• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [3082669]
• Literatura piękna
 [1815279]

  więcej...
• Turystyka
 [52558]
• Informatyka
 [156281]
• Komiksy
 [36475]
• Encyklopedie
 [23167]
• Dziecięca
 [613277]
• Hobby
 [105022]
• AudioBooki
 [1527]
• Literatura faktu
 [194886]
• Muzyka CD
 [275]
• Słowniki
 [2945]
• Inne
 [440204]
• Kalendarze
 [541]
• Podręczniki
 [165980]
• Poradniki
 [422905]
• Religia
 [509675]
• Czasopisma
 [473]
• Sport
 [61151]
• Sztuka
 [248589]
• CD, DVD, Video
 [3353]
• Technologie
 [230496]
• Zdrowie
 [98648]
• Książkowe Klimaty
 [126]
• Zabawki
 [2521]
• Puzzle, gry
 [3467]
• Literatura w języku ukraińskim
 [276]
• Art. papiernicze i szkolne
 [6689]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2830

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


Policies and Research in Identity Management: Third Ifip Wg 11.6 Working Conference, Idman 2013, London, Uk, April 8-9, 2013, Proceedings Fischer-Hübner, Simone 9783642431159 Springer
Policies and Research in Identity Management: Third Ifip Wg 11.6 Working Conference, Idman 2013, London, Uk, April 8-9, 2013, Proceedings

ISBN: 9783642431159 / Angielski / Miękka / 161 str.

ISBN: 9783642431159/Angielski/Miękka/161 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Simone Fischer-Hubner; Elisabeth De Leeuw; Chris J. Mitchell
The papers have been organized into topical sections on privacy and identity management, anonymous credentials, authentication and access control, risk management of identity management, identity management with smart cards, and federated identity management.
The papers have been organized into topical sections on privacy and identity management, anonymous credentials, authentication and access control, ris...
cena: 202,66

Constructive Side-Channel Analysis and Secure Design: 6th International Workshop, Cosade 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Pa Mangard, Stefan 9783319214757 Springer
Constructive Side-Channel Analysis and Secure Design: 6th International Workshop, Cosade 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Pa

ISBN: 9783319214757 / Angielski / Miękka / 271 str.

ISBN: 9783319214757/Angielski/Miękka/271 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stefan Mangard; Axel Y. Poschmann
the focus of this workshop was on following topics: side-channel attacks, FPGA countermeasures, timing attacks and countermeasures, fault attacks, countermeasures, and Hands-on Side-channel analysis.
the focus of this workshop was on following topics: side-channel attacks, FPGA countermeasures, timing attacks and countermeasures, fault attacks, cou...
cena: 202,66

Information and Communications Security: 16th International Conference, Icics 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers Hui, Lucas C. K. 9783319219653 Springer
Information and Communications Security: 16th International Conference, Icics 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers

ISBN: 9783319219653 / Angielski / Miękka / 321 str.

ISBN: 9783319219653/Angielski/Miękka/321 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lucas C. K. Hui; S. H. Qing; Elaine Shi
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014. The 22 revised full papers including two invited talks presented were carefully selected from 90 submissions. The papers provide the latest results in research, development and applications in the field of information security and cryptology.
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Secur...
cena: 202,66

Diffusion in Social Networks Paulo Shakarian Abhivav Bhatnagar Ashkan Aleali 9783319231044 Springer
Diffusion in Social Networks

ISBN: 9783319231044 / Angielski / Miękka / 101 str.

ISBN: 9783319231044/Angielski/Miękka/101 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Paulo Shakarian; Abhivav Bhatnagar; Ashkan Aleali
This book presents the leading models of social network diffusion that are used to demonstrate the spread of disease, ideas, and behavior. It introduces diffusion models from the fields of computer science (independent cascade and linear threshold), sociology (tipping models), physics (voter models), biology (evolutionary models), and epidemiology (SIR/SIS and related models). A variety of properties and problems related to these models are discussed including identifying seeds sets to initiate diffusion, game theoretic problems, predicting diffusion events, and more. The book explores...
This book presents the leading models of social network diffusion that are used to demonstrate the spread of disease, ideas, and behavior. It introduc...
cena: 202,66

Ddos Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance Dhruba Kumar Bhattacharyya Jugal Kumar Kalita  9781498729642 Productivity Press
Ddos Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance

ISBN: 9781498729642 / Angielski / Twarda / 288 str.

ISBN: 9781498729642/Angielski/Twarda/288 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dhruba Kumar Bhattacharyya;Jugal Kumar Kalita

DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with the goal of tolerating the attack. It introduces types and characteristics of DDoS attacks, reasons why such attacks are often successful, what aspects of the network infrastructure are usual targets, and methods used to launch attacks.

The book elaborates upon the...

DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (...

cena: 516,36

Security, Privacy, and Applied Cryptography Engineering: 5th International Conference, Space 2015, Jaipur, India, October 3-7, 2015, Proceedings Chakraborty, Rajat Subhra 9783319241258 Springer
Security, Privacy, and Applied Cryptography Engineering: 5th International Conference, Space 2015, Jaipur, India, October 3-7, 2015, Proceedings

ISBN: 9783319241258 / Angielski / Miękka / 373 str.

ISBN: 9783319241258/Angielski/Miękka/373 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rajat Subhra Chakraborty; Peter Schwabe; Jon Solworth

This book constitutes the proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2015, held in Jaipur, India, in October 2015.

The 17 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The book also contains 4 invited talks in full-paper length."

This book constitutes the proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2015, h...

cena: 202,66

Secure Information Management Using Linguistic Threshold Approach Marek R. Ogiela Urszula Ogiela 9781447160403 Springer
Secure Information Management Using Linguistic Threshold Approach

ISBN: 9781447160403 / Angielski / Miękka / 136 str.

ISBN: 9781447160403/Angielski/Miękka/136 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marek R. Ogiela; Urszula Ogiela
This book details linguistic threshold schemes for information sharing. It examines the opportunities of using these techniques to create new models of managing strategic information shared within a commercial organisation or a state institution.
This book details linguistic threshold schemes for information sharing. It examines the opportunities of using these techniques to create new models o...
cena: 202,66

Quantum Computational Number Theory Song Y. Yan 9783319258218 Springer
Quantum Computational Number Theory

ISBN: 9783319258218 / Angielski / Twarda / 252 str.

ISBN: 9783319258218/Angielski/Twarda/252 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Song Y. Yan

This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems. Key problems include prime number generation, primality testing, integer factorization, discrete logarithms, elliptic curve arithmetic, conjecture and numerical verification.

The author discusses quantum algorithms for solving the Integer Factorization Problem (IFP), the...

This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on appli...

cena: 405,36

Secure Wireless Sensor Networks: Threats and Solutions Conti, Mauro 9781493934584 Springer
Secure Wireless Sensor Networks: Threats and Solutions

ISBN: 9781493934584 / Angielski / Twarda / 169 str.

ISBN: 9781493934584/Angielski/Twarda/169 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mauro Conti

This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions for the node capture attack and the clone attack.

It examines a number of areas and problems to which WSNs are applied continuously, including: supporting rescue operations, building surveillance, fire prevention, battlefield monitoring and more. However, known and unknown threats still affect...

This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single nod...

cena: 202,66

Network Security and Cryptography Sarhan M. Musa 9781942270836 Mercury Learning & Information
Network Security and Cryptography

ISBN: 9781942270836 / Angielski / Miękka / 560 str.

ISBN: 9781942270836/Angielski/Miękka/560 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sarhan M. Musa
Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. This book is a definitive guide to the principles and techniques of cryptography and network security as well as their effective usage.

Primarily intended as a textbook for courses in computer science, electronics and communication, and electrical and electronics, the book also serves as a basic reference and refresher for professionals in these areas.

FEATURES:
-Introduces basic concepts in...
Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and...
cena: 212,33

Il Futuro Dell'information & Communication Technology: Tecnologie, Timori E Scenari Futuri Della Global Network Revolution Teti, Antonio 9788847056084 Springer Verlag
Il Futuro Dell'information & Communication Technology: Tecnologie, Timori E Scenari Futuri Della Global Network Revolution

ISBN: 9788847056084 / Angielski / Miękka / 162 str.

ISBN: 9788847056084/Angielski/Miękka/162 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Antonio Teti

Negli ultimi decenni il rapido sviluppo delle tecnologie IT ha influito in maniera determinante nella vita dell uomo, trasformando, spesso inconsapevolmente il suo lavoro, le sue abitudini, il suo modo di interagire con il mondo che lo circonda. Il fenomeno della "globalizzazione" dei mercati e solo una delle trasformazioni che l intero pianeta sta attraversando. Anche se i vantaggi derivanti dall utilizzo delle moderne tecnologie di comunicazione ci facilitano nel lavoro e nella attivita ludiche e personali, molte sono le perplessita e i dubbi che attanagliano tutti coloro che le...

Negli ultimi decenni il rapido sviluppo delle tecnologie IT ha influito in maniera determinante nella vita dell uomo, trasformando, spesso inconsap...

cena: 50,47

Innovative Security Solutions for Information Technology and Communications: 8th International Conference, Secitc 2015, Bucharest, Romania, June 11-12 Bica, Ion 9783319271781 Springer
Innovative Security Solutions for Information Technology and Communications: 8th International Conference, Secitc 2015, Bucharest, Romania, June 11-12

ISBN: 9783319271781 / Angielski / Miękka / 281 str.

ISBN: 9783319271781/Angielski/Miękka/281 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ion Bica; David Naccache; Emil Simion

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Security for Information Technology and Communications, SECITC 2015, held in Bucharest, Romania, in June 2015.

The 17 revised full papers were carefully reviewed and selected from 36 submissions. In addition with 5 invited talks the papers cover topics such as Cryptographic Algorithms and Protocols, Security Technologies for IT&C, Information Security Management, Cyber Defense, and Digital Forensics.


This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Security for Information Technolog...

cena: 194,60

Internet of Vehicles - Safe and Intelligent Mobility: Second International Conference, Iov 2015, Chengdu, China, December 19-21, 2015, Proceedings Hsu, Ching-Hsien 9783319272924 Springer
Internet of Vehicles - Safe and Intelligent Mobility: Second International Conference, Iov 2015, Chengdu, China, December 19-21, 2015, Proceedings

ISBN: 9783319272924 / Angielski / Miękka / 480 str.

ISBN: 9783319272924/Angielski/Miękka/480 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ching-Hsien Hsu; Xia Feng; Xingang Liu
This book constitutes the refereed proceedings of the SecondInternational Conference on Internet of Vehicles, IOV 2015, held inChengdu, China, in December 2015.
The 40 full papers presented were carefully reviewed and selected from128 submissions. They focus on the following topics: IOV architectures andapplications; intelligent mobility; V2V and M2M communications; and modeling and simulations.
This book constitutes the refereed proceedings of the SecondInternational Conference on Internet of Vehicles, IOV 2015, held inChengdu, China, in Dece...
cena: 202,66

Network Science and Cybersecurity Robinson E. Pino 9781489990655 Springer
Network Science and Cybersecurity

ISBN: 9781489990655 / Angielski / Miękka / 285 str.

ISBN: 9781489990655/Angielski/Miękka/285 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robinson E. Pino

Network Science and Cybersecurity introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of Defense, industry and academic laboratories.

This book examines new algorithms and tools, technology platforms and reconfigurable technologies for cybersecurity systems. Anomaly-based intrusion detection systems (IDS) are explored as a key component of any general network intrusion detection service, complementing signature-based IDS components by attempting to identify novel attacks. These...

Network Science and Cybersecurity introduces new research and development efforts for cybersecurity solutions and applications taking place ...

cena: 202,66

Pro Oracle Identity and Access Management Suite Kenneth Ramey 9781484215227 Apress
Pro Oracle Identity and Access Management Suite

ISBN: 9781484215227 / Angielski / Miękka / 326 str.

ISBN: 9781484215227/Angielski/Miękka/326 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kenneth Ramey

This book presents a process-based approach to implementing Oracle s Identity and Access Management Suite. Learn everything from basic installation through to advanced topics such as leveraging Oracle Virtual Directory and Identity Federation. Also covered is integrating with applications such as Oracle E-Business Suite and WebCenter Content. Pro Oracle Identity and Access Management Suite provides real world implementation examples that make up a valuable resource as you plan and implement the product stack in your own environment. The book and the examples are...

This book presents a process-based approach to implementing Oracle s Identity and Access Management Suite. Learn everything from basic installation...

cena: 202,66

Hacking Exposed Industrial Control Systems: ICS and Scada Security Secrets & Solutions Stephen Hilt 9781259589713 McGraw-Hill Education
Hacking Exposed Industrial Control Systems: ICS and Scada Security Secrets & Solutions

ISBN: 9781259589713 / Angielski / Miękka / 416 str.

ISBN: 9781259589713/Angielski/Miękka/416 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stephen Hilt

Secure your ICS and SCADA systems the battle-tested Hacking Exposed(TM) way

This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against...

Secure your ICS and SCADA systems the battle-tested Hacking Exposed(TM) way

This hands-on guide exposes the devious...

cena: 282,07

Time Delay Measurements of Key Generation Process on Smart Cards Naval Postgraduate School                Penny Hill Press Inc 9781522955399 Createspace Independent Publishing Platform
Time Delay Measurements of Key Generation Process on Smart Cards

ISBN: 9781522955399 / Angielski / Miękka / 40 str.

ISBN: 9781522955399/Angielski/Miękka/40 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Naval Postgraduate School;Penny Hill Press Inc
cena: 52,54

Post-Quantum Cryptography: 7th International Workshop, Pqcrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings Takagi, Tsuyoshi 9783319293592 Springer
Post-Quantum Cryptography: 7th International Workshop, Pqcrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings

ISBN: 9783319293592 / Angielski / Miękka / 267 str.

ISBN: 9783319293592/Angielski/Miękka/267 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tsuyoshi Takagi

This book constitutes the refereed proceedings of the 7th International Workshop on Post-Quantum Cryptography, PQCrypto 2016, held in Fukuoka, Japan, in February 2016.

The 16 revised full papers presented were carefully reviewed and selected from 42 submissions. The papers cover all technical aspects of multivariate polynomial cryptography, code-based cryptography, lattice-based cryptography, quantum algorithms, post-quantum protocols, and implementations.


This book constitutes the refereed proceedings of the 7th International Workshop on Post-Quantum Cryptography, PQCrypto 2016, held in Fukuoka, Japa...

cena: 202,66

Watermarking Security Bas, Patrick 9789811005053 Springer
Watermarking Security

ISBN: 9789811005053 / Angielski / Miękka / 125 str.

ISBN: 9789811005053/Angielski/Miękka/125 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Patrick Bas; Teddy Furon; Francois Cayre

This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking ...
cena: 202,66

Small Business Cyber Security: Your Customers Can Trust You...Right? Adam Anderson Tom Gilkeson Anderson 9781599325903 Advantage Media Group
Small Business Cyber Security: Your Customers Can Trust You...Right?

ISBN: 9781599325903 / Angielski / Miękka / 152 str.

ISBN: 9781599325903/Angielski/Miękka/152 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Adam Anderson; Tom Gilkeson;Anderson
Make Security Your Business Your company is a fortress secure, safe, and productive but when there is a threat, you, the superhero IT person, are pinned with solving the problem. What if preemptive action was taken to create a framework for an accessible and executable security plan? Security is everyone s business, and making it such is vital in order to: educate staff throughout the company and address the status quo; know what to do with risk; and build solid security into systems and ways of business. Adam Anderson and Tom Gilkeson expose trends that the leading cybersecurity...
Make Security Your Business Your company is a fortress secure, safe, and productive but when there is a threat, you, the superhero IT person, are pinn...
cena: 57,92

Pierwsza Podprzednia  100  101  102  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia