• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [3084821]
• Literatura piękna
 [1818531]

  więcej...
• Turystyka
 [52640]
• Informatyka
 [156433]
• Komiksy
 [36751]
• Encyklopedie
 [23178]
• Dziecięca
 [613236]
• Hobby
 [105326]
• AudioBooki
 [1727]
• Literatura faktu
 [194989]
• Muzyka CD
 [350]
• Słowniki
 [3001]
• Inne
 [441634]
• Kalendarze
 [606]
• Podręczniki
 [166391]
• Poradniki
 [423402]
• Religia
 [510371]
• Czasopisma
 [517]
• Sport
 [61219]
• Sztuka
 [248722]
• CD, DVD, Video
 [3436]
• Technologie
 [230487]
• Zdrowie
 [98718]
• Książkowe Klimaty
 [124]
• Zabawki
 [2526]
• Puzzle, gry
 [3722]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [7792]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2789

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


Attribute-Based Credentials for Trust: Identity in the Information Society Rannenberg, Kai 9783319381947 Springer
Attribute-Based Credentials for Trust: Identity in the Information Society

ISBN: 9783319381947 / Angielski / Miękka / 391 str.

ISBN: 9783319381947/Angielski/Miękka/391 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kai Rannenberg; Jan Camenisch; Ahmad Sabouri

The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-based Credentials (Privacy-ABCs) are elegant techniques to provide secure yet privacy-respecting access control. This book addresses the federation and interchangeability of Privacy-ABC technologies. It defines a common, unified architecture for Privacy-ABC systems that allows their respective features to be compared and combined Further, this book presents open reference implementations of selected Privacy-ABC systems and explains how to deploy...

The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-base...

cena: 405,36

Hardware IP Security and Trust Prabhat Mishra Swarup Bhunia Mark Tehranipoor 9783319490243 Springer
Hardware IP Security and Trust

ISBN: 9783319490243 / Angielski / Twarda / 353 str.

ISBN: 9783319490243/Angielski/Twarda/353 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Prabhat Mishra; Swarup Bhunia; Mark Tehranipoor
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle.
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP c...
cena: 567,53

Iris Biometric Model for Secured Network Access Franjieh El Khoury 9781138198722 CRC Press
Iris Biometric Model for Secured Network Access

ISBN: 9781138198722 / Angielski / Miękka / 220 str.

ISBN: 9781138198722/Angielski/Miękka/220 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Franjieh El Khoury

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.
Iris Biometric Model for Secured Network Access proposes a new model, the IrisCryptoAgentSystem (ICAS), which is based on a biometric method for authentication using the iris of the eyes and an asymmetric cryptography method using "Rivest-Shamir-Adleman" (RSA) in an agent-based architecture. It focuses on the development...

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore,...

cena: 255,68

Noiseless Steganography: The Key to Covert Communications Abdelrahman Desoky 9781138199361 Taylor & Francis Ltd
Noiseless Steganography: The Key to Covert Communications

ISBN: 9781138199361 / Angielski / Miękka / 300 str.

ISBN: 9781138199361/Angielski/Miękka/300 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Abdelrahman Desoky

Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind:

  • The first to comprehensively cover Linguistic Steganography
  • The first to comprehensively cover Graph Steganography
  • The first to comprehensively cover Game Steganography

Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These...

Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind:

  • The ...
cena: 285,18

Beginning Ethical Hacking with Python Sanjib Sinha 9781484225400 Apress
Beginning Ethical Hacking with Python

ISBN: 9781484225400 / Angielski / Miękka / 201 str.

ISBN: 9781484225400/Angielski/Miękka/201 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sanjib Sinha

Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming.

Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals...

Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation...

cena: 173,84

Secure and Privacy-Preserving Data Communication in Internet of Things Liehuang Zhu Zijian Zhang Chang Xu 9789811032349 Springer
Secure and Privacy-Preserving Data Communication in Internet of Things

ISBN: 9789811032349 / Angielski / Miękka / 78 str.

ISBN: 9789811032349/Angielski/Miękka/78 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Liehuang Zhu; Zijian Zhang; Chang Xu

This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader's horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy...

This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT...
cena: 222,94

Unsolved! : The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies Bauer, Craig 9780691167671 John Wiley & Sons
Unsolved! : The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies

ISBN: 9780691167671 / Angielski / Twarda / 624 str.

ISBN: 9780691167671/Angielski/Twarda/624 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

A mathematical tour of some of the greatest unsolved ciphers of all time

In 1953, a man was found dead from cyanide poisoning near the Philadelphia airport with a picture of a Nazi aircraft in his wallet. Taped to his abdomen was an enciphered message. In 1912, a book dealer named Wilfrid Voynich came into possession of an illuminated cipher manuscript once belonging to Emperor Rudolf II, who was obsessed with alchemy and the occult. Wartime codebreakers tried--and failed--to unlock the book's secrets, and it remains an enigma to this day. In this lively and entertaining book,...

A mathematical tour of some of the greatest unsolved ciphers of all time

In 1953, a man was found dead from cyanide poisoning near the...

cena: 155,30

Trusted Computing: Principles and Applications Feng, Dengguo 9783110476040 de Gruyter
Trusted Computing: Principles and Applications

ISBN: 9783110476040 / Angielski / Twarda / 311 str.

ISBN: 9783110476040/Angielski/Twarda/311 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dengguo Feng;Tsinghua University Press
cena: 598,89

Transactions on Large-Scale Data- And Knowledge-Centered Systems XXXI: Special Issue on Data and Security Engineering Hameurlain, Abdelkader 9783662541722 Springer
Transactions on Large-Scale Data- And Knowledge-Centered Systems XXXI: Special Issue on Data and Security Engineering

ISBN: 9783662541722 / Angielski / Miękka / 147 str.

ISBN: 9783662541722/Angielski/Miękka/147 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Abdelkader Hameurlain; Josef Kung; Roland Wagner
cena: 202,66

Smart Computing and Communication: First International Conference, Smartcom 2016, Shenzhen, China, December 17-19, 2016, Proceedings Qiu, Meikang 9783319520148 Springer
Smart Computing and Communication: First International Conference, Smartcom 2016, Shenzhen, China, December 17-19, 2016, Proceedings

ISBN: 9783319520148 / Angielski / Miękka / 589 str.

ISBN: 9783319520148/Angielski/Miękka/589 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Meikang Qiu
This book constitutes the proceedings of the First International Conference on Smart Computing and Communication, SmartCom 2016, held in Shenzhen, China, in December 2016. The 59 papers presented in this volume were carefully reviewed and selected from 210 submissions.
The conference focuses on both smart computing and communications fields and aims to collect recent academic work to improve the research and practical applications.
This book constitutes the proceedings of the First International Conference on Smart Computing and Communication, SmartCom 2016, held in Shenzhen, Chi...
cena: 202,66

Digital Forensics  9781119262381 John Wiley & Sons Inc
Digital Forensics

ISBN: 9781119262381 / Angielski / Miękka / 384 str.

ISBN: 9781119262381/Angielski/Miękka/384 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.

The definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critical field

Written by faculty members and associates of the world-renowned Norwegian Information Security Laboratory (NisLab) at the Norwegian University of Science and Technology (NTNU), this textbook takes a scientific approach to digital forensics ideally suited for university courses in digital forensics and information security. Each chapter was written by an accomplished expert in his or her field, many of them with extensive...

The definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critica...

cena: 341,39

Information Systems Security and Privacy: Second International Conference, Icissp 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers Camp, Olivier 9783319544328 Springer
Information Systems Security and Privacy: Second International Conference, Icissp 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers

ISBN: 9783319544328 / Angielski / Miękka / 215 str.

ISBN: 9783319544328/Angielski/Miękka/215 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Olivier Camp; Steven Furnell; Paolo Mori

This book constitutes the revised selected papers of the Second International Conference on Information Systems Security and Privacy, ICISSP 2016, held in Rome, Italy, in February 2016.

The 9 full papers presented together with two invited papers were carefully reviewed and selected from a total of 91 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; privacy in social media.


This book constitutes the revised selected papers of the Second International Conference on Information Systems Security and Privacy, ICISSP 2016, ...

cena: 202,66

Convergence Security: Journal Volume 1 - 2016 Kuinam K Kim 9788793519534 River Publishers
Convergence Security: Journal Volume 1 - 2016

ISBN: 9788793519534 / Angielski / Miękka / 62 str.

ISBN: 9788793519534/Angielski/Miękka/62 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kuinam K Kim

Convergence security can be defined as the security created by merging the physical and information security or the combining security with other non-IT technologies. Convergence Security Journal is an open access journal dedicated to the publication and discussion of research articles, short communications, and review papers on all areas of convergence security. The primary objective is to publish a high-quality journal with free Internet-based access for researchers and other interested people throughout the world. Papers published by the journal represent important advances of...

Convergence security can be defined as the security created by merging the physical and information security or the combining security with other n...

cena: 146,06

Mastering Blockchain: Deeper insights into decentralization, cryptography, Bitcoin, and popular Blockchain frameworks Bashir, Imran 9781787125445 Packt Publishing
Mastering Blockchain: Deeper insights into decentralization, cryptography, Bitcoin, and popular Blockchain frameworks

ISBN: 9781787125445 / Angielski / Miękka / 540 str.

ISBN: 9781787125445/Angielski/Miękka/540 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Imran Bashir
Blockchain is a distributed database that enables permanent, transparent, and secure storage of data. Mastering Blockchain is a comprehensive guide to this leading, cutting-edge technology and its implementation in the real world.
Blockchain is a distributed database that enables permanent, transparent, and secure storage of data. Mastering Blockchain is a comprehensive guide to...
cena: 237,98

Everyday Cryptography: Fundamental Principles and Applications Keith Martin 9780198788003 Oxford University Press, USA
Everyday Cryptography: Fundamental Principles and Applications

ISBN: 9780198788003 / Angielski / Twarda / 720 str.

ISBN: 9780198788003/Angielski/Twarda/720 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Keith Martin
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for various technologies.
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to...
cena: 565,36

Everyday Cryptography: Fundamental Principles and Applications Keith Martin 9780198788010 Oxford University Press
Everyday Cryptography: Fundamental Principles and Applications

ISBN: 9780198788010 / Angielski / Miękka / 720 str.

ISBN: 9780198788010/Angielski/Miękka/720 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Keith Martin
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for various technologies.
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to...
cena: 276,52

The Manga Guide To Cryptography Shinichi Sato 9781593277420 No Starch Press,US
The Manga Guide To Cryptography

ISBN: 9781593277420 / Angielski / Miękka / 248 str.

ISBN: 9781593277420/Angielski/Miękka/248 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shinichi Sato
Cryptography is hard, but it's less hard when it's filled with adorable Japanese manga. The latest addition to the Manga Guide series, The Manga Guide to Cryptography, turns the art of encryption and decryption into plain, comic illustrated English.

As you follow Inspector Jun Meguro in his quest to bring a cipher-wielding thief to justice, you'll learn how cryptographic ciphers work. (Ciphers are the algorithms at the heart of cryptography.) Like all books in the Manga Guide series, The Manga Guide to Cryptography is illustrated throughout with memorable Japanese manga as...

Cryptography is hard, but it's less hard when it's filled with adorable Japanese manga. The latest addition to the Manga Guide series, The Manga Gu...
cena: 121,58

Proceedings of the 2nd Workshop on Communication Security: Cryptography and Physical Layer Security Baldi, Marco 9783319592640 Springer
Proceedings of the 2nd Workshop on Communication Security: Cryptography and Physical Layer Security

ISBN: 9783319592640 / Angielski / Twarda / 141 str.

ISBN: 9783319592640/Angielski/Twarda/141 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marco Baldi; Stefano Tomasin; Elizabeth A. Quaglia
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers.
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions aga...
cena: 608,07

Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications Palomares Carrascosa, Iván 9783319594385 Springer
Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications

ISBN: 9783319594385 / Angielski / Twarda / 270 str.

ISBN: 9783319594385/Angielski/Twarda/270 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ivan Palomares Carrascosa; Harsha Kumara Kalutarage; Yan Huang
cena: 526,98

Guide to Security in Sdn and Nfv: Challenges, Opportunities, and Applications Zhu, Shao Ying 9783319646527 Springer
Guide to Security in Sdn and Nfv: Challenges, Opportunities, and Applications

ISBN: 9783319646527 / Angielski / Twarda / 331 str.

ISBN: 9783319646527/Angielski/Twarda/331 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shao Ying Zhu; Sandra Scott-Hayward; Ludovic Jacquin
This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), together referred to as SDNFV.
This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Ne...
cena: 214,82

Pierwsza Podprzednia  103  104  105  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia