• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [3082669]
• Literatura piękna
 [1815279]

  więcej...
• Turystyka
 [52558]
• Informatyka
 [156281]
• Komiksy
 [36475]
• Encyklopedie
 [23167]
• Dziecięca
 [613277]
• Hobby
 [105022]
• AudioBooki
 [1527]
• Literatura faktu
 [194886]
• Muzyka CD
 [275]
• Słowniki
 [2945]
• Inne
 [440204]
• Kalendarze
 [541]
• Podręczniki
 [165980]
• Poradniki
 [422905]
• Religia
 [509675]
• Czasopisma
 [473]
• Sport
 [61151]
• Sztuka
 [248589]
• CD, DVD, Video
 [3353]
• Technologie
 [230496]
• Zdrowie
 [98648]
• Książkowe Klimaty
 [126]
• Zabawki
 [2521]
• Puzzle, gry
 [3467]
• Literatura w języku ukraińskim
 [276]
• Art. papiernicze i szkolne
 [6689]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2829

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


Verschlüsselungsalgorithmen: Angewandte Zahlentheorie Rund Um Sicherheitsprotokolle Brands, Gilbert 9783528031824 Vieweg+teubner Verlag
Verschlüsselungsalgorithmen: Angewandte Zahlentheorie Rund Um Sicherheitsprotokolle

ISBN: 9783528031824 / Niemiecki / Miękka / 301 str.

ISBN: 9783528031824/Niemiecki/Miękka/301 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gilbert Brands
Der spielerische Umgang mit auch komplexeren Themen der Zahlentheorie soll dem mit Programmiertechniken vertrauten Leser zu eigenen Experimenten animieren und ein Verstandnis fur Sicherheitstechniken fordern, das nicht mehr von Versprechungen anderer abhangt."
Der spielerische Umgang mit auch komplexeren Themen der Zahlentheorie soll dem mit Programmiertechniken vertrauten Leser zu eigenen Experimenten animi...
cena: 189,24

Verschleierung Der Angaben Von Elektrizitätszählern Und Abhilfe Geldermann, Arthur 9783642986505 Springer
Verschleierung Der Angaben Von Elektrizitätszählern Und Abhilfe

ISBN: 9783642986505 / Niemiecki / Miękka / 130 str.

ISBN: 9783642986505/Niemiecki/Miękka/130 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Arthur Geldermann
Dieser Buchtitel ist Teil des Digitalisierungsprojekts Springer Book Archives mit Publikationen, die seit den Anfangen des Verlags von 1842 erschienen sind. Der Verlag stellt mit diesem Archiv Quellen fur die historische wie auch die disziplingeschichtliche Forschung zur Verfugung, die jeweils im historischen Kontext betrachtet werden mussen. Dieser Titel erschien in der Zeit vor 1945 und wird daher in seiner zeittypischen politisch-ideologischen Ausrichtung vom Verlag nicht beworben."
Dieser Buchtitel ist Teil des Digitalisierungsprojekts Springer Book Archives mit Publikationen, die seit den Anfangen des Verlags von 1842 erschienen...
cena: 208,34

What Is Computer Science?: An Information Security Perspective Page, Daniel 9783319040417 Springer
What Is Computer Science?: An Information Security Perspective

ISBN: 9783319040417 / Angielski / Miękka / 232 str.

ISBN: 9783319040417/Angielski/Miękka/232 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Daniel Page; Nigel Smart
This engaging and accessible text addresses the fundamental question: What Is Computer Science? The book showcases a set of representative concepts broadly connected by the theme of information security, for which the presentation of each topic can be treated as a "mini" lecture course, demonstrating how it allows us to solve real problems, as well as how it relates to other subjects. The discussions are further supported by numerous examples and practical hands-on exercises. Features: presents a concise introduction to the study of algorithms and describes how computers work;...
This engaging and accessible text addresses the fundamental question: What Is Computer Science? The book showcases a set of representative conc...
cena: 162,12

Security and Protection in Information Processing Systems: Ifip 18th World Computer Congress Tc11 19th International Information Security Conference 2 Deswarte, Yves 9781475780161 Springer
Security and Protection in Information Processing Systems: Ifip 18th World Computer Congress Tc11 19th International Information Security Conference 2

ISBN: 9781475780161 / Angielski / Miękka / 548 str.

ISBN: 9781475780161/Angielski/Miękka/548 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yves Deswarte; Frederic Cuppens; Sushil Jajodia

Security is probably the most critical factor for the development of the "Information Society." E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, except maybe if the citizens accept to waive their privacy, which is unacceptable ethically and socially. New progress is needed in security and privacy-preserving technologies. On these foundations, the IFIP/SEC conference has been established from the eighties as one of the most important forums for presenting new scientific research...

Security is probably the most critical factor for the development of the "Information Society." E-government, e-commerce, e-healthcare and all othe...

cena: 202,66

Public Key Infrastructures, Services and Applications: 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers Sokratis Katsikas, Isaac Agudo 9783642539961 Springer-Verlag Berlin and Heidelberg GmbH &
Public Key Infrastructures, Services and Applications: 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers

ISBN: 9783642539961 / Angielski / Miękka / 205 str.

ISBN: 9783642539961/Angielski/Miękka/205 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sokratis Katsikas;Isaac Agudo
This book constitutes the thoroughly refereed post-conference proceedings of the 10th European Workshop, EuroPKI 2013, held in Egham, UK, in September 2013. The 11 revised full papers presented together with 1 invited talk were carefully selected from 20 submissions. The papers are organized in topical sections such as authorization and delegation, certificates management, cross certification, interoperability, key management, legal issues, long-time archiving, time stamping, trust management, trusted computing, ubiquitous scenarios and Web services security.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th European Workshop, EuroPKI 2013, held in Egham, UK, in September...
cena: 186,49

Data Privacy Management and Autonomous Spontaneous Security: 8th International Workshop, Dpm 2013, and 6th International Workshop, Setop 2013, Egham, Garcia-Alfaro, Joaquin 9783642545672 Springer
Data Privacy Management and Autonomous Spontaneous Security: 8th International Workshop, Dpm 2013, and 6th International Workshop, Setop 2013, Egham,

ISBN: 9783642545672 / Angielski / Miękka / 400 str.

ISBN: 9783642545672/Angielski/Miękka/400 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joaquin Garcia-Alfaro; Georgios Lioudakis; Nora Cuppens-Boulahia
This book constitutes the revised selected papers of the 8th International Workshop on Data Privacy Management, DPM 2013, and the 6th International Workshop on Autonomous and Spontaneous Security, SETOP 2013, held in Egham, UK, in September 2013 and co-located with the 18th European Symposium on Research in Computer Security (ESORICS 2013). The volume contains 13 full papers selected out of 46 submissions and 1 keynote lecturer from the DPM workshop and 6 full papers together with 5 short papers selected among numerous submissions to the SETOP workshop. The papers cover topics related to the...
This book constitutes the revised selected papers of the 8th International Workshop on Data Privacy Management, DPM 2013, and the 6th International Wo...
cena: 202,66

Information Hiding in Speech Signals for Secure Communication Zhijun Wu 9780128013281 Syngress Publishing
Information Hiding in Speech Signals for Secure Communication

ISBN: 9780128013281 / Angielski / Miękka / 183 str.

ISBN: 9780128013281/Angielski/Miękka/183 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Zhijun Wu

In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art techniques to readers of this book, including a mathematical model for information hiding,...

In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are ma...

cena: 235,53

Communication Networks for Smart Grids: Making Smart Grid Real Budka, Kenneth C. 9781447163015 Springer, London
Communication Networks for Smart Grids: Making Smart Grid Real

ISBN: 9781447163015 / Angielski / Twarda / 369 str.

ISBN: 9781447163015/Angielski/Twarda/369 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kenneth C. Budka; Jayant G. Deshpande; Marina Thottan

A 21st century clean energy economy demands a 21st century electricity grid, yet the communication networks of many utilities today are ill-equipped for smart grid evolution.

This must-read text/reference presents an application-centric approach to the development of smart grid communication architecture and network transformation. The coverage includes in-depth reviews of such cutting-edge applications as advanced metering infrastructure, distribution automation, demand response, and synchrophasors as well as more traditional utility applications like SCADA systems. Providing...

A 21st century clean energy economy demands a 21st century electricity grid, yet the communication networks of many utilities today are ill-equippe...

cena: 405,36

Selected Areas in Cryptography Evangelos Kranakis Paul C. Va 9781461375081 Springer
Selected Areas in Cryptography

ISBN: 9781461375081 / Angielski / Miękka / 104 str.

ISBN: 9781461375081/Angielski/Miękka/104 str.

Termin realizacji zamówienia: 22 dni roboczych
Evangelos Kranakis; Paul C. Van Oorschot
Selected Areas in Cryptography brings together in one place important contributions and up-to-date research results in this fast moving area.
Selected Areas in Cryptography serves as an excellent reference, providing insight into some of the most challenging research issues in the field.
Selected Areas in Cryptography brings together in one place important contributions and up-to-date research results in this fast moving area....
488,24
341,77

Multidisciplinary Perspectives in Cryptology and Information Security Nidaa A. Abbas Sattar B. Sadkha 9781466658080 Information Science Reference
Multidisciplinary Perspectives in Cryptology and Information Security

ISBN: 9781466658080 / Angielski / Twarda / 334 str.

ISBN: 9781466658080/Angielski/Twarda/334 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nidaa A. Abbas; Sattar B. Sadkhan Al Maliky
This book considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security, offering a comprehensive, in-depth analysis of encryption solutions--
This book considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security, offeri...
cena: 1252,24

Trust Management VI: 6th Ifip Wg 11.11 International Conference, Ifiptm 2012, Surat, India, May 21-25, 2012, Proceedings Dimitrakos, Theo 9783642427848 Springer
Trust Management VI: 6th Ifip Wg 11.11 International Conference, Ifiptm 2012, Surat, India, May 21-25, 2012, Proceedings

ISBN: 9783642427848 / Angielski / Miękka / 282 str.

ISBN: 9783642427848/Angielski/Miękka/282 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Theo Dimitrakos; Rajat Moona; Dhiren Patel
This book constitutes the refereed proceedings of the 6th IFIP WG 11.11 International Conference, IFIPTM 2012, held in Surat, India, in May 2012. The 12 revised full papers presented together with 8 short papers and the abstracts of 4 keynote talks were carefully reviewed and selected from 51 submissions. Building on the traditions inherited from the iTrust and previous IFIPTM conferences, IFIPTM 2012 is a multi-disciplinary conference focusing on areas such as: trust models, social, economic and behavioural aspects of trust, trust in networks, mobile systems and cloud computation, privacy,...
This book constitutes the refereed proceedings of the 6th IFIP WG 11.11 International Conference, IFIPTM 2012, held in Surat, India, in May 2012. The ...
cena: 202,66

Code Breaking in the Pacific Peter, M.a . Donovan John Mack 9783319082776 Springer
Code Breaking in the Pacific

ISBN: 9783319082776 / Angielski / Twarda / 387 str.

ISBN: 9783319082776/Angielski/Twarda/387 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
M.a . Peter Donovan; John Mack
This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) and the Japanese Army's Water Transport Code during WWII. This is the first book to describe, explain and analyze the code breaking techniques developed and used to provide this intelligence, thus closing the sole remaining gap in the published accounts of the Pacific War. The authors also explore...
This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from...
cena: 608,07

Information Security and Privacy Research: 27th Ifip Tc 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, Gritzalis, Dimitris 9783642448928 Springer
Information Security and Privacy Research: 27th Ifip Tc 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6,

ISBN: 9783642448928 / Angielski / Miękka / 592 str.

ISBN: 9783642448928/Angielski/Miękka/592 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dimitris Gritzalis; Steven Furnell; Marianthi Theoharidou
This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012. The 42 revised full papers presented together with 11 short papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on attacks and malicious code, security architectures, system security, access control, database security, privacy attitudes and properties, social networks and social engineering, applied cryptography, anonymity and trust, usable security, security and...
This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Cret...
cena: 405,36

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework Bullock, Jessey 9781118918210 John Wiley & Sons
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

ISBN: 9781118918210 / Angielski / Miękka / 288 str.

ISBN: 9781118918210/Angielski/Miękka/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jessey Bullock

Master Wireshark to solve real-world security problems

If you don't already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment.

Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware...

Master Wireshark to solve real-world security problems

If you don't already use Wireshark for a wide range of information security t...

cena: 211,37

Designing and Building Security Operations Center David Nathans 9780128008997 SYNGRESS MEDIA
Designing and Building Security Operations Center

ISBN: 9780128008997 / Angielski / Miękka / 276 str.

ISBN: 9780128008997/Angielski/Miękka/276 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Nathans

Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and more significant every day, with many instances of companies and governments mishandling (or deliberately misusing) personal and financial data.

Organizations need to be committed to defending their own assets and their customers' information. Designing and Building a Security Operations Center will...

Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence ...

cena: 181,53

Iron-Clad Java: Building Secure Web Applications Manico, Jim 9780071835886 MCGRAW-HILL Professional
Iron-Clad Java: Building Secure Web Applications

ISBN: 9780071835886 / Angielski / Miękka / 304 str.

ISBN: 9780071835886/Angielski/Miękka/304 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jim Manico
Proven Methods for Building Secure Java-Based Web Applications

Develop, deploy, and maintain secure Java applications using the expert techniques and open source libraries described in this Oracle Press guide. Iron-Clad Java presents the processes required to build robust and secure applications from the start and explains how to eliminate existing security bugs. Best practices for authentication, access control, data protection, attack prevention, error handling, and much more are included. Using the practical advice and real-world examples provided in this authoritative resource,...

Proven Methods for Building Secure Java-Based Web Applications

Develop, deploy, and maintain secure Java applications using the expert techniques a...

cena: 188,31

Principles of Computer Security Lab Manual, Fourth Edition Vincent Nestler 9780071836555 MCGRAW-HILL Professional
Principles of Computer Security Lab Manual, Fourth Edition

ISBN: 9780071836555 / Angielski / Miękka / 384 str.

ISBN: 9780071836555/Angielski/Miękka/384 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vincent Nestler
Practice the Computer Security Skills You Need to Succeed
  • 40+ lab exercises challenge you to solve problems based on realistic case studies
  • Step-by-step scenarios require you to think critically
  • Lab analysis tests measure your understanding of lab results
  • Key term quizzes help build your vocabulary
  • Labs can be performed on a Windows, Linux, or Mac platform with the use of virtual machines

In this Lab Manual, you'll practice

  • Configuring workstation network connectivity
  • Analyzing network communication
  • Establishing secure network...
Practice the Computer Security Skills You Need to Succeed
  • 40+ lab exercises challenge you to solve problems based on realistic case studies
cena: 350,64

Foundations of Security Analysis and Design VII: Fosad 2012 / 2013 Tutorial Lectures Aldini, Alessandro 9783319100814 Springer
Foundations of Security Analysis and Design VII: Fosad 2012 / 2013 Tutorial Lectures

ISBN: 9783319100814 / Angielski / Miękka / 282 str.

ISBN: 9783319100814/Angielski/Miękka/282 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alessandro Aldini; Javier Lopez; Fabio Martinelli
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia or industry, interested to approach the field, investigate open problems, and follow priority lines of research.
This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of...
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in compute...
cena: 194,60

Constructive Side-Channel Analysis and Secure Design: 5th International Workshop, Cosade 2014, Paris, France, April 13-15, 2014. Revised Selected Pape Prouff, Emmanuel 9783319101743 Springer
Constructive Side-Channel Analysis and Secure Design: 5th International Workshop, Cosade 2014, Paris, France, April 13-15, 2014. Revised Selected Pape

ISBN: 9783319101743 / Angielski / Miękka / 313 str.

ISBN: 9783319101743/Angielski/Miękka/313 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Emmanuel Prouff

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Workshop, COSADE 2014, held in Paris, France, in April 2014. The 20 revised full papers presented together with two invited talks were carefully selected from 51 submissions and collect truly existing results in cryptographic engineering, from concepts to artifacts, from software to hardware, from attack to countermeasure.


This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Workshop, COSADE 2014, held in Paris, France, in...

cena: 194,60

Moderne Verfahren Der Kryptographie: Von Rsa Zu Zero-Knowledge Beutelspacher, Albrecht 9783528065904 Vieweg+teubner Verlag
Moderne Verfahren Der Kryptographie: Von Rsa Zu Zero-Knowledge

ISBN: 9783528065904 / Niemiecki / Miękka / 142 str.

ISBN: 9783528065904/Niemiecki/Miękka/142 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Albrecht Beutelspacher; Jorg Schwenk; Klaus-Dieter Wolfenstetter
Es gibt zwei Welten der Kryptographie. Der einen Welt scheint, von auBen betrachtet, ein Hauch von Abenteuer und Romantik anzuhaften. Man denkt an Sherlock Holmes und James Bond, sieht Massen von Men schen mit Codebiichem operieren und lange Buchstabenkolonnen statistisch untersu chen; es ist die Welt der ENIGMA und anderer Chiffriermaschinen, bei deren Anblick das Herz jedes Antiquitatensammlers hoher schlagt. Dies ist die Welt der "klassischen" Kryptographie. Demgegeniiber ist die andere Welt, die der modemen Kryptographie, bestimmt durch Stichworte wie Datenautobahn, elektronisches Geld,...
Es gibt zwei Welten der Kryptographie. Der einen Welt scheint, von auBen betrachtet, ein Hauch von Abenteuer und Romantik anzuhaften. Man denkt an She...
cena: 208,34

Pierwsza Podprzednia  100  101  102  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia