• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [3082669]
• Literatura piękna
 [1815279]

  więcej...
• Turystyka
 [52558]
• Informatyka
 [156281]
• Komiksy
 [36475]
• Encyklopedie
 [23167]
• Dziecięca
 [613277]
• Hobby
 [105022]
• AudioBooki
 [1527]
• Literatura faktu
 [194886]
• Muzyka CD
 [275]
• Słowniki
 [2945]
• Inne
 [440204]
• Kalendarze
 [541]
• Podręczniki
 [165980]
• Poradniki
 [422905]
• Religia
 [509675]
• Czasopisma
 [473]
• Sport
 [61151]
• Sztuka
 [248589]
• CD, DVD, Video
 [3353]
• Technologie
 [230496]
• Zdrowie
 [98648]
• Książkowe Klimaty
 [126]
• Zabawki
 [2521]
• Puzzle, gry
 [3467]
• Literatura w języku ukraińskim
 [276]
• Art. papiernicze i szkolne
 [6689]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2829

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


Security, Privacy, and Applied Cryptography Engineering: 4th International Conference, Space 2014, Pune, India, October 18-22, 2014. Proceedings Chakraborty, Rajat Subhra 9783319120591 Springer
Security, Privacy, and Applied Cryptography Engineering: 4th International Conference, Space 2014, Pune, India, October 18-22, 2014. Proceedings

ISBN: 9783319120591 / Angielski / Miękka / 333 str.

ISBN: 9783319120591/Angielski/Miękka/333 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rajat Subhra Chakraborty; Vashek Matyas; Patrick Schaumont
This book constitutes the refereed proceedings of the 4th International Conference on Security, Privacy, and Applied Cryptography Engineering held in Pune, India, in October 2014. The 19 papers presented together with two invited papers were carefully reviewed and selected from 66 submissions. The papers are organized in topical sections on cryptographic building blocks; mini tutorial; attacks and countermeasures; tools and methods; and secure systems and applications.
This book constitutes the refereed proceedings of the 4th International Conference on Security, Privacy, and Applied Cryptography Engineering held in ...
cena: 202,66

Future Data and Security Engineering: 1st International Conference, Fdse 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings Dang, Tran Khanh 9783319127774 Springer
Future Data and Security Engineering: 1st International Conference, Fdse 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings

ISBN: 9783319127774 / Angielski / Miękka / 312 str.

ISBN: 9783319127774/Angielski/Miękka/312 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tran Khanh Dang; Roland Wagner; Erich J. Neuhold
This book constitutes the refereed proceedings of the First International Conference on Future Data and Security Engineering, FDSE 2014, held in Ho Chi Minh City, Vietnam, in November 2014. The 23 full papers presented were carefully reviewed and selected from 66 submissions. They have been organized in the following topical sections: big data analytics and applications; security and privacy engineering; crowdsourcing and social network data analytics; biometrics and data protection in smart devices; cloud data management and applications; and advances in query processing and optimization.
This book constitutes the refereed proceedings of the First International Conference on Future Data and Security Engineering, FDSE 2014, held in Ho Ch...
cena: 202,66

Construction and Analysis of Cryptographic Functions Lilya Budaghyan 9783319129907 Springer
Construction and Analysis of Cryptographic Functions

ISBN: 9783319129907 / Angielski / Twarda / 168 str.

ISBN: 9783319129907/Angielski/Twarda/168 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lilya Budaghyan
This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions. These functions have optimal resistance to linear and/or differential attacks, which are the two most powerful attacks on symmetric cryptosystems. Besides cryptographic applications, these functions are significant in many branches of mathematics and information theory including coding theory, combinatorics, commutative algebra, finite geometry, sequence design and quantum information theory. The author analyzes...
This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (A...
cena: 405,36

Practical Hadoop Security Bhushan Lakhe 9781430265443 Apress
Practical Hadoop Security

ISBN: 9781430265443 / Angielski / Miękka / 220 str.

ISBN: 9781430265443/Angielski/Miękka/220 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bhushan Lakhe
Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive study of how to implement defined security within a Hadoop cluster in a hands-on way.

You will start with a detailed overview of all the security options available for Hadoop, including popular extensions like Kerberos and OpenSSH, and then delve into a hands-on implementation of...

Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop...
cena: 202,66

Hacking Exposed Wireless: Wireless Security Secrets & Solutions Joshua Wright 9780071827638 MCGRAW-HILL Professional
Hacking Exposed Wireless: Wireless Security Secrets & Solutions

ISBN: 9780071827638 / Angielski / Miękka / 544 str.

ISBN: 9780071827638/Angielski/Miękka/544 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joshua Wright
Exploit and defend against the latest wireless network attacks

Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you'll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how attackers impersonate cellular networks. Hacking Exposed Wireless, Third Edition features expert coverage of ever-expanding threats that...

Exploit and defend against the latest wireless network attacks

Learn to exploit weaknesses in wireless network environments using the innovative te...

cena: 280,54

Information Systems Security: 10th International Conference, Iciss 2014, Hyderabad, India, December 16-20, 2014. Proceedings Prakash, Atul 9783319138404 Springer
Information Systems Security: 10th International Conference, Iciss 2014, Hyderabad, India, December 16-20, 2014. Proceedings

ISBN: 9783319138404 / Angielski / Miękka / 478 str.

ISBN: 9783319138404/Angielski/Miękka/478 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Atul Prakash;Shyamasundar Rudrapatna;Rudrapatna Shyamasundar
This book constitutes the refereed proceedings of the 10th International Conference on Information Systems Security, ICISS 2014, held in Hyderabad, India, in December 2014. The 20 revised full papers and 5 short papers presented together with 3 invited papers were carefully reviewed and selected from 129 submissions. The papers address the following topics: security inferences; security policies; security user interfaces; security attacks; malware detection; forensics; and location based security services.
This book constitutes the refereed proceedings of the 10th International Conference on Information Systems Security, ICISS 2014, held in Hyderabad, In...
cena: 202,66

Advances in Digital Forensics VI: Sixth Ifip Wg 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selec Chow, Kam-Pui 9783642423383 Springer
Advances in Digital Forensics VI: Sixth Ifip Wg 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selec

ISBN: 9783642423383 / Angielski / Miękka / 311 str.

ISBN: 9783642423383/Angielski/Miękka/311 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kam-Pui Chow;Sujeet Shenoi
Advances in Digital Forensics VI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Internet Crime Investigations, Live Forensics, Advanced Forensic Techniques, and Forensic Tools. This book is the sixth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital...
Advances in Digital Forensics VI describes original research results and innovative applications in the discipline of digital forensics. In addition, ...
cena: 202,66

Security Protocols XVIII: 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers Bruce Christianson, James Malcolm 9783662459201 Springer-Verlag Berlin and Heidelberg GmbH &
Security Protocols XVIII: 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers

ISBN: 9783662459201 / Angielski / Miękka / 267 str.

ISBN: 9783662459201/Angielski/Miękka/267 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bruce Christianson;James Malcolm
This book constitutes the thoroughly refereed post-workshop proceedings of the 18th International Workshop on Security Protocols, held in Cambridge, UK, in March 2010. After an introduction the volume presents 16 revised papers and one abstract, each followed by a revised transcript of the discussion ensuing the presentation at the event. The theme of this year's workshop was "Virtually Perfect Security."
This book constitutes the thoroughly refereed post-workshop proceedings of the 18th International Workshop on Security Protocols, held in Cambridge, U...
cena: 194,60

Open Source Software for Digital Forensics Ewa Huebner Stefano Zanero  9781489983282 Springer
Open Source Software for Digital Forensics

ISBN: 9781489983282 / Angielski / Miękka / 124 str.

ISBN: 9781489983282/Angielski/Miękka/124 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ewa Huebner;Stefano Zanero

Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in computer forensics. It presents the motivations for using FLOSS applications as tools for collection, preservation and analysis of digital evidence in computer and network forensics. It also covers extensively several forensic FLOSS tools, their origins and evolution.

Open Source Software for Digital Forensics is based on the OSSCoNF workshop, which was held in Milan, Italy, September 2008 at the World Computing Congress, co-located with OSS 2008. This edited...

Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in computer forensics....

cena: 608,07

Electronic Postage Systems: Technology, Security, Economics Gerrit Bleumer 9781489986672 Springer-Verlag New York Inc.
Electronic Postage Systems: Technology, Security, Economics

ISBN: 9781489986672 / Angielski / Miękka / 248 str.

ISBN: 9781489986672/Angielski/Miękka/248 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gerrit Bleumer

As postal liberalization gains momentum, traditional postage meter markets are being transformed into digital meter markets for enterprise mailers. Modern technologies such as cryptography, digital signatures, hardware security devices, the Internet, 2D bar codes, and high-speed scanning equipment have come together to establish different flavors of electronic postage, addressing the needs of postal operators, private carriers and mailers.

Electronic Postage Systems: Technology, Security, Economics introduces a taxonomy of electronic postage systems and explains...

As postal liberalization gains momentum, traditional postage meter markets are being transformed into digital meter markets for enterprise mailers....

cena: 405,36

Secure Data Management in Decentralized Systems Ting Yu (University of Sydney, Australia Sushil Jajodia  9781489996701 Springer
Secure Data Management in Decentralized Systems

ISBN: 9781489996701 / Angielski / Miękka / 462 str.

ISBN: 9781489996701/Angielski/Miękka/462 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Australia Ting Yu (University of Sydney;Sushil Jajodia
Database security is one of the classical topics in the research of information system security. Ever since the early years of database management systems, a great deal of research activity has been conducted. Fruitful results have been produced, many of which are widely adopted in commercial and military database management systems. In recent years, the research scope of database security has been greatly expanded due to the rapid development of the global internetworked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of - ganizations....
Database security is one of the classical topics in the research of information system security. Ever since the early years of database management sys...
cena: 445,90

Attribute-Based Credentials for Trust: Identity in the Information Society Rannenberg, Kai 9783319144382 Springer
Attribute-Based Credentials for Trust: Identity in the Information Society

ISBN: 9783319144382 / Angielski / Twarda / 391 str.

ISBN: 9783319144382/Angielski/Twarda/391 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kai Rannenberg; Jan Camenisch

The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-based Credentials (Privacy-ABCs) are elegant techniques to provide secure yet privacy-respecting access control. This book addresses the federation and interchangeability of Privacy-ABC technologies. It defines a common, unified architecture for Privacy-ABC systems that allows their respective features to be compared and combined Further, this book presents open reference implementations of selected Privacy-ABC systems and explains how to deploy...

The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-base...

cena: 405,36

Blockchain Melanie Swa 9781491920497 O'Reilly Media
Blockchain

ISBN: 9781491920497 / Angielski / Miękka / 152 str.

ISBN: 9781491920497/Angielski/Miękka/152 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Melanie Swa

Bitcoin is starting to come into its own as a digital currency, but the blockchain technology behind it could prove to be much more significant. This book takes you beyond the currency ("Blockchain 1.0") and smart contracts ("Blockchain 2.0") to demonstrate how the blockchain is in position to become the fifth disruptive computing paradigm after mainframes, PCs, the Internet, and mobile/social networking.

Author Melanie Swan, Founder of the Institute for Blockchain Studies, explains that the blockchain is essentially a public ledger with potential as a worldwide, decentralized record...

Bitcoin is starting to come into its own as a digital currency, but the blockchain technology behind it could prove to be much more significant. Th...

cena: 134,46

E-Government, E-Services and Global Processes: Joint Ifip Tc 8 and Tc 6 International Conferences, Eges 2010 and Gisp 2010, Held as Part of Wcc 2010, Janssen, Marijn 9783642422911 Springer
E-Government, E-Services and Global Processes: Joint Ifip Tc 8 and Tc 6 International Conferences, Eges 2010 and Gisp 2010, Held as Part of Wcc 2010,

ISBN: 9783642422911 / Angielski / Miękka / 258 str.

ISBN: 9783642422911/Angielski/Miękka/258 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marijn Janssen; Winfried Lamersdorf; Jan Pries Heje
This book contains the proceedings of two of the IFIP conferences that took place at the IFIP World Computer Congress 2010 in Brisbane, Australia. The proceedings of each conference are allocated separate parts in this book each with their own editors. E-Government and E-Services (EGES) page 3 Marijn Janssen / Winfried Lamersdorf Global Information Systems Processes (GISP) page 183 Jan Pries-Heje / Michael Rosemann Organization E-Government and E-Services (EGES 2010) EGES Co-chairs Marijn Janssen Delft, The Netherlands Winfried Lamersdorf Hamburg, Germany Lalit Sawhney Bangalore, India Leon...
This book contains the proceedings of two of the IFIP conferences that took place at the IFIP World Computer Congress 2010 in Brisbane, Australia. The...
cena: 202,66

Engineering Secure Software and Systems: 7th International Symposium, Essos 2015, Milan, Italy, March 4-6, 2015, Proceedings Piessens, Frank 9783319156170 Springer
Engineering Secure Software and Systems: 7th International Symposium, Essos 2015, Milan, Italy, March 4-6, 2015, Proceedings

ISBN: 9783319156170 / Angielski / Miękka / 227 str.

ISBN: 9783319156170/Angielski/Miękka/227 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Frank Piessens; Juan Caballero; Nataliia Bielova
This book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, held in Milan, Italy, in March 2015. The 11 full papers presented together with 5 short papers were carefully reviewed and selected from 41 submissions. The symposium features the following topics: formal methods; cloud passwords; machine learning; measurements ontologies; and access control.
This book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, held in Mila...
cena: 202,66

Progress in Cryptology - Latincrypt 2014: Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil Aranha, Diego F. 9783319162942 Springer
Progress in Cryptology - Latincrypt 2014: Third International Conference on Cryptology and Information Security in Latin America Florianópolis, Brazil

ISBN: 9783319162942 / Angielski / Miękka / 387 str.

ISBN: 9783319162942/Angielski/Miękka/387 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Diego F. Aranha
This book constitutes the proceedings of the 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, held in Florianopolis, Brazil, in September 2014. The 19 papers presented together with four invited talks were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on cryptographic engineering, side-channel attacks and countermeasures, privacy, crypto analysis and cryptographic protocols.
This book constitutes the proceedings of the 3rd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2014, he...
cena: 202,66

Handbook of Research on Emerging Developments in Data Privacy Manish Gupta 9781466673816 Information Science Reference
Handbook of Research on Emerging Developments in Data Privacy

ISBN: 9781466673816 / Angielski / Twarda / 534 str.

ISBN: 9781466673816/Angielski/Twarda/534 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Manish Gupta
"This book brings together new ideas on how to deal with potential leaks of valuable customer information, highlighting the legal aspects of identity protection, trust and security, and detection techniques"--
"This book brings together new ideas on how to deal with potential leaks of valuable customer information, highlighting the legal aspects of identity ...
cena: 1661,14

Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, Dpm 2014, 7th International Workshop, Se Garcia-Alfaro, Joaquin 9783319170152 Springer
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance: 9th International Workshop, Dpm 2014, 7th International Workshop, Se

ISBN: 9783319170152 / Angielski / Miękka / 343 str.

ISBN: 9783319170152/Angielski/Miękka/343 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joaquin Garcia-Alfaro; Jordi Herrera-Joancomarti; Emil Lupu
This book constitutes the revised selected papers of the 9th International Workshop on Data Privacy Management, DPM 2014, the 7th International Workshop on Autonomous and Spontaneous Security, SETOP 2014, and the 9th International Workshop on Quantitative Aspects in Security Assurance, held in Wroclaw, Poland, in September 2014, co-located with the 19th European Symposium on Research in Computer Security (ESORICS 2014). The volume contains 7 full and 4 short papers plus 1 keynote talk from the DPM workshop; 2 full papers and 1 keynote talk from the SETOP workshop; and 7 full papers and 1...
This book constitutes the revised selected papers of the 9th International Workshop on Data Privacy Management, DPM 2014, the 7th International Worksh...
cena: 202,66

Candidate Multilinear Maps Sanjam Garg 9781627055376 Morgan & Claypool Publishers-ACM
Candidate Multilinear Maps

ISBN: 9781627055376 / Angielski / Miękka / 122 str.

ISBN: 9781627055376/Angielski/Miękka/122 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sanjam Garg
The aim of cryptography is to design primitives and protocols that withstand adversarial behavior. Information theoretic cryptography, how-so-ever desirable, is extremely restrictive and most non-trivial cryptographic tasks are known to be information theoretically impossible. In order to realize sophisticated cryptographic primitives, we forgo information theoretic security and assume limitations on what can be efficiently computed. In other words we attempt to build secure systems conditioned on some computational intractability assumption such as factoring, discrete log, decisional...
The aim of cryptography is to design primitives and protocols that withstand adversarial behavior. Information theoretic cryptography, how-so-ever des...
cena: 201,21

Multilevel Modeling of Secure Systems in Qop-ML Bogdan Ksi 9781482202557 Auerbach Publications
Multilevel Modeling of Secure Systems in Qop-ML

ISBN: 9781482202557 / Angielski / Twarda / 262 str.

ISBN: 9781482202557/Angielski/Twarda/262 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bogdan Ksi

In order to perform effective analysis of today s information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and accounts for all of the significant details.
Enabling the multilevel modeling of secure systems, the quality of protection modeling language (QoP-ML) approach provides for the abstraction of security systems while maintaining an emphasis on quality protection. This book introduces the basis of...

In order to perform effective analysis of today s information security systems, numerous components must be taken into consideration. This book pre...

cena: 466,18

Pierwsza Podprzednia  100  101  102  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia