![]() |
Elementary Cryptanalysis
ISBN: 9780883856475 / Angielski / Twarda / 224 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. An introduction to the basic mathematical techniques involved in cryptanalysis.
An introduction to the basic mathematical techniques involved in cryptanalysis.
|
cena:
219,26 |
![]() |
Innovations in Digital Watermarking Techniques
ISBN: 9783642031861 / Angielski / Twarda / 186 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information security and copyright protection are more important today than before. Digital watermarking is one of the widely used techniques used in the world in the area of information security. This book introduces a number of digital watermarking techniques and is divided into four parts. The first part introduces the importance of watermarking techniques and intelligent technology. The second part includes a number of watermarking techniques. The third part includes the hybrid watermarking techniques and the final part presents conclusions. This book is directed to students, professors,...
Information security and copyright protection are more important today than before. Digital watermarking is one of the widely used techniques used in ...
|
cena:
402,53 |
![]() |
Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures
ISBN: 9783642038280 / Angielski / Miękka / 339 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents tutorial lectures from three International Schools on Foundations of Security Analysis and Design, FOSAD 2007/2008/2009. Topics include cryptographic protocol analysis, identity management and electronic voting, and wireless security. This book presents tutorial lectures from three International Schools on Foundations of Security Analysis and Design, FOSAD 2007/2008/2009. Topics ... |
cena:
184,98 |
![]() |
Contemporary Computing
ISBN: 9783642035463 / Angielski / Miękka / 684 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Welcome to the Second International Conference on Contemporary Computing, which was held in Noida (outskirts of New Delhi), India. Computing is an exciting and evolving area. This conference, which was jointly organized by the Jaypee Institute of Information Technology University, Noida, India and the University of Florida, Gainesville, USA, focused on topics that are of contemporary interest to computer and computational scientists and engineers. The conference had an exciting technical program of 61 papers submitted by - searchers and practitioners from academia, industry and government to...
Welcome to the Second International Conference on Contemporary Computing, which was held in Noida (outskirts of New Delhi), India. Computing is an exc...
|
cena:
402,53 |
![]() |
Securing Wireless Communications at the Physical Layer
ISBN: 9781441913845 / Angielski / Twarda / 396 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Securing communications is a challenging task. A ?rst attempt at security involves learning basic cryptography, and applying encryption algorithms to make messages unintelligible to adversaries. However, rarely is the task of securing a message - changesosimple.Whenonestepsbackandcontemplateshowtosecuretheexchange of communications, one realizes that the challenge is fundamentally one of bui- ing a complete solution. For example, one must ensure that all entities involved have proper and authenticated cryptographic material, or one must ensure that one veri?ably knows to whom one is...
Securing communications is a challenging task. A ?rst attempt at security involves learning basic cryptography, and applying encryption algorithms to ...
|
cena:
603,81 |
![]() |
Recent Advances in Intrusion Detection: 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009, Proceedings
ISBN: 9783642043413 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 12th International Symposium on Recent Advances in Intrusion Detection systems (RAID 2009), which took place in Saint-Malo, France, during September 23-25. As in the past, the symposium brought together leading - searchers and practitioners from academia, government, and industry to discuss intrusion detection research and practice. There were six main sessions prese- ingfullresearchpapersonanomalyandspeci?cation-basedapproaches, malware detection and prevention, network and host intrusion detection and...
On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 12th International Symposium on Recent Advances in Intrusion ...
|
cena:
201,24 |
![]() |
Ad-Hoc, Mobile and Wireless Networks: 8th International Conference, ADHOC-NOW 2009, Murcia, Spain, September 22-25, 2009, Proceedings
ISBN: 9783642043826 / Angielski / Miękka / 420 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 8th International Conference on Ad-Hoc Networks and Wireless (ADHOC-NOW 2009) was held September 22-25, 2009 in Murcia, Spain. Since ADHOCNOW started as a workshop in 2002, it has become a well-established and well-known international conference dedicated to wireless and mobile c- puting. During the last few years it has been held in Toronto, Canada (2002), Montreal, Canada (2003), Vancouver, Canada (2004), Cancun, Mexico (2005), Ottawa, Canada (2006), Morelia, Mexico (2007) and Sophia Antipolis, France (2008). The conference serves as a forum for interesting discussions on ongoing...
The 8th International Conference on Ad-Hoc Networks and Wireless (ADHOC-NOW 2009) was held September 22-25, 2009 in Murcia, Spain. Since ADHOCNOW star...
|
cena:
201,24 |
![]() |
Detection of Intrusions and Malware, and Vulnerability Assessment: 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009, Proceedings
ISBN: 9783642029172 / Angielski / Miękka / 236 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 6th GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Since 2004, DIMVA annually brings together leading researchers and practitioners from academia, government and industry to present and discuss novel security research. DIMVA is organized by the Special Interest Group Security-Intrusion Detection and Response (SIDAR)-of the German Inf- matics Society (GI). The DIMVA 2009 Program Committee received 44 submissions from ind- trial and academic...
On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 6th GI International Conference on Detection of Intrusions an...
|
cena:
201,24 |
![]() |
Protecting Persons While Protecting the People: Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers
ISBN: 9783642102325 / Angielski / Miękka / 139 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Second Annual Workshop on Privacy and Security, organized by the Center for Interdisciplinary Studies in Information Privacy and Security of the School of C- munication and Information at Rutgers University, was held on May 12, 2008 at the Hyatt Regency, New Brunswick, New Jersey, USA. A few of the papers in this volume were produced through a multi-step process. First, we recorded the talk given by each author at the workshop in May 2008. Next, we transcribed the recording. The authors then produced a draft of their paper from these transcriptions, refining each draft until the final...
The Second Annual Workshop on Privacy and Security, organized by the Center for Interdisciplinary Studies in Information Privacy and Security of the S...
|
cena:
201,24 |
![]() |
Handbook of Data Compression
ISBN: 9781848829022 / Angielski / Twarda / 1361 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Data compression is one of the most important fields and tools in modern computing. From archiving data, to CD-ROMs, and from coding theory to image analysis, many facets of modern computing rely upon data compression. This book provides a comprehensive reference for the many different types and methods of compression. Included are a detailed and helpful taxonomy, analysis of most common methods, and discussions on the use and comparative benefits of methods and description of "how to" use them. Detailed descriptions and explanations of the most well-known and frequently used compression... Data compression is one of the most important fields and tools in modern computing. From archiving data, to CD-ROMs, and from coding theory to imag... |
cena:
771,70 |
![]() |
Data Privacy Management and Autonomous Spontaneous Security
ISBN: 9783642112065 / Angielski / Miękka / 265 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the two international workshops DPM 2009, the 4th International Workshop on Data Privacy Management, and SETOP 2009, the Second International Workshop on Autonomous and Spontaneous Security, collocated with the ESORICS 2009 symposium in St. Malo, France, in September 2009. The 8 revised full papers for DPM 2009, selected from 23 submissions, presented together with two keynote lectures are accompanied by 9 revised full papers of SETOP 2009; all papers were carefully reviewed and selected for inclusion in the... This book constitutes the thoroughly refereed post-conference proceedings of the two international workshops DPM 2009, the 4th International Worksh... |
cena:
201,24 |
![]() |
Open Source Software for Digital Forensics
ISBN: 9781441958020 / Angielski / Twarda / 124 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in computer forensics. It presents the motivations for using FLOSS applications as tools for collection, preservation and analysis of digital evidence in computer and network forensics. It also covers extensively several forensic FLOSS tools, their origins and evolution. Open Source Software for Digital Forensics is based on the OSSCoNF workshop, which was held in Milan, Italy, September 2008 at the World Computing Congress, co-located with OSS 2008. This edited... Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in computer forensics.... |
cena:
603,81 |
![]() |
Information Security and Digital Forensics: First International Conference, ISDF 2009 London, United Kingdom, September 7-9, 2009 Revised Selected Pap
ISBN: 9783642115295 / Angielski / Miękka / 196 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ISDF 2009, the First International Conference on Information Security and Digital Forensics, was held at City University London during September 7-8, 2009. The c- ference was organized as a meeting point for leading national and international - perts of information security and digital forensics. The conference was rewarding in many ways; ISDF 2009 was an exciting and vibrant event, with 4 keynote talks, 25 invited talks and 18 full-paper presentations and those attending had the opportunity to meet and talk with many distinguished people who are responsible for shaping the area of...
ISDF 2009, the First International Conference on Information Security and Digital Forensics, was held at City University London during September 7-8, ...
|
cena:
201,24 |
![]() |
Security Technology: International Conference, Sectech 2009, Held as Part of the Future Generation Information Technology Conference, Fgit
ISBN: 9783642108464 / Angielski / Miękka / 308 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the advancement of FGIT as a whole. Of particular interest are hybrid solutions that c- bine ideas taken from multiple disciplines in order to achieve something more signi- cant than the sum of the individual parts. Through such hybrid philosophy, a new principle...
As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common t...
|
cena:
201,24 |
![]() |
Information Systems Security: 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings
ISBN: 9783642107719 / Angielski / Miękka / 325 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The management of services and operations in today s organizations are - coming increasingly dependent on their enterprise local area network (enterprise LAN). An enterprise LAN consists of a set of network zones (logical group of networkelements)correspondingto di?erent departments orsections, connected through various interface switches (typically, Layer-3 switches). The network service accesses between these zones and also with the external network (e. g., Internet) are governed by a global network security policy of the organization. This global policy is de?ned as a collection of service...
The management of services and operations in today s organizations are - coming increasingly dependent on their enterprise local area network (enterpr...
|
cena:
201,24 |
![]() |
Security and Privacy in Communication Networks: 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Sel
ISBN: 9783642052835 / Angielski / Miękka / 460 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference, SecureComm 2009, held in September 2009 in Athens, Greece. The 19 revised full papers and 7 revised short papers were carefully reviewed and selected from 76 submissions. The papers cover various topics such as wireless network security, network intrusion detection, security and privacy for the general internet, malware and misbehavior, sensor networks, key management, credentials and authentications, as well as secure multicast and emerging technologies.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference, SecureComm 2009, held in September...
|
cena:
201,24 |
![]() |
e-Business and Telecommunications
ISBN: 9783642051968 / Angielski / Miękka / 482 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. th This book contains the best papers of the 5 International Conference on e-Business and Telecommunications (ICETE), which was held in July 2008, in Porto, Portugal. This conference reflects a continuing effort to increase the dissemination of recent research results among professionals who work in the areas of e-business and te- communications. ICETE is a joint international conference integrating four major areas of knowledge that are divided into four corresponding conferences: ICE-B (- ternational Conf. on e-Business), SECRYPT (International Conf. on Security and Cryptography), SIGMAP...
th This book contains the best papers of the 5 International Conference on e-Business and Telecommunications (ICETE), which was held in July 2008, in ...
|
cena:
402,53 |
![]() |
Speech Dereverberation
ISBN: 9781849960557 / Angielski / Twarda / 388 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Speech Dereverberation gathers together an overview, a mathematical formulation of the problem and the state-of-the-art solutions for dereverberation. Speech Dereverberation presents current approaches to the problem of reverberation. It provides a review of topics in room acoustics and also describes performance measures for dereverberation. The algorithms are then explained with mathematical analysis and examples that enable the reader to see the strengths and weaknesses of the various techniques, as well as giving an understanding of the questions still to be... Speech Dereverberation gathers together an overview, a mathematical formulation of the problem and the state-of-the-art solutions for dere... |
cena:
603,81 |
![]() |
Selected Areas in Cryptography
ISBN: 9780792380238 / Angielski / Twarda / 104 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Selected Areas in Cryptography brings together in one place important contributions and up-to-date research results in this fast moving area.
Selected Areas in Cryptography serves as an excellent reference, providing insight into some of the most challenging research issues in the field. Selected Areas in Cryptography brings together in one place important contributions and up-to-date research results in this fast moving area....
|
cena:
402,53 |
![]() |
Digital Video and Audio Broadcasting Technology: A Practical Engineering Guide
ISBN: 9783642116117 / Angielski / Twarda / 800 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "Digital Video and Audio Broadcasting Technology - A Practical Engineering Guide" deals with all the most important digital television, sound radio and multimedia standards such as MPEG, DVB, DVD, DAB, ATSC, T-DMB, DMB-T, DRM and ISDB-T. The book provides an in-depth look at these subjects in terms of practical experience. In addition it contains chapters on the basics of technologies such as analog television, digital modulation, COFDM or mathematical transformations between time and frequency domains. The attention in the respective field under discussion is focussed on aspects of measuring...
"Digital Video and Audio Broadcasting Technology - A Practical Engineering Guide" deals with all the most important digital television, sound radio an...
|
cena:
402,53 |