• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2739

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Cryptographic Security Architecture: Design and Verification Gutmann, Peter 9780387953878 Springer
Cryptographic Security Architecture: Design and Verification

ISBN: 9780387953878 / Angielski / Twarda / 320 str.

ISBN: 9780387953878/Angielski/Twarda/320 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peter Gutmann

A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar cryptovariables. It is the foundation for enforcing computer security policies and controls and preempting system misuse.

This book provides a comprehensive design for a portable, flexible high-security cryptographic architecture, with particular emphasis on incorporating rigorous security models and practices. "Cryptographic Security Architecture" unveils an alternative means of building a trustworthy system based on concepts...

A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar ...

cena: 403,47 zł

 Guide to Wireless Network Security John R. Vacca 9780387954257 Springer
Guide to Wireless Network Security

ISBN: 9780387954257 / Angielski / Twarda / 874 str.

ISBN: 9780387954257/Angielski/Twarda/874 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John R. Vacca

A major, comprehensive professional text/reference for designing and maintaining security and reliability. From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. Includes coverage of wireless security testing techniques and prevention techniques for intrusion (attacks). An essential resource for wireless network administrators and developers.


A major, comprehensive professional text/reference for designing and maintaining security and reliability. From basic concepts to designing princip...

cena: 605,23 zł

 The History of Information Security: A Comprehensive Handbook de Leeuw, Karl Maria Michael 9780444516084 Elsevier Science
The History of Information Security: A Comprehensive Handbook

ISBN: 9780444516084 / Angielski / Twarda / 887 str.

ISBN: 9780444516084/Angielski/Twarda/887 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jan A. Bergstra; Karl De Leeuw
Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.

The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas other...

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptogra...
cena: 895,67 zł

 Computer Security and Cryptography Alan G. Konheim 9780471947837 Wiley-Interscience
Computer Security and Cryptography

ISBN: 9780471947837 / Angielski / Twarda / 544 str.

ISBN: 9780471947837/Angielski/Twarda/544 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alan G. Konheim
Gain the skills and knowledge needed to create effective data security systems

This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems.

The author contributed to the design and analysis of the Data Encryption Standard...

Gain the skills and knowledge needed to create effective data security systems

This book updates readers with all the tools, techniques, and...

cena: 691,49 zł

 Foundations of Cryptography: Volume 1, Basic Tools Oded Goldreich 9780521035361 Cambridge University Press
Foundations of Cryptography: Volume 1, Basic Tools

ISBN: 9780521035361 / Angielski / Miękka / 396 str.

ISBN: 9780521035361/Angielski/Miękka/396 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Oded Goldreich
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. It focuses on the basic mathematical tools: computational difficulty (one-way functions), pseudorandomness and zero-knowledge proofs. Rather than describing ad-hoc approaches, this book emphasizes the clarification of fundamental concepts and the demonstration of the feasibility of solving...
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. This book prese...
cena: 320,12 zł

 Complexity and Cryptography: An Introduction John Talbot (University College London), Dominic Welsh (University of Oxford) 9780521617710 Cambridge University Press
Complexity and Cryptography: An Introduction

ISBN: 9780521617710 / Angielski / Miękka / 304 str.

ISBN: 9780521617710/Angielski/Miękka/304 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
John Talbot (University College London);Dominic Welsh (University of Oxford)
Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and web-based business processes. Understanding the principles on which it is based is an important topic that requires a knowledge of both computational complexity and a range of topics in pure mathematics. This book provides that knowledge, combining an informal style with strong proofs of the key results to provide an accessible introduction. It includes many examples and exercises, and is based on a highly successful course developed and taught over many years.
Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and web-based business processes. Und...
cena: 352,67 zł

 Protecting Information: From Classical Error Correction to Quantum Cryptography Loepp, Susan 9780521827409 Cambridge University Press
Protecting Information: From Classical Error Correction to Quantum Cryptography

ISBN: 9780521827409 / Angielski / Twarda / 304 str.

ISBN: 9780521827409/Angielski/Twarda/304 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Susan Loepp; William Wootters
For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum computing, thus providing a context in which ideas from mathematics and physics meet. By covering such topics as Shor's quantum factoring algorithm, this text informs the reader about current thinking in quantum information theory and encourages an appreciation of the connections between mathematics and science. Of particular interest are the...
For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error ...
cena: 407,51 zł

 Pseudorandomness &Amp; Cryptographic Applications Luby, Michael 9780691025469 Princeton University Press
Pseudorandomness &Amp; Cryptographic Applications

ISBN: 9780691025469 / Angielski / Miękka / 248 str.

ISBN: 9780691025469/Angielski/Miękka/248 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michael Luby;Luby

A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that "looks" just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construction of a private key cryptosystem that is secure against chosen plaintext attack.


There do not seem to be natural examples of functions that are pseudorandom generators. On the other hand, there do seem to be a variety of natural examples of another basic primitive: the one-way function. A function is one-way if it is easy to...

A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that "looks" just like a ran...

cena: 447,84 zł

 Spatial and Temporal Reasoning Loiviero Stock Oliviero Stock O. Stock 9780792346449 Springer
Spatial and Temporal Reasoning

ISBN: 9780792346449 / Angielski / Twarda / 394 str.

ISBN: 9780792346449/Angielski/Twarda/394 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Loiviero Stock; Oliviero Stock; O. Stock
Qualitative reasoning about space and time - a reasoning at the human level - promises to become a fundamental aspect of future systems that will accompany us in daily activity.
The aim of Spatial and Temporal Reasoning is to give a picture of current research in this area focusing on both representational and computational issues. The picture emphasizes some major lines of development in this multifaceted, constantly growing area. The material in the book also shows some common ground and a novel combination of spatial and temporal aspects of qualitative reasoning.
Part...
Qualitative reasoning about space and time - a reasoning at the human level - promises to become a fundamental aspect of future systems that will acco...
cena: 605,23 zł

 Communications and Multimedia Security Issues of the New Century: Ifip Tc6 / Tc11 Fifth Joint Working Conference on Communications and Multimedia Secu Steinmetz, Ralf 9780792373650 Springer
Communications and Multimedia Security Issues of the New Century: Ifip Tc6 / Tc11 Fifth Joint Working Conference on Communications and Multimedia Secu

ISBN: 9780792373650 / Angielski / Twarda / 432 str.

ISBN: 9780792373650/Angielski/Twarda/432 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ralf Steinmetz; Ralf Steinmetz; Jana Dittmann
The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany. The conference is arranged jointly by the Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP) The name "Communications and Multimedia Security" was first used in 1995, Reinhard Posch organized the first in this series of...
The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001...
cena: 806,99 zł

 Trusted Information: The New Decade Challenge Dupuy, Michel 9780792373896 Kluwer Academic Publishers
Trusted Information: The New Decade Challenge

ISBN: 9780792373896 / Angielski / Twarda / 490 str.

ISBN: 9780792373896/Angielski/Twarda/490 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Michel Dupuy; Michel Dupuy; Michel Dupuy
Since the early eighties IFIP/Sec has been an important rendezvous for Information Technology researchers and specialists involved in all aspects of IT security. The explosive growth of the Web is now faced with the formidable challenge of providing trusted information. IFIP/Sec'01 is the first of this decade (and century) and it will be devoted to "Trusted Information - the New Decade Challenge" This proceedings are divided in eleven parts related to the conference program. Session are dedicated to technologies: Security Protocols, Smart Card, Network Security and Intrusion Detection,...
Since the early eighties IFIP/Sec has been an important rendezvous for Information Technology researchers and specialists involved in all aspects of I...
cena: 806,99 zł

 Recent Advances in Rsa Cryptography Katzenbeisser, Stefan 9780792374381 Kluwer Academic Publishers
Recent Advances in Rsa Cryptography

ISBN: 9780792374381 / Angielski / Twarda / 140 str.

ISBN: 9780792374381/Angielski/Twarda/140 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stefan Katzenbeisser
Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in RSA cryptography. Special emphasis is laid on the description and analysis of proposed attacks against the RSA cryptosystem. The first chapters introduce the necessary background information on number theory, complexity and public key cryptography. Subsequent chapters review factorization algorithms and specific properties that make RSA attractive for cryptographers. Most recent attacks against RSA are discussed in the third part of the book (among them attacks against...
Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in RSA cryptography. Special emp...
cena: 403,47 zł

 Elliptic Curves and Their Applications to Cryptography: An Introduction Enge, Andreas 9780792385899 Springer
Elliptic Curves and Their Applications to Cryptography: An Introduction

ISBN: 9780792385899 / Angielski / Twarda / 164 str.

ISBN: 9780792385899/Angielski/Twarda/164 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andreas Enge
Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic communication, and this need, given the tremendous growth of the Internet, is likely to continue growing. Elliptic curve cryptosystems represent the state of the art for such systems.
Elliptic Curves and Their Applications to Cryptography An Introduction provides a comprehensive and self-contained introduction to elliptic curves and how they are employed to secure public key cryptosystems. Even though the...
Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic...
cena: 887,69 zł

 Secure Information Networks: Communications and Multimedia Security Ifip Tc6/Tc11 Joint Working Conference on Communications and Multimedia Securit Preneel, Bart 9780792386001 Springer
Secure Information Networks: Communications and Multimedia Security Ifip Tc6/Tc11 Joint Working Conference on Communications and Multimedia Securit

ISBN: 9780792386001 / Angielski / Twarda / 324 str.

ISBN: 9780792386001/Angielski/Twarda/324 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bart Preneel
This volume contains papers presented at the fourth working conference on Communications and Multimedia Security (CMS'99), held in Leuven, Belgium from September 20-21, 1999. The Conference, arrangedjointly by Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP), was organized by the Department of Electrical Engineering of the Katholieke Universiteit Leuven. The name "Communications and Multimedia Security" was used for the first time in 1995, when Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the...
This volume contains papers presented at the fourth working conference on Communications and Multimedia Security (CMS'99), held in Leuven, Belgium fro...
cena: 806,99 zł

 Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial Van Tilborg, Henk C. a. 9780792386759 Kluwer Academic Publishers
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial

ISBN: 9780792386759 / Angielski / Mixed media product / 492 str.

ISBN: 9780792386759/Angielski/Mixed media product/492 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Henk C. a. Van Tilborg; Henk C. a. Van Tilborg
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable for these threats. Also, new issues have come up that were not relevant before, e. g. how to add a (digital) signature to an electronic document in such a way that the signer can not deny later on that the document was signed by him/her. Cryptology addresses the above issues. It is at the foundation of all information security. The techniques...
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern c...
cena: 201,72 zł

 Statistical Methods in Computer Security Chen                                     William W. S. Chen Chen W. S. Chen 9780824759391 CRC
Statistical Methods in Computer Security

ISBN: 9780824759391 / Angielski / Twarda / 376 str.

ISBN: 9780824759391/Angielski/Twarda/376 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chen; William W. S. Chen; Chen W. S. Chen
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct on the Internet, considers the development of infrastructures that may prevent breaches of security and law, and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software,...
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current appl...
cena: 778,85 zł

 Cryptology: Machines, History and Methods B. Winkel, etc. 9780890063996 Artech House Publishers
Cryptology: Machines, History and Methods

ISBN: 9780890063996 / Angielski / Twarda / 520 str.

ISBN: 9780890063996/Angielski/Twarda/520 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
B. Winkel;etc.
The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yesterday, today and tomorrow ) culled from Cryptologia (Rose-Hulman Institute of Technology, Terre Haute, IN). The articles are divided into five sectio
The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yes...
cena: 818,60 zł

 Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26–27, 2002, Portorož, Slovenia Borka Jerman-Blazic, Tomaz Klobucar 9781402072062 Springer-Verlag New York Inc.
Advanced Communications and Multimedia Security: IFIP TC6 / TC11 Sixth Joint Working Conference on Communications and Multimedia Security September 26–27, 2002, Portorož, Slovenia

ISBN: 9781402072062 / Angielski / Twarda / 312 str.

ISBN: 9781402072062/Angielski/Twarda/312 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Borka Jerman-Blazic;Tomaz Klobucar
Security, trust and confidence can certainly be considered as the most important parts of the Information Society. Being protected when working, learning, shopping or doing any kind of e-commerce is of great value to citizens, students, business people, employees and employers. Commercial companies and their clients want to do business over the Internet in a secure way; business managers when having meetings by videoconferencing tools require the exchanged information to be protected; the publishing industry is concerned with the protection of copyright; hospital patients have a right to...
Security, trust and confidence can certainly be considered as the most important parts of the Information Society. Being protected when working, learn...
cena: 403,47 zł

 Artificial Intelligence and Security in Computing Systems: 9th International Conference, Acs '2002 Międzyzdroje, Poland October 23-25, 2002 Proce Soldek, Jerzy 9781402073960 Kluwer Academic Publishers
Artificial Intelligence and Security in Computing Systems: 9th International Conference, Acs '2002 Międzyzdroje, Poland October 23-25, 2002 Proce

ISBN: 9781402073960 / Angielski / Twarda / 302 str.

ISBN: 9781402073960/Angielski/Twarda/302 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jerzy Soldek; Leszek Drobiazgiewicz; Jerzy Soldek
Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies:

-Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments.
-Multiagent Systems include laboratory research on multiagent intelligent systems as well as upon their applications in transportation and information systems.
-Computer Security and Safety...

Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice an...
cena: 605,23 zł

 Intrusion Detection in Distributed Systems: An Abstraction-Based Approach Peng Ning 9781402076244 Springer
Intrusion Detection in Distributed Systems: An Abstraction-Based Approach

ISBN: 9781402076244 / Angielski / Twarda / 136 str.

ISBN: 9781402076244/Angielski/Twarda/136 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Peng Ning; Ning Peng Ning; Xiaoyang Sean Wang
Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.
Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect...
cena: 201,72 zł

Pierwsza Podprzednia  1  2  3  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia