• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2953081]
• Literatura piękna
 [1807186]

  więcej...
• Turystyka
 [52332]
• Informatyka
 [151352]
• Komiksy
 [36730]
• Encyklopedie
 [23076]
• Dziecięca
 [611400]
• Hobby
 [105092]
• AudioBooki
 [1722]
• Literatura faktu
 [191783]
• Muzyka CD
 [360]
• Słowniki
 [2970]
• Inne
 [439815]
• Kalendarze
 [655]
• Podręczniki
 [166156]
• Poradniki
 [422232]
• Religia
 [506466]
• Czasopisma
 [515]
• Sport
 [59946]
• Sztuka
 [242990]
• CD, DVD, Video
 [3439]
• Technologie
 [219109]
• Zdrowie
 [98416]
• Książkowe Klimaty
 [124]
• Zabawki
 [2537]
• Puzzle, gry
 [3685]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [7832]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2785

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


Algebraic Aspects of Cryptography Neal Koblitz 9783642083327 Springer
Algebraic Aspects of Cryptography

ISBN: 9783642083327 / Angielski / Miękka / 206 str.

ISBN: 9783642083327/Angielski/Miękka/206 str.

Termin realizacji zamówienia: 22 dni roboczych
Neal Koblitz
This book is intended as a text for a course on cryptography with emphasis on algebraic methods. It is written so as to be accessible to graduate or advanced undergraduate students, as well as to scientists in other fields. The first three chapters form a self-contained introduction to basic concepts and techniques. Here my approach is intuitive and informal. For example, the treatment of computational complexity in Chapter 2, while lacking formalistic rigor, emphasizes the aspects of the subject that are most important in cryptography. Chapters 4-6 and the Appendix contain material that for...
This book is intended as a text for a course on cryptography with emphasis on algebraic methods. It is written so as to be accessible to graduate or a...
881,91
617,33

Number Theory for Computing Song Y. Yan M. E. Hellmann 9783642077104 Springer
Number Theory for Computing

ISBN: 9783642077104 / Angielski / Miękka / 435 str.

ISBN: 9783642077104/Angielski/Miękka/435 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Song Y. Yan; M. E. Hellmann
Modern cryptography depends heavily on number theory, with primality test ing, factoring, discrete logarithms (indices), and elliptic curves being perhaps the most prominent subject areas. Since my own graduate study had empha sized probability theory, statistics, and real analysis, when I started work ing in cryptography around 1970, I found myself swimming in an unknown, murky sea. I thus know from personal experience how inaccessible number theory can be to the uninitiated. Thank you for your efforts to case the transition for a new generation of cryptographers. Thank you also for helping...
Modern cryptography depends heavily on number theory, with primality test ing, factoring, discrete logarithms (indices), and elliptic curves being per...
cena: 233,19

Modern Cryptography, Probabilistic Proofs and Pseudorandomness Oded Goldreich 9783642084324 Springer
Modern Cryptography, Probabilistic Proofs and Pseudorandomness

ISBN: 9783642084324 / Angielski / Miękka / 183 str.

ISBN: 9783642084324/Angielski/Miękka/183 str.

Termin realizacji zamówienia: 22 dni roboczych
Oded Goldreich
You can start by putting the DO NOT DISTURB sign. Cay, in Desert Hearts (1985). The interplay between randomness and computation is one of the most fas- cinating scientific phenomena uncovered in the last couple of decades. This interplay is at the heart of modern cryptography and plays a fundamental role in complexity theory at large. Specifically, the interplay of randomness and computation is pivotal to several intriguing notions of probabilistic proof systems and is the focal of the computational approach to randomness. This book provides an introduction to these three, somewhat...
You can start by putting the DO NOT DISTURB sign. Cay, in Desert Hearts (1985). The interplay between randomness and computation is one of the most fa...
638,67
447,07

Cryptographic Engineering Cetin Kaya Koc 9781441944177 Springer
Cryptographic Engineering

ISBN: 9781441944177 / Angielski / Miękka / 522 str.

ISBN: 9781441944177/Angielski/Miękka/522 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Cetin Kaya Koc

Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and conference articles, and authors lecture notes. This is a first attempt by top cryptographic engineers to bring this material in a book form and make it available to electrical engineering and computer science students and engineers working for the industry.

This book is intended for a graduate-level course in Cryptographic Engineering to be taught in Electrical Engineering, Computer Engineering, and Computer Science departments....

Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and...

cena: 1022,92

Advances in Information Technology: 4th International Conference, IAIT 2010, Bangkok, Thailand, November 4-5, 2010, Proceedings Papasratorn, Borworn 9783642166983 Not Avail
Advances in Information Technology: 4th International Conference, IAIT 2010, Bangkok, Thailand, November 4-5, 2010, Proceedings

ISBN: 9783642166983 / Angielski / Miękka / 215 str.

ISBN: 9783642166983/Angielski/Miękka/215 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Borworn Papasratorn; Kittichai Lavangnananda; Wichian Chutimaskul
It was our intention to organize IAIT 2010 as the place where researchers and ind- trial practitioners could share their work and achievements in information technology, both theoretical and in application. This is the fourth time we have organized IAIT to serve as a venue to foster collaboration among industry and academia from different parts of the world. A lot has been achieved since the launch of the first IAIT in 2005; however, many challenges remain to be addressed in the years to come. IAIT 2010 drew attendance from leading professionals in both industry and academes, as in IAIT 2009....
It was our intention to organize IAIT 2010 as the place where researchers and ind- trial practitioners could share their work and achievements in info...
cena: 204,55

Network-Aware Security for Group Communications Yan Sun Wade Trappe K. J. Ray Liu 9781441943354 Springer
Network-Aware Security for Group Communications

ISBN: 9781441943354 / Angielski / Miękka / 304 str.

ISBN: 9781441943354/Angielski/Miękka/304 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yan Sun; Wade Trappe; K. J. Ray Liu

Group-oriented communications will play a significant role in the next generation of networks as many services, such as pay-per-view media broadcasts and the delivery of network control messages, will rely upon the ability to reliably deliver data simultaneously to a large group of users. As these networks become increasingly pervasive and these multi-user services become increasingly ubiquitous, it will become essential that a complementary suite of security solutions are deployed in order to protect these services from a broad spectrum of security threats that are unique to group...

Group-oriented communications will play a significant role in the next generation of networks as many services, such as pay-per-view media broadcas...

cena: 409,14

Cyber Crime and the Victimization of Women: Laws, Rights and Regulations Halder, Debarati 9781609608309 Information Science Publishing
Cyber Crime and the Victimization of Women: Laws, Rights and Regulations

ISBN: 9781609608309 / Angielski / Twarda / 280 str.

ISBN: 9781609608309/Angielski/Twarda/280 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Debarati Halder; K. Jaishankar
Cyber Crime and the Victimization of Women: Laws, Rights and Regulations is a unique and important contribution to the literature on cyber crime. It explores gendered dimensions of cyber crimes like adult bullying, cyber stalking, hacking, defamation, morphed pornographic images, and electronic blackmailing. These and other tactics designed to inflict intimidation, control, and other harms are frequently committed by perpetrators who, for many reasons, are unlikely to be identified or punished. Scholars, researchers, law makers, and ordinary women and their supporters will gain a better...
Cyber Crime and the Victimization of Women: Laws, Rights and Regulations is a unique and important contribution to the literature on cyber crime. It e...
cena: 1005,14

Identity-Based Encryption Sanjit Chatterjee Palash Sarkar 9781441993823 Not Avail
Identity-Based Encryption

ISBN: 9781441993823 / Angielski / Twarda / 180 str.

ISBN: 9781441993823/Angielski/Twarda/180 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sanjit Chatterjee; Palash Sarkar

Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find...

Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption ...

cena: 409,14

Software-Schutz: Rechtliche, Organisatorische Und Technische Maßnahmen Piller, E. 9783211819661 Springer
Software-Schutz: Rechtliche, Organisatorische Und Technische Maßnahmen

ISBN: 9783211819661 / Niemiecki / Miękka / 204 str.

ISBN: 9783211819661/Niemiecki/Miękka/204 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
E. Piller; A. Weissenbrunner
Der Software-Schutz umfaBt zum einen den Schutz von Software von Endbeniitzern vor unbefugtem Zugriff und den Schutz von Computern vor unbefugter Beniitzung, zum anderen den Schutz von Software vor illegaler VervieWntigung. Da Software ein machtiges Werkzeug sein kann und sich zu minimalen Kosten in Serie produzieren laBt, ist das Risiko des MiBbrauchs besonders hoch. Der illegale Verkauf und Tausch von PC-Software ist heute schon weit verbreitet. Viele wissen dabei nicht, daB sie eigentlich etwas Unrechtes tun. Auch das miBbrauchliche Eindringen in fremde Computer hat in den letzten lahren...
Der Software-Schutz umfaBt zum einen den Schutz von Software von Endbeniitzern vor unbefugtem Zugriff und den Schutz von Computern vor unbefugter Beni...
cena: 210,28

Diensteintegrierende Kommunikationsnetze Mit Teilnehmerüberprüfbarem Datenschutz Pfitzmann, Andreas 9783540523277 Springer-Verlag
Diensteintegrierende Kommunikationsnetze Mit Teilnehmerüberprüfbarem Datenschutz

ISBN: 9783540523277 / Niemiecki / Mikrofilm / 345 str.

ISBN: 9783540523277/Niemiecki/Mikrofilm/345 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andreas Pfitzmann
Menschen und Maschinen kommunizieren immer mehr uber offentliche Vermittlungsnetze. Sensitive Daten wie personenbezogene Daten oder vertrauliche Geschaftsdaten konnen dabei sowohl aus den eigentlichen Nutzdaten als auch aus den Vermittlungsdaten, z.B. Ziel- und Herkunftsadresse, Datenumfang und Zeit, gewonnen werden. In diesem Buch wird erstmals umfassend untersucht, wie diese Daten vor illegalen und legalen Netzbenutzern, dem Betreiber des Netzes und den Herstellern der Vermittlungszentralen sowie ihren Mitarbeitern geschutzt werden konnen. Nach einer Problemanalyse werden die zur Abhilfe...
Menschen und Maschinen kommunizieren immer mehr uber offentliche Vermittlungsnetze. Sensitive Daten wie personenbezogene Daten oder vertrauliche Gesch...
cena: 210,28

Data Fusion Applications: Workshop Proceedings Brussels, November 25, 1992 Pfleger, S. 9783540569732 Springer
Data Fusion Applications: Workshop Proceedings Brussels, November 25, 1992

ISBN: 9783540569732 / Angielski / Miękka / 266 str.

ISBN: 9783540569732/Angielski/Miękka/266 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
S. Pfleger; J. Goncalves; D. Vernon
Data fusion, the ability to combine data derived from several sources to provide a coherent, informative, and useful characterization of a situation, is a challenging task. There is no unified and proven solution which is applicable in all circumstances, but there are many plausible and useful approaches which can be and are used to solve particular applications. This volume presents the proceedings of the workshop Data Fusion Applications hosted in Brussels by the 1992 ESPRIT Conference and Exhibition. It contains 22 papers from 69 experts, who present advanced research results on data...
Data fusion, the ability to combine data derived from several sources to provide a coherent, informative, and useful characterization of a situation, ...
cena: 204,55

Jit'99: Java-Informations-Tage 1999 Cap, Clemens H. 9783540664642 Not Avail
Jit'99: Java-Informations-Tage 1999

ISBN: 9783540664642 / Niemiecki / Miękka / 296 str.

ISBN: 9783540664642/Niemiecki/Miękka/296 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Clemens H. Cap
cena: 191,17

Networking 2010: 9th International IFIP TC 6 Networking Conference Chennai, India, May 11-15, 2010 Proceedings Crovella, Mark 9783642129629 Springer
Networking 2010: 9th International IFIP TC 6 Networking Conference Chennai, India, May 11-15, 2010 Proceedings

ISBN: 9783642129629 / Angielski / Miękka / 410 str.

ISBN: 9783642129629/Angielski/Miękka/410 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mark Crovella; Laura Marie Feeney; Dan Rubenstein
This book constitutes the refereed proceedings of the 9th IFIP-TC6 Networking Conference, Networking 2010. Papers were solicited in three broad topic areas: applications and services, network technologies, and internet design. All papers were considered on their merits by a uni?ed Technical ProgramCommittee (TPC); there was no attempt to enforce a quota among topic areas. We believe the resulting program is an excellentrepresentationofthebreadthofrecentadvancesinnetworkingresearch. This year, the conference received 101 full paper submissions from 23 co- trieson?vecontinents,...
This book constitutes the refereed proceedings of the 9th IFIP-TC6 Networking Conference, Networking 2010. Papers were solicited in three broad topic ...
cena: 204,55

Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers Simone Fischer-Hübner, Penny Duquenoy, Marit Hansen, Ronald Leenes, Ge Zhang 9783642207686 Springer-Verlag Berlin and Heidelberg GmbH &
Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers

ISBN: 9783642207686 / Angielski / Twarda / 356 str.

ISBN: 9783642207686/Angielski/Twarda/356 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Simone Fischer-Hubner;Penny Duquenoy;Marit Hansen
Constitutes the refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. This title features the papers that are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, and usable privacy.
Constitutes the refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsi...
cena: 204,55

Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices Dudley, Alfreda 9781613501320 Information Science Publishing
Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices

ISBN: 9781613501320 / Angielski / Twarda / 342 str.

ISBN: 9781613501320/Angielski/Twarda/342 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alfreda Dudley-Sponaugle; James Braman; Giovanni Vincenti
Ethical values in computing are essential for understanding and maintaining the relationship between computing professionals and researchers and the users of their applications and programs. While concerns about cyber ethics and cyber law are constantly changing as technology changes, the intersections of cyber ethics and cyber law are still underexplored. Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices discusses the impact of cyber ethics and cyber law on information technologies and society. Featuring current research, theoretical frameworks, and case studies, the...
Ethical values in computing are essential for understanding and maintaining the relationship between computing professionals and researchers and the u...
cena: 1021,19

Unconstrained Face Recognition Shaohua Kevin Zhou Rama Chellappa Wenyi Zhao 9781441938909 Not Avail
Unconstrained Face Recognition

ISBN: 9781441938909 / Angielski / Miękka / 244 str.

ISBN: 9781441938909/Angielski/Miękka/244 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shaohua Kevin Zhou; Rama Chellappa; Wenyi Zhao

Face recognition has been actively studied over the past decade and continues to be a big research challenge. Just recently, researchers have begun to investigate face recognition under unconstrained conditions. Unconstrained Face Recognition provides a comprehensive review of this biometric, especially face recognition from video, assembling a collection of novel approaches that are able to recognize human faces under various unconstrained situations. The underlying basis of these approaches is that, unlike conventional face recognition algorithms, they exploit the...

Face recognition has been actively studied over the past decade and continues to be a big research challenge. Just recently, researchers have begun...

cena: 409,14

Security for Wireless Sensor Networks Donggang Liu Peng Ning 9781441940988 Not Avail
Security for Wireless Sensor Networks

ISBN: 9781441940988 / Angielski / Miękka / 212 str.

ISBN: 9781441940988/Angielski/Miękka/212 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Donggang Liu; Peng Ning
The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional wireless sensor nodes to monitor and report the conditions and events in their local environments. A large collection of these sensor nodes can thus form a wireless sensor network in an ad hoc manner, creating a new type of information systems. Such sensor networks have recently emerged as an important means to study and interact with the physical world and have received a lot of attention due to their wide applications in military and civilian operations such as target...
The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional wireless sensor nodes to monito...
cena: 613,74

Privacy and Identity Management for Life Jan Camenisch Simone Fischer- Kai Rannenberg 9783642203169 Springer
Privacy and Identity Management for Life

ISBN: 9783642203169 / Angielski / Twarda / 512 str.

ISBN: 9783642203169/Angielski/Twarda/512 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jan Camenisch; Simone Fischer-H Bner; Kai Rannenberg
At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundamental research it will contain description of best practice solutions.
At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundament...
cena: 613,74

Data and Applications Security and Privacy XXV: 25th Annual Ifip Wg 11.3 Conference, Dbsec 2011, Richmond, Va, Usa, July 11-13, 2011, Proceedings Li, Yingjiu 9783642223471 Springer
Data and Applications Security and Privacy XXV: 25th Annual Ifip Wg 11.3 Conference, Dbsec 2011, Richmond, Va, Usa, July 11-13, 2011, Proceedings

ISBN: 9783642223471 / Angielski / Miękka / 309 str.

ISBN: 9783642223471/Angielski/Miękka/309 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yingjiu Li
This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2011, held in Richmond, VA, USA, in July 2011. The 14 revised full papers and 9 short papers presented together with 3 invited lectures were carefully reviewed and selected from 37 submissions. The topics of these papers include access control, privacy-preserving data applications, data confidentiality and query verification, query and data privacy, authentication and secret sharing.
This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec ...
cena: 204,55

Security Protocols XIX: 19th International Workshop, Cambridge, Uk, March 28-30, 2011, Revised Selected Papers Christianson, Bruce 9783642258664 Springer, Berlin
Security Protocols XIX: 19th International Workshop, Cambridge, Uk, March 28-30, 2011, Revised Selected Papers

ISBN: 9783642258664 / Angielski / Miękka / 383 str.

ISBN: 9783642258664/Angielski/Miękka/383 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This text constitutes the thoroughly refereed post-workshop proceedings of the 19th International Workshop on Security Protocols, held in Cambridge, UK, in March 2011. Following the tradition of this workshop series, each paper was revised by the authors to incorporate ideas from the workshop.
This text constitutes the thoroughly refereed post-workshop proceedings of the 19th International Workshop on Security Protocols, held in Cambridge, U...
cena: 204,55

Pierwsza Podprzednia  124  125  126  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia