![]() |
Architecting Critical Systems: First International Symposium, Prague, Czech Republic, June 23-25, 2010
ISBN: 9783642135552 / Angielski / Miękka / 205 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Architecting critical systems has gained major importance in commercial, g- ernmentalandindustrialsectors. Emergingsoftwareapplicationsencompasscr- icalities that are associated with either the whole system or some of its com- nents. Therefore, e?ective methods, techniques, and tools for constructing, te- ing, analyzing, and evaluating the architectures for critical systems are of major importance. Furthermore, these methods, techniques and tools must address - sues of dependability and security, while focusing not only on the development, but also on the deployment and evolution of the...
Architecting critical systems has gained major importance in commercial, g- ernmentalandindustrialsectors. Emergingsoftwareapplicationsencompasscr- ic...
|
cena:
200,77 |
![]() |
Arithmetic of Finite Fields: Third International Workshop, Waifi 2010, Istanbul, Turkey, June 27-30, 2010, Proceedings
ISBN: 9783642137969 / Angielski / Miękka / 280 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. These are the proceedings of WAIFI 2010, the Third International Workshop on theArithmeticofFiniteFields, heldinIstanbul, Turkey, duringJune27-30,2010. The ?rst workshop, WAIFI 2007, was held in Madrid, Spain, and then WAIFI 2008 was held in Siena, Italy. In 2008, the workshop series was made biannual and it is now being held every even year, bringing together mathematicians, computer scientists, engineers and physicists who are doing research on various aspects of ?nite ?eld arithmetic. This year the workshop received 33 submissions, each of which was reviewed by at least three reviewerswho...
These are the proceedings of WAIFI 2010, the Third International Workshop on theArithmeticofFiniteFields, heldinIstanbul, Turkey, duringJune27-30,2010...
|
cena:
200,77 |
![]() |
Public Key Infrastructures, Services and Applications: 9th European Workshop, Europki 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Paper
ISBN: 9783642400117 / Angielski / Miękka / 195 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 9th European Workshop, EuroPKI 2012, held in Pisa, Italy, in September 2012. The 12 revised full papers presented were carefully selected from 30 submissions and cover topics such as Cryptographic Schemas and Protocols, Public Key Infrastructure, Wireless Authentication and Revocation, Certificate and Trusted Computing, and Digital Structures. This book constitutes the thoroughly refereed post-conference proceedings of the 9th European Workshop, EuroPKI 2012, held in Pisa, Italy, in Septe... |
cena:
184,75 |
![]() |
Personal Satellite Services: Second International ICST Conference, PSATS 2010, Rome, Italy, February 4-5, 2010, Revised Selected Papers
ISBN: 9783642136177 / Angielski / Miękka / 454 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST Conference on Personal Satellite Services, PSATS 2010, held in Rome, Italy, Februray 2010. The conference included a keynote speech, 4 regular technical tracks and 4 special sessions consisting of 33 high-quality scientific papers. These cover various topics such as Satellite Communications: Coding and Modulations, Multimedia Integration, Satellite Network: Quality of Service and Architectures and Applications and Services, as well as Delay-Tolerant Networks, Quantum Satellite...
This book constitutes the thoroughly refereed post-conference proceedings of the Second International ICST Conference on Personal Satellite Services, ...
|
cena:
200,77 |
![]() |
Formal Aspects in Security and Trust: 6th International Workshop, FAST 2009 Eindhoven, The Netherlands, November 5-6, 2009 Revised Selected Papers
ISBN: 9783642124587 / Angielski / Miękka / 279 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The present volume contains the proceedings of the 6th International workshop on Formal Aspects of Security and Trust (fast 2009), held in Eindhoven, The Netherlands, 5-6 November 2009, as part of Formal Methods Week 2009. fast is sponsored by IFIP WG 1.7 on Foundations of Security Analysis and Design. The previous ?ve fast workshop editions have fostered cooperation among researchers in the areas of security and trust, and we aimed to continue this tradition. As computing and networkinfrastructures become increasingly per- sive, and as they carry increasing economic activity, society needs...
The present volume contains the proceedings of the 6th International workshop on Formal Aspects of Security and Trust (fast 2009), held in Eindhoven, ...
|
cena:
200,77 |
![]() |
Security and Policy Driven Computing
ISBN: 9781439825792 / Angielski / Twarda / 290 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management. The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses...
Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author i...
|
cena:
825,84 |
![]() |
Recent Trends in Network Security and Applications: Third International Conference, Cnsa 2010, Chennai, India, July 23-25, 2010 Proceedings
ISBN: 9783642144776 / Angielski / Miękka / 636 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Third International Conference on Network Security and Applications (CNSA-2010) focused on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding modern security threats and countermeasures, and establishing new collaborations in these areas. Authors are invited to contribute to the conference by submitting articles that illustrate research results, projects, survey work and industrial experiences describing...
The Third International Conference on Network Security and Applications (CNSA-2010) focused on all technical and practical aspects of security and its...
|
cena:
401,58 |
![]() |
Algorithmic Number Theory: 9th International Symposium, Ants-IX, Nancy, France, July 19-23, 2010, Proceedings
ISBN: 9783642145179 / Angielski / Miękka / 397 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the 9th International Algorithmic Number Theory Symposium, ANTS 2010, held in Nancy, France, in July 2010. This book features the papers that are devoted to algorithmic aspects of number theory, including elementary number theory, algebraic number theory, analytic number theory, and more.
Constitutes the refereed proceedings of the 9th International Algorithmic Number Theory Symposium, ANTS 2010, held in Nancy, France, in July 2010. Thi...
|
cena:
200,77 |
![]() |
Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
ISBN: 9783642149917 / Angielski / Twarda / 257 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010. FinancialCryptographyandData Securityis a majorinternationalforumfor research, advanced development, education, exploration, and debate regarding information assurance, with a speci?c focus on commercial contexts. The c- ference covers all aspects of securing transactions and systems and especially encourages original work focusing on both fundamental and applied real-world...
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conferenc...
|
cena:
200,77 |
![]() |
Trust Management IV: 4th Ifip Wg 11.11 International Conference, Ifiptm 2010, Morioka, Japan, June 16-18, 2010, Proceedings
ISBN: 9783642134456 / Angielski / Twarda / 276 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan during June 16-18, 2010. IFIPTM 2010 provided a truly global platform for the reporting of research, development, policy, and practice in the interdependent arrears of privacy, se- rity, and trust. Building on the traditions inherited from the highly succe- ful iTrust conference series, the IFIPTM 2007 conference in Moncton, New Brunswick, Canada, the IFIPTM 2008 conference in Trondheim, Norway, and the IFIPTM 2009 conference at Purdue...
This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan...
|
cena:
200,77 |
![]() |
Trust, Privacy and Security in Digital Business: 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010, Proceedings
ISBN: 9783642151514 / Angielski / Miękka / 252 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents the proceedings of the 7th International Conference on Trust, P- vacy and Security in Digital Business (TrustBus 2010), held in Bilbao, Spain during August 30-31, 2010. The conference continued from previous events held in Zaragoza (2004), Copenhagen (2005), Krakow (2006), Regensburg (2007), Turin (2008) and Linz (2009). The recent advances in information and communication technologies (ICT) have raised new opportunities for the implementation of novel applications and the provision of high-quality services over global networks. The aim is to utilize this 'information...
This book presents the proceedings of the 7th International Conference on Trust, P- vacy and Security in Digital Business (TrustBus 2010), held in Bil...
|
cena:
200,77 |
![]() |
Global Security, Safety, and Sustainability: 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010, Proceedings
ISBN: 9783642157165 / Angielski / Miękka / 301 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The annual International Conference on Global Security, Safety and Sustainability (ICGS3) is an established platform in which security, safety and sustainability issues can be examined from several global perspectives through dialogue between acad- ics, students, government representatives, chief executives, security professionals, and research scientists from the United Kingdom and from around the globe. The three-day conference focused on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and...
The annual International Conference on Global Security, Safety and Sustainability (ICGS3) is an established platform in which security, safety and sus...
|
cena:
200,77 |
![]() |
New Technologies for Digital Crime and Forensics: Devices, Applications, and Software
ISBN: 9781609605155 / Angielski / Twarda / 374 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. New Technologies for Digital Crime and Forensics: Devices, Applications, and Software provides theories, methods, and studies on digital crime prevention and investigation, which are useful to a broad range of researchers and communities. This field is under constant evolution as the nature of digital crime continues to change and new methods for tracking and preventing digital attacks are developed.
New Technologies for Digital Crime and Forensics: Devices, Applications, and Software provides theories, methods, and studies on digital crime prevent...
|
cena:
897,39 |
![]() |
Security and Privacy - Silver Linings in the Cloud: 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010,
ISBN: 9783642152566 / Angielski / Twarda / 332 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this conf- ence, which is the 25th in a series of well-established international conferences on security and privacy organized annually by Technical Committee 11 (TC-11) of IFIP. Moreover, in 2010 it is part of the IFIP World Computer Congress 2010 celebrating both the Golden Jubilee of IFIP (founded in 1960) and the Silver Jubilee of the SEC conference in the exciting city of Brisbane, Australia, during September 20-23. The call for...
These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceeding...
|
cena:
200,77 |
![]() |
What Kind of Information Society?: Governance, Virtuality, Surveillance, Sustainability, Resilience
ISBN: 9783642154782 / Angielski / Miękka / 416 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The present book contains the proceedings of two conferences held at the World Computer Congress 2010 in Brisbane, Australia (September 20-23) organised by the International Federation for Information Processing (IFIP). In the first part, the reader can find the proceedings of the 9th Human Choice and Computers International C- ference (HCC9) organised by the IFIP Technical Committee TC9 on the Relationship Between ICT and Society. The HCC9 part is subdivided into four tracks: Ethics and ICT Governance, Virtual Technologies and Social Shaping, Surveillance and Privacy, and ICT and Sustainable...
The present book contains the proceedings of two conferences held at the World Computer Congress 2010 in Brisbane, Australia (September 20-23) organis...
|
cena:
401,58 |
![]() |
Computer Security - ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010, Proceedings
ISBN: 9783642154966 / Angielski / Miękka / 718 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The EuropeanSymposium on Researchin Computer Security (ESORICS) has a tradition that goes back two decades. It tries to bring together the international research community in a top-quality event that covers all the areas of computer security, ranging from theory to applications. ESORICS 2010 was the 15th edition of the event. It was held in Athens, Greece, September 20-22, 2010. The conference received 201 submissions. The papers went through a careful review process. In a ?rst round, each paper - ceived three independent reviews. For the majority of the papers an electronic discussion was...
The EuropeanSymposium on Researchin Computer Security (ESORICS) has a tradition that goes back two decades. It tries to bring together the internation...
|
cena:
401,58 |
![]() |
Privacy, Security and Trust Within the Context of Pervasive Computing
ISBN: 9781441936295 / Angielski / Miękka / 171 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria. The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces between mechanisms in different technical and social problem spaces. An investigation of the interfaces between the notions of context, privacy, security, and trust will result in a deeper understanding of the "atomic"... Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second i... |
cena:
401,58 |
![]() |
Semistructured Database Design
ISBN: 9781441936387 / Angielski / Miękka / 178 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Semistructured Database Design provides an essential reference for anyone interested in the effective management of semsistructured data. Since many new and advanced web applications consume a huge amount of such data, there is a growing need to properly design efficient databases. This volume responds to that need by describing a semantically rich data model for semistructured data, called Object-Relationship-Attribute model for Semistructured data (ORA-SS). Focusing on this new model, the book discusses problems and presents solutions for a number of topics,... Semistructured Database Design provides an essential reference for anyone interested in the effective management of semsistructure... |
cena:
401,58 |
![]() |
Security in E-Learning
ISBN: 9781441937223 / Angielski / Miękka / 185 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this topic. Security in E-Learning discusses typical threats to e-learning projects and introduces how these issues have been and should be addressed. This knowledge is essential to conduct a security risk analysis effectively, because participants need to be aware of common threats, protection mechanisms and effort/cost issues. Based on the security risk analysis, appropriate preventive measures are thoroughly discussed in this... As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this... |
cena:
401,58 |
![]() |
Kryptografie in Theorie Und Praxis: Mathematische Grundlagen Für Internetsicherheit, Mobilfunk Und Elektronisches Geld
ISBN: 9783834809773 / Niemiecki / Miękka / 324 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Kryptografie hat sich in jungster Zeit als eine Wissenschaft gezeigt, bei der mathematische Methoden mit besonderem Erfolg eingesetzt werden konnen. Das Buch stellt die gesamte Kryptografie unter diesem Aspekt vor: Grundlagen und Anwendungen, Verschlusselung und Authentifikation, symmetrische Algorithmen und Public-Key-Verfahren werden entsprechend ihrer Wichtigkeit prasentiert. Das Buch hat den Umfang einer 2-semestrigen Vorlesung, aufgrund seiner klaren Darstellung eignet es sich aber auch hervorragend zum Selbststudium. Zahlreiche Ubungsaufgaben von unterschiedlichem Schwierigkeitsgrad...
Kryptografie hat sich in jungster Zeit als eine Wissenschaft gezeigt, bei der mathematische Methoden mit besonderem Erfolg eingesetzt werden konnen. D...
|
cena:
187,64 |