![]() |
Security in Emerging Wireless Communication and Networking Systems: First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009,
ISBN: 9783642115257 / Angielski / Miękka / 88 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The First ICST International Workshop on Security in Emerging Wireless Commu- cation and Networking Systems (SEWCN 2009) was held in Athens, Greece, Sept- ber 14, in conjunction with SecureComm 2009. SEWCN 2009 was sponsored by the Institute for Computer Sciences, Social-Informatics and Telecommunications En- neering (ICST). The Workshop Chairs were Qijun Gu from Texas State University- San Marcos, USA, and Wanyu Zang from Western Illinois University, USA. The workshop invited 20 researchers from academia and industry around the world in the areas of networking and security to form the...
The First ICST International Workshop on Security in Emerging Wireless Commu- cation and Networking Systems (SEWCN 2009) was held in Athens, Greece, S...
|
cena:
204,55 |
![]() |
High Performance Networking, Computing, Communication Systems, and Mathematical Foundations: International Conferences, ICHCC 2009-ICTMF 2009 Sanya, H
ISBN: 9783642116179 / Angielski / Miękka / 128 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 2009 International Conference on High-Performance Networking, Computing and Communication Systems and the 2009 International Conference on Theoretical and Mathematical Foundations of Computer Science (ICHCC -ICTMF 2009) were held during December 13-14, 2009, in Sanya, Hainan Island, China. ICHCC -ICTMF 2009 was a comprehensive conference focused on the various aspects of advances in high-performance networking, computing, communication systems and mathematical foundations. The conferences provided a chance for academic and industry profe- ionals to discuss recent progress in the area of...
The 2009 International Conference on High-Performance Networking, Computing and Communication Systems and the 2009 International Conference on Theoret...
|
cena:
204,55 |
![]() |
Adaptive Cryptographic Access Control
ISBN: 9781441966544 / Angielski / Twarda / 138 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Applications of cryptographic access control will benefit companies, governments and the military where structured access to information is essential. The purpose of this book is to highlight the need for adaptability in cryptographic access control schemes that are geared for dynamic environments, such as the Internet. Adaptive Cryptographic Access Control... Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct... |
cena:
409,14 |
![]() |
Communications and Multimedia Security: 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, May 31 - June 2, 2010, Proceedings
ISBN: 9783642132407 / Angielski / Miękka / 281 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Over the last decade, we have witnessed a growing dependency on information technologyresultingina wide rangeofnew opportunities. Clearly, ithas become almost impossible to imagine life without a personal computer or laptop, or without a cell phone. Social network sites (SNS) are competing with face-- face encounters and may even oust them. Most SNS-adepts have hundreds of "friends," happily sharing pictures and pro?les and endless chitchat. We are on the threshold of the Internet of Things, where every object will have its RFID-tag. This will not only e?ect companies, who will be able to...
Over the last decade, we have witnessed a growing dependency on information technologyresultingina wide rangeofnew opportunities. Clearly, ithas becom...
|
cena:
204,55 |
![]() |
Advanced Statistical Steganalysis
ISBN: 9783642143120 / Angielski / Twarda / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the first book dedicated to modern steganography and steganalysis. The author offers a proposal to structure approaches to provably secure steganography according to their implied assumptions on the limits of the adversary and on the nature of covers. This is the first book dedicated to modern steganography and steganalysis. The author offers a proposal to structure approaches to provably secure ... |
cena:
613,74 |
![]() |
Critical Information Infrastructures Security: 4th International Workshop, Critis 2009, Bonn, Germany, September 30 - October 2, 2009, Revised Papers
ISBN: 9783642143786 / Angielski / Miękka / 213 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the proceedings of the 4th International Workshop on Critical Information Infrastructures Security (CRITIS 2009). The workshopwas held from September 30 to October 2 in the Gunnewig ] Hotel Bristol in Bonn, Germany. TheworkshopwasorganizedbytheFraunhoferInstituteforIntelligent Analysis and Information Systems (IAIS), Sankt Augustin, Germany. CRITIS 2009 continued the series of successful CRITIS Workshops. Com- nies, researchinstitutions, andgovernmentalorganizationsfromallmainareasof critical infrastructures took an active part in supporting CRITIS and we found CRITIS...
This volume contains the proceedings of the 4th International Workshop on Critical Information Infrastructures Security (CRITIS 2009). The workshopwas...
|
cena:
204,55 |
![]() |
Bloomer's Commercial Cryptograph: A Telegraph Code and Double Index-Holocryptic Cipher
ISBN: 9781145069107 / Angielski / Miękka / 238 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is a reproduction of a book published before 1923. This book may have occasional imperfections such as missing or blurred pages, poor pictures, errant marks, etc. that were either part of the original artifact, or were introduced by the scanning process. We believe this work is culturally important, and despite the imperfections, have elected to bring it back into print as part of our continuing commitment to the preservation of printed works worldwide. We appreciate your understanding of the imperfections in the preservation process, and hope you enjoy this valuable book.
This is a reproduction of a book published before 1923. This book may have occasional imperfections such as missing or blurred pages, poor pictures, e...
|
cena:
92,39 |
![]() |
Quantum Attacks on Public-Key Cryptosystems
ISBN: 9781441977212 / Angielski / Twarda / 207 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists. Quantum Attacks on Public-Key Cryptosystems presemts almost all... The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm ... |
cena:
409,14 |
![]() |
Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selec
ISBN: 9783642155055 / Angielski / Twarda / 311 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Advances in Digital Forensics VI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Internet Crime Investigations, Live Forensics, Advanced Forensic Techniques, and Forensic Tools. This book is the sixth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital...
Advances in Digital Forensics VI describes original research results and innovative applications in the discipline of digital forensics. In addition, ...
|
cena:
204,55 |
![]() |
Sequences and Their Applications - Seta 2010: 6th International Conference, Paris, France, September 13-17, 2010. Proceedings
ISBN: 9783642158735 / Angielski / Miękka / 465 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 6th International Conference on Sequences and Their Applications held in Paris, France, in September 2010.
This book constitutes the proceedings of the 6th International Conference on Sequences and Their Applications held in Paris, France, in September 2010...
|
cena:
204,55 |
![]() |
E-Government, E-Services and Global Processes: Joint IFIP TC 8 and TC 6 International Conferences, EGES 2010 and GISP 2010, Held as Part of WCC 2010,
ISBN: 9783642153457 / Angielski / Twarda / 258 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the IFIP TC 8 International Conference on E-Government and E-Services, EGES 2010 and the IFIP TC 8 International Conference on Global Information Systems Processes, GISP 2010, held as part of the 21st World Computer Congress, WCC 2010, in Brisbane, Australia, in September 2010.
Constitutes the refereed proceedings of the IFIP TC 8 International Conference on E-Government and E-Services, EGES 2010 and the IFIP TC 8 Internation...
|
cena:
204,55 |
![]() |
Guide to Elliptic Curve Cryptography
ISBN: 9781441929297 / Angielski / Miękka / 312 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book... After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and gover... |
cena:
531,90 |
![]() |
Access Control Systems: Security, Identity Management and Trust Models
ISBN: 9781441934734 / Angielski / Miękka / 262 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This essential resource for professionals and advanced students in security programming and system design introduces the foundations of programming systems security and the theory behind access control models, and addresses emerging access control mechanisms. This essential resource for professionals and advanced students in security programming and system design introduces the foundations of programming... |
cena:
409,14 |
![]() |
Coding for Data and Computer Communications
ISBN: 9781441935465 / Angielski / Miękka / 548 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Coding is an highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basis of coding can prevent a serious and practical understanding of this important area. "Coding for Data and Computer Communications" eschews the complex mathematics and clearly describes the core concepts, principles, and methods of channel codes ( for error correction), source codes (for compressing data), and secure codes (for cryptography, data hiding, and privacy). Conveniently organized and segmented into three associated parts for... Coding is an highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basi... |
cena:
490,98 |
![]() |
Complexity Theory and Cryptology: An Introduction to Cryptocomplexity
ISBN: 9783642060540 / Angielski / Miękka / 478 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Modern cryptology increasingly employs mathematically rigorous concepts and methods from complexity theory. Conversely, current research topics in complexity theory are often motivated by questions and problems from cryptology. This book takes account of this situation, and therefore its subject is what may be dubbed "cryptocomplexity'', a kind of symbiosis of these two areas. This book is written for undergraduate and graduate students of computer science, mathematics, and engineering, and can be used for courses on complexity theory and cryptology, preferably by stressing their... Modern cryptology increasingly employs mathematically rigorous concepts and methods from complexity theory. Conversely, current research topics in ... |
cena:
204,55 |
![]() |
Informatik: Aufgaben Und Lösungen
ISBN: 9783211211366 / Niemiecki / Miękka / 127 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Diese Aufgabensammlung stellt eine sinnvolle Erganzung zum Lehrbuch "Informatik" von Blieberger et al. dar, das mittlerweile in der 4. Auflage erschienen ist. Ziel der Aufgabensammlung ist es, durch das Losen von Aufgaben den angebotenen Stoff zu vertiefen und zugleich anhand der Losungen die eigene Bearbeitung zu uberprufen. Den Aufgaben und Losungen zu den einzelnen Kapiteln werden jeweils Zusammenfassungen des Stoffes vorangestellt, die das Buch auch unabhangig vom Lehrbuch verwendbar machen."
Diese Aufgabensammlung stellt eine sinnvolle Erganzung zum Lehrbuch "Informatik" von Blieberger et al. dar, das mittlerweile in der 4. Auflage erschie...
|
cena:
76,44 |
![]() |
Internet-Security Aus Software-Sicht: Grundlagen Der Software-Erstellung Für Sicherheitskritische Bereiche
ISBN: 9783540222231 / Niemiecki / Twarda / 314 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Die Praxis zeigt, dass bei der Entwicklung groAer, komplexer Softwaresysteme Sicherheitsaspekte oft gar nicht oder erst sehr spAt berA1/4cksichtigt werden. IT-Security-Spezialisten werden in die Entwicklung neuer Systeme oft nicht eingebunden, und Softwareentwicklern fehlt hAufig das Bewusstsein fA1/4r Sicherheitsprobleme und die nAtigen Detailkenntnisse, vorhandene LAsungen richtig einzusetzen. Hier setzt das Buch an und schlAgt eine BrA1/4cke von der Softwaresicht zu mehr netzwerkorientierten Aspekten der Internet-Security. Ziel der Autoren ist es, bei Entwicklern und Projektleitern ein...
Die Praxis zeigt, dass bei der Entwicklung groAer, komplexer Softwaresysteme Sicherheitsaspekte oft gar nicht oder erst sehr spAt berA1/4cksichtigt we...
|
cena:
114,69 |
![]() |
Handbook of Biometrics
ISBN: 9781441943750 / Angielski / Miękka / 556 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Biometric recognition, or simply Biometrics, is a rapidly evolving field with applications ranging from accessing one's computer to gaining entry into a country. Biometric systems rely on the use of physical or behavioral traits, such as fingerprints, face, voice and hand geometry, to establish the identity of an individual. The deployment of large-scale biometric systems in both commercial (e.g., grocery stores, amusement parks, airports) and government (e.g., US-VISIT) applications has served to increase the public's awareness of this technology. This rapid growth has also highlighted... Biometric recognition, or simply Biometrics, is a rapidly evolving field with applications ranging from accessing one's computer to gaining entry i... |
cena:
675,12 |
![]() |
Trust Management II: Proceedings of Ifiptm 2008: Joint Itrust and Pst Conferences on Privacy, Trust Management and Security, June 18-20, 20
ISBN: 9781441934772 / Angielski / Miękka / 372 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to June 20, 2008. IFIPTM 2008 provides a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Privacy, Security, and Trust. Following the traditions inherited from the highly successful iTrust and PST conference series, IFIPTM 2008 focuses on trust, privacy and security from multidisciplinary perspectives. The conference is an arena for discussion about re...
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trond...
|
cena:
409,14 |
![]() |
Secure Multi-Party Non-Repudiation Protocols and Applications
ISBN: 9781441945396 / Angielski / Miękka / 190 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. This book is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. The book is also suitable as an advanced-level... The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professio... |
cena:
409,14 |