![]() |
Verschlüsselungsalgorithmen: Angewandte Zahlentheorie Rund Um Sicherheitsprotokolle
ISBN: 9783528031824 / Niemiecki / Miękka / 301 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Der spielerische Umgang mit auch komplexeren Themen der Zahlentheorie soll dem mit Programmiertechniken vertrauten Leser zu eigenen Experimenten animieren und ein Verstandnis fur Sicherheitstechniken fordern, das nicht mehr von Versprechungen anderer abhangt."
Der spielerische Umgang mit auch komplexeren Themen der Zahlentheorie soll dem mit Programmiertechniken vertrauten Leser zu eigenen Experimenten animi...
|
cena:
189,24 |
![]() |
Verschleierung Der Angaben Von Elektrizitätszählern Und Abhilfe
ISBN: 9783642986505 / Niemiecki / Miękka / 130 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Dieser Buchtitel ist Teil des Digitalisierungsprojekts Springer Book Archives mit Publikationen, die seit den Anfangen des Verlags von 1842 erschienen sind. Der Verlag stellt mit diesem Archiv Quellen fur die historische wie auch die disziplingeschichtliche Forschung zur Verfugung, die jeweils im historischen Kontext betrachtet werden mussen. Dieser Titel erschien in der Zeit vor 1945 und wird daher in seiner zeittypischen politisch-ideologischen Ausrichtung vom Verlag nicht beworben."
Dieser Buchtitel ist Teil des Digitalisierungsprojekts Springer Book Archives mit Publikationen, die seit den Anfangen des Verlags von 1842 erschienen...
|
cena:
208,34 |
![]() |
What Is Computer Science?: An Information Security Perspective
ISBN: 9783319040417 / Angielski / Miękka / 232 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This engaging and accessible text addresses the fundamental question: What Is Computer Science? The book showcases a set of representative concepts broadly connected by the theme of information security, for which the presentation of each topic can be treated as a "mini" lecture course, demonstrating how it allows us to solve real problems, as well as how it relates to other subjects. The discussions are further supported by numerous examples and practical hands-on exercises. Features: presents a concise introduction to the study of algorithms and describes how computers work;...
This engaging and accessible text addresses the fundamental question: What Is Computer Science? The book showcases a set of representative conc...
|
cena:
162,12 |
![]() |
Security and Protection in Information Processing Systems: Ifip 18th World Computer Congress Tc11 19th International Information Security Conference 2
ISBN: 9781475780161 / Angielski / Miękka / 548 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security is probably the most critical factor for the development of the "Information Society." E-government, e-commerce, e-healthcare and all other e-activities present challenging security requirements that cannot be satisfied with current technology, except maybe if the citizens accept to waive their privacy, which is unacceptable ethically and socially. New progress is needed in security and privacy-preserving technologies. On these foundations, the IFIP/SEC conference has been established from the eighties as one of the most important forums for presenting new scientific research... Security is probably the most critical factor for the development of the "Information Society." E-government, e-commerce, e-healthcare and all othe... |
cena:
202,66 |
![]() |
Public Key Infrastructures, Services and Applications: 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers
ISBN: 9783642539961 / Angielski / Miękka / 205 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 10th European Workshop, EuroPKI 2013, held in Egham, UK, in September 2013. The 11 revised full papers presented together with 1 invited talk were carefully selected from 20 submissions. The papers are organized in topical sections such as authorization and delegation, certificates management, cross certification, interoperability, key management, legal issues, long-time archiving, time stamping, trust management, trusted computing, ubiquitous scenarios and Web services security.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th European Workshop, EuroPKI 2013, held in Egham, UK, in September...
|
cena:
186,49 |
![]() |
Data Privacy Management and Autonomous Spontaneous Security: 8th International Workshop, Dpm 2013, and 6th International Workshop, Setop 2013, Egham,
ISBN: 9783642545672 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the revised selected papers of the 8th International Workshop on Data Privacy Management, DPM 2013, and the 6th International Workshop on Autonomous and Spontaneous Security, SETOP 2013, held in Egham, UK, in September 2013 and co-located with the 18th European Symposium on Research in Computer Security (ESORICS 2013). The volume contains 13 full papers selected out of 46 submissions and 1 keynote lecturer from the DPM workshop and 6 full papers together with 5 short papers selected among numerous submissions to the SETOP workshop. The papers cover topics related to the...
This book constitutes the revised selected papers of the 8th International Workshop on Data Privacy Management, DPM 2013, and the 6th International Wo...
|
cena:
202,66 |
![]() |
Information Hiding in Speech Signals for Secure Communication
ISBN: 9780128013281 / Angielski / Miękka / 183 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art techniques to readers of this book, including a mathematical model for information hiding,... In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are ma... |
cena:
235,53 |
![]() |
Communication Networks for Smart Grids: Making Smart Grid Real
ISBN: 9781447163015 / Angielski / Twarda / 369 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A 21st century clean energy economy demands a 21st century electricity grid, yet the communication networks of many utilities today are ill-equipped for smart grid evolution. This must-read text/reference presents an application-centric approach to the development of smart grid communication architecture and network transformation. The coverage includes in-depth reviews of such cutting-edge applications as advanced metering infrastructure, distribution automation, demand response, and synchrophasors as well as more traditional utility applications like SCADA systems. Providing... A 21st century clean energy economy demands a 21st century electricity grid, yet the communication networks of many utilities today are ill-equippe... |
cena:
405,36 |
![]() |
Selected Areas in Cryptography
ISBN: 9781461375081 / Angielski / Miękka / 104 str. Termin realizacji zamówienia: 22 dni roboczych Selected Areas in Cryptography brings together in one place important contributions and up-to-date research results in this fast moving area.
Selected Areas in Cryptography serves as an excellent reference, providing insight into some of the most challenging research issues in the field. Selected Areas in Cryptography brings together in one place important contributions and up-to-date research results in this fast moving area....
|
341,77 |
![]() |
Multidisciplinary Perspectives in Cryptology and Information Security
ISBN: 9781466658080 / Angielski / Twarda / 334 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security, offering a comprehensive, in-depth analysis of encryption solutions--
This book considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security, offeri...
|
cena:
1252,24 |
![]() |
Trust Management VI: 6th Ifip Wg 11.11 International Conference, Ifiptm 2012, Surat, India, May 21-25, 2012, Proceedings
ISBN: 9783642427848 / Angielski / Miękka / 282 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 6th IFIP WG 11.11 International Conference, IFIPTM 2012, held in Surat, India, in May 2012. The 12 revised full papers presented together with 8 short papers and the abstracts of 4 keynote talks were carefully reviewed and selected from 51 submissions. Building on the traditions inherited from the iTrust and previous IFIPTM conferences, IFIPTM 2012 is a multi-disciplinary conference focusing on areas such as: trust models, social, economic and behavioural aspects of trust, trust in networks, mobile systems and cloud computation, privacy,...
This book constitutes the refereed proceedings of the 6th IFIP WG 11.11 International Conference, IFIPTM 2012, held in Surat, India, in May 2012. The ...
|
cena:
202,66 |
![]() |
Code Breaking in the Pacific
ISBN: 9783319082776 / Angielski / Twarda / 387 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) and the Japanese Army's Water Transport Code during WWII. This is the first book to describe, explain and analyze the code breaking techniques developed and used to provide this intelligence, thus closing the sole remaining gap in the published accounts of the Pacific War. The authors also explore...
This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from...
|
cena:
608,07 |
![]() |
Information Security and Privacy Research: 27th Ifip Tc 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6,
ISBN: 9783642448928 / Angielski / Miękka / 592 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012. The 42 revised full papers presented together with 11 short papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on attacks and malicious code, security architectures, system security, access control, database security, privacy attitudes and properties, social networks and social engineering, applied cryptography, anonymity and trust, usable security, security and...
This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Cret...
|
cena:
405,36 |
![]() |
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
ISBN: 9781118918210 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Master Wireshark to solve real-world security problems If you don't already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment. Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware... Master Wireshark to solve real-world security problems If you don't already use Wireshark for a wide range of information security t... |
cena:
211,37 |
![]() |
Designing and Building Security Operations Center
ISBN: 9780128008997 / Angielski / Miękka / 276 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and more significant every day, with many instances of companies and governments mishandling (or deliberately misusing) personal and financial data. Organizations need to be committed to defending their own assets and their customers' information. Designing and Building a Security Operations Center will... Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence ... |
cena:
181,53 |
![]() |
Iron-Clad Java: Building Secure Web Applications
ISBN: 9780071835886 / Angielski / Miękka / 304 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Proven Methods for Building Secure Java-Based Web Applications
Develop, deploy, and maintain secure Java applications using the expert techniques and open source libraries described in this Oracle Press guide. Iron-Clad Java presents the processes required to build robust and secure applications from the start and explains how to eliminate existing security bugs. Best practices for authentication, access control, data protection, attack prevention, error handling, and much more are included. Using the practical advice and real-world examples provided in this authoritative resource,... Proven Methods for Building Secure Java-Based Web Applications
Develop, deploy, and maintain secure Java applications using the expert techniques a... |
cena:
188,31 |
![]() |
Principles of Computer Security Lab Manual, Fourth Edition
ISBN: 9780071836555 / Angielski / Miękka / 384 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Practice the Computer Security Skills You Need to Succeed
In this Lab Manual, you'll practice
Practice the Computer Security Skills You Need to Succeed
|
cena:
350,64 |
![]() |
Foundations of Security Analysis and Design VII: Fosad 2012 / 2013 Tutorial Lectures
ISBN: 9783319100814 / Angielski / Miękka / 282 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia or industry, interested to approach the field, investigate open problems, and follow priority lines of research.
This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of... FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in compute...
|
cena:
194,60 |
![]() |
Constructive Side-Channel Analysis and Secure Design: 5th International Workshop, Cosade 2014, Paris, France, April 13-15, 2014. Revised Selected Pape
ISBN: 9783319101743 / Angielski / Miękka / 313 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Workshop, COSADE 2014, held in Paris, France, in April 2014. The 20 revised full papers presented together with two invited talks were carefully selected from 51 submissions and collect truly existing results in cryptographic engineering, from concepts to artifacts, from software to hardware, from attack to countermeasure. This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Workshop, COSADE 2014, held in Paris, France, in... |
cena:
194,60 |
![]() |
Moderne Verfahren Der Kryptographie: Von Rsa Zu Zero-Knowledge
ISBN: 9783528065904 / Niemiecki / Miękka / 142 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Es gibt zwei Welten der Kryptographie. Der einen Welt scheint, von auBen betrachtet, ein Hauch von Abenteuer und Romantik anzuhaften. Man denkt an Sherlock Holmes und James Bond, sieht Massen von Men schen mit Codebiichem operieren und lange Buchstabenkolonnen statistisch untersu chen; es ist die Welt der ENIGMA und anderer Chiffriermaschinen, bei deren Anblick das Herz jedes Antiquitatensammlers hoher schlagt. Dies ist die Welt der "klassischen" Kryptographie. Demgegeniiber ist die andere Welt, die der modemen Kryptographie, bestimmt durch Stichworte wie Datenautobahn, elektronisches Geld,...
Es gibt zwei Welten der Kryptographie. Der einen Welt scheint, von auBen betrachtet, ein Hauch von Abenteuer und Romantik anzuhaften. Man denkt an She...
|
cena:
208,34 |