![]() |
Advances in Digital Forensics: Ifip International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 1
ISBN: 9780387300122 / Angielski / Twarda / 313 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance - investigations of security... Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wir... |
cena:
407,25 |
![]() |
Securing Biometrics Applications
ISBN: 9780387699325 / Angielski / Twarda / 190 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Biometrics is becoming increasingly common in establishments that require high security such as state security and financial sectors. The increased threat to national security by terrorists has led to the explosive popularity of biometrics. A number of biometric devices are now available to capture biometric measurements such as fingerprints, palm, retinal scans, keystroke, voice recognition and facial scanning. However, the accuracy of these measurements varies, which has a direct relevance on the levels of security they offer. With the need to combat the problems related to identify... Biometrics is becoming increasingly common in establishments that require high security such as state security and financial sectors. The increased... |
cena:
407,25 |
![]() |
Handbook of Biometrics
ISBN: 9780387710402 / Angielski / Twarda / 568 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Biometric recognition, or simply Biometrics, is a rapidly evolving field with applications ranging from accessing one's computer to gaining entry into a country. Biometric systems rely on the use of physical or behavioral traits, such as fingerprints, face, voice and hand geometry, to establish the identity of an individual. The deployment of large-scale biometric systems in both commercial (e.g., grocery stores, amusement parks, airports) and government (e.g., US-VISIT) applications has served to increase the public's awareness of this technology. This rapid growth has also highlighted... Biometric recognition, or simply Biometrics, is a rapidly evolving field with applications ranging from accessing one's computer to gaining entry i... |
cena:
936,74 |
![]() |
A Guide to Data Compression Methods [With CD-ROM]
ISBN: 9780387952604 / Angielski / Miękka / 295 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In 1829, Louis Braille, a young organist in a Paris church, blind since age 3, invented the well-known code for the blind, still in common use today all over the world and named after him. Braille himself modified his code in 1834, and there have been several modifications since. However, the basic design of this code, where each character is represented by a group of 3 x 2 dots, has remained intact. The dots are embossed on thick paper and each can be raised or flat (i. e., present or absent). Each dot is therefore equivalent to one bit of information. As a result, the Braille code (Figure...
In 1829, Louis Braille, a young organist in a Paris church, blind since age 3, invented the well-known code for the blind, still in common use today a...
|
cena:
203,61 |
![]() |
Biometric Solutions: For Authentication in an E-World
ISBN: 9781402071423 / Angielski / Twarda / 451 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In today's complex, geographically mobile, electronically wired information society, the problem of identifying a person continues to pose a great challenge. Since the conventional technology of using a Personal Identification Number (PIN) or password hardly meets the requirements of an authentication system, biometric-based authentication is emerging as the most reliable method.
Biometric Solutions for Authentication in an E-World provides a collection of sixteen chapters containing tutorial articles and new material in a unified manner. This includes the basic concepts,... In today's complex, geographically mobile, electronically wired information society, the problem of identifying a person continues to pose a great cha...
|
cena:
610,90 |
![]() |
Information Assurance: Security in the Information Environment
ISBN: 9781846282669 / Angielski / Miękka / 264 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. When you first hear the term information assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it. In truth, this is the Holy Grail that all organisations that value their information should strive to achieve, but which few even understand. Information assurance is a term that has recently come into common use. When talking with old timers in IT (or at least those that are over 35-year old), you will hear them talking about information security, a term that...
When you first hear the term information assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to pr...
|
cena:
692,36 |
![]() |
Variable-Length Codes for Data Compression
ISBN: 9781846289583 / Angielski / Miękka / 196 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Most data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there are a large number of less-known codes that have useful properties and these can be useful. This book brings this large set of codes to the attention of workers in the field and for students of computer science. The author s crystal clear style of writing and presentation allows easy access to the topic."
Most data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there are a large number of less... |
cena:
203,61 |
![]() |
Sequences and Their Applications - Seta 2004: Third International Conference, Seoul, Korea, October 24-28, 2004, Revised Selected Papers
ISBN: 9783540260844 / Angielski / Miękka / 451 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the Third International Conference on Sequences and Their Applications, SETA 2004, held in Seoul, Korea in October 2004. The 30 revised full papers presented together with 4 invited survey articles were carefully selected during two rounds of reviewing and improvement from initially 59 submissions. The papers are organized in topical sections on complexity of sequences, perfect sequences, sequence construction, sequences modulo z, sequence generator properties and applications, multi-dimensional sequences, optics and OFDM... This book constitutes the thoroughly refereed post-proceedings of the Third International Conference on Sequences and Their Applications, SETA 2004... |
cena:
203,61 |
![]() |
Information Hiding: 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers
ISBN: 9783540290391 / Angielski / Miękka / 420 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-proceedings of the7th International Workshop on Information Hiding, IH 2005, held in Barcelona, Spain in June 2005. The 28 revised full papers presented together with an invited talk were This book constitutes the thoroughly refereed post-proceedings of the7th International Workshop on Information Hiding, IH 2005, held in Barcelona, ... |
cena:
203,61 |
![]() |
Smart Card Application Development Using Java
ISBN: 9783540432029 / Angielski / Miękka / 305 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Smart cards play an increasingly important role in everyday life. We encounter them as credit cards, loyalty cards, electronic purses, health cards, ands as secure tokens for authentication or digital signatures. Their small size and the compatibility of their form with the magnetic stripe card make them ideal carriers of personal information such as secret keys, passwords, customization profiles, and medical emergency information. This book provides a guide for the rapid development of smart card applications using Java and the OpenCard Framework. It gives you the basic information you need...
Smart cards play an increasingly important role in everyday life. We encounter them as credit cards, loyalty cards, electronic purses, health cards, a...
|
cena:
407,25 |
![]() |
Advances in Information and Computer Security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings
ISBN: 9783540476993 / Angielski / Miękka / 438 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ItwasourpleasuretoholdtheInternationalWorkshoponSecurity2006(IWSEC 2006) this year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series. The workshop was our ?rst trial in that two major academic society groups on security in Japan, viz. ISEC and CSEC, jointly organized it; ISEC is a te- nical group on information security of the Institute of Electronics, Information and Communication Engineers (IEICE), and CSEC is a special interest group on computer security of the Information Processing Society of Japan (IPSJ). It was Ryoichi Sasaki, the...
ItwasourpleasuretoholdtheInternationalWorkshoponSecurity2006(IWSEC 2006) this year in Kyoto and to publish the proceedings as a volume of the Lecture ...
|
cena:
203,61 |
![]() |
Smart Card. Research and Applications: Third International Conference, Cardis'98 Louvain-La-Neuve, Belgium, September 14-16, 1998 Proceedings
ISBN: 9783540679233 / Angielski / Miękka / 379 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Smart cards have been driven by the need for a secure, portable, computing platform. Hence it is no surprise that security considerations dominated their research. The CARDIS conferences were created to provide a forum for this research. CARDIS 1998 is the third international conference on Smart Card Research and Advanced Applications, held in Louvain-la-Neuve, Belgium, 14-16 Sept- ber 1998. The ?rst CARDIS was held in Lille, France in November 1994, and the second was held in Amsterdam, The Netherlands in September 1996. The fourth CARDIS is scheduled to take place in Bristol, UK in...
Smart cards have been driven by the need for a secure, portable, computing platform. Hence it is no surprise that security considerations dominated th...
|
cena:
203,61 |
![]() |
Random Curves: Journeys of a Mathematician
ISBN: 9783540740773 / Angielski / Twarda / 392 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Neal Koblitz is a co-inventor of one of the two most popular forms of encryption and digital signature, and his autobiographical memoirs are collected in this volume. Besides his own personal career in mathematics and cryptography, Koblitz details his travels to the Soviet Union, Latin America, Vietnam and elsewhere; political activism; and academic controversies relating to math education, the C. P. Snow "two-culture" problem, and mistreatment of women in academia. These engaging stories fully capture the experiences of a student and later a scientist caught up in the tumultuous events of... Neal Koblitz is a co-inventor of one of the two most popular forms of encryption and digital signature, and his autobiographical memoirs are collec... |
cena:
447,98 |
![]() |
RFID Security: Techniques, Protocols and System-On-Chip Design
ISBN: 9780387764801 / Angielski / Twarda / 446 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardware implementations for cryptography algorithms and security techniques in RFID. The volume is structured in three parts. Part 1 deals with RFID fundamentals, including system architectures and applications. Part 2 addresses RFID security protocols and techniques with a comprehensive collection of the recent state-of-art protocols and techniques to secure RFID avoiding all potential security forces and cracks. Finally, the book discusses hardware... RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security theories and protocols, and hardwa... |
cena:
610,90 |
![]() |
Advances in Cryptology - Crypto 2007: 27th Annual International Cryptology Conference, Santa Barbara, Ca, Usa, August 19-23, 2007, Proceedings
ISBN: 9783540741428 / Angielski / Miękka / 650 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the refereed proceedings of the 27th Annual International Cryptology Conference held in Santa Barbara, California, in August 2007. Thirty-three full papers are presented along with one important invited lecture. The papers address current foundational, theoretical, and research aspects of cryptology, cryptography, and cryptanalysis. In addition, readers will discover many advanced and emerging applications. This volume constitutes the refereed proceedings of the 27th Annual International Cryptology Conference held in Santa Barbara, California, in Augus... |
cena:
407,25 |
![]() |
Automata, Languages and Programming: 22nd International Colloquium, Icalp 95, Szeged, Hungary, July 10 - 14, 1995. Proceedings
ISBN: 9783540600848 / Angielski / Miękka / 692 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the proceedings of the 22nd Interna- tional Colloquium on Automata, Languages, and Programming, held under the sponsorship of EATCS in Szeged, Hungary in July 1995.
The volume presents four invited papers and 53 full revised research papers selected from a total of 111 submissions. ICALP traditionally covers the whole area of theoretical computer science; among the topics addressed in the volume are concurrency, automata, formal languages, algorithms, communication protocols, computational complexity, computability, foundations of programming, learning and coding,... This volume constitutes the proceedings of the 22nd Interna- tional Colloquium on Automata, Languages, and Programming, held under the sponsorship of ...
|
cena:
407,25 |
![]() |
Secure Networking - Cqre (Secure) '99: International Exhibition and Congress Düsseldorf, Germany, November 30 - December 2, 1999, Proceedings
ISBN: 9783540668008 / Angielski / Miękka / 266 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The CQRE Secure] conference provides a new international forum giving a close-up view on information security in the context of rapidly evolving economic processes. The unprecedented reliance on computer technology has transformed the previous technical side-issue "information security" to a management problem requiring decisions of strategic importance. Thus one of the main goals of the conference is to provide a platform for both technical specialists as well as decision makers from government, industry, commercial, and academic communities. The target of CQRE is to promote and stimulate...
The CQRE Secure] conference provides a new international forum giving a close-up view on information security in the context of rapidly evolving econ...
|
cena:
203,61 |
![]() |
Eurocode '90: International Symposium on Coding Theory and Applications, Udine, Italy, November 5-9, 1990. Proceedings
ISBN: 9783540543039 / Angielski / Miękka / 396 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents a selection of the papers presented at EUROCODE '90, the symposium on coding theory held in Udine, Italy, November 1990. It gives the state of the art on coding in Europe and ranges from theoretical top- ics like algebraic geometry and combinatorial coding to applications like modulation, real-space decoding and VLSI implementation. The book is divided into eight sections: - Algebraic codes - Combinatorial codes - Geometric codes - Protection of information - Convolutional codes - Information theory - Modulation - Applications of coding. Five of the sections are introduced...
This book presents a selection of the papers presented at EUROCODE '90, the symposium on coding theory held in Udine, Italy, November 1990. It gives t...
|
cena:
203,61 |
![]() |
Emerging Directions in Embedded and Ubiquitous Computing: Euc 2007 Workshops: Trust, Wsoc, Ncus, Uuwsn, Usn, Eso, and Secubiq, Taipei, Taiwan, Decembe
ISBN: 9783540770893 / Angielski / Miękka / 866 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the EUC 2007 workshops held in conjunction with the IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2007, in Taipei, Taiwan, in December 2007. The 69 revised full papers presented together with four invited papers were carefully reviewed and selected from about 200 submissions to the seven workshops. A broad range of topics are covered. This book constitutes the refereed proceedings of the EUC 2007 workshops held in conjunction with the IFIP International Conference on Embedded and... |
cena:
407,25 |
![]() |
Fast Software Encryption: 9th International Workshop, Fse 2002, Leuven, Belgium, February 4-6, 2002. Revised Papers
ISBN: 9783540440093 / Angielski / Miękka / 284 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This Fast Software Encryption workshop was the ninth in a series of workshops started in Cambridge in December 1993. The previous workshop took place in YokohamainApril2001.Itconcentratedonallaspectsoffastprimitivesfor symmetric cryptography: secret key ciphers, the design and cryptanalysis of block and stream ciphers, as well as hash functions and message authentication codes (MACs). The ninth Fast Software Encryption workshop was held in February 2002 in Leuven, Belgium and was organized by General Chair Matt Landrock (Cryp- mathic Belgium), in cooperation with the research group COSIC of...
This Fast Software Encryption workshop was the ninth in a series of workshops started in Cambridge in December 1993. The previous workshop took place ...
|
cena:
203,61 |