![]() |
Security Protocols XIX: 19th International Workshop, Cambridge, Uk, March 28-30, 2011, Revised Selected Papers
ISBN: 9783642258664 / Angielski / Miękka / 383 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This text constitutes the thoroughly refereed post-workshop proceedings of the 19th International Workshop on Security Protocols, held in Cambridge, UK, in March 2011. Following the tradition of this workshop series, each paper was revised by the authors to incorporate ideas from the workshop.
This text constitutes the thoroughly refereed post-workshop proceedings of the 19th International Workshop on Security Protocols, held in Cambridge, U...
|
cena:
204,55 |
![]() |
Multiple-Base Number System: Theory and Applications
ISBN: 9781439830468 / Angielski / Twarda / 294 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computer arithmetic has become so fundamentally embedded into digital design that many engineers are unaware of the many research advances in the area. As a result, they are losing out on emerging opportunities to optimize its use in targeted applications and technologies. In many cases, easily available standard arithmetic hardware might not necessarily be the most efficient implementation strategy. Multiple-Base Number System: Theory and Applications stands apart from the usual books on computer arithmetic with its concentration on the uses and the... Computer arithmetic has become so fundamentally embedded into digital design that many engineers are unaware of the many research advances in the a... |
cena:
1162,69 |
![]() |
The Future of Identity in the Information Society: 4th Ifip Wg 9.2, 9.6, 11.6, 11.7/Fidis International Summer School, Brno, Czech Republic, September
ISBN: 9783642242311 / Angielski / Miękka / 283 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity m- agement and to build up collegial relationships with others. As such, the...
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The in...
|
cena:
409,14 |
![]() |
European Axis Signal Intelligence in World War II
ISBN: 9781608880089 / Angielski / Twarda / 1120 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. An omnibus edition of nine volumes of postwar histories declassified by the National Security Agency in 2010. The research was carried out by the Army Security Agency relying on captured documents and interviews with prisoners. This is an absolutely essential primary reference for anyone interested in cryptography as a vital aspect of World War II.
The volumes include: Volume I: Synopsis Volume 2: Notes on German High Level Cryptography and Cryptanalysis Volume 3: The Signal Intelligence Agency of the Supreme Command, Armed Forces Volume 4: The Signal Intelligence Service of the... An omnibus edition of nine volumes of postwar histories declassified by the National Security Agency in 2010. The research was carried out by the Army...
|
cena:
436,59 |
![]() |
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011, Amsterdam, the Netherlands, July 7-8, 201
ISBN: 9783642224232 / Angielski / Miękka / 235 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2011, held in Amsterdam, the Netherlands, in July 2011. The 11 full papers presented together with two short papers were carefully reviewed and selected from 41intial submissions. The papers are organized in topical sections on network security, attacks, Web security, and host security.
This book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessmen...
|
cena:
204,55 |
![]() |
Autonomic and Trusted Computing: 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011, Proceedings
ISBN: 9783642234958 / Angielski / Miękka / 258 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 8th International Conference on Autonomic and Trusted Computing, ATC 2011, held in Banff, Canada, September 2011.
The 17 revised full papers presented together with 1 keynote speech were carefully reviewed and selected from numerous submissions. The papers address all current issues in autonomic architectures, models and systems, autonomic communications, trusted and secure computing, reliable, secure and trust applications. This book constitutes the refereed proceedings of the 8th International Conference on Autonomic and Trusted Computing, ATC 2011, held in Banff, Canada...
|
cena:
204,55 |
![]() |
Recent Advances in Intrusion Detection: 14th International Symposium, Raid 2011, Menlo Park, Ca, Usa, September 20-21, 2011, Proceedings
ISBN: 9783642236433 / Angielski / Miękka / 399 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments.
This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA...
|
cena:
204,55 |
![]() |
Critical Infrastructure Protection V: 5th Ifip Wg 11.10 International Conference on Critical Infrastructure Protection, Iccip 2011, Hanover, Nh, Usa,
ISBN: 9783642248634 / Angielski / Twarda / 218 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure...
The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every se...
|
cena:
204,55 |
![]() |
Security and Intelligent Information Systems: International Joint Confererence, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers
ISBN: 9783642252600 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the Joint Meeting of the 2nd Luxembourg-Polish Symposium on Security and Trust and the 19th International Conference Intelligent Information Systems, held as International Joint Confererence on Security and Intelligent Information Systems, SIIS 2011, in Warsaw, Poland, in June 2011. The 29 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 60 initial submissions during two rounds of selection and improvement. The papers are organized in the following three...
This book constitutes the thoroughly refereed post-conference proceedings of the Joint Meeting of the 2nd Luxembourg-Polish Symposium on Security and ...
|
cena:
204,55 |
![]() |
Security Technology: International Conference, Sectech 2011, Held as Part of the Future Generation Information Technology Conference, Fgit
ISBN: 9783642271885 / Angielski / Miękka / 252 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book comprises selected papers of the International Conferences, SecTech 2011, held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, in December 2011. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of security technology.
This book comprises selected papers of the International Conferences, SecTech 2011, held as Part of the Future Generation Information Technology Confe...
|
cena:
204,55 |
![]() |
Smart Card Research and Advanced Applications: 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Re
ISBN: 9783642272561 / Angielski / Miękka / 335 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 10th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications, CARDIS 2011, held in Leuven, Belgium, in September 2011. The 20 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on smart cards system security, invasive attacks, new algorithms and protocols, implementations and hardware security, non-invasive attacks, and Java card security.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th IFIP WG 8.8/11.2 International Conference on Smart Card Research...
|
cena:
204,55 |
![]() |
Crittografia Nel Paese Delle Meraviglie
ISBN: 9788847024809 / Włoski / Miękka / 500 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In passato, l arte della scrittura nascosta (meglio nota come crittografia) era per lo piu riferita ad un insieme di metodi per nascondere il contenuto di un dato messaggio agli occhi di lettori non autorizzati. Oggi, l evoluzione dei sistemi digitali ha generato nuovi scenari di comunicazione, richiedendo ai moderni crittografi di progettare crittosistemi che soddisfino requisiti di sicurezza complessi, ben oltre il requisito base di confidenzialita ottenibile attraverso la scrittura nascosta . Tuttavia, l analisi di sicurezza di questi schemi crittografici (fino ai primi anni 80)... In passato, l arte della scrittura nascosta (meglio nota come crittografia) era per lo piu riferita ad un insieme di metodi per nascondere il conte... |
cena:
184,10 |
![]() |
Data Warehousing and Knowledge Discovery: 13th International Conference, Dawak 2011, Toulouse, France, August 29- September 2, 2011, Proceedings
ISBN: 9783642235436 / Angielski / Miękka / 498 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 13th International Conference on Data Warehousing and Knowledge Discovery, DaWak 2011 held in Toulouse, France in August/September 2011. The 37 revised full papers presented were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections on physical and conceptual data warehouse models, data warehousing design methodologies and tools, data warehouse performance and optimization, pattern mining, matrix-based mining techniques and stream, sensor and time-series mining.
This book constitutes the refereed proceedings of the 13th International Conference on Data Warehousing and Knowledge Discovery, DaWak 2011 held in To...
|
cena:
204,55 |
![]() |
Critical Infrastructure Protection: Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense
ISBN: 9783642289194 / Angielski / Miękka / 357 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critical Information Infrastructure (CII), which not only forms one of the constituent sectors of the overall CI, but also is unique in providing an element of interconnection between sectors as well as often also intra-sectoral control mechanisms. The 14 papers of this book present a collection of pieces of scientific work in the areas of critical infrastructure protection. In combining elementary concepts and models with policy-related issues on one...
The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critic...
|
cena:
347,77 |
![]() |
Advances in Cryptology - Eurocrypt 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, U
ISBN: 9783642290107 / Angielski / Miękka / 758 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2012, held in Cambgridge, UK, in April 2012.
Constitutes the refereed proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT...
|
cena:
204,55 |
![]() |
Information Security Technology for Applications: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised Selected Papers
ISBN: 9783642296147 / Angielski / Miękka / 273 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, October 26-28, 2011. The 16 revised papers presented together with 2 invited talks were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on applied cryptography, commercial security policies and their enforcement, communication and network security, security modeling and metrics, economics, law and social aspects of security, and software security and malware.
This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, Octo...
|
cena:
204,55 |
![]() |
Cyber Situational Awareness: Issues and Research
ISBN: 9781461424758 / Angielski / Miękka / 252 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive science, and decision science areas elab orate on the fundamental challenges facing the research community and identify promising solution paths. Today, when a security incident occurs, the top three questions security admin istrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the ?rst two questions form the...
Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future res...
|
cena:
409,14 |
![]() |
Sequences and Their Applications - SETA 2012: 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedings
ISBN: 9783642306143 / Angielski / Miękka / 337 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Presents the proceedings of the 7th International Conference on Sequences and Their Applications, SETA 2012, held in Waterloo, Canada, in June 2012. This title includes papers that are grouped in topical sections on: perfect sequences; finite fields; boolean functions; Golomb 80th birthday session; linear complexity; frequency hopping; and, more.
Presents the proceedings of the 7th International Conference on Sequences and Their Applications, SETA 2012, held in Waterloo, Canada, in June 2012. T...
|
cena:
204,55 |
![]() |
Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings
ISBN: 9783642309205 / Angielski / Miękka / 341 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the 5th International Conference on "Trust and Trustworthy Computing", TRUST 2012, held in Vienna, Austria, in June 2012.
Constitutes the refereed proceedings of the 5th International Conference on "Trust and Trustworthy Computing", TRUST 2012, held in Vienna, Austria, in...
|
cena:
204,55 |
![]() |
Information Security and Privacy: 17th Australasian Conference, Acisp 2012, Wollongong, Nsw, Australia, July 9-11, 2012. Proceedings
ISBN: 9783642314476 / Angielski / Miękka / 460 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography.
This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong...
|
cena:
204,55 |