![]() |
Security, Privacy, and Applied Cryptography Engineering: 4th International Conference, Space 2014, Pune, India, October 18-22, 2014. Proceedings
ISBN: 9783319120591 / Angielski / Miękka / 333 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 4th International Conference on Security, Privacy, and Applied Cryptography Engineering held in Pune, India, in October 2014. The 19 papers presented together with two invited papers were carefully reviewed and selected from 66 submissions. The papers are organized in topical sections on cryptographic building blocks; mini tutorial; attacks and countermeasures; tools and methods; and secure systems and applications.
This book constitutes the refereed proceedings of the 4th International Conference on Security, Privacy, and Applied Cryptography Engineering held in ...
|
cena:
202,66 |
![]() |
Future Data and Security Engineering: 1st International Conference, Fdse 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings
ISBN: 9783319127774 / Angielski / Miękka / 312 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the First International Conference on Future Data and Security Engineering, FDSE 2014, held in Ho Chi Minh City, Vietnam, in November 2014. The 23 full papers presented were carefully reviewed and selected from 66 submissions. They have been organized in the following topical sections: big data analytics and applications; security and privacy engineering; crowdsourcing and social network data analytics; biometrics and data protection in smart devices; cloud data management and applications; and advances in query processing and optimization.
This book constitutes the refereed proceedings of the First International Conference on Future Data and Security Engineering, FDSE 2014, held in Ho Ch...
|
cena:
202,66 |
![]() |
Construction and Analysis of Cryptographic Functions
ISBN: 9783319129907 / Angielski / Twarda / 168 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions. These functions have optimal resistance to linear and/or differential attacks, which are the two most powerful attacks on symmetric cryptosystems. Besides cryptographic applications, these functions are significant in many branches of mathematics and information theory including coding theory, combinatorics, commutative algebra, finite geometry, sequence design and quantum information theory. The author analyzes...
This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (A...
|
cena:
405,36 |
![]() |
Practical Hadoop Security
ISBN: 9781430265443 / Angielski / Miękka / 220 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive study of how to implement defined security within a Hadoop cluster in a hands-on way.
You will start with a detailed overview of all the security options available for Hadoop, including popular extensions like Kerberos and OpenSSH, and then delve into a hands-on implementation of... Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop...
|
cena:
202,66 |
![]() |
Hacking Exposed Wireless: Wireless Security Secrets & Solutions
ISBN: 9780071827638 / Angielski / Miękka / 544 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Exploit and defend against the latest wireless network attacks
Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you'll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how attackers impersonate cellular networks. Hacking Exposed Wireless, Third Edition features expert coverage of ever-expanding threats that... Exploit and defend against the latest wireless network attacks
Learn to exploit weaknesses in wireless network environments using the innovative te... |
cena:
280,54 |
![]() |
Information Systems Security: 10th International Conference, Iciss 2014, Hyderabad, India, December 16-20, 2014. Proceedings
ISBN: 9783319138404 / Angielski / Miękka / 478 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 10th International Conference on Information Systems Security, ICISS 2014, held in Hyderabad, India, in December 2014. The 20 revised full papers and 5 short papers presented together with 3 invited papers were carefully reviewed and selected from 129 submissions. The papers address the following topics: security inferences; security policies; security user interfaces; security attacks; malware detection; forensics; and location based security services.
This book constitutes the refereed proceedings of the 10th International Conference on Information Systems Security, ICISS 2014, held in Hyderabad, In...
|
cena:
202,66 |
![]() |
Advances in Digital Forensics VI: Sixth Ifip Wg 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selec
ISBN: 9783642423383 / Angielski / Miękka / 311 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Advances in Digital Forensics VI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Internet Crime Investigations, Live Forensics, Advanced Forensic Techniques, and Forensic Tools. This book is the sixth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital...
Advances in Digital Forensics VI describes original research results and innovative applications in the discipline of digital forensics. In addition, ...
|
cena:
202,66 |
![]() |
Security Protocols XVIII: 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers
ISBN: 9783662459201 / Angielski / Miękka / 267 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-workshop proceedings of the 18th International Workshop on Security Protocols, held in Cambridge, UK, in March 2010. After an introduction the volume presents 16 revised papers and one abstract, each followed by a revised transcript of the discussion ensuing the presentation at the event. The theme of this year's workshop was "Virtually Perfect Security."
This book constitutes the thoroughly refereed post-workshop proceedings of the 18th International Workshop on Security Protocols, held in Cambridge, U...
|
cena:
194,60 |
![]() |
Open Source Software for Digital Forensics
ISBN: 9781489983282 / Angielski / Miękka / 124 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in computer forensics. It presents the motivations for using FLOSS applications as tools for collection, preservation and analysis of digital evidence in computer and network forensics. It also covers extensively several forensic FLOSS tools, their origins and evolution. Open Source Software for Digital Forensics is based on the OSSCoNF workshop, which was held in Milan, Italy, September 2008 at the World Computing Congress, co-located with OSS 2008. This edited... Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in computer forensics.... |
cena:
608,07 |
![]() |
Electronic Postage Systems: Technology, Security, Economics
ISBN: 9781489986672 / Angielski / Miękka / 248 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As postal liberalization gains momentum, traditional postage meter markets are being transformed into digital meter markets for enterprise mailers. Modern technologies such as cryptography, digital signatures, hardware security devices, the Internet, 2D bar codes, and high-speed scanning equipment have come together to establish different flavors of electronic postage, addressing the needs of postal operators, private carriers and mailers. Electronic Postage Systems: Technology, Security, Economics introduces a taxonomy of electronic postage systems and explains... As postal liberalization gains momentum, traditional postage meter markets are being transformed into digital meter markets for enterprise mailers.... |
cena:
405,36 |
![]() |
Secure Data Management in Decentralized Systems
ISBN: 9781489996701 / Angielski / Miękka / 462 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Database security is one of the classical topics in the research of information system security. Ever since the early years of database management systems, a great deal of research activity has been conducted. Fruitful results have been produced, many of which are widely adopted in commercial and military database management systems. In recent years, the research scope of database security has been greatly expanded due to the rapid development of the global internetworked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of - ganizations....
Database security is one of the classical topics in the research of information system security. Ever since the early years of database management sys...
|
cena:
445,90 |
![]() |
Attribute-Based Credentials for Trust: Identity in the Information Society
ISBN: 9783319144382 / Angielski / Twarda / 391 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-based Credentials (Privacy-ABCs) are elegant techniques to provide secure yet privacy-respecting access control. This book addresses the federation and interchangeability of Privacy-ABC technologies. It defines a common, unified architecture for Privacy-ABC systems that allows their respective features to be compared and combined Further, this book presents open reference implementations of selected Privacy-ABC systems and explains how to deploy... The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-base... |
cena:
405,36 |
![]() |
Blockchain
ISBN: 9781491920497 / Angielski / Miękka / 152 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Bitcoin is starting to come into its own as a digital currency, but the blockchain technology behind it could prove to be much more significant. This book takes you beyond the currency ("Blockchain 1.0") and smart contracts ("Blockchain 2.0") to demonstrate how the blockchain is in position to become the fifth disruptive computing paradigm after mainframes, PCs, the Internet, and mobile/social networking. Author Melanie Swan, Founder of the Institute for Blockchain Studies, explains that the blockchain is essentially a public ledger with potential as a worldwide, decentralized record... Bitcoin is starting to come into its own as a digital currency, but the blockchain technology behind it could prove to be much more significant. Th... |
cena:
134,46 |
![]() |
E-Government, E-Services and Global Processes: Joint Ifip Tc 8 and Tc 6 International Conferences, Eges 2010 and Gisp 2010, Held as Part of Wcc 2010,
ISBN: 9783642422911 / Angielski / Miękka / 258 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book contains the proceedings of two of the IFIP conferences that took place at the IFIP World Computer Congress 2010 in Brisbane, Australia. The proceedings of each conference are allocated separate parts in this book each with their own editors. E-Government and E-Services (EGES) page 3 Marijn Janssen / Winfried Lamersdorf Global Information Systems Processes (GISP) page 183 Jan Pries-Heje / Michael Rosemann Organization E-Government and E-Services (EGES 2010) EGES Co-chairs Marijn Janssen Delft, The Netherlands Winfried Lamersdorf Hamburg, Germany Lalit Sawhney Bangalore, India Leon...
This book contains the proceedings of two of the IFIP conferences that took place at the IFIP World Computer Congress 2010 in Brisbane, Australia. The...
|
cena:
202,66 |
![]() |
Engineering Secure Software and Systems: 7th International Symposium, Essos 2015, Milan, Italy, March 4-6, 2015, Proceedings
ISBN: 9783319156170 / Angielski / Miękka / 227 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, held in Milan, Italy, in March 2015. The 11 full papers presented together with 5 short papers were carefully reviewed and selected from 41 submissions. The symposium features the following topics: formal methods; cloud passwords; machine learning; measurements ontologies; and access control.
This book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, held in Mila...
|
cena:
202,66 |
![]() |
Progress in Cryptology - Latincrypt 2014: Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil
ISBN: 9783319162942 / Angielski / Miękka / 387 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, held in Florianopolis, Brazil, in September 2014. The 19 papers presented together with four invited talks were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on cryptographic engineering, side-channel attacks and countermeasures, privacy, crypto analysis and cryptographic protocols.
This book constitutes the proceedings of the 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, he...
|
cena:
202,66 |
![]() |
Handbook of Research on Emerging Developments in Data Privacy
ISBN: 9781466673816 / Angielski / Twarda / 534 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "This book brings together new ideas on how to deal with potential leaks of valuable customer information, highlighting the legal aspects of identity protection, trust and security, and detection techniques"--
"This book brings together new ideas on how to deal with potential leaks of valuable customer information, highlighting the legal aspects of identity ...
|
cena:
1661,14 |
![]() |
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, Dpm 2014, 7th International Workshop, Se
ISBN: 9783319170152 / Angielski / Miękka / 343 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the revised selected papers of the 9th International Workshop on Data Privacy Management, DPM 2014, the 7th International Workshop on Autonomous and Spontaneous Security, SETOP 2014, and the 9th International Workshop on Quantitative Aspects in Security Assurance, held in Wroclaw, Poland, in September 2014, co-located with the 19th European Symposium on Research in Computer Security (ESORICS 2014). The volume contains 7 full and 4 short papers plus 1 keynote talk from the DPM workshop; 2 full papers and 1 keynote talk from the SETOP workshop; and 7 full papers and 1...
This book constitutes the revised selected papers of the 9th International Workshop on Data Privacy Management, DPM 2014, the 7th International Worksh...
|
cena:
202,66 |
![]() |
Candidate Multilinear Maps
ISBN: 9781627055376 / Angielski / Miękka / 122 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The aim of cryptography is to design primitives and protocols that withstand adversarial behavior. Information theoretic cryptography, how-so-ever desirable, is extremely restrictive and most non-trivial cryptographic tasks are known to be information theoretically impossible. In order to realize sophisticated cryptographic primitives, we forgo information theoretic security and assume limitations on what can be efficiently computed. In other words we attempt to build secure systems conditioned on some computational intractability assumption such as factoring, discrete log, decisional...
The aim of cryptography is to design primitives and protocols that withstand adversarial behavior. Information theoretic cryptography, how-so-ever des...
|
cena:
201,21 |
![]() |
Multilevel Modeling of Secure Systems in Qop-ML
ISBN: 9781482202557 / Angielski / Twarda / 262 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In order to perform effective analysis of today s information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and accounts for all of the significant details. In order to perform effective analysis of today s information security systems, numerous components must be taken into consideration. This book pre... |
cena:
466,18 |