• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [3084821]
• Literatura piękna
 [1818531]

  więcej...
• Turystyka
 [52640]
• Informatyka
 [156433]
• Komiksy
 [36751]
• Encyklopedie
 [23178]
• Dziecięca
 [613236]
• Hobby
 [105326]
• AudioBooki
 [1727]
• Literatura faktu
 [194989]
• Muzyka CD
 [350]
• Słowniki
 [3001]
• Inne
 [441634]
• Kalendarze
 [606]
• Podręczniki
 [166391]
• Poradniki
 [423402]
• Religia
 [510371]
• Czasopisma
 [517]
• Sport
 [61219]
• Sztuka
 [248722]
• CD, DVD, Video
 [3436]
• Technologie
 [230487]
• Zdrowie
 [98718]
• Książkowe Klimaty
 [124]
• Zabawki
 [2526]
• Puzzle, gry
 [3722]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [7792]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2786

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies Zubairi, Junaid Ahmed 9781609608514 Information Science Publishing
Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies

ISBN: 9781609608514 / Angielski / Twarda / 338 str.

ISBN: 9781609608514/Angielski/Twarda/338 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Junaid Ahmed Zubairi; Athar Mahboob
Cyber security, encompassing both information and network security, is of utmost importance in today's information age. Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies details the latest and most important advances in security standards. First, it introduces the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter...
Cyber security, encompassing both information and network security, is of utmost importance in today's information age. Cyber Security Standards, Prac...
cena: 1005,14

Geometries, Codes and Cryptography G. Longo M. Marchi A. Sgarro 9783211822050 Springer
Geometries, Codes and Cryptography

ISBN: 9783211822050 / Angielski / Miękka / 228 str.

ISBN: 9783211822050/Angielski/Miękka/228 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
G. Longo; M. Marchi; A. Sgarro
The general problem studied by information theory is the reliable transmission of information through unreliable channels. Channels can be unreliable either because they are disturbed by noise or because unauthorized receivers intercept the information transmitted. In the first case, the theory of error-control codes provides techniques for correcting at least part of the errors caused by noise. In the second case cryptography offers the most suitable methods for coping with the many problems linked with secrecy and authentication. Now, both error-control and cryptography schemes can be...
The general problem studied by information theory is the reliable transmission of information through unreliable channels. Channels can be unreliable ...
cena: 234,31

Post-Quantum Cryptography Daniel J. Bernstein Johannes Buchmann Erik Dahmen 9783642100192 Springer
Post-Quantum Cryptography

ISBN: 9783642100192 / Angielski / Miękka / 246 str.

ISBN: 9783642100192/Angielski/Miękka/246 str.

Termin realizacji zamówienia: 22 dni roboczych
Daniel J. Bernstein; Johannes Buchmann; Erik Dahmen

Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems.

Leading experts have joined forces for the first time to explain the state of the art in quantum computing, hash-based cryptography, code-based cryptography, lattice-based cryptography, and multivariate cryptography. Mathematical...

Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader ...

833,26
583,28

Security and Privacy in Mobile Information and Communication Systems: Second International Icst Conference, Mobisec 2010, Catania, Sicily, Italy, May Schmidt, Andreas U. 9783642175015 Springer
Security and Privacy in Mobile Information and Communication Systems: Second International Icst Conference, Mobisec 2010, Catania, Sicily, Italy, May

ISBN: 9783642175015 / Angielski / Miękka / 176 str.

ISBN: 9783642175015/Angielski/Miękka/176 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andreas U. Schmidt
MobiSec 2010 was the second ICST conference on security and privacy in mobile information and communication systems. With the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale application of novel kinds of information security for mobile devices and communication.
MobiSec 2010 was the second ICST conference on security and privacy in mobile information and communication systems. With the vast area of mobile tech...
cena: 204,55

A Classical Introduction to Cryptography Exercise Book Thomas Baigneres Pascal Junod Yi Lu 9781441939128 Springer
A Classical Introduction to Cryptography Exercise Book

ISBN: 9781441939128 / Angielski / Miękka / 254 str.

ISBN: 9781441939128/Angielski/Miękka/254 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thomas Baigneres; Pascal Junod; Yi Lu
TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerland Serge Vaudenay EPFL, Switzerland Springer - Thomas Baignbres Pascal Junod EPFL - I&C - LASEC Lausanne, Switzerland Lausanne, Switzerland Yi Lu Jean Monnerat EPFL - I&C - LASEC EPFL-I&C-LASEC Lausanne, Switzerland Lausanne, Switzerland Serge Vaudenay Lausanne, Switzerland Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY...
TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerlan...
cena: 175,91

Primality Testing and Integer Factorization in Public-Key Cryptography Song Y. Yan 9781441945860 Not Avail
Primality Testing and Integer Factorization in Public-Key Cryptography

ISBN: 9781441945860 / Angielski / Miękka / 371 str.

ISBN: 9781441945860/Angielski/Miękka/371 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Song Y. Yan

The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P). There is still no polynomial-time algorithm for IFP. Many practical public-key cryptosystems and protocols such as RSA (Rivest-Shamir-Adleman) rely their security on computational intractability of IFP.

Primality Testing and Integer Factorization in Public Key Cryptography, Second Edition, provides a survey of recent progress in primality testing and integer...

The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm,...

cena: 613,74

Datenschutz und Datensicherung im Wandel der Informationstechnologien: 1.GI-Fachtagung München, 30. und 31. Oktober 1985 Proceedings Peter P. Spies 9783540160366 Springer-Verlag Berlin and Heidelberg GmbH &
Datenschutz und Datensicherung im Wandel der Informationstechnologien: 1.GI-Fachtagung München, 30. und 31. Oktober 1985 Proceedings

ISBN: 9783540160366 / Niemiecki / Miękka / 256 str.

ISBN: 9783540160366/Niemiecki/Miękka/256 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peter P. Spies
Der Arbeitskreis "Datenschutz und Datensicherung" des Prasidiums der Gesellschaft fur In formatik sieht es als seine Aufgabe an, Probleme des Datenschutzes und der Datensicherung aus der Sicht der Informatik zu behandeln. Er hat in diesem Rahmen grundsatzliche Aus sagen zu diesen Themen unter besonderer Berucksichtigung der sich rasch entwickelnden In formationstechnologien erarbeitet und zu Entwurfen fur Anderungen des Bundesdatenschutz gesetzes Stellung genommen. Aus dieser Tatigkeit heraus entstand der Plan zur Durchfuh rung einer Fachtagung mit dem Thema "Datenschutz und Datensicherung im...
Der Arbeitskreis "Datenschutz und Datensicherung" des Prasidiums der Gesellschaft fur In formatik sieht es als seine Aufgabe an, Probleme des Datensch...
cena: 210,28

Information Security: 5th International Conference, Isc 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings Chan, Agnes Hui 9783540442707 Springer
Information Security: 5th International Conference, Isc 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings

ISBN: 9783540442707 / Angielski / Miękka / 502 str.

ISBN: 9783540442707/Angielski/Miękka/502 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
A. H. Chan; V. Gilgor; Agnes Hui Chan
As distinct from other security and cryptography conferences, the Information Security Conference (ISC) 2002 brought together individuals involved in a wide variety of different disciplines of information security to foster the exchange of ideas. The conference is an outgrowth of the Information Security Workshop, first held in Ishikawa, Japan 1997. ISC 2002 was held in Sao Paulo, Brazil, on September 30- October 2, 2002. The Program Committee considered 81 submissions of which 38 papers were accepted for presentation. These proceedings contain revised versions of the accepted papers. The...
As distinct from other security and cryptography conferences, the Information Security Conference (ISC) 2002 brought together individuals involved in ...
cena: 204,55

Approximative Public-Key-Kryptosysteme Patrick Horster, Hartmut Isselhorst 9783540509042 Springer-Verlag Berlin and Heidelberg GmbH &
Approximative Public-Key-Kryptosysteme

ISBN: 9783540509042 / Niemiecki / Miękka / 174 str.

ISBN: 9783540509042/Niemiecki/Miękka/174 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Patrick Horster;Hartmut Isselhorst
In der vorliegenden Arbeit werden die Einsatzmoglichkeiten approximativer Verfahren fur Public-Key-Kryptosysteme untersucht. Dazu werden in einer allgemeinverstandlichen Einleitung die notwendigen Grundlagen erarbeitet. Im Anschluss daran werden Resultate uber eine reellwertige Approximation periodischer und nichtperiodischer Funktionen fur Verschlusselungssysteme mit offentlichem Schlussel entwickelt. Weiterhin werden die kryptologischen Eigenschaften rationaler Zahlen untersucht. Diese fliessen in die Entwicklung eines neuen Konzeptes fur ein Public-Key-Kryptosystem ein, die...
In der vorliegenden Arbeit werden die Einsatzmoglichkeiten approximativer Verfahren fur Public-Key-Kryptosysteme untersucht. Dazu werden in einer allg...
cena: 210,28

VIS ’91 Verläßliche Informationssysteme: GI-Fachtagung, Darmstadt, 13.–15. März 1991 Proceedings Andreas Pfitzmann, Eckart Raubold 9783540539117 Springer-Verlag Berlin and Heidelberg GmbH &
VIS ’91 Verläßliche Informationssysteme: GI-Fachtagung, Darmstadt, 13.–15. März 1991 Proceedings

ISBN: 9783540539117 / Niemiecki / Miękka / 355 str.

ISBN: 9783540539117/Niemiecki/Miękka/355 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andreas Pfitzmann;Eckart Raubold
Das Thema "Computer-Sicherheit" gehOrt zu den Modethemen der DV-Branche. Doch je nach Zielvorstellung und Ausgangspunkt liegen jeweils andere Frage stellungen im Schwerpunkt der Diskussion zu diesem Thema. Die neugegrOndete Fachgruppe "VerlaBliche Informationssysteme" (2.5.3) der GI wahlt als Ausgangspunkt ihrer Betrachtungen naturgemaB die systemtechnischen Gestaltungsmoglichkeiten von Informationssystemen, und von den vielen moglichen Zielen der Systemgestaltung hat die Fachgruppe die "VerlaBlichkeit" des Systems in den Mittelpunkt gestellt. Mit dem Begriff der VerlaBlichkeit verbindet die...
Das Thema "Computer-Sicherheit" gehOrt zu den Modethemen der DV-Branche. Doch je nach Zielvorstellung und Ausgangspunkt liegen jeweils andere Frage st...
cena: 210,28

Chipkarten ALS Sicherheitswerkzeug: Grundlagen Und Anwendungen Beutelspacher, Albrecht 9783540541400 Springer
Chipkarten ALS Sicherheitswerkzeug: Grundlagen Und Anwendungen

ISBN: 9783540541400 / Niemiecki / Miękka / 167 str.

ISBN: 9783540541400/Niemiecki/Miękka/167 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Albrecht Beutelspacher; Annette G. Kersten; Axel Pfau
Chipkarten sind Kleinstrechner in Scheckkartenformat, die selbstandig Daten verwalten und verarbeiten konnen. Eine ihrer wichtigsten Anwendungen ist die Realisierung von Sicherheitsdiensten. Mit der Chipkarte steht erstmals ein Werkzeug zur Verfugung, das den Einsatz kryptographischer Methoden kommerziell moglich macht und damit in ausserst benutzerfreundlicher Weise hohe Sicherheit bietet. Es ermoglicht z.B. einen sicheren Zugang zum offentlichen Telefon, "elektronisches Einkaufen" (POS-Banking, electronic cash) oder den Einsatz als Dokument, etwa als medizinischer Notfallausweis. Dieses...
Chipkarten sind Kleinstrechner in Scheckkartenformat, die selbstandig Daten verwalten und verarbeiten konnen. Eine ihrer wichtigsten Anwendungen ist d...
cena: 210,28

Advances in Cryptology -- Crypto '91: Proceedings Feigenbaum, Joan 9783540551881 Not Avail
Advances in Cryptology -- Crypto '91: Proceedings

ISBN: 9783540551881 / Angielski / Miękka / 484 str.

ISBN: 9783540551881/Angielski/Miękka/484 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joan Feigenbaum
Presents the proceedings of the 11th in a series of workshops on cryptology sponsored by the International Association for Cryptologic Research. All theoretical and practical aspects of cryptology are represented.
Presents the proceedings of the 11th in a series of workshops on cryptology sponsored by the International Association for Cryptologic Research. All t...
cena: 204,55

Advances in Cryptology -- Crypto '92: 12th Annual International Cryptology Conference, Santa Barbara, California, Usa, August 16-20, 1992. Proceedings Brickell, Ernest F. 9783540573401 Not Avail
Advances in Cryptology -- Crypto '92: 12th Annual International Cryptology Conference, Santa Barbara, California, Usa, August 16-20, 1992. Proceedings

ISBN: 9783540573401 / Angielski / Miękka / 593 str.

ISBN: 9783540573401/Angielski/Miękka/593 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ernest F. Brickell
Crypto'92 took place on August 16-20, 1992. It was the twelfth in the series of annual cryptology conferences held on the beautiful campus of the University of California, Santa Barbara. Once again, it was sponsored by the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy. The conference ran smoothly, due to the diligent efforts of the g- eral chair, Spyros Magliveras of the University of Nebraska. One of the measures of the success of this series of conferences is represented by the ever increasing...
Crypto'92 took place on August 16-20, 1992. It was the twelfth in the series of annual cryptology conferences held on the beautiful campus of the Univ...
cena: 204,55

Advances in Cryptology - Eurocrypt '93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23-27, 1993 Proceeding Helleseth, Tor 9783540576006 Springer
Advances in Cryptology - Eurocrypt '93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23-27, 1993 Proceeding

ISBN: 9783540576006 / Angielski / Twarda / 465 str.

ISBN: 9783540576006/Angielski/Twarda/465 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tor Helleseth
Eurocrypt is a series of open workshops on the theory and application of cryptographic techniques. These meetings have taken place in Europe every year since 1982 and are sponsored by the International Association for Cryptologic Research. Eurocrypt '93 was held in the village of Lofthus in Norway in May 1993. The call for papers resulted in 117 submissions with authors representing 27 different countries. The 36 accepted papers were selected by the program committee after a blind refereeing process. The papers are grouped into parts on authentication, public key, block ciphers, secret...
Eurocrypt is a series of open workshops on the theory and application of cryptographic techniques. These meetings have taken place in Europe every yea...
cena: 204,55

Advances in Cryptology -- Crypto '93: 13th Annual International Cryptology Conference Santa Barbara, California, USA August 22-26, 1993 Proceedings Stinson, Douglas R. 9783540577669 Not Avail
Advances in Cryptology -- Crypto '93: 13th Annual International Cryptology Conference Santa Barbara, California, USA August 22-26, 1993 Proceedings

ISBN: 9783540577669 / Angielski / Miękka / 491 str.

ISBN: 9783540577669/Angielski/Miękka/491 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Douglas R. Stinson
The CRYPTO '93 conference was sponsored by the International Association for Cryptologic Research (IACR) and Bell-Northern Research (a subsidiary of Northern Telecom), in co-operation with the IEEE Computer Society Technical Committee. It took place at the University of California, Santa Barbara, from August 22-26, 1993. This was the thirteenth annual CRYPTO conference, all of which have been held at UCSB. The conference was very enjoyable and ran very of the General Chair, Paul Van Oorschot. smoothly, largely due to the efforts It was a pleasure working with Paul throughout the months...
The CRYPTO '93 conference was sponsored by the International Association for Cryptologic Research (IACR) and Bell-Northern Research (a subsidiary of N...
cena: 204,55

Advances in Cryptology -- Crypto '94: 14th Annual International Cryptology Conference, Santa Barbara, California, Usa, August 21-25, 1994. Proceedings Desmedt, Yvo G. 9783540583332 Not Avail
Advances in Cryptology -- Crypto '94: 14th Annual International Cryptology Conference, Santa Barbara, California, Usa, August 21-25, 1994. Proceedings

ISBN: 9783540583332 / Angielski / Miękka / 438 str.

ISBN: 9783540583332/Angielski/Miękka/438 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yvo G. Desmedt
The CRYPTO '94 conference is sponsored by the International Association for Cryptologic Research (IACR), in co-operation with the IEEE Computer Society Technical Committee on Security and Privacy. It has taken place at the Univ- sity of California, Santa Barbara, from August 21-25,1994. This is the fourteenth annual CRYPTO conference, all of which have been held at UCSB. This is the first time that proceedings are available at the conference. The General Chair, Jimmy R. Upton has been responsible for local organization, registration, etc. There were 114 submitted papers which were considered...
The CRYPTO '94 conference is sponsored by the International Association for Cryptologic Research (IACR), in co-operation with the IEEE Computer Societ...
cena: 204,55

Formale Begriffsanalyse Mit C++: Datenstrukturen Und Algorithmen Vogt, Frank 9783540610717 Not Avail
Formale Begriffsanalyse Mit C++: Datenstrukturen Und Algorithmen

ISBN: 9783540610717 / Niemiecki / Miękka / 325 str.

ISBN: 9783540610717/Niemiecki/Miękka/325 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Frank Vogt
Das Buch soll den Leser, der an Formaler Begriffsanalyse als Methode der Datenanalyse und Wissenstrukturierung interessiert ist, in die Lage versetzen, eigene C++-Programme zur Formalen Begriffsanalyse zu schreiben. Die C++-Klassenbibliothek wird in Aufbau und Benutzung ausfuhrlich anhand zahlreicher Beispiele sowie den zugrunde liegenden mathematischen Begriffen diskutiert. Die Vorgehensweisen der Formalen Begriffsanalyse werden an einem Anwendungsbeispiel erlautert, so dass das Buch sowohl als Leitfaden fur den interessierten Neueinsteiger als auch als Handbuch fur den versierten...
Das Buch soll den Leser, der an Formaler Begriffsanalyse als Methode der Datenanalyse und Wissenstrukturierung interessiert ist, in die Lage versetzen...
cena: 210,28

Fast Software Encryption: 5th International Workshop, Fse '98, Paris, France, March 23-25, 1998, Proceedings G. Goos J. Hartmanis J. Va 9783540642657 Springer
Fast Software Encryption: 5th International Workshop, Fse '98, Paris, France, March 23-25, 1998, Proceedings

ISBN: 9783540642657 / Angielski / Miękka / 297 str.

ISBN: 9783540642657/Angielski/Miękka/297 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
G. Goos; J. Hartmanis; J. Van Leeuwen
This book constitutes the refereed proceedings of the 5th International Workshop on Fast Software Encryption, FSE '98, held in Paris, France, in March 1998. The 20 revised full papers presented were carefully reviewed and selected from a total of 39 submissions. The volume is divided in topical sections on cryptanalysis, new stream ciphers, design construction analysis, hash functions, pseudo-random generators, new block ciphers, and modes of operation.
This book constitutes the refereed proceedings of the 5th International Workshop on Fast Software Encryption, FSE '98, held in Paris, France, in March...
cena: 204,55

Digitale Signatur: Grundlagen, Funktion Und Einsatz Bitzer, Frank 9783540655633 Not Avail
Digitale Signatur: Grundlagen, Funktion Und Einsatz

ISBN: 9783540655633 / Niemiecki / Miękka / 209 str.

ISBN: 9783540655633/Niemiecki/Miękka/209 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Frank Bitzer; Klaus M. Brisch
Digitale Kommunikation dringt in immer mehr Bereiche privater und unternehmerischer Anwendungsfelder ein. Seit 1997 sind die gesetzlichen Rahmenbedingungen in Deutschland fur rechtlich gesicherte Vorgange im Internet geschaffen. Zentraler Bestandteil ist die digitale Signatur. Die Autoren erklaren anschaulich und detailliert deren Konzept und Einsatzmoglichkeiten. Die Funktionen von Signatur, Trustcenter, Chipkarte und asymmetrischem Schlusselverfahren werden dargestellt und durch zahlreiche Diagramme verdeutlicht. Die Informationen dienen als Entscheidungsgrundlage fur den Einsatz der...
Digitale Kommunikation dringt in immer mehr Bereiche privater und unternehmerischer Anwendungsfelder ein. Seit 1997 sind die gesetzlichen Rahmenbeding...
cena: 210,28

Ethics and Policy of Biometrics: Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, Hong Kong, January Kumar, Ajay 9783642125942 Springer
Ethics and Policy of Biometrics: Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, Hong Kong, January

ISBN: 9783642125942 / Angielski / Miękka / 168 str.

ISBN: 9783642125942/Angielski/Miękka/168 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ajay Kumar; David Zhang

This volume constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, held in Hong Kong, during January 4-5, 2010. The 25 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on Privacy Protection and Challenges, Legal Challenges, Engineering and Social Challenges, Ethical and Medical Concerns, Policy Issues and Deployments in Asia, Challenges in Large Scale Biometrics Identification.

This volume constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Ethics and Policy of Biometric...

cena: 204,55

Pierwsza Podprzednia  13  14  15  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia