• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [3084821]
• Literatura piękna
 [1818531]

  więcej...
• Turystyka
 [52640]
• Informatyka
 [156433]
• Komiksy
 [36751]
• Encyklopedie
 [23178]
• Dziecięca
 [613236]
• Hobby
 [105326]
• AudioBooki
 [1727]
• Literatura faktu
 [194989]
• Muzyka CD
 [350]
• Słowniki
 [3001]
• Inne
 [441634]
• Kalendarze
 [606]
• Podręczniki
 [166391]
• Poradniki
 [423402]
• Religia
 [510371]
• Czasopisma
 [517]
• Sport
 [61219]
• Sztuka
 [248722]
• CD, DVD, Video
 [3436]
• Technologie
 [230487]
• Zdrowie
 [98718]
• Książkowe Klimaty
 [124]
• Zabawki
 [2526]
• Puzzle, gry
 [3722]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [7792]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2786

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems Jerzy Pejas Andrzej Piegat 9781441954381 Not Avail
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems

ISBN: 9781441954381 / Angielski / Miękka / 396 str.

ISBN: 9781441954381/Angielski/Miękka/396 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jerzy Pejas; Andrzej Piegat

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research.

"Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions analyzing such areas of AI as fuzzy set theory, predicate logic, neural networks, clustering, data mining and others. It also presents applications of AI as possible solutions for problems like firm bankruptcy, soil erosion, flight control and others.

...

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading E...

cena: 937,39

Digitale Signaturen Andreas Bertsch 9783540423515 Springer
Digitale Signaturen

ISBN: 9783540423515 / Angielski / Twarda / 280 str.

ISBN: 9783540423515/Angielski/Twarda/280 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andreas Bertsch
Digitale Signaturen basieren auf kryptographischen Algorithmen. Nationale Gesetze zielen auf die beweisrechtliche Gleichstellung digitaler/elektronischer Signaturen mit handschriftlichen Unterschriften. Die Falschungssicherheit digitaler Signaturen ist dabei eine wesentliche Voraussetzung. Im Buch werden die bekannten Verfahren der Gultigkeitsprufung digitaler Signaturen vorgestellt, Probleme analysiert und neue Losungsansatze vorgeschlagen. Dabei werden die Vorgaben des Signaturgesetzes und X.509 berucksichtigt. Die Theorie uber Abgabe und Zugang von Erklarungen des BGB wird dem Verfahren...
Digitale Signaturen basieren auf kryptographischen Algorithmen. Nationale Gesetze zielen auf die beweisrechtliche Gleichstellung digitaler/elektronisc...
cena: 267,65

Advances in Cryptology - Crypto '89: Proceedings Brassard, Gilles 9780387973173 Springer, Berlin
Advances in Cryptology - Crypto '89: Proceedings

ISBN: 9780387973173 / Angielski / Miękka / 634 str.

ISBN: 9780387973173/Angielski/Miękka/634 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gilles Brassard
CRYPTO is a conference devoted to all aspects of cryptologic research. It is held each year at the University of California at Santa Barbara. Annual meetings on this topic also take place in Europe and are regularly published in this Lecture Notes series under the name of EUROCRYPT. This volume presents the proceedings of the ninth CRYPTO meeting. The papers are organized into sections with the following themes: Why is cryptography harder than it looks?, pseudo-randomness and sequences, cryptanalysis and implementation, signature and authentication, threshold schemes and key management, key...
CRYPTO is a conference devoted to all aspects of cryptologic research. It is held each year at the University of California at Santa Barbara. Annual m...
cena: 204,55

Sicherheit Und Vertrauen in Der Mobilen Informations- Und Kommunikationstechnologie: Tagungsband Zur Eict-Konferenz It-Sicherheit Bub, Udo Wolfenstetter, Klaus-Dieter  9783834808172 Vieweg+Teubner
Sicherheit Und Vertrauen in Der Mobilen Informations- Und Kommunikationstechnologie: Tagungsband Zur Eict-Konferenz It-Sicherheit

ISBN: 9783834808172 / Niemiecki / Miękka

ISBN: 9783834808172/Niemiecki/Miękka

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Udo Bub; Klaus-Dieter Wolfenstetter
Udo Bub, Klaus-Dieter Wolfenstetter Angesichts der Dynamik des technologischen Wandels und der umfassenden Verbreitung der Informations- und Kommunikationstechnologien (IKT) haben Unternehmen, Privatpersonen und offentliche Hand einen wachsenden Bedarf an Datenschutz und Sicherheit im Netz. Dabei stehen Industrie, Forschung und Politik - je nach Aufgabenstellung - vor zwei Herausforderungen: Einerseits verlangen innovative Anwendungen, die durch zunehmende Mobilitat gepragt sind, angemessene Sicherheitslosungen und einen ausgewogenen Datenschutz, andererseits mussen auch bereits bestehende...
Udo Bub, Klaus-Dieter Wolfenstetter Angesichts der Dynamik des technologischen Wandels und der umfassenden Verbreitung der Informations- und Kommunika...
cena: 38,22

Datenschutz Kompakt Und Verständlich: Eine Praxisorientierte Einführung Witt, Bernhard C. 9783834812254 Vieweg+Teubner
Datenschutz Kompakt Und Verständlich: Eine Praxisorientierte Einführung

ISBN: 9783834812254 / Niemiecki / Miękka / 246 str.

ISBN: 9783834812254/Niemiecki/Miękka/246 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bernhard C. Witt
Das Thema "Datenschutz" geht jeden an, der an verantwortlicher Stelle mit IT zu tun hat, d. h. nicht nur den Datenschutzbeauftragten. Es geht um die Verarbeitung personenbezogener Daten und die Gewahrleistung des informationellen Selbstbestimmungsrechtes der betroffenen Individuen. Daran kommt heute kein Informatiker oder Marketingverantwortlicher mehr vorbei. "Datenschutz kompakt und verstandlich" vermittelt fundiertes Basis- und Praxiswissen. Die BDSG-Novellen 2009 werden ebenso wie z. B. das neue IT-Grundrecht auf die betriebliche und behordliche Praxis angewendet.
Dieses Buch eignet...
Das Thema "Datenschutz" geht jeden an, der an verantwortlicher Stelle mit IT zu tun hat, d. h. nicht nur den Datenschutzbeauftragten. Es geht um die V...
cena: 133,80

Communication and Cyberspace

ISBN: 9781572733947 / Angielski

ISBN: 9781572733947/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
A study of communication in the electronic environment known as cyberspace. It features essays on theoretical contexts, discussion and research on cybernetworks and cyberspaces, studies of new senses of space and navigation (cybernautics) and explorations of cybercommunication and cyberculture.
A study of communication in the electronic environment known as cyberspace. It features essays on theoretical contexts, discussion and research on cyb...
cena: 133,54

Decrypted Secrets: Methods and Maxims of Cryptology Bauer, Friedrich L. 9783642063831 Springer
Decrypted Secrets: Methods and Maxims of Cryptology

ISBN: 9783642063831 / Angielski / Miękka / 525 str.

ISBN: 9783642063831/Angielski/Miękka/525 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Friedrich L. Bauer

In today's unsafe and increasingly wired world cryptology plays a vital role in protecting communication channels, databases, and software from unwanted intruders. This revised and extended third edition of the classic reference work on cryptology now contains many new technical and biographical details. The first part treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis, where particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a...

In today's unsafe and increasingly wired world cryptology plays a vital role in protecting communication channels, databases, and software from unw...

cena: 818,33

Security and Privacy in the Age of Ubiquitous Computing: Ifip Tc11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, J Sasaki, Ryoichi 9781441938190 Springer
Security and Privacy in the Age of Ubiquitous Computing: Ifip Tc11 20th International Information Security Conference, May 30 - June 1, 2005, Chiba, J

ISBN: 9781441938190 / Angielski / Miękka / 612 str.

ISBN: 9781441938190/Angielski/Miękka/612 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ryoichi Sasaki; Sihan Qing; Eiji Okamoto
Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In addition, we need to deal with new issues such as security in the P2P environment, privacy issues in the use of smart cards, and RFID systems. Security and Privacy in the Age of Ubiquitous Computing addresses these issues and more by exploring a wide scope of topics. The volume presents a selection of papers from the proceedings of the 20th IFIP International Information Security Conference held from May 30 to June 1,...
Even in the age of ubiquitous computing, the importance of the Internet will not change and we still need to solve conventional security issues. In ad...
cena: 613,74

Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting Tuyls, Pim 9781849966931 Springer
Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting

ISBN: 9781849966931 / Angielski / Miękka / 340 str.

ISBN: 9781849966931/Angielski/Miękka/340 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Pim Tuyls; Boris Skoric; Tom Kevenaar

Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data. It provides a comprehensive overview of the theory of extracting cryptographic keys from noisy data, and describes applications in the field of biometrics, secure key storage, and anti-counterfeiting.

Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained ove...

cena: 409,14

Intelligence and Security Informatics: Techniques and Applications Chen, Hsinchun 9783642088704 Springer
Intelligence and Security Informatics: Techniques and Applications

ISBN: 9783642088704 / Angielski / Miękka / 460 str.

ISBN: 9783642088704/Angielski/Miękka/460 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hsinchun Chen; Christopher C. Yang
The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) conference series (http: //www. isiconference. org) have drawn significant attention in the recent years. Intelligence and Security Informatics is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The ISI conference series have brought together academic researchers, law enforcement and intelligence experts, -...
The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (P...
cena: 613,74

Public-Key Cryptography Arto Salomaa 9783642082542 Springer
Public-Key Cryptography

ISBN: 9783642082542 / Angielski / Miękka / 275 str.

ISBN: 9783642082542/Angielski/Miękka/275 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Arto Salomaa
Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essence and advantages, various public-key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis. The second edition has been revised and enlarged especially in its treatment of cryptographic protocols. From a review of the first edition: "This is a comprehensive review ... there can be...
Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications...
cena: 204,55

Rfid Security and Privacy: Concepts, Protocols, and Architectures Henrici, Dirk 9783642097928 Springer
Rfid Security and Privacy: Concepts, Protocols, and Architectures

ISBN: 9783642097928 / Angielski / Miękka / 269 str.

ISBN: 9783642097928/Angielski/Miękka/269 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dirk Henrici
In the beginning of 2003, I found a short article about the privacy implications of RFID technology in a newspaper. It raised my interest, and after reading some early research papers on the topic, I thought: "There must exist better solutions. " I c- cerned myself with the topic in my spare time. After having developed my rst - lutions, I asked my supervisor, Prof. Dr. Paul Muller ], whether I could write a paper about my results. As the topic did not t into any running project or at least the overall research directions of his group, he could have answered no. But instead, he encouraged me...
In the beginning of 2003, I found a short article about the privacy implications of RFID technology in a newspaper. It raised my interest, and after r...
cena: 613,74

Computational Number Theory Abhijit Das 9781439866153 CRC Press
Computational Number Theory

ISBN: 9781439866153 / Angielski / Twarda / 614 str.

ISBN: 9781439866153/Angielski/Twarda/614 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Abhijit Das

Developed from the author s popular graduate-level course, Computational Number Theory presents a complete treatment of number-theoretic algorithms. Avoiding advanced algebra, this self-contained text is designed for advanced undergraduate and beginning graduate students in engineering. It is also suitable for researchers new to the field and practitioners of cryptography in industry.

Requiring no prior experience with number theory or sophisticated algebraic tools, the book covers many computational aspects of number theory and highlights important and...

Developed from the author s popular graduate-level course, Computational Number Theory presents a complete treatment of number-the...

cena: 593,71

Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore Abe, Masayuki 9783642173721 Not Avail
Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore

ISBN: 9783642173721 / Angielski / Miękka / 634 str.

ISBN: 9783642173721/Angielski/Miękka/634 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Masayuki Abe
ASIACRYPT 2010 was held in the Swiss otel Merchant Court in Singapore, d- ing December 5-9, 2010. The conference was sponsored by the International Association for Cryptologic Research (IACR) in cooperation with the Coding and Cryptography Research Group of Nanyang Technological University. It was also supported by the Singapore Tourism Board, and co-sponsored by the - tional Research Foundation of Singapore, Lee Foundation, IBM Singapore Ltd., O'Connor'sSingaporeLtd., Pu?ersoftLtd., PrivylinkLtd., Hewlett-PackardS- gaporeLtd., JardineOneSolutionLtd., andSingaporeMathematicalSociety.San Ling...
ASIACRYPT 2010 was held in the Swiss otel Merchant Court in Singapore, d- ing December 5-9, 2010. The conference was sponsored by the International As...
cena: 204,55

Security Technology, Disaster Recovery and Business Continuity: International Conferences, Sectech and Drbc 2010, Held as Part of the Future Generatio Fang, Wai-Chi 9783642176098 Not Avail
Security Technology, Disaster Recovery and Business Continuity: International Conferences, Sectech and Drbc 2010, Held as Part of the Future Generatio

ISBN: 9783642176098 / Angielski / Miękka / 300 str.

ISBN: 9783642176098/Angielski/Miękka/300 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Wai-Chi Fang; Muhammad Khurram Khan; Kirk P. Arnett
Welcome to the proceedings of the 2010 International Conferences on Security Te- nology (SecTech 2010), and Disaster Recovery and Business Continuity (DRBC 2010) - two of the partnering events of the Second International Mega-Conference on Future Generation Information Technology (FGIT 2010). SecTech and DRBC bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of security and disaster recovery methodologies, including their links to c- putational sciences, mathematics and information...
Welcome to the proceedings of the 2010 International Conferences on Security Te- nology (SecTech 2010), and Disaster Recovery and Business Continuity ...
cena: 204,55

Cryptology and Network Security: 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi 9783642176180 Springer-Verlag Berlin and Heidelberg GmbH &
Cryptology and Network Security: 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings

ISBN: 9783642176180 / Angielski / Miękka / 355 str.

ISBN: 9783642176180/Angielski/Miękka/355 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Swee-Huay Heng;Rebecca N. Wright;Bok-Min Goi
The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12-14, 2010. The conference was co-organized by the Multimedia University (MMU), Malaysia, and Universiti Tunku Abdul Rahman (UTAR), Malaysia. The conference received 64 submissions from 22 countries, out of which 21 were accepted after a careful and thorough review process. These proceedings also contain abstracts for two invited talks. All submissions were reviewed by at least three members of the Program Committee; those authored or co-authored by Program...
The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12-14, 2010. The co...
cena: 204,55

Transactions on Computational Science XI: Special Issue on Security in Computing, Part II Gavrilova, Marina L. 9783642176968 Not Avail
Transactions on Computational Science XI: Special Issue on Security in Computing, Part II

ISBN: 9783642176968 / Angielski / Miękka / 294 str.

ISBN: 9783642176968/Angielski/Miękka/294 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marina L. Gavrilova
Transactions on Computational Science XI reflects recent developments in the field of Computational Science. Each chapter addresses a range of hot topics within the sphere of security research, including new architectures, novel hardware implementations, and more.
Transactions on Computational Science XI reflects recent developments in the field of Computational Science. Each chapter addresses a range of hot top...
cena: 204,55

Digital Watermarking: 9th International Workshop, Iwdw 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers Kim, Hyoung-Joong 9783642184048 Not Avail
Digital Watermarking: 9th International Workshop, Iwdw 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers

ISBN: 9783642184048 / Angielski / Miękka / 317 str.

ISBN: 9783642184048/Angielski/Miękka/317 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hyoung-Joong Kim
This book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held in Seoul, Korea, in October 2010. The 26 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on forensics, visual cryptography, robust watermarking, steganography, fingerprinting, and steganalysis.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held i...
cena: 204,55

Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011, Proceedings Aggelos Kiayias 9783642190735 Springer-Verlag Berlin and Heidelberg GmbH &
Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011, Proceedings

ISBN: 9783642190735 / Angielski / Miękka / 417 str.

ISBN: 9783642190735/Angielski/Miękka/417 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Aggelos Kiayias
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2011, CT-RSA 2011, held in San Francisco, CA, USA, in February 2011.
The 24 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on secure two-party computation, cryptographic primitives, side channel attacks, authenticated key agreement, proofs of security, block ciphers, security notions, public-key encryption, crypto tools and parameters, and digital signatures.
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2011, CT-RSA 2011, held in San Francisco, CA, USA, i...
cena: 204,55

Rfid Security: Techniques, Protocols and System-On-Chip Design Kitsos, Paris 9781441945570 Springer
Rfid Security: Techniques, Protocols and System-On-Chip Design

ISBN: 9781441945570 / Angielski / Miękka / 446 str.

ISBN: 9781441945570/Angielski/Miękka/446 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Paris Kitsos; Yan Zhang

RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardware implementations for cryptography algorithms and security techniques in RFID. The volume is structured in three parts. Part 1 deals with RFID fundamentals, including system architectures and applications. Part 2 addresses RFID security protocols and techniques with a comprehensive collection of the recent state-of-art protocols and techniques to secure RFID avoiding all potential security forces and cracks. Finally, the book discusses hardware...

RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardwa...

cena: 613,74

Pierwsza Podprzednia  13  14  15  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia