![]() |
Policies and Research in Identity Management: Third Ifip Wg 11.6 Working Conference, Idman 2013, London, Uk, April 8-9, 2013, Proceedings
ISBN: 9783642431159 / Angielski / Miękka / 161 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The papers have been organized into topical sections on privacy and identity management, anonymous credentials, authentication and access control, risk management of identity management, identity management with smart cards, and federated identity management.
The papers have been organized into topical sections on privacy and identity management, anonymous credentials, authentication and access control, ris...
|
cena:
202,66 |
![]() |
Constructive Side-Channel Analysis and Secure Design: 6th International Workshop, Cosade 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Pa
ISBN: 9783319214757 / Angielski / Miękka / 271 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. the focus of this workshop was on following topics: side-channel attacks, FPGA countermeasures, timing attacks and countermeasures, fault attacks, countermeasures, and Hands-on Side-channel analysis.
the focus of this workshop was on following topics: side-channel attacks, FPGA countermeasures, timing attacks and countermeasures, fault attacks, cou...
|
cena:
202,66 |
![]() |
Information and Communications Security: 16th International Conference, Icics 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers
ISBN: 9783319219653 / Angielski / Miękka / 321 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Security, ICISC 2014, held in Hong Kong, China, in December 2014. The 22 revised full papers including two invited talks presented were carefully selected from 90 submissions. The papers provide the latest results in research, development and applications in the field of information security and cryptology.
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information and Communications Secur...
|
cena:
202,66 |
![]() |
Diffusion in Social Networks
ISBN: 9783319231044 / Angielski / Miękka / 101 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents the leading models of social network diffusion that are used to demonstrate the spread of disease, ideas, and behavior. It introduces diffusion models from the fields of computer science (independent cascade and linear threshold), sociology (tipping models), physics (voter models), biology (evolutionary models), and epidemiology (SIR/SIS and related models). A variety of properties and problems related to these models are discussed including identifying seeds sets to initiate diffusion, game theoretic problems, predicting diffusion events, and more. The book explores...
This book presents the leading models of social network diffusion that are used to demonstrate the spread of disease, ideas, and behavior. It introduc...
|
cena:
202,66 |
![]() |
Ddos Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance
ISBN: 9781498729642 / Angielski / Twarda / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with the goal of tolerating the attack. It introduces types and characteristics of DDoS attacks, reasons why such attacks are often successful, what aspects of the network infrastructure are usual targets, and methods used to launch attacks. The book elaborates upon the... DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (... |
cena:
516,36 |
![]() |
Security, Privacy, and Applied Cryptography Engineering: 5th International Conference, Space 2015, Jaipur, India, October 3-7, 2015, Proceedings
ISBN: 9783319241258 / Angielski / Miękka / 373 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2015, held in Jaipur, India, in October 2015. The 17 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The book also contains 4 invited talks in full-paper length."
This book constitutes the proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2015, h... |
cena:
202,66 |
![]() |
Secure Information Management Using Linguistic Threshold Approach
ISBN: 9781447160403 / Angielski / Miękka / 136 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book details linguistic threshold schemes for information sharing. It examines the opportunities of using these techniques to create new models of managing strategic information shared within a commercial organisation or a state institution.
This book details linguistic threshold schemes for information sharing. It examines the opportunities of using these techniques to create new models o...
|
cena:
202,66 |
![]() |
Quantum Computational Number Theory
ISBN: 9783319258218 / Angielski / Twarda / 252 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems. Key problems include prime number generation, primality testing, integer factorization, discrete logarithms, elliptic curve arithmetic, conjecture and numerical verification. The author discusses quantum algorithms for solving the Integer Factorization Problem (IFP), the... This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on appli... |
cena:
405,36 |
![]() |
Secure Wireless Sensor Networks: Threats and Solutions
ISBN: 9781493934584 / Angielski / Twarda / 169 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions for the node capture attack and the clone attack. It examines a number of areas and problems to which WSNs are applied continuously, including: supporting rescue operations, building surveillance, fire prevention, battlefield monitoring and more. However, known and unknown threats still affect... This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single nod... |
cena:
202,66 |
![]() |
Network Security and Cryptography
ISBN: 9781942270836 / Angielski / Miękka / 560 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. This book is a definitive guide to the principles and techniques of cryptography and network security as well as their effective usage.
Primarily intended as a textbook for courses in computer science, electronics and communication, and electrical and electronics, the book also serves as a basic reference and refresher for professionals in these areas. FEATURES: -Introduces basic concepts in... Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and...
|
cena:
212,33 |
![]() |
Il Futuro Dell'information & Communication Technology: Tecnologie, Timori E Scenari Futuri Della Global Network Revolution
ISBN: 9788847056084 / Angielski / Miękka / 162 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Negli ultimi decenni il rapido sviluppo delle tecnologie IT ha influito in maniera determinante nella vita dell uomo, trasformando, spesso inconsapevolmente il suo lavoro, le sue abitudini, il suo modo di interagire con il mondo che lo circonda. Il fenomeno della "globalizzazione" dei mercati e solo una delle trasformazioni che l intero pianeta sta attraversando. Anche se i vantaggi derivanti dall utilizzo delle moderne tecnologie di comunicazione ci facilitano nel lavoro e nella attivita ludiche e personali, molte sono le perplessita e i dubbi che attanagliano tutti coloro che le... Negli ultimi decenni il rapido sviluppo delle tecnologie IT ha influito in maniera determinante nella vita dell uomo, trasformando, spesso inconsap... |
cena:
50,47 |
![]() |
Innovative Security Solutions for Information Technology and Communications: 8th International Conference, Secitc 2015, Bucharest, Romania, June 11-12
ISBN: 9783319271781 / Angielski / Miękka / 281 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Security for Information Technology and Communications, SECITC 2015, held in Bucharest, Romania, in June 2015. The 17 revised full papers were carefully reviewed and selected from 36 submissions. In addition with 5 invited talks the papers cover topics such as Cryptographic Algorithms and Protocols, Security Technologies for IT&C, Information Security Management, Cyber Defense, and Digital Forensics.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Security for Information Technolog... |
cena:
194,60 |
![]() |
Internet of Vehicles - Safe and Intelligent Mobility: Second International Conference, Iov 2015, Chengdu, China, December 19-21, 2015, Proceedings
ISBN: 9783319272924 / Angielski / Miękka / 480 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the SecondInternational Conference on Internet of Vehicles, IOV 2015, held inChengdu, China, in December 2015.
The 40 full papers presented were carefully reviewed and selected from128 submissions. They focus on the following topics: IOV architectures andapplications; intelligent mobility; V2V and M2M communications; and modeling and simulations. This book constitutes the refereed proceedings of the SecondInternational Conference on Internet of Vehicles, IOV 2015, held inChengdu, China, in Dece...
|
cena:
202,66 |
![]() |
Network Science and Cybersecurity
ISBN: 9781489990655 / Angielski / Miękka / 285 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Network Science and Cybersecurity introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of Defense, industry and academic laboratories. This book examines new algorithms and tools, technology platforms and reconfigurable technologies for cybersecurity systems. Anomaly-based intrusion detection systems (IDS) are explored as a key component of any general network intrusion detection service, complementing signature-based IDS components by attempting to identify novel attacks. These... Network Science and Cybersecurity introduces new research and development efforts for cybersecurity solutions and applications taking place ... |
cena:
202,66 |
![]() |
Pro Oracle Identity and Access Management Suite
ISBN: 9781484215227 / Angielski / Miękka / 326 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents a process-based approach to implementing Oracle s Identity and Access Management Suite. Learn everything from basic installation through to advanced topics such as leveraging Oracle Virtual Directory and Identity Federation. Also covered is integrating with applications such as Oracle E-Business Suite and WebCenter Content. Pro Oracle Identity and Access Management Suite provides real world implementation examples that make up a valuable resource as you plan and implement the product stack in your own environment. The book and the examples are... This book presents a process-based approach to implementing Oracle s Identity and Access Management Suite. Learn everything from basic installation... |
cena:
202,66 |
![]() |
Hacking Exposed Industrial Control Systems: ICS and Scada Security Secrets & Solutions
ISBN: 9781259589713 / Angielski / Miękka / 416 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Secure your ICS and SCADA systems the battle-tested Hacking Exposed(TM) way This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against... Secure your ICS and SCADA systems the battle-tested Hacking Exposed(TM) way This hands-on guide exposes the devious... |
cena:
282,07 |
![]() |
Time Delay Measurements of Key Generation Process on Smart Cards
ISBN: 9781522955399 / Angielski / Miękka / 40 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
52,54 |
![]() |
Post-Quantum Cryptography: 7th International Workshop, Pqcrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings
ISBN: 9783319293592 / Angielski / Miękka / 267 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 7th International Workshop on Post-Quantum Cryptography, PQCrypto 2016, held in Fukuoka, Japan, in February 2016. The 16 revised full papers presented were carefully reviewed and selected from 42 submissions. The papers cover all technical aspects of multivariate polynomial cryptography, code-based cryptography, lattice-based cryptography, quantum algorithms, post-quantum protocols, and implementations. This book constitutes the refereed proceedings of the 7th International Workshop on Post-Quantum Cryptography, PQCrypto 2016, held in Fukuoka, Japa... |
cena:
202,66 |
![]() |
Watermarking Security
ISBN: 9789811005053 / Angielski / Miękka / 125 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain. This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking ... |
cena:
202,66 |
![]() |
Small Business Cyber Security: Your Customers Can Trust You...Right?
ISBN: 9781599325903 / Angielski / Miękka / 152 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Make Security Your Business Your company is a fortress secure, safe, and productive but when there is a threat, you, the superhero IT person, are pinned with solving the problem. What if preemptive action was taken to create a framework for an accessible and executable security plan? Security is everyone s business, and making it such is vital in order to: educate staff throughout the company and address the status quo; know what to do with risk; and build solid security into systems and ways of business. Adam Anderson and Tom Gilkeson expose trends that the leading cybersecurity...
Make Security Your Business Your company is a fortress secure, safe, and productive but when there is a threat, you, the superhero IT person, are pinn...
|
cena:
57,92 |