• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2953408]
• Literatura piękna
 [1818674]

  więcej...
• Turystyka
 [70115]
• Informatyka
 [151610]
• Komiksy
 [36466]
• Encyklopedie
 [23169]
• Dziecięca
 [612210]
• Hobby
 [135681]
• AudioBooki
 [1806]
• Literatura faktu
 [226254]
• Muzyka CD
 [391]
• Słowniki
 [2978]
• Inne
 [449189]
• Kalendarze
 [1375]
• Podręczniki
 [166538]
• Poradniki
 [469635]
• Religia
 [508779]
• Czasopisma
 [523]
• Sport
 [61275]
• Sztuka
 [243340]
• CD, DVD, Video
 [3479]
• Technologie
 [219064]
• Zdrowie
 [98975]
• Książkowe Klimaty
 [124]
• Zabawki
 [2531]
• Puzzle, gry
 [3670]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8134]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2777

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selec Chow, Kam-Pui 9783642155055 Not Avail
Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selec

ISBN: 9783642155055 / Angielski / Twarda / 311 str.

ISBN: 9783642155055/Angielski/Twarda/311 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kam-Pui Chow; Sujeet Shenoi
Advances in Digital Forensics VI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Internet Crime Investigations, Live Forensics, Advanced Forensic Techniques, and Forensic Tools. This book is the sixth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital...
Advances in Digital Forensics VI describes original research results and innovative applications in the discipline of digital forensics. In addition, ...
cena: 203,61

 Quantum Attacks on Public-Key Cryptosystems Song Y. Yan 9781441977212 Not Avail
Quantum Attacks on Public-Key Cryptosystems

ISBN: 9781441977212 / Angielski / Twarda / 207 str.

ISBN: 9781441977212/Angielski/Twarda/207 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Song Y. Yan

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.

Quantum Attacks on Public-Key Cryptosystems presemts almost all...

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm ...

cena: 407,25

 E-Government, E-Services and Global Processes: Joint IFIP TC 8 and TC 6 International Conferences, EGES 2010 and GISP 2010, Held as Part of WCC 2010, Janssen, Marijn 9783642153457 Not Avail
E-Government, E-Services and Global Processes: Joint IFIP TC 8 and TC 6 International Conferences, EGES 2010 and GISP 2010, Held as Part of WCC 2010,

ISBN: 9783642153457 / Angielski / Twarda / 258 str.

ISBN: 9783642153457/Angielski/Twarda/258 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Marijn Janssen; Winfried Lamersdorf; Jan Pries-Heje
Constitutes the refereed proceedings of the IFIP TC 8 International Conference on E-Government and E-Services, EGES 2010 and the IFIP TC 8 International Conference on Global Information Systems Processes, GISP 2010, held as part of the 21st World Computer Congress, WCC 2010, in Brisbane, Australia, in September 2010.
Constitutes the refereed proceedings of the IFIP TC 8 International Conference on E-Government and E-Services, EGES 2010 and the IFIP TC 8 Internation...
cena: 203,61

 Guide to Elliptic Curve Cryptography Darrel Hankerson Alfred J. Menezes Scott Vanstone 9781441929297 Not Avail
Guide to Elliptic Curve Cryptography

ISBN: 9781441929297 / Angielski / Miękka / 312 str.

ISBN: 9781441929297/Angielski/Miękka/312 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Darrel Hankerson; Alfred J. Menezes; Scott Vanstone

After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism.

Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book...

After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and gover...

cena: 529,44

 Access Control Systems: Security, Identity Management and Trust Models Benantar, Messaoud 9781441934734 Not Avail
Access Control Systems: Security, Identity Management and Trust Models

ISBN: 9781441934734 / Angielski / Miękka / 262 str.

ISBN: 9781441934734/Angielski/Miękka/262 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Messaoud Benantar

This essential resource for professionals and advanced students in security programming and system design introduces the foundations of programming systems security and the theory behind access control models, and addresses emerging access control mechanisms.


This essential resource for professionals and advanced students in security programming and system design introduces the foundations of programming...

cena: 407,25

 Coding for Data and Computer Communications David Salomon 9781441935465 Not Avail
Coding for Data and Computer Communications

ISBN: 9781441935465 / Angielski / Miękka / 548 str.

ISBN: 9781441935465/Angielski/Miękka/548 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
David Salomon

Coding is an highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basis of coding can prevent a serious and practical understanding of this important area.

"Coding for Data and Computer Communications" eschews the complex mathematics and clearly describes the core concepts, principles, and methods of channel codes ( for error correction), source codes (for compressing data), and secure codes (for cryptography, data hiding, and privacy). Conveniently organized and segmented into three associated parts for...

Coding is an highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basi...

cena: 488,71

 Complexity Theory and Cryptology: An Introduction to Cryptocomplexity Rothe, Jörg 9783642060540 Not Avail
Complexity Theory and Cryptology: An Introduction to Cryptocomplexity

ISBN: 9783642060540 / Angielski / Miękka / 478 str.

ISBN: 9783642060540/Angielski/Miękka/478 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jorg Rothe

Modern cryptology increasingly employs mathematically rigorous concepts and methods from complexity theory. Conversely, current research topics in complexity theory are often motivated by questions and problems from cryptology. This book takes account of this situation, and therefore its subject is what may be dubbed "cryptocomplexity'', a kind of symbiosis of these two areas.

This book is written for undergraduate and graduate students of computer science, mathematics, and engineering, and can be used for courses on complexity theory and cryptology, preferably by stressing their...

Modern cryptology increasingly employs mathematically rigorous concepts and methods from complexity theory. Conversely, current research topics in ...

cena: 203,61

 Informatik: Aufgaben Und Lösungen Kastner, Wolfgang 9783211211366 Springer, Wien
Informatik: Aufgaben Und Lösungen

ISBN: 9783211211366 / Niemiecki / Miękka / 127 str.

ISBN: 9783211211366/Niemiecki/Miękka/127 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Wolfgang Kastner; Gerhard-Helge Schildt
Diese Aufgabensammlung stellt eine sinnvolle Erganzung zum Lehrbuch "Informatik" von Blieberger et al. dar, das mittlerweile in der 4. Auflage erschienen ist. Ziel der Aufgabensammlung ist es, durch das Losen von Aufgaben den angebotenen Stoff zu vertiefen und zugleich anhand der Losungen die eigene Bearbeitung zu uberprufen. Den Aufgaben und Losungen zu den einzelnen Kapiteln werden jeweils Zusammenfassungen des Stoffes vorangestellt, die das Buch auch unabhangig vom Lehrbuch verwendbar machen."
Diese Aufgabensammlung stellt eine sinnvolle Erganzung zum Lehrbuch "Informatik" von Blieberger et al. dar, das mittlerweile in der 4. Auflage erschie...
cena: 76,08

 Internet-Security Aus Software-Sicht: Grundlagen Der Software-Erstellung Für Sicherheitskritische Bereiche Kriha, Walter 9783540222231 Springer, Berlin
Internet-Security Aus Software-Sicht: Grundlagen Der Software-Erstellung Für Sicherheitskritische Bereiche

ISBN: 9783540222231 / Niemiecki / Twarda / 314 str.

ISBN: 9783540222231/Niemiecki/Twarda/314 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Walter Kriha; Roland Schmitz
Die Praxis zeigt, dass bei der Entwicklung groAer, komplexer Softwaresysteme Sicherheitsaspekte oft gar nicht oder erst sehr spAt berA1/4cksichtigt werden. IT-Security-Spezialisten werden in die Entwicklung neuer Systeme oft nicht eingebunden, und Softwareentwicklern fehlt hAufig das Bewusstsein fA1/4r Sicherheitsprobleme und die nAtigen Detailkenntnisse, vorhandene LAsungen richtig einzusetzen. Hier setzt das Buch an und schlAgt eine BrA1/4cke von der Softwaresicht zu mehr netzwerkorientierten Aspekten der Internet-Security. Ziel der Autoren ist es, bei Entwicklern und Projektleitern ein...
Die Praxis zeigt, dass bei der Entwicklung groAer, komplexer Softwaresysteme Sicherheitsaspekte oft gar nicht oder erst sehr spAt berA1/4cksichtigt we...
cena: 114,17

 Handbook of Biometrics Anil K. Jain Patrick Flynn Arun A. Ross 9781441943750 Springer
Handbook of Biometrics

ISBN: 9781441943750 / Angielski / Miękka / 556 str.

ISBN: 9781441943750/Angielski/Miękka/556 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Anil K. Jain; Patrick Flynn; Arun A. Ross

Biometric recognition, or simply Biometrics, is a rapidly evolving field with applications ranging from accessing one's computer to gaining entry into a country. Biometric systems rely on the use of physical or behavioral traits, such as fingerprints, face, voice and hand geometry, to establish the identity of an individual. The deployment of large-scale biometric systems in both commercial (e.g., grocery stores, amusement parks, airports) and government (e.g., US-VISIT) applications has served to increase the public's awareness of this technology. This rapid growth has also highlighted...

Biometric recognition, or simply Biometrics, is a rapidly evolving field with applications ranging from accessing one's computer to gaining entry i...

cena: 672,00

 Trust Management II: Proceedings of Ifiptm 2008: Joint Itrust and Pst Conferences on Privacy, Trust Management and Security, June 18-20, 20 Karabulut, Yücel 9781441934772 Springer
Trust Management II: Proceedings of Ifiptm 2008: Joint Itrust and Pst Conferences on Privacy, Trust Management and Security, June 18-20, 20

ISBN: 9781441934772 / Angielski / Miękka / 372 str.

ISBN: 9781441934772/Angielski/Miękka/372 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yucel Karabulut; John C. Mitchell; Peter Herrmann
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to June 20, 2008. IFIPTM 2008 provides a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Privacy, Security, and Trust. Following the traditions inherited from the highly successful iTrust and PST conference series, IFIPTM 2008 focuses on trust, privacy and security from multidisciplinary perspectives. The conference is an arena for discussion about re...
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trond...
cena: 407,25

 Algebraic Aspects of Cryptography Neal Koblitz 9783642083327 Springer
Algebraic Aspects of Cryptography

ISBN: 9783642083327 / Angielski / Miękka / 206 str.

ISBN: 9783642083327/Angielski/Miękka/206 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Neal Koblitz
This book is intended as a text for a course on cryptography with emphasis on algebraic methods. It is written so as to be accessible to graduate or advanced undergraduate students, as well as to scientists in other fields. The first three chapters form a self-contained introduction to basic concepts and techniques. Here my approach is intuitive and informal. For example, the treatment of computational complexity in Chapter 2, while lacking formalistic rigor, emphasizes the aspects of the subject that are most important in cryptography. Chapters 4-6 and the Appendix contain material that for...
This book is intended as a text for a course on cryptography with emphasis on algebraic methods. It is written so as to be accessible to graduate or a...
cena: 733,09

 Advances in Information Technology: 4th International Conference, IAIT 2010, Bangkok, Thailand, November 4-5, 2010, Proceedings Papasratorn, Borworn 9783642166983 Not Avail
Advances in Information Technology: 4th International Conference, IAIT 2010, Bangkok, Thailand, November 4-5, 2010, Proceedings

ISBN: 9783642166983 / Angielski / Miękka / 215 str.

ISBN: 9783642166983/Angielski/Miękka/215 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Borworn Papasratorn; Kittichai Lavangnananda; Wichian Chutimaskul
It was our intention to organize IAIT 2010 as the place where researchers and ind- trial practitioners could share their work and achievements in information technology, both theoretical and in application. This is the fourth time we have organized IAIT to serve as a venue to foster collaboration among industry and academia from different parts of the world. A lot has been achieved since the launch of the first IAIT in 2005; however, many challenges remain to be addressed in the years to come. IAIT 2010 drew attendance from leading professionals in both industry and academes, as in IAIT 2009....
It was our intention to organize IAIT 2010 as the place where researchers and ind- trial practitioners could share their work and achievements in info...
cena: 203,61

 Cryptographic Engineering Cetin Kaya Koc 9781441944177 Springer
Cryptographic Engineering

ISBN: 9781441944177 / Angielski / Miękka / 522 str.

ISBN: 9781441944177/Angielski/Miękka/522 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Cetin Kaya Koc

Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and conference articles, and authors lecture notes. This is a first attempt by top cryptographic engineers to bring this material in a book form and make it available to electrical engineering and computer science students and engineers working for the industry.

This book is intended for a graduate-level course in Cryptographic Engineering to be taught in Electrical Engineering, Computer Engineering, and Computer Science departments....

Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and...

cena: 1018,20

 Secure Multi-Party Non-Repudiation Protocols and Applications Springer 9781441945396 Springer
Secure Multi-Party Non-Repudiation Protocols and Applications

ISBN: 9781441945396 / Angielski / Miękka / 190 str.

ISBN: 9781441945396/Angielski/Miękka/190 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Springer

The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. This book is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. The book is also suitable as an advanced-level...

The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professio...

cena: 407,25

 Modern Cryptography, Probabilistic Proofs and Pseudorandomness Oded Goldreich 9783642084324 Springer
Modern Cryptography, Probabilistic Proofs and Pseudorandomness

ISBN: 9783642084324 / Angielski / Miękka / 183 str.

ISBN: 9783642084324/Angielski/Miękka/183 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Oded Goldreich
You can start by putting the DO NOT DISTURB sign. Cay, in Desert Hearts (1985). The interplay between randomness and computation is one of the most fas- cinating scientific phenomena uncovered in the last couple of decades. This interplay is at the heart of modern cryptography and plays a fundamental role in complexity theory at large. Specifically, the interplay of randomness and computation is pivotal to several intriguing notions of probabilistic proof systems and is the focal of the computational approach to randomness. This book provides an introduction to these three, somewhat...
You can start by putting the DO NOT DISTURB sign. Cay, in Desert Hearts (1985). The interplay between randomness and computation is one of the most fa...
cena: 529,44

 Number Theory for Computing Song Y. Yan M. E. Hellmann 9783642077104 Springer
Number Theory for Computing

ISBN: 9783642077104 / Angielski / Miękka / 435 str.

ISBN: 9783642077104/Angielski/Miękka/435 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Song Y. Yan; M. E. Hellmann
Modern cryptography depends heavily on number theory, with primality test ing, factoring, discrete logarithms (indices), and elliptic curves being perhaps the most prominent subject areas. Since my own graduate study had empha sized probability theory, statistics, and real analysis, when I started work ing in cryptography around 1970, I found myself swimming in an unknown, murky sea. I thus know from personal experience how inaccessible number theory can be to the uninitiated. Thank you for your efforts to case the transition for a new generation of cryptographers. Thank you also for helping...
Modern cryptography depends heavily on number theory, with primality test ing, factoring, discrete logarithms (indices), and elliptic curves being per...
cena: 232,11

 Network-Aware Security for Group Communications Yan Sun Wade Trappe K. J. Ray Liu 9781441943354 Springer
Network-Aware Security for Group Communications

ISBN: 9781441943354 / Angielski / Miękka / 304 str.

ISBN: 9781441943354/Angielski/Miękka/304 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yan Sun; Wade Trappe; K. J. Ray Liu

Group-oriented communications will play a significant role in the next generation of networks as many services, such as pay-per-view media broadcasts and the delivery of network control messages, will rely upon the ability to reliably deliver data simultaneously to a large group of users. As these networks become increasingly pervasive and these multi-user services become increasingly ubiquitous, it will become essential that a complementary suite of security solutions are deployed in order to protect these services from a broad spectrum of security threats that are unique to group...

Group-oriented communications will play a significant role in the next generation of networks as many services, such as pay-per-view media broadcas...

cena: 407,25

 Cyber Crime and the Victimization of Women: Laws, Rights and Regulations Halder, Debarati 9781609608309 Information Science Publishing
Cyber Crime and the Victimization of Women: Laws, Rights and Regulations

ISBN: 9781609608309 / Angielski / Twarda / 280 str.

ISBN: 9781609608309/Angielski/Twarda/280 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Debarati Halder; K. Jaishankar
Cyber Crime and the Victimization of Women: Laws, Rights and Regulations is a unique and important contribution to the literature on cyber crime. It explores gendered dimensions of cyber crimes like adult bullying, cyber stalking, hacking, defamation, morphed pornographic images, and electronic blackmailing. These and other tactics designed to inflict intimidation, control, and other harms are frequently committed by perpetrators who, for many reasons, are unlikely to be identified or punished. Scholars, researchers, law makers, and ordinary women and their supporters will gain a better...
Cyber Crime and the Victimization of Women: Laws, Rights and Regulations is a unique and important contribution to the literature on cyber crime. It e...
cena: 1005,14

 Identity-Based Encryption Sanjit Chatterjee Palash Sarkar 9781441993823 Not Avail
Identity-Based Encryption

ISBN: 9781441993823 / Angielski / Twarda / 180 str.

ISBN: 9781441993823/Angielski/Twarda/180 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sanjit Chatterjee; Palash Sarkar

Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find...

Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption ...

cena: 407,25

Pierwsza Podprzednia  121  122  123  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia