their privacy and that of their loved ones. In their e?ort to cope with the problem, scientists, managers, and politicians all over the world havedesignedandarecurrently implementing...
Duringthelastfewyearsweseenetworkandinformationsystemsecurityplaying an increasingly important role in our everyday lives. As our computers continue t...
cena: 201,24

 Personal Medical Information: Security, Engineering, and Ethics Anderson, Ross 9783540632443 Springer
Personal Medical Information: Security, Engineering, and Ethics

ISBN: 9783540632443 / Angielski / Miękka / 254 str.

ISBN: 9783540632443/Angielski/Miękka/254 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Anderson; Ross Anderson; Ross Anderson
In the last few years, the protection of computerised medical records, and of other personal health information, has become the subject of both technical research and political dispute in a number of countries. In Britain, the issue arose initially as an argument between the British Me dical Association and the Department of Health over whether encryption should be used in a new medical network. In Germany, the focus was the issue to all patients of a smartcard to hold insurance details and facilitate payment; while in the USA, the debate has been whether federal law should preempt state re...
In the last few years, the protection of computerised medical records, and of other personal health information, has become the subject of both techni...
cena: 201,24

 Modern Cryptography, Probabilistic Proofs and Pseudorandomness Oded Goldreich R. L. Graham B. Korte 9783540647669 Springer
Modern Cryptography, Probabilistic Proofs and Pseudorandomness

ISBN: 9783540647669 / Angielski / Twarda / 183 str.

ISBN: 9783540647669/Angielski/Twarda/183 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Oded Goldreich; R. L. Graham; B. Korte
You can start by putting the DO NOT DISTURB sign. Cay, in Desert Hearts (1985). The interplay between randomness and computation is one of the most fas- cinating scientific phenomena uncovered in the last couple of decades. This interplay is at the heart of modern cryptography and plays a fundamental role in complexity theory at large. Specifically, the interplay of randomness and computation is pivotal to several intriguing notions of probabilistic proof systems and is the focal of the computational approach to randomness. This book provides an introduction to these three, somewhat...
You can start by putting the DO NOT DISTURB sign. Cay, in Desert Hearts (1985). The interplay between randomness and computation is one of the most fa...
cena: 523,30

 Coding Theory, Cryptography and Related Areas: Proceedings of an International Conference on Coding Theory, Cryptography and Related Areas, Held in Gu Buchmann, Johannes 9783540662488 Springer
Coding Theory, Cryptography and Related Areas: Proceedings of an International Conference on Coding Theory, Cryptography and Related Areas, Held in Gu

ISBN: 9783540662488 / Angielski / Miękka / 260 str.

ISBN: 9783540662488/Angielski/Miękka/260 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
J. Buchmann; T. Hoholdt; H. Stichtenoth

A series of research papers on various aspects of coding theory, cryptography, and other areas, including new and unpublished results on the subjects. The book will be useful to students, researchers, professionals, and tutors interested in this area of research.


A series of research papers on various aspects of coding theory, cryptography, and other areas, including new and unpublished results on the subjec...

cena: 402,53

 Arithmetic of Finite Fields: First International Workshop, Waifi 2007 Carlet, Claude 9783540730736 Springer
Arithmetic of Finite Fields: First International Workshop, Waifi 2007

ISBN: 9783540730736 / Angielski / Miękka / 374 str.

ISBN: 9783540730736/Angielski/Miękka/374 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Berk Sunar; Claude Carlet

This book constitutes the refereed proceedings of the First International Workshop on the Arithmetic of Finite Fields, WAIFI 2007, held in Madrid, Spain in June 2007. It covers structures in finite fields, efficient implementation and architectures, efficient finite field arithmetic, classification and construction of mappings over finite fields, curve algebra, cryptography, codes, and discrete structures.


This book constitutes the refereed proceedings of the First International Workshop on the Arithmetic of Finite Fields, WAIFI 2007, held in Madrid, ...

cena: 201,24

 Modern Cryptology Brassard, Gilles 9780387968421 Springer
Modern Cryptology

ISBN: 9780387968421 / Angielski / Miękka / 116 str.

ISBN: 9780387968421/Angielski/Miękka/116 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gilles Brassard
Cryptology is the art and science of secure communication over insecure channels. The primary aim of this book is to provide a self-contained overview of recent cryptologic achievements and techniques in a form that can be understood by readers having no previous acquaintance with cryptology. It can thus be used as independent reading by whoever wishes to get started on the subject. An extensive bibliography of 250 references is included to help the reader deepen his or her understanding and go beyond the topics treated here. This book can also be used as preliminary material for an...
Cryptology is the art and science of secure communication over insecure channels. The primary aim of this book is to provide a self-contained overview...
cena: 173,06

 Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991 Bart Preneel, Rene Govaerts, Joos Vandewalle 9783540573418 Springer-Verlag Berlin and Heidelberg GmbH &
Computer Security and Industrial Cryptography: State of the Art and Evolution. ESAT Course, Leuven, Belgium, May 21-23, 1991

ISBN: 9783540573418 / Angielski / Miękka / 284 str.

ISBN: 9783540573418/Angielski/Miękka/284 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bart Preneel;Rene Govaerts;Joos Vandewalle
This volume is based on a course held several times, and again in 1993, at the ESAT Laboratorium of the Department of Electrical Engineering at the Katholieke Universiteit Leuven in Belgium. These courses are intended for both researchers in computer security and cryptography and for practitioners in industry and government. The contributors of the 1991 course were invited to submit revised and updated versions of their papers for inclusion in a book. This volume is the final result; it is well- balanced between basic theory and real life applications, between mathematical background and...
This volume is based on a course held several times, and again in 1993, at the ESAT Laboratorium of the Department of Electrical Engineering at the Ka...
cena: 189,17

 Cryptographic Hardware and Embedded Systems: First International Workshop, CHES'99 Worcester, MA, USA, August 12-13, 1999 Proceedings Cetin K. Koc, Christof Paar 9783540666462 Springer-Verlag Berlin and Heidelberg GmbH &
Cryptographic Hardware and Embedded Systems: First International Workshop, CHES'99 Worcester, MA, USA, August 12-13, 1999 Proceedings

ISBN: 9783540666462 / Angielski / Miękka / 356 str.

ISBN: 9783540666462/Angielski/Miękka/356 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Cetin K. Koc;Christof Paar
This text constitutes the refereed proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems (CHES '99), held in Worcester, Massachussetts, USA in August 1999. The 27 papers presented together with three invited contributions are organized in sections on cryptographic hardware, hardware architectures, smartcards and embedded systems, arithmetic algorithms, power attacks, true random numbers, cryptographic algorithms on FPGAs, elliptic curve implementations, new cryptographic schemes and modes of operation.
This text constitutes the refereed proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems (CHES '99), held in ...
cena: 201,24

 Information Security Management & Small Systems Security: Ifip Tc11 Wg11.1/Wg11.2 Seventh Annual Working Conference on Information Security Management Eloff, Jan H. P. 9780792386261 Kluwer Academic Publishers
Information Security Management & Small Systems Security: Ifip Tc11 Wg11.1/Wg11.2 Seventh Annual Working Conference on Information Security Management

ISBN: 9780792386261 / Angielski / Twarda / 248 str.

ISBN: 9780792386261/Angielski/Twarda/248 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jan H. P. Eloff; Les Labuschagne; Rossouw Von Solms
The 7th Annual Working Conference of ISMSSS (lnformation Security Management and Small Systems Security), jointly presented by WG 11.1 and WG 11.2 of the International Federation for Information Processing {IFIP), focuses on various state-of-art concepts in the two relevant fields. The conference focuses on technical, functional as well as managerial issues. This working conference brings together researchers and practitioners of different disciplines, organisations, and countries, to discuss the latest developments in (amongst others) secure techniques for smart card technology, information...
The 7th Annual Working Conference of ISMSSS (lnformation Security Management and Small Systems Security), jointly presented by WG 11.1 and WG 11.2 of ...
cena: 603,81

 Research Directions in Data and Applications Security XVIII: Ifip Tc11 / Wg11.3 Eighteenth Annual Conference on Data and Applications Security July 25 Farkas, Csilla 9781402081279 Springer
Research Directions in Data and Applications Security XVIII: Ifip Tc11 / Wg11.3 Eighteenth Annual Conference on Data and Applications Security July 25

ISBN: 9781402081279 / Angielski / Twarda / 385 str.

ISBN: 9781402081279/Angielski/Twarda/385 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Csilla Farkas; Pierangela Samarati; Csilla Farkas

As Information Technology becomes a vital part of our everyday activities, ranging from personal use to government and defense applications, the need to develop high-assurance systems increases. Data and applications security and privacy are crucial elements in developing such systems.

Research Directions in Data and Applications Security XVIII presents original unpublished research results, practical experiences, and innovative ideas in the field of data and applications security and privacy. Topics presented in this volume include:
-Database theory;...

As Information Technology becomes a vital part of our everyday activities, ranging from personal use to government and defense applications, the ne...

cena: 402,53

Pierwsza Podprzednia  85  86  87  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia