Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint
ISBN: 9780387952819 / Angielski / Twarda / 333 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins University. That course was the genesis of this book. I had been working in the field for several years at the Naval Surface Warfare Center, in Dahlgren, Virginia, under the auspices of the SHADOW program, with some funding by the Office of Naval Research. In designing the class, I was concerned both with giving an overview of the basic problems in computer security, and with providing information that was of interest to a department of...
In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins Un...
|
|
cena:
391,77 zł |
Cryptographic Security Architecture: Design and Verification
ISBN: 9780387953878 / Angielski / Twarda / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar cryptovariables. It is the foundation for enforcing computer security policies and controls and preempting system misuse. This book provides a comprehensive design for a portable, flexible high-security cryptographic architecture, with particular emphasis on incorporating rigorous security models and practices. "Cryptographic Security Architecture" unveils an alternative means of building a trustworthy system based on concepts... A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar ... |
|
cena:
391,77 zł |
Guide to Wireless Network Security
ISBN: 9780387954257 / Angielski / Twarda / 874 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A major, comprehensive professional text/reference for designing and maintaining security and reliability. From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. Includes coverage of wireless security testing techniques and prevention techniques for intrusion (attacks). An essential resource for wireless network administrators and developers. A major, comprehensive professional text/reference for designing and maintaining security and reliability. From basic concepts to designing princip... |
|
cena:
587,67 zł |
The History of Information Security: A Comprehensive Handbook
ISBN: 9780444516084 / Angielski / Twarda / 887 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties. The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas other...
Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptogra...
|
|
cena:
967,26 zł |
Computer Security and Cryptography
ISBN: 9780471947837 / Angielski / Twarda / 544 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Gain the skills and knowledge needed to create effective data security systems
This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems. The author contributed to the design and analysis of the Data Encryption Standard... Gain the skills and knowledge needed to create effective data security systems
This book updates readers with all the tools, techniques, and... |
|
cena:
746,75 zł |
Foundations of Cryptography: Volume 1, Basic Tools
ISBN: 9780521035361 / Angielski / Miękka / 396 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. It focuses on the basic mathematical tools: computational difficulty (one-way functions), pseudorandomness and zero-knowledge proofs. Rather than describing ad-hoc approaches, this book emphasizes the clarification of fundamental concepts and the demonstration of the feasibility of solving...
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. This book prese...
|
|
cena:
343,83 zł |
Complexity and Cryptography: An Introduction
ISBN: 9780521617710 / Angielski / Miękka / 304 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and web-based business processes. Understanding the principles on which it is based is an important topic that requires a knowledge of both computational complexity and a range of topics in pure mathematics. This book provides that knowledge, combining an informal style with strong proofs of the key results to provide an accessible introduction. It includes many examples and exercises, and is based on a highly successful course developed and taught over many years.
Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and web-based business processes. Und...
|
|
cena:
338,63 zł |
Protecting Information: From Classical Error Correction to Quantum Cryptography
ISBN: 9780521827409 / Angielski / Twarda / 304 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum computing, thus providing a context in which ideas from mathematics and physics meet. By covering such topics as Shor's quantum factoring algorithm, this text informs the reader about current thinking in quantum information theory and encourages an appreciation of the connections between mathematics and science. Of particular interest are the...
For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error ...
|
|
cena:
424,58 zł |
Quantum Cryptography and Secret-Key Distillation
ISBN: 9780521864855 / Angielski / Twarda / 276 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This 2006 text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secret-key distillation. The book starts with an overview chapter, progressing to classical cryptography, information theory (classical and quantum), and applications of quantum cryptography. The discussion moves to secret-key distillation, privacy...
Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secu...
|
|
cena:
499,29 zł |
Pseudorandomness &Amp; Cryptographic Applications
ISBN: 9780691025469 / Angielski / Miękka / 248 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that "looks" just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construction of a private key cryptosystem that is secure against chosen plaintext attack. There do not seem to be natural examples of functions that are pseudorandom generators. On the other hand, there do seem to be a variety of natural examples of another basic primitive: the one-way function. A function is one-way if it is easy to... A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that "looks" just like a ran... |
|
cena:
486,95 zł |
Spatial and Temporal Reasoning
ISBN: 9780792346449 / Angielski / Twarda / 394 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Qualitative reasoning about space and time - a reasoning at the human level - promises to become a fundamental aspect of future systems that will accompany us in daily activity.
The aim of Spatial and Temporal Reasoning is to give a picture of current research in this area focusing on both representational and computational issues. The picture emphasizes some major lines of development in this multifaceted, constantly growing area. The material in the book also shows some common ground and a novel combination of spatial and temporal aspects of qualitative reasoning. Part... Qualitative reasoning about space and time - a reasoning at the human level - promises to become a fundamental aspect of future systems that will acco...
|
|
cena:
587,67 zł |
Communications and Multimedia Security Issues of the New Century: Ifip Tc6 / Tc11 Fifth Joint Working Conference on Communications and Multimedia Secu
ISBN: 9780792373650 / Angielski / Twarda / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany. The conference is arranged jointly by the Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP) The name "Communications and Multimedia Security" was first used in 1995, Reinhard Posch organized the first in this series of...
The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001...
|
|
cena:
783,57 zł |
Trusted Information: The New Decade Challenge
ISBN: 9780792373896 / Angielski / Twarda / 490 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since the early eighties IFIP/Sec has been an important rendezvous for Information Technology researchers and specialists involved in all aspects of IT security. The explosive growth of the Web is now faced with the formidable challenge of providing trusted information. IFIP/Sec'01 is the first of this decade (and century) and it will be devoted to "Trusted Information - the New Decade Challenge" This proceedings are divided in eleven parts related to the conference program. Session are dedicated to technologies: Security Protocols, Smart Card, Network Security and Intrusion Detection,...
Since the early eighties IFIP/Sec has been an important rendezvous for Information Technology researchers and specialists involved in all aspects of I...
|
|
cena:
783,57 zł |
Recent Advances in Rsa Cryptography
ISBN: 9780792374381 / Angielski / Twarda / 140 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in RSA cryptography. Special emphasis is laid on the description and analysis of proposed attacks against the RSA cryptosystem. The first chapters introduce the necessary background information on number theory, complexity and public key cryptography. Subsequent chapters review factorization algorithms and specific properties that make RSA attractive for cryptographers. Most recent attacks against RSA are discussed in the third part of the book (among them attacks against...
Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in RSA cryptography. Special emp...
|
|
cena:
391,77 zł |
Elliptic Curves and Their Applications to Cryptography: An Introduction
ISBN: 9780792385899 / Angielski / Twarda / 164 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic communication, and this need, given the tremendous growth of the Internet, is likely to continue growing. Elliptic curve cryptosystems represent the state of the art for such systems.
Elliptic Curves and Their Applications to Cryptography An Introduction provides a comprehensive and self-contained introduction to elliptic curves and how they are employed to secure public key cryptosystems. Even though the... Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic...
|
|
cena:
861,93 zł |
Secure Information Networks: Communications and Multimedia Security Ifip Tc6/Tc11 Joint Working Conference on Communications and Multimedia Securit
ISBN: 9780792386001 / Angielski / Twarda / 324 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains papers presented at the fourth working conference on Communications and Multimedia Security (CMS'99), held in Leuven, Belgium from September 20-21, 1999. The Conference, arrangedjointly by Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP), was organized by the Department of Electrical Engineering of the Katholieke Universiteit Leuven. The name "Communications and Multimedia Security" was used for the first time in 1995, when Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the...
This volume contains papers presented at the fourth working conference on Communications and Multimedia Security (CMS'99), held in Leuven, Belgium fro...
|
|
cena:
783,57 zł |
Statistical Methods in Computer Security
ISBN: 9780824759391 / Angielski / Twarda / 376 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct on the Internet, considers the development of infrastructures that may prevent breaches of security and law, and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software,...
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current appl...
|
|
cena:
788,53 zł |
Cryptology: Machines, History and Methods
ISBN: 9780890063996 / Angielski / Twarda / 520 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yesterday, today and tomorrow ) culled from Cryptologia (Rose-Hulman Institute of Technology, Terre Haute, IN). The articles are divided into five sectio
The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yes...
|
|
cena:
932,66 zł |
Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26–27, 2002, Portorož, Slovenia
ISBN: 9781402072062 / Angielski / Twarda / 312 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security, trust and confidence can certainly be considered as the most important parts of the Information Society. Being protected when working, learning, shopping or doing any kind of e-commerce is of great value to citizens, students, business people, employees and employers. Commercial companies and their clients want to do business over the Internet in a secure way; business managers when having meetings by videoconferencing tools require the exchanged information to be protected; the publishing industry is concerned with the protection of copyright; hospital patients have a right to...
Security, trust and confidence can certainly be considered as the most important parts of the Information Society. Being protected when working, learn...
|
|
cena:
391,77 zł |
Artificial Intelligence and Security in Computing Systems: 9th International Conference, Acs '2002 Międzyzdroje, Poland October 23-25, 2002 Proce
ISBN: 9781402073960 / Angielski / Twarda / 302 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies:
-Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments. Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice an...
|
|
cena:
587,67 zł |