![]() |
The Future Wallet: Managing Money in a Borderless World
ISBN: 9789374597019 / Angielski / Miękka / 310 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
141,71 |
![]() |
The DarkWhale Protocol: My Crypto Journey With Satoshi
ISBN: 9789948650324 / Angielski / Twarda / 422 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
137,77 |
![]() |
Cybersecurity Risk Management: Embedded Quality as Your Shield from Modern Threats
ISBN: 9781636942087 / Angielski / Miękka / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
308,70 |
![]() |
Robust Biometric Systems and Efficient Data Preservation
ISBN: 9781032874524 / Angielski / 02-06-2026 Książka dostępna od: 02-06-2026 |
|
Termin ukazania się książki: 02-06-2026
Książkę można już zamówić z rabatem 5% |
|
564,03 |
![]() |
Crypto Crises: Lessons From the Booms and Busts
ISBN: 9789374592939 / Angielski / Miękka / 380 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
141,71 |
![]() |
Stablecoins Explained: The Bridge Between Crypto and Cash
ISBN: 9789374593653 / Angielski / Miękka / 234 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
98,40 |
![]() |
The Decentralized Web: Building the Next Internet
ISBN: 9789374597200 / Angielski / Miękka / 208 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
90,52 |
![]() |
Progressive Computational Intelligence, Information Technology, and Networking
ISBN: 9781041368120 / Angielski / Miękka / 16-07-2026 / 808 str. Książka dostępna od: 16-07-2026 |
|
Termin ukazania się książki: 16-07-2026
Książkę można już zamówić z rabatem 5% |
|
302,29 |
![]() |
Progressive Computational Intelligence, Information Technology, and Networking
ISBN: 9781041311065 / Angielski / Twarda / 16-07-2026 / 808 str. Książka dostępna od: 16-07-2026 |
|
Termin ukazania się książki: 16-07-2026
Książkę można już zamówić z rabatem 5% |
|
435,37 |
![]() |
Advances in Digital Forensics: Ifip International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 1
ISBN: 9780387300122 / Angielski / Twarda / 313 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance - investigations of security... Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wir... |
cena:
409,14 |
![]() |
Securing Biometrics Applications
ISBN: 9780387699325 / Angielski / Twarda / 190 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Biometrics is becoming increasingly common in establishments that require high security such as state security and financial sectors. The increased threat to national security by terrorists has led to the explosive popularity of biometrics. A number of biometric devices are now available to capture biometric measurements such as fingerprints, palm, retinal scans, keystroke, voice recognition and facial scanning. However, the accuracy of these measurements varies, which has a direct relevance on the levels of security they offer. With the need to combat the problems related to identify... Biometrics is becoming increasingly common in establishments that require high security such as state security and financial sectors. The increased... |
cena:
409,14 |
![]() |
Handbook of Biometrics
ISBN: 9780387710402 / Angielski / Twarda / 568 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Biometric recognition, or simply Biometrics, is a rapidly evolving field with applications ranging from accessing one's computer to gaining entry into a country. Biometric systems rely on the use of physical or behavioral traits, such as fingerprints, face, voice and hand geometry, to establish the identity of an individual. The deployment of large-scale biometric systems in both commercial (e.g., grocery stores, amusement parks, airports) and government (e.g., US-VISIT) applications has served to increase the public's awareness of this technology. This rapid growth has also highlighted... Biometric recognition, or simply Biometrics, is a rapidly evolving field with applications ranging from accessing one's computer to gaining entry i... |
cena:
941,08 |
![]() |
A Guide to Data Compression Methods [With CD-ROM]
ISBN: 9780387952604 / Angielski / Miękka / 295 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In 1829, Louis Braille, a young organist in a Paris church, blind since age 3, invented the well-known code for the blind, still in common use today all over the world and named after him. Braille himself modified his code in 1834, and there have been several modifications since. However, the basic design of this code, where each character is represented by a group of 3 x 2 dots, has remained intact. The dots are embossed on thick paper and each can be raised or flat (i. e., present or absent). Each dot is therefore equivalent to one bit of information. As a result, the Braille code (Figure...
In 1829, Louis Braille, a young organist in a Paris church, blind since age 3, invented the well-known code for the blind, still in common use today a...
|
cena:
204,55 |
![]() |
Biometric Solutions: For Authentication in an E-World
ISBN: 9781402071423 / Angielski / Twarda / 451 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In today's complex, geographically mobile, electronically wired information society, the problem of identifying a person continues to pose a great challenge. Since the conventional technology of using a Personal Identification Number (PIN) or password hardly meets the requirements of an authentication system, biometric-based authentication is emerging as the most reliable method.
Biometric Solutions for Authentication in an E-World provides a collection of sixteen chapters containing tutorial articles and new material in a unified manner. This includes the basic concepts,... In today's complex, geographically mobile, electronically wired information society, the problem of identifying a person continues to pose a great cha...
|
cena:
613,74 |
![]() |
Information Assurance: Security in the Information Environment
ISBN: 9781846282669 / Angielski / Miękka / 264 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. When you first hear the term information assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it. In truth, this is the Holy Grail that all organisations that value their information should strive to achieve, but which few even understand. Information assurance is a term that has recently come into common use. When talking with old timers in IT (or at least those that are over 35-year old), you will hear them talking about information security, a term that...
When you first hear the term information assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to pr...
|
cena:
695,57 |
![]() |
Variable-Length Codes for Data Compression
ISBN: 9781846289583 / Angielski / Miękka / 196 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Most data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there are a large number of less-known codes that have useful properties and these can be useful. This book brings this large set of codes to the attention of workers in the field and for students of computer science. The author s crystal clear style of writing and presentation allows easy access to the topic."
Most data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there are a large number of less... |
cena:
204,55 |
![]() |
Sequences and Their Applications - Seta 2004: Third International Conference, Seoul, Korea, October 24-28, 2004, Revised Selected Papers
ISBN: 9783540260844 / Angielski / Miękka / 451 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the Third International Conference on Sequences and Their Applications, SETA 2004, held in Seoul, Korea in October 2004. The 30 revised full papers presented together with 4 invited survey articles were carefully selected during two rounds of reviewing and improvement from initially 59 submissions. The papers are organized in topical sections on complexity of sequences, perfect sequences, sequence construction, sequences modulo z, sequence generator properties and applications, multi-dimensional sequences, optics and OFDM... This book constitutes the thoroughly refereed post-proceedings of the Third International Conference on Sequences and Their Applications, SETA 2004... |
cena:
204,55 |
![]() |
Information Hiding: 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers
ISBN: 9783540290391 / Angielski / Miękka / 420 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the7th International Workshop on Information Hiding, IH 2005, held in Barcelona, Spain in June 2005. The 28 revised full papers presented together with an invited talk were This book constitutes the thoroughly refereed post-proceedings of the7th International Workshop on Information Hiding, IH 2005, held in Barcelona, ... |
cena:
204,55 |
![]() |
Smart Card Application Development Using Java
ISBN: 9783540432029 / Angielski / Miękka / 305 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Smart cards play an increasingly important role in everyday life. We encounter them as credit cards, loyalty cards, electronic purses, health cards, ands as secure tokens for authentication or digital signatures. Their small size and the compatibility of their form with the magnetic stripe card make them ideal carriers of personal information such as secret keys, passwords, customization profiles, and medical emergency information. This book provides a guide for the rapid development of smart card applications using Java and the OpenCard Framework. It gives you the basic information you need...
Smart cards play an increasingly important role in everyday life. We encounter them as credit cards, loyalty cards, electronic purses, health cards, a...
|
cena:
409,14 |
![]() |
Advances in Information and Computer Security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings
ISBN: 9783540476993 / Angielski / Miękka / 438 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ItwasourpleasuretoholdtheInternationalWorkshoponSecurity2006(IWSEC 2006) this year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series. The workshop was our ?rst trial in that two major academic society groups on security in Japan, viz. ISEC and CSEC, jointly organized it; ISEC is a te- nical group on information security of the Institute of Electronics, Information and Communication Engineers (IEICE), and CSEC is a special interest group on computer security of the Information Processing Society of Japan (IPSJ). It was Ryoichi Sasaki, the...
ItwasourpleasuretoholdtheInternationalWorkshoponSecurity2006(IWSEC 2006) this year in Kyoto and to publish the proceedings as a volume of the Lecture ...
|
cena:
204,55 |