• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [3082669]
• Literatura piękna
 [1815279]

  więcej...
• Turystyka
 [52558]
• Informatyka
 [156281]
• Komiksy
 [36475]
• Encyklopedie
 [23167]
• Dziecięca
 [613277]
• Hobby
 [105022]
• AudioBooki
 [1527]
• Literatura faktu
 [194886]
• Muzyka CD
 [275]
• Słowniki
 [2945]
• Inne
 [440204]
• Kalendarze
 [541]
• Podręczniki
 [165980]
• Poradniki
 [422905]
• Religia
 [509675]
• Czasopisma
 [473]
• Sport
 [61151]
• Sztuka
 [248589]
• CD, DVD, Video
 [3353]
• Technologie
 [230496]
• Zdrowie
 [98648]
• Książkowe Klimaty
 [126]
• Zabawki
 [2521]
• Puzzle, gry
 [3467]
• Literatura w języku ukraińskim
 [276]
• Art. papiernicze i szkolne
 [6689]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2830

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


Cryptography: Infosec Pro Guide Oriyano, Sean-Philip 9780071794251 0
Cryptography: Infosec Pro Guide

ISBN: 9780071794251 / Angielski / Miękka / 320 str.

ISBN: 9780071794251/Angielski/Miękka/320 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sean Philip Oriyano
Security Smarts for the Self-Guided IT Professional

This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics such as ciphers, algorithms and key exchange, to practical applications such as digital signatures and certificates, the book delivers...

Security Smarts for the Self-Guided IT Professional

This complete, practical resource for security and IT professionals presents the underpinnings ...

cena: 154,56

Implementing SSL / TLS Using Cryptography and PKI Joshua Davies 9780470920411 John Wiley & Sons Inc
Implementing SSL / TLS Using Cryptography and PKI

ISBN: 9780470920411 / Angielski / Miękka / 704 str.

ISBN: 9780470920411/Angielski/Miękka/704 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Joshua Davies
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security

If you are a network professional who knows C programming, this practical book is for you. Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you have a working knowledge of cryptography. The book covers SSLv2, TLS 1.0, and TLS 1.2, including implementations of the relevant cryptographic protocols, secure hashing, certificate parsing, certificate generation, and more.

Coverage includes:

...
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security

If you are a network professional who knows C programming, th...

cena: 243,43

Foundations of Cryptography: Volume 2, Basic Applications Oded Goldreich 9780521119917 0
Foundations of Cryptography: Volume 2, Basic Applications

ISBN: 9780521119917 / Angielski / Miękka / 452 str.

ISBN: 9780521119917/Angielski/Miękka/452 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Oded Goldreich
Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Building on the basic tools presented in the first volume, this second volume of Foundations of Cryptography contains a rigorous and systematic treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the...
Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of ...
cena: 349,46

Cryptography for Dummies Cobb, Chey 9780764541889 0
Cryptography for Dummies

ISBN: 9780764541889 / Angielski / Miękka / 336 str.

ISBN: 9780764541889/Angielski/Miękka/336 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Chey Cobb
  • Cryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping, stock trading, and banking
  • This invaluable introduction to the basics of encryption covers everything from the terminology used in the field to specific technologies to the pros and cons of different implementations
  • Discusses specific technologies that incorporate cryptography in their design, such as authentication methods, wireless encryption, e-commerce, and smart cards
  • Based entirely on real-world issues and situations, the...
  • Cryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping, stock trad...
cena: 147,48

Communication System Security Lidong Chen 9781439840368 0
Communication System Security

ISBN: 9781439840368 / Angielski / Twarda / 750 str.

ISBN: 9781439840368/Angielski/Twarda/750 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lidong Chen

Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design.

Divided into four parts, the book begins with the necessary background on practical cryptography primitives. This part describes pseudorandom sequence generators, stream and block ciphers, hash functions, and public-key cryptographic algorithms.

...

Helping current and future system designers take a more productive approach in the field, Communication System Security shows how ...

cena: 983,54

Computer Security Literacy: Staying Safe in a Digital World Jacobson, Douglas 9781439856185 0
Computer Security Literacy: Staying Safe in a Digital World

ISBN: 9781439856185 / Angielski / Miękka / 368 str.

ISBN: 9781439856185/Angielski/Miękka/368 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Douglas Jacobson

Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital World focuses on practical security topics that users are likely to encounter on a regular basis.

Written for nontechnical readers, the book provides context to routine computing tasks so that readers better understand the...

Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or...

cena: 270,43

Introduction to Computer and Network Security: Navigating Shades of Gray Brooks, Richard R. 9781439860717 0
Introduction to Computer and Network Security: Navigating Shades of Gray

ISBN: 9781439860717 / Angielski / Twarda

ISBN: 9781439860717/Angielski/Twarda

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Richard R. Brooks

Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues

Taking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical issues related to security. Unlike most computer security books, which concentrate on software design and implementation, cryptographic tools, or networking issues, this text also explores how the interactions between hardware, software, and users affect system...

Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues

Taking an interact...

cena: 452,38

Introduction to Network Security Douglas Jacobson 9781584885436 0
Introduction to Network Security

ISBN: 9781584885436 / Angielski / Twarda / 500 str.

ISBN: 9781584885436/Angielski/Twarda/500 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Douglas Jacobson

Unlike data communications of the past, today s networks consist of numerous devices that handle the data as it passes from the sender to the receiver. However, security concerns are frequently raised in circumstances where interconnected computers use a network not controlled by any one entity or organization. Introduction to Network Security examines various network protocols, focusing on vulnerabilities, exploits, attacks, and methods to mitigate an attack.

The book begins with a brief discussion of network architectures and the functions of layers in a...

Unlike data communications of the past, today s networks consist of numerous devices that handle the data as it passes from the sender to the recei...

cena: 516,36

Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I Ran Canetti, Juan A. Garay 9783642400407 Springer-Verlag Berlin and Heidelberg GmbH &
Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I

ISBN: 9783642400407 / Angielski / Miękka / 590 str.

ISBN: 9783642400407/Angielski/Miękka/590 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ran Canetti;Juan A. Garay
The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange; multi...
The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013,...
cena: 202,66

Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II Ran Canetti, Juan A. Garay 9783642400834 Springer-Verlag Berlin and Heidelberg GmbH &
Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II

ISBN: 9783642400834 / Angielski / Miękka / 558 str.

ISBN: 9783642400834/Angielski/Miękka/558 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ran Canetti;Juan A. Garay

The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange;...

The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 20...

cena: 202,66

Location Privacy Protection in Mobile Networks Xinxin Liu Xiaolin Li 9781461490739 Springer
Location Privacy Protection in Mobile Networks

ISBN: 9781461490739 / Angielski / Miękka / 75 str.

ISBN: 9781461490739/Angielski/Miękka/75 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xinxin Liu; Xiaolin Li
This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users' privacy. The second approach considers a totally distributed environment where users...
This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes mu...
cena: 202,66

Cyber Security: Deterrence and It Protection for Critical Infrastructures Martellini, Maurizio 9783319022789 Springer
Cyber Security: Deterrence and It Protection for Critical Infrastructures

ISBN: 9783319022789 / Angielski / Miękka / 72 str.

ISBN: 9783319022789/Angielski/Miękka/72 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Maurizio Martellini
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber attacks and argues that nations are entering a new cyber arms race. The brief also provides a technical analysis of possible cyber attacks towards critical infrastructures in the chemical industry and chemical safety industry. The authors also propose modern analyses and a holistic approach to...
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods o...
cena: 202,66

Communications and Multimedia Security: 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer 9783642407789 Springer-Verlag Berlin and Heidelberg GmbH &
Communications and Multimedia Security: 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings

ISBN: 9783642407789 / Angielski / Miękka / 249 str.

ISBN: 9783642407789/Angielski/Miękka/249 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bart De Decker;Jana Dittmann;Christian Kraetzer
This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2013, held in Magdeburg, Germany, in September 2013. The 5 revised full papers presented together with 11 short papers, 5 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on biometrics; applied cryptography; digital watermarking, steganography and forensics; and social network privacy, security...
This book constitutes the refereed proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 201...
cena: 202,66

Security and the Networked Society Mark Gregory David Glance 9783319023892 Springer
Security and the Networked Society

ISBN: 9783319023892 / Angielski / Twarda / 297 str.

ISBN: 9783319023892/Angielski/Twarda/297 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mark Gregory; David Glance
This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information privacy. This book traces the rise into prominence of these issues while also exploring the resulting cultural reaction. The authors' analysis forms the basis of a discussion on future technological directions and their potential impact on society....
This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, a...
cena: 202,66

Security and Trust Management: 9th International Workshop, STM 2013, Egham, Uk, September 12-13, 2013, Proceedings Accorsi, Rafael 9783642410970 Springer
Security and Trust Management: 9th International Workshop, STM 2013, Egham, Uk, September 12-13, 2013, Proceedings

ISBN: 9783642410970 / Angielski / Miękka / 235 str.

ISBN: 9783642410970/Angielski/Miękka/235 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Rafael Accorsi; Silvio Ranise
This book constitutes the refereed proceedings of the 9th International Workshop on Security and Trust Management, STM 2013, held in Egham, UK, in September 2013 - in conjunction with the 18th European Symposium Research in Computer Security (ESORICS 2013). The 15 revised full papers including two invited talks were carefully reviewed and selected from 47 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.
This book constitutes the refereed proceedings of the 9th International Workshop on Security and Trust Management, STM 2013, held in Egham, UK, in Sep...
cena: 186,49

Lightweight Cryptography for Security and Privacy: 2nd International Workshop, Lightsec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers Avoine, Gildas 9783642403910 Springer
Lightweight Cryptography for Security and Privacy: 2nd International Workshop, Lightsec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers

ISBN: 9783642403910 / Angielski / Miękka / 143 str.

ISBN: 9783642403910/Angielski/Miękka/143 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gildas Avoine; Orhun Kara
This book constitutes the proceedings of the 2th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2013, held in Gebze, Turkey, during May 6-7, 2013. The 10 full papers presented together with 3 invited talks were carefully reviewed and selected from 27 submissions. The papers are grouped in topical sections on efficient Implementations and designs, block cipher cryptanalysis, wireless sensor networks, and cryptographic protocols.
This book constitutes the proceedings of the 2th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2013, held in G...
cena: 186,49

Advances in Digital Forensics IX: 9th Ifip Wg 11.9 International Conference on Digital Forensics, Orlando, Fl, Usa, January 28-30, 2013, Revised Selec Peterson, Gilbert 9783642411472 Springer
Advances in Digital Forensics IX: 9th Ifip Wg 11.9 International Conference on Digital Forensics, Orlando, Fl, Usa, January 28-30, 2013, Revised Selec

ISBN: 9783642411472 / Angielski / Twarda / 398 str.

ISBN: 9783642411472/Angielski/Twarda/398 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Gilbert Peterson; Sujeet Shenoi
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance - investigations of security...
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wirele...
cena: 405,36

Trustworthy Global Computing: 7th International Symposium, Tgc 2012, Newcastle Upon Tyne, Uk, September 7-8, 2012, Revised Selected Papers Palamidessi, Catuscia 9783642411564 Springer
Trustworthy Global Computing: 7th International Symposium, Tgc 2012, Newcastle Upon Tyne, Uk, September 7-8, 2012, Revised Selected Papers

ISBN: 9783642411564 / Angielski / Miękka / 213 str.

ISBN: 9783642411564/Angielski/Miękka/213 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Catuscia Palamidessi; Mark D. Ryan
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Symposium on Trustworthy Global Computing, TGC 2012, held in Newcastle upon Tyne, UK, in September 2012. The 9 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 14 submissions. The papers cover a wide range of topics in the area of global computing and reliable computation in the so-called global computers, i.e., those computational abstractions emerging in large-scale infrastructures such as service-oriented architectures, autonomic systems...
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Symposium on Trustworthy Global Computing, TGC 2012...
cena: 186,49

Security, Privacy, and Applied Cryptography Engineering: Third International Conference, Space 2013, Kharagpur, India, October 19-23, 2013, Proceeding Gierlichs, Benedikt 9783642412233 Springer
Security, Privacy, and Applied Cryptography Engineering: Third International Conference, Space 2013, Kharagpur, India, October 19-23, 2013, Proceeding

ISBN: 9783642412233 / Angielski / Miękka / 191 str.

ISBN: 9783642412233/Angielski/Miękka/191 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Benedikt Gierlichs; Sylvain Guilley; Debdeep Mukhopadhyay
This book constitutes the refereed proceedings of the Third International Conference on Security, Privacy and Applied Cryptography Engineering held in Kharagpur, India, in October 2013. The 12 papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections on implementations and protocols, side channel attacks and countermeasures, identity-based identification schemes, and signatures.
This book constitutes the refereed proceedings of the Third International Conference on Security, Privacy and Applied Cryptography Engineering held in...
cena: 186,49

Provable Security: 7th International Conference, Provsec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings Susilo, Willy 9783642412264 Springer
Provable Security: 7th International Conference, Provsec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings

ISBN: 9783642412264 / Angielski / Miękka / 347 str.

ISBN: 9783642412264/Angielski/Miękka/347 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Willy Susilo; Reza Reyhanitabar
This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption.
This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in Oc...
cena: 202,66

Pierwsza Podprzednia  22  23  24  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia