Advances in Computers: Information Security Volume 60
ISBN: 9780120121601 / Angielski / Twarda / 340 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Advances in Computers covers new developments in computer technology. Most chapters present an overview of a current subfield within computers, with many citations, and often include new developments in the field by the authors of the individual chapters. Topics include hardware, software, theoretical underpinnings of computing, and novel applications of computers. This current volume emphasizes information security issues and includes topics like certifying computer professionals, non-invasive attacks ("cognitive hacking"), computer files as legal evidence ("computer forensics")... Advances in Computers covers new developments in computer technology. Most chapters present an overview of a current subfield within compute... |
|
cena:
1253,89 zł |
Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia
ISBN: 9780120471447 / Angielski / Twarda / 252 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce. Data Hiding Fundamentals and... Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of servi... |
|
cena:
323,40 zł |
Data Acquisition Techniques Using PCs
ISBN: 9780120683772 / Angielski / Miękka / 416 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The second edition of this highly successful text focuses on the major changes that have taken place in this field in recent times. Data Acquisition Techniques Using PCs, Second Edition, recognises that data acquisition is the core of most engineering and many life science systems in measurement and instrumentation. It will prove invaluable to scientists, engineers, students and technicians wishing to keep up with the latest technological developments.
The second edition of this highly successful text focuses on the major changes that have taken place in this field in recent times. Data Acquisitio...
|
|
cena:
469,53 zł |
Java Cryptography Extensions: Practical Guide for Programmers
ISBN: 9780127427515 / Angielski / Miękka / 176 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic...
For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see ther...
|
|
cena:
122,60 zł |
System-On-Chip Architectures and Implementations for Private-Key Data Encryption
ISBN: 9780306478826 / Angielski / Twarda / 160 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architectures for the DES and Rijndael symmetric key encryption algorithms are presented. The generic architectures can be utilised to rapidly and effortlessly generate system-on-chip cores, which support numerous application requirements, most importantly, different modes of operation and encryption and decryption capabilities. In addition, efficient silicon SHA-1, SHA-2 and HMAC hash algorithm architectures are described. A single-chip Internet... In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architec... |
|
cena:
390,87 zł |
Data Privacy and Security
ISBN: 9780387003115 / Angielski / Twarda / 465 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies. Features & Benefits: * Incorporates both data encryption and data hiding * Supplies a wealth of exercises and solutions to help readers readily understand the material * Presents... Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is... |
|
cena:
384,35 zł |
Access Control Systems: Security, Identity Management and Trust Models
ISBN: 9780387004457 / Angielski / Twarda / 262 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This essential resource for professionals and advanced students in security programming and system design introduces the foundations of programming systems security and the theory behind access control models, and addresses emerging access control mechanisms. This essential resource for professionals and advanced students in security programming and system design introduces the foundations of programming... |
|
cena:
390,87 zł |
Brute Force: Cracking the Data Encryption Standard
ISBN: 9780387201092 / Angielski / Twarda / 292 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved to be rigorous enough. In 1973, the NBS put out an open call for a new, stronger encryption system that would become the new federal standard. Several years later, IBM responded with a system called Lucifer that came to simply be known as DES... In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these c... |
|
cena:
109,42 zł |
Secure Group Communications Over Data Networks
ISBN: 9780387229706 / Angielski / Twarda / 172 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The ubiquitous nature of the Internet is enabling a new generation of - pUcations to support collaborative work among geographically distant users. Security in such an environment is of utmost importance to safeguard the pri vacy of the communication and to ensure the integrity of the applications. 'Secure group communications' (SGC) refers to a scenario in which a group of participants can receive and send messages to group members, in a way that outsiders are unable to glean any information even when they are able to intercept the messages. SGC is becoming extremely important for...
The ubiquitous nature of the Internet is enabling a new generation of - pUcations to support collaborative work among geographically distant users. Se...
|
|
cena:
390,87 zł |
Intrusion Detection and Correlation: Challenges and Solutions
ISBN: 9780387233987 / Angielski / Twarda / 118 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and cryptography. The Internet is omnipresent and companies have increasingly put critical resources online. This has given rise to the activities of cyber criminals. Virtually all organizations face increasing threats to their networks and the... Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the proble... |
|
cena:
390,87 zł |
Image and Video Encryption: From Digital Rights Management to Secured Personal Communication
ISBN: 9780387234021 / Angielski / Twarda / 161 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....). The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material. Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from com... |
|
cena:
390,87 zł |
Security in E-Learning
ISBN: 9780387243412 / Angielski / Twarda / 185 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this topic. Security in E-Learning discusses typical threats to e-learning projects and introduces how these issues have been and should be addressed. This knowledge is essential to conduct a security risk analysis effectively, because participants need to be aware of common threats, protection mechanisms and effort/cost issues. Based on the security risk analysis, appropriate preventive measures are thoroughly discussed in this... As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this... |
|
cena:
390,87 zł |
Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (Teismes)
ISBN: 9780387243436 / Angielski / Twarda / 196 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This study investigates the impacts and risk assessment of technology-ena bled information (TET), v DEGREEShich are engaged in the process of discovering the opportunities and challenges presented by TEI to the new form of small medi um enterprises (SME) business transactions: Technology Enable Information Small Medium Enterprises (TEISME). Within the UK economy, the notion of TEISMEs is one that forms the focus for this research. Other technologies that enabled information are also discussed. For example electronic mail (e-mail), voice mail, facsimile machines (fax), teleconferencing, data...
This study investigates the impacts and risk assessment of technology-ena bled information (TET), v DEGREEShich are engaged in the process of discover...
|
|
cena:
390,87 zł |
Certification and Security in Inter-Organizational E-Services: Ifip 18th World Computer Congress, August 22-27, 2004, Toulouse, France
ISBN: 9780387250878 / Angielski / Twarda / 149 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Certification and Security in Inter-Organizational E-Services presents the proceeding of CSES 2004 - the 2nd International Workshop on Certification and Security in Inter-Organizational E-Services held within IFIP WCC 2004 in August, 2004, in Toulouse, France. Certification and security share a common technological basis in the reliable and efficient monitoring of executed and running processes; they likewise depend on the same fundamental organizational and economic principles. As the range of services managed and accessed through communication networks grows throughout... Certification and Security in Inter-Organizational E-Services presents the proceeding of CSES 2004 - the 2nd International Worksho... |
|
cena:
195,42 zł |
Network Security Policies and Procedures
ISBN: 9780387309378 / Angielski / Twarda / 244 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures gives the reader a strong, multi-disciplinary understanding of how to pursue this goal. This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on "the other side of the fence" view an organization s security and will... Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and P... |
|
cena:
390,87 zł |
Synchronizing Internet Protocol Security (Sipsec)
ISBN: 9780387327242 / Angielski / Twarda / 223 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The open design of the Internet has not only opened many new opp- tunities for communications, but it has also opened many new avenues for attackers against organisations network and computing resources. This book is a critical investigation of the Internet Protocol Security (IPSec) based on combination of theoretical investigation and practical implementation, which provides an in-depth understanding of the IPSec framework. The bene?ts of IPSec were exploited while the delimiting factors cannot be ignored. Infor- tion security has become a major concern in recent times as more and more...
The open design of the Internet has not only opened many new opp- tunities for communications, but it has also opened many new avenues for attackers a...
|
|
cena:
390,87 zł |
Privacy-Respecting Intrusion Detection
ISBN: 9780387343464 / Angielski / Twarda / 307 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computer and network security is an issue that has been studied for many years. The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di?culties in evaluating a system to determine if it provided the necessary security for particular applications. The Anderson Report, published in 1972, was the outcome of an Air Force Planning Study whose intent was to de?ne the research and development paths required to make secure computers a reality in the USAF. A major contribution of this report was the de?nition of the reference monitor concept,...
Computer and network security is an issue that has been studied for many years. The Ware Report, which was published in 1970, pointed out the need for...
|
|
cena:
390,87 zł |
Preserving Privacy in On-Line Analytical Processing (Olap)
ISBN: 9780387462738 / Angielski / Twarda / 180 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Preserving Privacy for On-Line Analytical Processing addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. OLAP systems usually need to meet two conflicting goals. First, the sensitive data stored in underlying data warehouses must be kept secret. Second, analytical queries about the data must be allowed for decision support purposes. The main challenge is that sensitive data can be inferred from answers to seemingly innocent aggregations of the data. This volume reviews a series of methods that can precisely answer data cube-style OLAP, regarding... Preserving Privacy for On-Line Analytical Processing addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. OL... |
|
cena:
390,87 zł |
Principles of Secure Network Systems Design
ISBN: 9780387952130 / Angielski / Twarda / 209 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As e-commerce becomes the norm of business transactions and information be comes an essential commodity, it is vital that extensive efforts be made to examine and rectify the problems with the underlying architectures, processes, methods, that are involved in providing and and tools, as well as organizational structures, utilizing services relating to information technology. Such a holistic view of the relevant structures is required in order to identify all of the key aspects that can affect network security. Unfortunately, today's systems and practices, although they have proved to be...
As e-commerce becomes the norm of business transactions and information be comes an essential commodity, it is vital that extensive efforts be made to...
|
|
cena:
195,42 zł |
Guide to Elliptic Curve Cryptography
ISBN: 9780387952734 / Angielski / Twarda / 311 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book... After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and gover... |
|
cena:
703,61 zł |