![]() |
Attribute-Based Credentials for Trust: Identity in the Information Society
ISBN: 9783319381947 / Angielski / Miękka / 391 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-based Credentials (Privacy-ABCs) are elegant techniques to provide secure yet privacy-respecting access control. This book addresses the federation and interchangeability of Privacy-ABC technologies. It defines a common, unified architecture for Privacy-ABC systems that allows their respective features to be compared and combined Further, this book presents open reference implementations of selected Privacy-ABC systems and explains how to deploy... The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-base... |
cena:
405,36 |
![]() |
Hardware IP Security and Trust
ISBN: 9783319490243 / Angielski / Twarda / 353 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle.
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP c...
|
cena:
567,53 |
![]() |
Iris Biometric Model for Secured Network Access
ISBN: 9781138198722 / Angielski / Miękka / 220 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore,... |
cena:
255,68 |
![]() |
Noiseless Steganography: The Key to Covert Communications
ISBN: 9781138199361 / Angielski / Miękka / 300 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind:
Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These... Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind:
|
cena:
285,18 |
![]() |
Beginning Ethical Hacking with Python
ISBN: 9781484225400 / Angielski / Miękka / 201 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming. Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals... Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation... |
cena:
173,84 |
![]() |
Secure and Privacy-Preserving Data Communication in Internet of Things
ISBN: 9789811032349 / Angielski / Miękka / 78 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader's horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy... This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT... |
cena:
222,94 |
![]() |
Unsolved! : The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies
ISBN: 9780691167671 / Angielski / Twarda / 624 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A mathematical tour of some of the greatest unsolved ciphers of all time In 1953, a man was found dead from cyanide poisoning near the Philadelphia airport with a picture of a Nazi aircraft in his wallet. Taped to his abdomen was an enciphered message. In 1912, a book dealer named Wilfrid Voynich came into possession of an illuminated cipher manuscript once belonging to Emperor Rudolf II, who was obsessed with alchemy and the occult. Wartime codebreakers tried--and failed--to unlock the book's secrets, and it remains an enigma to this day. In this lively and entertaining book,... A mathematical tour of some of the greatest unsolved ciphers of all time In 1953, a man was found dead from cyanide poisoning near the... |
cena:
155,30 |
![]() |
Trusted Computing: Principles and Applications
ISBN: 9783110476040 / Angielski / Twarda / 311 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
598,89 |
![]() |
Transactions on Large-Scale Data- And Knowledge-Centered Systems XXXI: Special Issue on Data and Security Engineering
ISBN: 9783662541722 / Angielski / Miękka / 147 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
202,66 |
![]() |
Smart Computing and Communication: First International Conference, Smartcom 2016, Shenzhen, China, December 17-19, 2016, Proceedings
ISBN: 9783319520148 / Angielski / Miękka / 589 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the First International Conference on Smart Computing and Communication, SmartCom 2016, held in Shenzhen, China, in December 2016. The 59 papers presented in this volume were carefully reviewed and selected from 210 submissions.
The conference focuses on both smart computing and communications fields and aims to collect recent academic work to improve the research and practical applications. This book constitutes the proceedings of the First International Conference on Smart Computing and Communication, SmartCom 2016, held in Shenzhen, Chi...
|
cena:
202,66 |
![]() |
Digital Forensics
ISBN: 9781119262381 / Angielski / Miękka / 384 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critical field Written by faculty members and associates of the world-renowned Norwegian Information Security Laboratory (NisLab) at the Norwegian University of Science and Technology (NTNU), this textbook takes a scientific approach to digital forensics ideally suited for university courses in digital forensics and information security. Each chapter was written by an accomplished expert in his or her field, many of them with extensive... The definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critica... |
cena:
341,39 |
![]() |
Information Systems Security and Privacy: Second International Conference, Icissp 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers
ISBN: 9783319544328 / Angielski / Miękka / 215 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the revised selected papers of the Second International Conference on Information Systems Security and Privacy, ICISSP 2016, held in Rome, Italy, in February 2016. The 9 full papers presented together with two invited papers were carefully reviewed and selected from a total of 91 submissions. They are dealing with topics such as data and software security; privacy and confidentiality; mobile systems security; biometric authentication; privacy in social media. This book constitutes the revised selected papers of the Second International Conference on Information Systems Security and Privacy, ICISSP 2016, ... |
cena:
202,66 |
![]() |
Convergence Security: Journal Volume 1 - 2016
ISBN: 9788793519534 / Angielski / Miękka / 62 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Convergence security can be defined as the security created by merging the physical and information security or the combining security with other non-IT technologies. Convergence Security Journal is an open access journal dedicated to the publication and discussion of research articles, short communications, and review papers on all areas of convergence security. The primary objective is to publish a high-quality journal with free Internet-based access for researchers and other interested people throughout the world. Papers published by the journal represent important advances of... Convergence security can be defined as the security created by merging the physical and information security or the combining security with other n... |
cena:
146,06 |
![]() |
Mastering Blockchain: Deeper insights into decentralization, cryptography, Bitcoin, and popular Blockchain frameworks
ISBN: 9781787125445 / Angielski / Miękka / 540 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Blockchain is a distributed database that enables permanent, transparent, and secure storage of data. Mastering Blockchain is a comprehensive guide to this leading, cutting-edge technology and its implementation in the real world.
Blockchain is a distributed database that enables permanent, transparent, and secure storage of data. Mastering Blockchain is a comprehensive guide to...
|
cena:
237,98 |
![]() |
Everyday Cryptography: Fundamental Principles and Applications
ISBN: 9780198788003 / Angielski / Twarda / 720 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for various technologies.
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to...
|
cena:
565,36 |
![]() |
Everyday Cryptography: Fundamental Principles and Applications
ISBN: 9780198788010 / Angielski / Miękka / 720 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for various technologies.
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to...
|
cena:
276,52 |
![]() |
The Manga Guide To Cryptography
ISBN: 9781593277420 / Angielski / Miękka / 248 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography is hard, but it's less hard when it's filled with adorable Japanese manga. The latest addition to the Manga Guide series, The Manga Guide to Cryptography, turns the art of encryption and decryption into plain, comic illustrated English. As you follow Inspector Jun Meguro in his quest to bring a cipher-wielding thief to justice, you'll learn how cryptographic ciphers work. (Ciphers are the algorithms at the heart of cryptography.) Like all books in the Manga Guide series, The Manga Guide to Cryptography is illustrated throughout with memorable Japanese manga as...
Cryptography is hard, but it's less hard when it's filled with adorable Japanese manga. The latest addition to the Manga Guide series, The Manga Gu...
|
cena:
121,58 |
![]() |
Proceedings of the 2nd Workshop on Communication Security: Cryptography and Physical Layer Security
ISBN: 9783319592640 / Angielski / Twarda / 141 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers.
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions aga...
|
cena:
608,07 |
![]() |
Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications
ISBN: 9783319594385 / Angielski / Twarda / 270 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
526,98 |
![]() |
Guide to Security in Sdn and Nfv: Challenges, Opportunities, and Applications
ISBN: 9783319646527 / Angielski / Twarda / 331 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), together referred to as SDNFV.
This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Ne...
|
cena:
214,82 |