• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2953081]
• Literatura piękna
 [1807186]

  więcej...
• Turystyka
 [52332]
• Informatyka
 [151352]
• Komiksy
 [36730]
• Encyklopedie
 [23076]
• Dziecięca
 [611400]
• Hobby
 [105092]
• AudioBooki
 [1722]
• Literatura faktu
 [191783]
• Muzyka CD
 [360]
• Słowniki
 [2970]
• Inne
 [439815]
• Kalendarze
 [655]
• Podręczniki
 [166156]
• Poradniki
 [422232]
• Religia
 [506466]
• Czasopisma
 [515]
• Sport
 [59946]
• Sztuka
 [242990]
• CD, DVD, Video
 [3439]
• Technologie
 [219109]
• Zdrowie
 [98416]
• Książkowe Klimaty
 [124]
• Zabawki
 [2537]
• Puzzle, gry
 [3685]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [7832]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2786

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Hacker Contest: Sicherheitsprobleme, Lösungen, Beispiele Schumacher, Markus 9783642625060 Springer
Hacker Contest: Sicherheitsprobleme, Lösungen, Beispiele

ISBN: 9783642625060 / Niemiecki / Miękka / 301 str.

ISBN: 9783642625060/Niemiecki/Miękka/301 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Markus Schumacher; Utz Roedig; Marie-Luise Moschgath
Know-how zur Abwehr von Hacker-Angriffen
Mehr Sicherheit fur Netze, Systeme und Anwendungen
Praxis-Leitfaden mit konzeptionellem Ansatz
Anschaulich durch zeitlose Beispiele

Ein Wettbewerb der Hacker? Wer knackt am schnellsten das Sicherheitssystem?
Die andere Seite - die Sicherheitsexperten - mussen in der Lage sein, Rechnernetze, Systeme und Anwendungen aus der Sicht eines Angreifers zu verstehen, um Sicherheitslucken erkennen und effizient schliessen zu konnen. Dabei unterstutzt sie das Buch.
Das Thema Sicherheit wird hier pragmatisch betrachtet. Die Sicherheit einer...

Know-how zur Abwehr von Hacker-Angriffen
Mehr Sicherheit fur Netze, Systeme und Anwendungen
Praxis-Leitfaden mit konzeptionellem Ansatz
Ansch...
cena: 152,91

 Distributed Networks: Intelligence, Security, and Applications Memon, Qurban A. 9781466559578 CRC Press
Distributed Networks: Intelligence, Security, and Applications

ISBN: 9781466559578 / Angielski / Twarda / 412 str.

ISBN: 9781466559578/Angielski/Twarda/412 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Qurban Ali Memon

For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized command and control in terms of scalability, flexibility, and robustness. It also introduces its own challenges. Distributed Networks: Intelligence, Security, and Applications brings together scientific research in distributed network intelligence, security, and novel applications. The book presents recent trends and advances in the theory and applications of network intelligence and helps you understand how to successfully...

For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized c...

cena: 1092,86

 Security and Privacy in Biometrics Patrizio Campisi 9781447152293 Springer
Security and Privacy in Biometrics

ISBN: 9781447152293 / Angielski / Twarda / 438 str.

ISBN: 9781447152293/Angielski/Twarda/438 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Patrizio Campisi

This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of...

This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from...

cena: 409,14

 Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers Simone Fischer-Hübner, Penny Duquenoy, Marit Hansen, Ronald Leenes, Ge Zhang 9783642267987 Springer-Verlag Berlin and Heidelberg GmbH &
Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers

ISBN: 9783642267987 / Angielski / Miękka / 356 str.

ISBN: 9783642267987/Angielski/Miękka/356 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Simone Fischer-Hubner;Penny Duquenoy;Marit Hansen
This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. The 27 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, data protection and identity management, eID cards and eID interoperability, emerging technologies, privacy for eGovernment and AAL applications, social networks and privacy, privacy...
This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer ...
cena: 204,55

 Emerging Management Mechanisms for the Future Internet: 7th Ifip Wg 6.6 International Conference on Autonomous Infrastructure, Management, and Securit Doyen, Guillaume 9783642389979 Springer
Emerging Management Mechanisms for the Future Internet: 7th Ifip Wg 6.6 International Conference on Autonomous Infrastructure, Management, and Securit

ISBN: 9783642389979 / Angielski / Miękka / 161 str.

ISBN: 9783642389979/Angielski/Miękka/161 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Guillaume Doyen; Martin Waldburger; Pavel Celeda
This book constitutes the refereed proceedings of the 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, held in Barcelona, Spain, in June 2013. The 11 full papers presented were carefully reviewed and selected from 32 submissions. The volume also includes 7 papers presented at the AIMS Ph.D. workshop. They were reviewed and selected from 14 submissions. The papers are organized in topical sections on traffic engineering and quality-of-service; monitoring and modeling; security management; content distribution and multimedia; autonomous...
This book constitutes the refereed proceedings of the 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security,...
cena: 204,55

 Information and Communication Technology: International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedings Khabib Mustofa, Erich Neuhold, A Min Tjoa, Edgar R. Weippl, Ilsun You 9783642368172 Springer-Verlag Berlin and Heidelberg GmbH &
Information and Communication Technology: International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedings

ISBN: 9783642368172 / Angielski / Miękka / 552 str.

ISBN: 9783642368172/Angielski/Miękka/552 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Khabib Mustofa;Erich Neuhold;A Min Tjoa
This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography,...
This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the ...
cena: 204,55

 Security and Privacy Protection in Information Processing Systems: 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013, Proceedings Lech J. Janczewski, Henry B. Wolfe, Sujeet Shenoi 9783642392177 Springer-Verlag Berlin and Heidelberg GmbH &
Security and Privacy Protection in Information Processing Systems: 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013, Proceedings

ISBN: 9783642392177 / Angielski / Twarda / 436 str.

ISBN: 9783642392177/Angielski/Twarda/436 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lech J. Janczewski;Henry B. Wolfe;Sujeet Shenoi
This book constitutes the refereed proceedings of the 28th IFIP TC 11 International Information Security and Privacy Conference, SEC 2013, held in Auckland, New Zealand, in July 2013. The 31 revised full papers presented were carefully reviewed and selected from 83 submissions. The papers are organized in topical sections on malware, authentication and authorization, network security/cryptography, software security, policy compliance and obligations, privacy protection, risk analysis and security metrics, social engineering, and security management/forensics.
This book constitutes the refereed proceedings of the 28th IFIP TC 11 International Information Security and Privacy Conference, SEC 2013, held in Auc...
cena: 409,14

 Simple Steps to Data Encryption: A Practical Guide to Secure Computing Loshin, Pete 9780124114838 0
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

ISBN: 9780124114838 / Angielski / Miękka / 86 str.

ISBN: 9780124114838/Angielski/Miękka/86 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Pete Loshin

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography.

Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into...

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is conce...

cena: 119,18

 Introduction to Biometrics Karthik Nandakumar 9780387773254 Springer-Verlag New York Inc.
Introduction to Biometrics

ISBN: 9780387773254 / Angielski / Twarda / 312 str.

ISBN: 9780387773254/Angielski/Twarda/312 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Karthik Nandakumar

Biometric recognition, or simply biometrics, is the science of establishing the identity of a person based on physical or behavioral attributes. It is a rapidly evolving field with applications ranging from securely accessing one's computer to gaining entry into a country. While the deployment of large-scale biometric systems in both commercial and government applications has increased the public awareness of this technology, "Introduction to Biometrics" is the first textbook to introduce the fundamentals of Biometrics to undergraduate/graduate students. The three commonly used modalities...

Biometric recognition, or simply biometrics, is the science of establishing the identity of a person based on physical or behavioral attributes. It...

cena: 409,14

 Spyware and Adware John Aycock 9780387777405 0
Spyware and Adware

ISBN: 9780387777405 / Angielski / Twarda / 146 str.

ISBN: 9780387777405/Angielski/Twarda/146 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John Aycock

Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field.

Spyware and Adware is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry.


Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. ...

cena: 409,14

 Security and Privacy Preserving in Social Networks Bechara Chbeir 9783709108932 0
Security and Privacy Preserving in Social Networks

ISBN: 9783709108932 / Angielski / Twarda / 367 str.

ISBN: 9783709108932/Angielski/Twarda/367 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bechara Chbeir
Drawing on a range of expert contributions, this book assesses current approaches and technologies related to the security and privacy of social networks, outlines major challenges and offers perspectives on the direction of future research on the topic.
Drawing on a range of expert contributions, this book assesses current approaches and technologies related to the security and privacy of social netwo...
cena: 409,14

 Advances in Cryptology: Proceedings of Crypto 83 Chaum, David 9781468447323 Springer
Advances in Cryptology: Proceedings of Crypto 83

ISBN: 9781468447323 / Angielski / Miękka / 396 str.

ISBN: 9781468447323/Angielski/Miękka/396 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Chaum
An international community of researchers is now flourishing in the area of cryptology-there was none half-a-dozen years ago. The intrinsic fascination of the field certainly is part of the explanation. Another factor may be that many sense the importance and potential consequences of this work, as we move into the information age. I believe that the various meetings devoted to cryptology over the past few years have contributed quite significantly to the formation of this community, by allowing those in the field to get to know each other and by providing for rapid exchange of ideas. CRYPTO...
An international community of researchers is now flourishing in the area of cryptology-there was none half-a-dozen years ago. The intrinsic fascinatio...
cena: 204,55

 Advances in Cryptology: Proceedings of Crypto 82 Chaum, David 9781475706048 Springer
Advances in Cryptology: Proceedings of Crypto 82

ISBN: 9781475706048 / Angielski / Miękka / 331 str.

ISBN: 9781475706048/Angielski/Miękka/331 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Chaum
cena: 204,55

 Cryptography and Computational Number Theory Kwok Y Igor Shparlinski Huaxiong Wang 9783034895071 Birkhauser
Cryptography and Computational Number Theory

ISBN: 9783034895071 / Angielski / Miękka / 378 str.

ISBN: 9783034895071/Angielski/Miękka/378 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kwok Y. Lam; Igor Shparlinski; Huaxiong Wang
This volume contains the refereed proceedings of the Workshop on Cryptography and Computational Number Theory, CCNT'99, which has been held in Singapore during the week of November 22-26, 1999. The workshop was organized by the Centre for Systems Security of the Na- tional University of Singapore. We gratefully acknowledge the financial support from the Singapore National Science and Technology Board under the grant num- ber RP960668/M. The idea for this workshop grew out of the recognition of the recent, rapid development in various areas of cryptography and computational number the- ory....
This volume contains the refereed proceedings of the Workshop on Cryptography and Computational Number Theory, CCNT'99, which has been held in Singapo...
cena: 204,55

 Critical Infrastructure Protection V: 5th Ifip Wg 11.10 International Conference on Critical Infrastructure Protection, Iccip 2011, Hanover, Nh, Usa, Butts, Jonathan 9783642270413 Springer
Critical Infrastructure Protection V: 5th Ifip Wg 11.10 International Conference on Critical Infrastructure Protection, Iccip 2011, Hanover, Nh, Usa,

ISBN: 9783642270413 / Angielski / Miękka / 218 str.

ISBN: 9783642270413/Angielski/Miękka/218 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jonathan Butts; Sujeet Shenoi
The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure...
The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every se...
cena: 204,55

 Introduction to Biometrics Anil K. Jain Arun A. Ross Karthik Nandakumar 9781489985439 Springer
Introduction to Biometrics

ISBN: 9781489985439 / Angielski / Miękka / 312 str.

ISBN: 9781489985439/Angielski/Miękka/312 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Anil K. Jain; Arun A. Ross; Karthik Nandakumar

Biometric recognition, or simply biometrics, is the science of establishing the identity of a person based on physical or behavioral attributes. It is a rapidly evolving field with applications ranging from securely accessing one's computer to gaining entry into a country. While the deployment of large-scale biometric systems in both commercial and government applications has increased the public awareness of this technology, "Introduction to Biometrics" is the first textbook to introduce the fundamentals of Biometrics to undergraduate/graduate students. The three commonly used modalities...

Biometric recognition, or simply biometrics, is the science of establishing the identity of a person based on physical or behavioral attributes. It...

cena: 265,93

 Accumulo: Application Development, Table Design, and Best Practices Wall, Michael; Cordova, Aaron; Rinaldi, Billie 9781449374181 John Wiley & Sons
Accumulo: Application Development, Table Design, and Best Practices

ISBN: 9781449374181 / Angielski / Miękka / 552 str.

ISBN: 9781449374181/Angielski/Miękka/552 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Wall; Aaron Cordova; Billie Rinaldi

Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Google's BigTable data storage system. Written by former NSA team members, this comprehensive tutorial and reference covers Accumulo architecture, application development, table design, and cell-level security.

With clear information on system administration, performance tuning, and best practices, this book is ideal for developers seeking to write Accumulo applications, administrators charged with installing and maintaining Accumulo, and other...

Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Googl...

cena: 198,41

 Soliton Coding for Secured Optical Communication Link Iraj Sadegh Amiri, Sayed Ehsan Alavi, Sevia Mahdaliza Idrus 9789812871602 Springer Verlag, Singapore
Soliton Coding for Secured Optical Communication Link

ISBN: 9789812871602 / Angielski / Miękka / 58 str.

ISBN: 9789812871602/Angielski/Miękka/58 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Iraj Sadegh Amiri;Sayed Ehsan Alavi;Sevia Mahdaliza Idrus
Nonlinear behavior of light such as chaos can be observed during propagation of a laser beam inside the microring resonator (MRR) systems. This Brief highlights the design of a system of MRRs to generate a series of logic codes. An optical soliton is used to generate an entangled photon. The ultra-short soliton pulses provide the required communication signals to generate a pair of polarization entangled photons required for quantum keys. In the frequency domain, MRRs can be used to generate optical millimetre-wave solitons with a broadband frequency of 0-100 GHz. The soliton signals are...
Nonlinear behavior of light such as chaos can be observed during propagation of a laser beam inside the microring resonator (MRR) systems. This Brief ...
cena: 204,55

 Privacy and Identity Management for Life: 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers Jan Camenisch, Bruno Crispo, Simone Fischer-Hübner, Ronald Leenes, Giovanni Russello 9783642433139 Springer-Verlag Berlin and Heidelberg GmbH &
Privacy and Identity Management for Life: 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers

ISBN: 9783642433139 / Angielski / Miękka / 294 str.

ISBN: 9783642433139/Angielski/Miękka/294 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jan Camenisch;Bruno Crispo;Simone Fischer-Hubner
This book constitutes the thoroughly refereed post-conference proceedings of the 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, held in Trento, Italy, in September 2011. The 20 revised papers were carefully selected from numerous submissions during two rounds of reviewing. The book also contains two invited talks. The papers are organized in topical sections on privacy metrics and comparison, policies, privacy transparency in the age of cloud computing, privacy for mobile applications, consumer privacy, privacy for online communities, privacy for eHealth and eID...
This book constitutes the thoroughly refereed post-conference proceedings of the 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, he...
cena: 204,55

 An Introduction to Mathematical Cryptography Joseph H. Silverman 9781493917105 Springer-Verlag New York Inc.
An Introduction to Mathematical Cryptography

ISBN: 9781493917105 / Angielski / Twarda / 538 str.

ISBN: 9781493917105/Angielski/Twarda/538 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joseph H. Silverman

This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required of the reader; techniques from algebra, number theory, and probability are introduced and developed as required. This text provides an ideal introduction for mathematics and computer science students to the mathematical foundations of modern...

This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signat...

cena: 286,39

Pierwsza Podprzednia  127  128  129  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia