![]() |
Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selec
ISBN: 9783642155055 / Angielski / Twarda / 311 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Advances in Digital Forensics VI describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Internet Crime Investigations, Live Forensics, Advanced Forensic Techniques, and Forensic Tools. This book is the sixth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital...
Advances in Digital Forensics VI describes original research results and innovative applications in the discipline of digital forensics. In addition, ...
|
cena:
203,61 |
![]() |
Quantum Attacks on Public-Key Cryptosystems
ISBN: 9781441977212 / Angielski / Twarda / 207 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists. Quantum Attacks on Public-Key Cryptosystems presemts almost all... The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm ... |
cena:
407,25 |
![]() |
E-Government, E-Services and Global Processes: Joint IFIP TC 8 and TC 6 International Conferences, EGES 2010 and GISP 2010, Held as Part of WCC 2010,
ISBN: 9783642153457 / Angielski / Twarda / 258 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the IFIP TC 8 International Conference on E-Government and E-Services, EGES 2010 and the IFIP TC 8 International Conference on Global Information Systems Processes, GISP 2010, held as part of the 21st World Computer Congress, WCC 2010, in Brisbane, Australia, in September 2010.
Constitutes the refereed proceedings of the IFIP TC 8 International Conference on E-Government and E-Services, EGES 2010 and the IFIP TC 8 Internation...
|
cena:
203,61 |
![]() |
Guide to Elliptic Curve Cryptography
ISBN: 9781441929297 / Angielski / Miękka / 312 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book... After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and gover... |
cena:
529,44 |
![]() |
Access Control Systems: Security, Identity Management and Trust Models
ISBN: 9781441934734 / Angielski / Miękka / 262 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This essential resource for professionals and advanced students in security programming and system design introduces the foundations of programming systems security and the theory behind access control models, and addresses emerging access control mechanisms. This essential resource for professionals and advanced students in security programming and system design introduces the foundations of programming... |
cena:
407,25 |
![]() |
Coding for Data and Computer Communications
ISBN: 9781441935465 / Angielski / Miękka / 548 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Coding is an highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basis of coding can prevent a serious and practical understanding of this important area. "Coding for Data and Computer Communications" eschews the complex mathematics and clearly describes the core concepts, principles, and methods of channel codes ( for error correction), source codes (for compressing data), and secure codes (for cryptography, data hiding, and privacy). Conveniently organized and segmented into three associated parts for... Coding is an highly integral component of viable and efficient computer and data communications, yet the often heavy mathematics that form the basi... |
cena:
488,71 |
![]() |
Complexity Theory and Cryptology: An Introduction to Cryptocomplexity
ISBN: 9783642060540 / Angielski / Miękka / 478 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Modern cryptology increasingly employs mathematically rigorous concepts and methods from complexity theory. Conversely, current research topics in complexity theory are often motivated by questions and problems from cryptology. This book takes account of this situation, and therefore its subject is what may be dubbed "cryptocomplexity'', a kind of symbiosis of these two areas. This book is written for undergraduate and graduate students of computer science, mathematics, and engineering, and can be used for courses on complexity theory and cryptology, preferably by stressing their... Modern cryptology increasingly employs mathematically rigorous concepts and methods from complexity theory. Conversely, current research topics in ... |
cena:
203,61 |
![]() |
Informatik: Aufgaben Und Lösungen
ISBN: 9783211211366 / Niemiecki / Miękka / 127 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Diese Aufgabensammlung stellt eine sinnvolle Erganzung zum Lehrbuch "Informatik" von Blieberger et al. dar, das mittlerweile in der 4. Auflage erschienen ist. Ziel der Aufgabensammlung ist es, durch das Losen von Aufgaben den angebotenen Stoff zu vertiefen und zugleich anhand der Losungen die eigene Bearbeitung zu uberprufen. Den Aufgaben und Losungen zu den einzelnen Kapiteln werden jeweils Zusammenfassungen des Stoffes vorangestellt, die das Buch auch unabhangig vom Lehrbuch verwendbar machen."
Diese Aufgabensammlung stellt eine sinnvolle Erganzung zum Lehrbuch "Informatik" von Blieberger et al. dar, das mittlerweile in der 4. Auflage erschie...
|
cena:
76,08 |
![]() |
Internet-Security Aus Software-Sicht: Grundlagen Der Software-Erstellung Für Sicherheitskritische Bereiche
ISBN: 9783540222231 / Niemiecki / Twarda / 314 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Die Praxis zeigt, dass bei der Entwicklung groAer, komplexer Softwaresysteme Sicherheitsaspekte oft gar nicht oder erst sehr spAt berA1/4cksichtigt werden. IT-Security-Spezialisten werden in die Entwicklung neuer Systeme oft nicht eingebunden, und Softwareentwicklern fehlt hAufig das Bewusstsein fA1/4r Sicherheitsprobleme und die nAtigen Detailkenntnisse, vorhandene LAsungen richtig einzusetzen. Hier setzt das Buch an und schlAgt eine BrA1/4cke von der Softwaresicht zu mehr netzwerkorientierten Aspekten der Internet-Security. Ziel der Autoren ist es, bei Entwicklern und Projektleitern ein...
Die Praxis zeigt, dass bei der Entwicklung groAer, komplexer Softwaresysteme Sicherheitsaspekte oft gar nicht oder erst sehr spAt berA1/4cksichtigt we...
|
cena:
114,17 |
![]() |
Handbook of Biometrics
ISBN: 9781441943750 / Angielski / Miękka / 556 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Biometric recognition, or simply Biometrics, is a rapidly evolving field with applications ranging from accessing one's computer to gaining entry into a country. Biometric systems rely on the use of physical or behavioral traits, such as fingerprints, face, voice and hand geometry, to establish the identity of an individual. The deployment of large-scale biometric systems in both commercial (e.g., grocery stores, amusement parks, airports) and government (e.g., US-VISIT) applications has served to increase the public's awareness of this technology. This rapid growth has also highlighted... Biometric recognition, or simply Biometrics, is a rapidly evolving field with applications ranging from accessing one's computer to gaining entry i... |
cena:
672,00 |
![]() |
Trust Management II: Proceedings of Ifiptm 2008: Joint Itrust and Pst Conferences on Privacy, Trust Management and Security, June 18-20, 20
ISBN: 9781441934772 / Angielski / Miękka / 372 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to June 20, 2008. IFIPTM 2008 provides a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Privacy, Security, and Trust. Following the traditions inherited from the highly successful iTrust and PST conference series, IFIPTM 2008 focuses on trust, privacy and security from multidisciplinary perspectives. The conference is an arena for discussion about re...
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trond...
|
cena:
407,25 |
![]() |
Algebraic Aspects of Cryptography
ISBN: 9783642083327 / Angielski / Miękka / 206 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is intended as a text for a course on cryptography with emphasis on algebraic methods. It is written so as to be accessible to graduate or advanced undergraduate students, as well as to scientists in other fields. The first three chapters form a self-contained introduction to basic concepts and techniques. Here my approach is intuitive and informal. For example, the treatment of computational complexity in Chapter 2, while lacking formalistic rigor, emphasizes the aspects of the subject that are most important in cryptography. Chapters 4-6 and the Appendix contain material that for...
This book is intended as a text for a course on cryptography with emphasis on algebraic methods. It is written so as to be accessible to graduate or a...
|
cena:
733,09 |
![]() |
Advances in Information Technology: 4th International Conference, IAIT 2010, Bangkok, Thailand, November 4-5, 2010, Proceedings
ISBN: 9783642166983 / Angielski / Miękka / 215 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. It was our intention to organize IAIT 2010 as the place where researchers and ind- trial practitioners could share their work and achievements in information technology, both theoretical and in application. This is the fourth time we have organized IAIT to serve as a venue to foster collaboration among industry and academia from different parts of the world. A lot has been achieved since the launch of the first IAIT in 2005; however, many challenges remain to be addressed in the years to come. IAIT 2010 drew attendance from leading professionals in both industry and academes, as in IAIT 2009....
It was our intention to organize IAIT 2010 as the place where researchers and ind- trial practitioners could share their work and achievements in info...
|
cena:
203,61 |
![]() |
Cryptographic Engineering
ISBN: 9781441944177 / Angielski / Miękka / 522 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and conference articles, and authors lecture notes. This is a first attempt by top cryptographic engineers to bring this material in a book form and make it available to electrical engineering and computer science students and engineers working for the industry. This book is intended for a graduate-level course in Cryptographic Engineering to be taught in Electrical Engineering, Computer Engineering, and Computer Science departments.... Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and... |
cena:
1018,20 |
![]() |
Secure Multi-Party Non-Repudiation Protocols and Applications
ISBN: 9781441945396 / Angielski / Miękka / 190 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications. This book is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. The book is also suitable as an advanced-level... The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professio... |
cena:
407,25 |
![]() |
Modern Cryptography, Probabilistic Proofs and Pseudorandomness
ISBN: 9783642084324 / Angielski / Miękka / 183 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. You can start by putting the DO NOT DISTURB sign. Cay, in Desert Hearts (1985). The interplay between randomness and computation is one of the most fas- cinating scientific phenomena uncovered in the last couple of decades. This interplay is at the heart of modern cryptography and plays a fundamental role in complexity theory at large. Specifically, the interplay of randomness and computation is pivotal to several intriguing notions of probabilistic proof systems and is the focal of the computational approach to randomness. This book provides an introduction to these three, somewhat...
You can start by putting the DO NOT DISTURB sign. Cay, in Desert Hearts (1985). The interplay between randomness and computation is one of the most fa...
|
cena:
529,44 |
![]() |
Number Theory for Computing
ISBN: 9783642077104 / Angielski / Miękka / 435 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Modern cryptography depends heavily on number theory, with primality test ing, factoring, discrete logarithms (indices), and elliptic curves being perhaps the most prominent subject areas. Since my own graduate study had empha sized probability theory, statistics, and real analysis, when I started work ing in cryptography around 1970, I found myself swimming in an unknown, murky sea. I thus know from personal experience how inaccessible number theory can be to the uninitiated. Thank you for your efforts to case the transition for a new generation of cryptographers. Thank you also for helping...
Modern cryptography depends heavily on number theory, with primality test ing, factoring, discrete logarithms (indices), and elliptic curves being per...
|
cena:
232,11 |
![]() |
Network-Aware Security for Group Communications
ISBN: 9781441943354 / Angielski / Miękka / 304 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Group-oriented communications will play a significant role in the next generation of networks as many services, such as pay-per-view media broadcasts and the delivery of network control messages, will rely upon the ability to reliably deliver data simultaneously to a large group of users. As these networks become increasingly pervasive and these multi-user services become increasingly ubiquitous, it will become essential that a complementary suite of security solutions are deployed in order to protect these services from a broad spectrum of security threats that are unique to group... Group-oriented communications will play a significant role in the next generation of networks as many services, such as pay-per-view media broadcas... |
cena:
407,25 |
![]() |
Cyber Crime and the Victimization of Women: Laws, Rights and Regulations
ISBN: 9781609608309 / Angielski / Twarda / 280 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cyber Crime and the Victimization of Women: Laws, Rights and Regulations is a unique and important contribution to the literature on cyber crime. It explores gendered dimensions of cyber crimes like adult bullying, cyber stalking, hacking, defamation, morphed pornographic images, and electronic blackmailing. These and other tactics designed to inflict intimidation, control, and other harms are frequently committed by perpetrators who, for many reasons, are unlikely to be identified or punished. Scholars, researchers, law makers, and ordinary women and their supporters will gain a better...
Cyber Crime and the Victimization of Women: Laws, Rights and Regulations is a unique and important contribution to the literature on cyber crime. It e...
|
cena:
1005,14 |
![]() |
Identity-Based Encryption
ISBN: 9781441993823 / Angielski / Twarda / 180 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work in this area. This book will also cover a brief background on Elliptic Curves and Pairings, security against chosen Cipher text Attacks, standards and more. Advanced-level students in computer science and mathematics who specialize in cryptology, and the general community of researchers in the area of cryptology and data security will find... Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption ... |
cena:
407,25 |