![]() |
Software-Schutz: Rechtliche, Organisatorische Und Technische Maßnahmen
ISBN: 9783211819661 / Niemiecki / Miękka / 204 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Der Software-Schutz umfaBt zum einen den Schutz von Software von Endbeniitzern vor unbefugtem Zugriff und den Schutz von Computern vor unbefugter Beniitzung, zum anderen den Schutz von Software vor illegaler VervieWntigung. Da Software ein machtiges Werkzeug sein kann und sich zu minimalen Kosten in Serie produzieren laBt, ist das Risiko des MiBbrauchs besonders hoch. Der illegale Verkauf und Tausch von PC-Software ist heute schon weit verbreitet. Viele wissen dabei nicht, daB sie eigentlich etwas Unrechtes tun. Auch das miBbrauchliche Eindringen in fremde Computer hat in den letzten lahren...
Der Software-Schutz umfaBt zum einen den Schutz von Software von Endbeniitzern vor unbefugtem Zugriff und den Schutz von Computern vor unbefugter Beni...
|
cena:
209,31 |
![]() |
Data Fusion Applications: Workshop Proceedings Brussels, November 25, 1992
ISBN: 9783540569732 / Angielski / Miękka / 266 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Data fusion, the ability to combine data derived from several sources to provide a coherent, informative, and useful characterization of a situation, is a challenging task. There is no unified and proven solution which is applicable in all circumstances, but there are many plausible and useful approaches which can be and are used to solve particular applications. This volume presents the proceedings of the workshop Data Fusion Applications hosted in Brussels by the 1992 ESPRIT Conference and Exhibition. It contains 22 papers from 69 experts, who present advanced research results on data...
Data fusion, the ability to combine data derived from several sources to provide a coherent, informative, and useful characterization of a situation, ...
|
cena:
203,61 |
![]() |
Jit'99: Java-Informations-Tage 1999
ISBN: 9783540664642 / Niemiecki / Miękka / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
190,29 |
![]() |
Networking 2010: 9th International IFIP TC 6 Networking Conference Chennai, India, May 11-15, 2010 Proceedings
ISBN: 9783642129629 / Angielski / Miękka / 410 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 9th IFIP-TC6 Networking Conference, Networking 2010. Papers were solicited in three broad topic areas: applications and services, network technologies, and internet design. All papers were considered on their merits by a uni?ed Technical ProgramCommittee (TPC); there was no attempt to enforce a quota among topic areas. We believe the resulting program is an excellentrepresentationofthebreadthofrecentadvancesinnetworkingresearch. This year, the conference received 101 full paper submissions from 23 co- trieson?vecontinents,...
This book constitutes the refereed proceedings of the 9th IFIP-TC6 Networking Conference, Networking 2010. Papers were solicited in three broad topic ...
|
cena:
203,61 |
![]() |
Diensteintegrierende Kommunikationsnetze Mit Teilnehmerüberprüfbarem Datenschutz
ISBN: 9783540523277 / Niemiecki / Mikrofilm / 345 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Menschen und Maschinen kommunizieren immer mehr uber offentliche Vermittlungsnetze. Sensitive Daten wie personenbezogene Daten oder vertrauliche Geschaftsdaten konnen dabei sowohl aus den eigentlichen Nutzdaten als auch aus den Vermittlungsdaten, z.B. Ziel- und Herkunftsadresse, Datenumfang und Zeit, gewonnen werden. In diesem Buch wird erstmals umfassend untersucht, wie diese Daten vor illegalen und legalen Netzbenutzern, dem Betreiber des Netzes und den Herstellern der Vermittlungszentralen sowie ihren Mitarbeitern geschutzt werden konnen. Nach einer Problemanalyse werden die zur Abhilfe...
Menschen und Maschinen kommunizieren immer mehr uber offentliche Vermittlungsnetze. Sensitive Daten wie personenbezogene Daten oder vertrauliche Gesch...
|
cena:
209,31 |
![]() |
Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers
ISBN: 9783642207686 / Angielski / Twarda / 356 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. This title features the papers that are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, and usable privacy.
Constitutes the refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsi...
|
cena:
203,61 |
![]() |
Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices
ISBN: 9781613501320 / Angielski / Twarda / 342 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Ethical values in computing are essential for understanding and maintaining the relationship between computing professionals and researchers and the users of their applications and programs. While concerns about cyber ethics and cyber law are constantly changing as technology changes, the intersections of cyber ethics and cyber law are still underexplored. Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices discusses the impact of cyber ethics and cyber law on information technologies and society. Featuring current research, theoretical frameworks, and case studies, the...
Ethical values in computing are essential for understanding and maintaining the relationship between computing professionals and researchers and the u...
|
cena:
1010,30 |
![]() |
Unconstrained Face Recognition
ISBN: 9781441938909 / Angielski / Miękka / 244 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Face recognition has been actively studied over the past decade and continues to be a big research challenge. Just recently, researchers have begun to investigate face recognition under unconstrained conditions. Unconstrained Face Recognition provides a comprehensive review of this biometric, especially face recognition from video, assembling a collection of novel approaches that are able to recognize human faces under various unconstrained situations. The underlying basis of these approaches is that, unlike conventional face recognition algorithms, they exploit the... Face recognition has been actively studied over the past decade and continues to be a big research challenge. Just recently, researchers have begun... |
cena:
407,25 |
![]() |
Security for Wireless Sensor Networks
ISBN: 9781441940988 / Angielski / Miękka / 212 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional wireless sensor nodes to monitor and report the conditions and events in their local environments. A large collection of these sensor nodes can thus form a wireless sensor network in an ad hoc manner, creating a new type of information systems. Such sensor networks have recently emerged as an important means to study and interact with the physical world and have received a lot of attention due to their wide applications in military and civilian operations such as target...
The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional wireless sensor nodes to monito...
|
cena:
610,90 |
![]() |
Privacy and Identity Management for Life
ISBN: 9783642203169 / Angielski / Twarda / 512 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundamental research it will contain description of best practice solutions.
At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundament...
|
cena:
610,90 |
![]() |
Data and Applications Security and Privacy XXV: 25th Annual Ifip Wg 11.3 Conference, Dbsec 2011, Richmond, Va, Usa, July 11-13, 2011, Proceedings
ISBN: 9783642223471 / Angielski / Miękka / 309 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2011, held in Richmond, VA, USA, in July 2011. The 14 revised full papers and 9 short papers presented together with 3 invited lectures were carefully reviewed and selected from 37 submissions. The topics of these papers include access control, privacy-preserving data applications, data confidentiality and query verification, query and data privacy, authentication and secret sharing.
This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec ...
|
cena:
203,61 |
![]() |
Security Protocols XIX: 19th International Workshop, Cambridge, Uk, March 28-30, 2011, Revised Selected Papers
ISBN: 9783642258664 / Angielski / Miękka / 383 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This text constitutes the thoroughly refereed post-workshop proceedings of the 19th International Workshop on Security Protocols, held in Cambridge, UK, in March 2011. Following the tradition of this workshop series, each paper was revised by the authors to incorporate ideas from the workshop.
This text constitutes the thoroughly refereed post-workshop proceedings of the 19th International Workshop on Security Protocols, held in Cambridge, U...
|
cena:
203,61 |
![]() |
The Future of Identity in the Information Society: 4th Ifip Wg 9.2, 9.6, 11.6, 11.7/Fidis International Summer School, Brno, Czech Republic, September
ISBN: 9783642242311 / Angielski / Miękka / 283 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity m- agement and to build up collegial relationships with others. As such, the...
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The in...
|
cena:
407,25 |
![]() |
Multiple-Base Number System: Theory and Applications
ISBN: 9781439830468 / Angielski / Twarda / 294 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computer arithmetic has become so fundamentally embedded into digital design that many engineers are unaware of the many research advances in the area. As a result, they are losing out on emerging opportunities to optimize its use in targeted applications and technologies. In many cases, easily available standard arithmetic hardware might not necessarily be the most efficient implementation strategy. Multiple-Base Number System: Theory and Applications stands apart from the usual books on computer arithmetic with its concentration on the uses and the... Computer arithmetic has become so fundamentally embedded into digital design that many engineers are unaware of the many research advances in the a... |
cena:
1162,69 |
![]() |
European Axis Signal Intelligence in World War II
ISBN: 9781608880089 / Angielski / Twarda / 1120 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. An omnibus edition of nine volumes of postwar histories declassified by the National Security Agency in 2010. The research was carried out by the Army Security Agency relying on captured documents and interviews with prisoners. This is an absolutely essential primary reference for anyone interested in cryptography as a vital aspect of World War II.
The volumes include: Volume I: Synopsis Volume 2: Notes on German High Level Cryptography and Cryptanalysis Volume 3: The Signal Intelligence Agency of the Supreme Command, Armed Forces Volume 4: The Signal Intelligence Service of the... An omnibus edition of nine volumes of postwar histories declassified by the National Security Agency in 2010. The research was carried out by the Army...
|
cena:
431,93 |
![]() |
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011, Amsterdam, the Netherlands, July 7-8, 201
ISBN: 9783642224232 / Angielski / Miękka / 235 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2011, held in Amsterdam, the Netherlands, in July 2011. The 11 full papers presented together with two short papers were carefully reviewed and selected from 41intial submissions. The papers are organized in topical sections on network security, attacks, Web security, and host security.
This book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessmen...
|
cena:
203,61 |
![]() |
Autonomic and Trusted Computing: 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011, Proceedings
ISBN: 9783642234958 / Angielski / Miękka / 258 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 8th International Conference on Autonomic and Trusted Computing, ATC 2011, held in Banff, Canada, September 2011.
The 17 revised full papers presented together with 1 keynote speech were carefully reviewed and selected from numerous submissions. The papers address all current issues in autonomic architectures, models and systems, autonomic communications, trusted and secure computing, reliable, secure and trust applications. This book constitutes the refereed proceedings of the 8th International Conference on Autonomic and Trusted Computing, ATC 2011, held in Banff, Canada...
|
cena:
203,61 |
![]() |
Recent Advances in Intrusion Detection: 14th International Symposium, Raid 2011, Menlo Park, Ca, Usa, September 20-21, 2011, Proceedings
ISBN: 9783642236433 / Angielski / Miękka / 399 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments.
This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA...
|
cena:
203,61 |
![]() |
Critical Infrastructure Protection V: 5th Ifip Wg 11.10 International Conference on Critical Infrastructure Protection, Iccip 2011, Hanover, Nh, Usa,
ISBN: 9783642248634 / Angielski / Twarda / 218 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure...
The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every se...
|
cena:
203,61 |
![]() |
Security and Intelligent Information Systems: International Joint Confererence, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers
ISBN: 9783642252600 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the Joint Meeting of the 2nd Luxembourg-Polish Symposium on Security and Trust and the 19th International Conference Intelligent Information Systems, held as International Joint Confererence on Security and Intelligent Information Systems, SIIS 2011, in Warsaw, Poland, in June 2011. The 29 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 60 initial submissions during two rounds of selection and improvement. The papers are organized in the following three...
This book constitutes the thoroughly refereed post-conference proceedings of the Joint Meeting of the 2nd Luxembourg-Polish Symposium on Security and ...
|
cena:
203,61 |