• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2953408]
• Literatura piękna
 [1818674]

  więcej...
• Turystyka
 [70115]
• Informatyka
 [151610]
• Komiksy
 [36466]
• Encyklopedie
 [23169]
• Dziecięca
 [612210]
• Hobby
 [135681]
• AudioBooki
 [1806]
• Literatura faktu
 [226254]
• Muzyka CD
 [391]
• Słowniki
 [2978]
• Inne
 [449189]
• Kalendarze
 [1375]
• Podręczniki
 [166538]
• Poradniki
 [469635]
• Religia
 [508779]
• Czasopisma
 [523]
• Sport
 [61275]
• Sztuka
 [243340]
• CD, DVD, Video
 [3479]
• Technologie
 [219064]
• Zdrowie
 [98975]
• Książkowe Klimaty
 [124]
• Zabawki
 [2531]
• Puzzle, gry
 [3670]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8134]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2777

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Software-Schutz: Rechtliche, Organisatorische Und Technische Maßnahmen Piller, E. 9783211819661 Springer
Software-Schutz: Rechtliche, Organisatorische Und Technische Maßnahmen

ISBN: 9783211819661 / Niemiecki / Miękka / 204 str.

ISBN: 9783211819661/Niemiecki/Miękka/204 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
E. Piller; A. Weissenbrunner
Der Software-Schutz umfaBt zum einen den Schutz von Software von Endbeniitzern vor unbefugtem Zugriff und den Schutz von Computern vor unbefugter Beniitzung, zum anderen den Schutz von Software vor illegaler VervieWntigung. Da Software ein machtiges Werkzeug sein kann und sich zu minimalen Kosten in Serie produzieren laBt, ist das Risiko des MiBbrauchs besonders hoch. Der illegale Verkauf und Tausch von PC-Software ist heute schon weit verbreitet. Viele wissen dabei nicht, daB sie eigentlich etwas Unrechtes tun. Auch das miBbrauchliche Eindringen in fremde Computer hat in den letzten lahren...
Der Software-Schutz umfaBt zum einen den Schutz von Software von Endbeniitzern vor unbefugtem Zugriff und den Schutz von Computern vor unbefugter Beni...
cena: 209,31

 Data Fusion Applications: Workshop Proceedings Brussels, November 25, 1992 Pfleger, S. 9783540569732 Springer
Data Fusion Applications: Workshop Proceedings Brussels, November 25, 1992

ISBN: 9783540569732 / Angielski / Miękka / 266 str.

ISBN: 9783540569732/Angielski/Miękka/266 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
S. Pfleger; J. Goncalves; D. Vernon
Data fusion, the ability to combine data derived from several sources to provide a coherent, informative, and useful characterization of a situation, is a challenging task. There is no unified and proven solution which is applicable in all circumstances, but there are many plausible and useful approaches which can be and are used to solve particular applications. This volume presents the proceedings of the workshop Data Fusion Applications hosted in Brussels by the 1992 ESPRIT Conference and Exhibition. It contains 22 papers from 69 experts, who present advanced research results on data...
Data fusion, the ability to combine data derived from several sources to provide a coherent, informative, and useful characterization of a situation, ...
cena: 203,61

 Jit'99: Java-Informations-Tage 1999 Cap, Clemens H. 9783540664642 Not Avail
Jit'99: Java-Informations-Tage 1999

ISBN: 9783540664642 / Niemiecki / Miękka / 296 str.

ISBN: 9783540664642/Niemiecki/Miękka/296 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Clemens H. Cap
cena: 190,29

 Networking 2010: 9th International IFIP TC 6 Networking Conference Chennai, India, May 11-15, 2010 Proceedings Crovella, Mark 9783642129629 Springer
Networking 2010: 9th International IFIP TC 6 Networking Conference Chennai, India, May 11-15, 2010 Proceedings

ISBN: 9783642129629 / Angielski / Miękka / 410 str.

ISBN: 9783642129629/Angielski/Miękka/410 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Mark Crovella; Laura Marie Feeney; Dan Rubenstein
This book constitutes the refereed proceedings of the 9th IFIP-TC6 Networking Conference, Networking 2010. Papers were solicited in three broad topic areas: applications and services, network technologies, and internet design. All papers were considered on their merits by a uni?ed Technical ProgramCommittee (TPC); there was no attempt to enforce a quota among topic areas. We believe the resulting program is an excellentrepresentationofthebreadthofrecentadvancesinnetworkingresearch. This year, the conference received 101 full paper submissions from 23 co- trieson?vecontinents,...
This book constitutes the refereed proceedings of the 9th IFIP-TC6 Networking Conference, Networking 2010. Papers were solicited in three broad topic ...
cena: 203,61

 Diensteintegrierende Kommunikationsnetze Mit Teilnehmerüberprüfbarem Datenschutz Pfitzmann, Andreas 9783540523277 Springer-Verlag
Diensteintegrierende Kommunikationsnetze Mit Teilnehmerüberprüfbarem Datenschutz

ISBN: 9783540523277 / Niemiecki / Mikrofilm / 345 str.

ISBN: 9783540523277/Niemiecki/Mikrofilm/345 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Andreas Pfitzmann
Menschen und Maschinen kommunizieren immer mehr uber offentliche Vermittlungsnetze. Sensitive Daten wie personenbezogene Daten oder vertrauliche Geschaftsdaten konnen dabei sowohl aus den eigentlichen Nutzdaten als auch aus den Vermittlungsdaten, z.B. Ziel- und Herkunftsadresse, Datenumfang und Zeit, gewonnen werden. In diesem Buch wird erstmals umfassend untersucht, wie diese Daten vor illegalen und legalen Netzbenutzern, dem Betreiber des Netzes und den Herstellern der Vermittlungszentralen sowie ihren Mitarbeitern geschutzt werden konnen. Nach einer Problemanalyse werden die zur Abhilfe...
Menschen und Maschinen kommunizieren immer mehr uber offentliche Vermittlungsnetze. Sensitive Daten wie personenbezogene Daten oder vertrauliche Gesch...
cena: 209,31

 Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers Simone Fischer-Hübner, Penny Duquenoy, Marit Hansen, Ronald Leenes, Ge Zhang 9783642207686 Springer-Verlag Berlin and Heidelberg GmbH &
Privacy and Identity Management for Life: 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers

ISBN: 9783642207686 / Angielski / Twarda / 356 str.

ISBN: 9783642207686/Angielski/Twarda/356 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Simone Fischer-Hubner;Penny Duquenoy;Marit Hansen
Constitutes the refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. This title features the papers that are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, and usable privacy.
Constitutes the refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsi...
cena: 203,61

 Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices Dudley, Alfreda 9781613501320 Information Science Publishing
Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices

ISBN: 9781613501320 / Angielski / Twarda / 342 str.

ISBN: 9781613501320/Angielski/Twarda/342 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Alfreda Dudley-Sponaugle; James Braman; Giovanni Vincenti
Ethical values in computing are essential for understanding and maintaining the relationship between computing professionals and researchers and the users of their applications and programs. While concerns about cyber ethics and cyber law are constantly changing as technology changes, the intersections of cyber ethics and cyber law are still underexplored. Investigating Cyber Law and Cyber Ethics: Issues, Impacts and Practices discusses the impact of cyber ethics and cyber law on information technologies and society. Featuring current research, theoretical frameworks, and case studies, the...
Ethical values in computing are essential for understanding and maintaining the relationship between computing professionals and researchers and the u...
cena: 1010,30

 Unconstrained Face Recognition Shaohua Kevin Zhou Rama Chellappa Wenyi Zhao 9781441938909 Not Avail
Unconstrained Face Recognition

ISBN: 9781441938909 / Angielski / Miękka / 244 str.

ISBN: 9781441938909/Angielski/Miękka/244 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shaohua Kevin Zhou; Rama Chellappa; Wenyi Zhao

Face recognition has been actively studied over the past decade and continues to be a big research challenge. Just recently, researchers have begun to investigate face recognition under unconstrained conditions. Unconstrained Face Recognition provides a comprehensive review of this biometric, especially face recognition from video, assembling a collection of novel approaches that are able to recognize human faces under various unconstrained situations. The underlying basis of these approaches is that, unlike conventional face recognition algorithms, they exploit the...

Face recognition has been actively studied over the past decade and continues to be a big research challenge. Just recently, researchers have begun...

cena: 407,25

 Security for Wireless Sensor Networks Donggang Liu Peng Ning 9781441940988 Not Avail
Security for Wireless Sensor Networks

ISBN: 9781441940988 / Angielski / Miękka / 212 str.

ISBN: 9781441940988/Angielski/Miękka/212 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Donggang Liu; Peng Ning
The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional wireless sensor nodes to monitor and report the conditions and events in their local environments. A large collection of these sensor nodes can thus form a wireless sensor network in an ad hoc manner, creating a new type of information systems. Such sensor networks have recently emerged as an important means to study and interact with the physical world and have received a lot of attention due to their wide applications in military and civilian operations such as target...
The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional wireless sensor nodes to monito...
cena: 610,90

 Privacy and Identity Management for Life Jan Camenisch Simone Fischer- Kai Rannenberg 9783642203169 Springer
Privacy and Identity Management for Life

ISBN: 9783642203169 / Angielski / Twarda / 512 str.

ISBN: 9783642203169/Angielski/Twarda/512 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jan Camenisch; Simone Fischer-H Bner; Kai Rannenberg
At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundamental research it will contain description of best practice solutions.
At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundament...
cena: 610,90

 Data and Applications Security and Privacy XXV: 25th Annual Ifip Wg 11.3 Conference, Dbsec 2011, Richmond, Va, Usa, July 11-13, 2011, Proceedings Li, Yingjiu 9783642223471 Springer
Data and Applications Security and Privacy XXV: 25th Annual Ifip Wg 11.3 Conference, Dbsec 2011, Richmond, Va, Usa, July 11-13, 2011, Proceedings

ISBN: 9783642223471 / Angielski / Miękka / 309 str.

ISBN: 9783642223471/Angielski/Miękka/309 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Yingjiu Li
This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2011, held in Richmond, VA, USA, in July 2011. The 14 revised full papers and 9 short papers presented together with 3 invited lectures were carefully reviewed and selected from 37 submissions. The topics of these papers include access control, privacy-preserving data applications, data confidentiality and query verification, query and data privacy, authentication and secret sharing.
This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec ...
cena: 203,61

 Security Protocols XIX: 19th International Workshop, Cambridge, Uk, March 28-30, 2011, Revised Selected Papers Christianson, Bruce 9783642258664 Springer, Berlin
Security Protocols XIX: 19th International Workshop, Cambridge, Uk, March 28-30, 2011, Revised Selected Papers

ISBN: 9783642258664 / Angielski / Miękka / 383 str.

ISBN: 9783642258664/Angielski/Miękka/383 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
This text constitutes the thoroughly refereed post-workshop proceedings of the 19th International Workshop on Security Protocols, held in Cambridge, UK, in March 2011. Following the tradition of this workshop series, each paper was revised by the authors to incorporate ideas from the workshop.
This text constitutes the thoroughly refereed post-workshop proceedings of the 19th International Workshop on Security Protocols, held in Cambridge, U...
cena: 203,61

 The Future of Identity in the Information Society: 4th Ifip Wg 9.2, 9.6, 11.6, 11.7/Fidis International Summer School, Brno, Czech Republic, September Matyás, Vashek 9783642242311 Springer-Verlag Berlin and Heidelberg GmbH &
The Future of Identity in the Information Society: 4th Ifip Wg 9.2, 9.6, 11.6, 11.7/Fidis International Summer School, Brno, Czech Republic, September

ISBN: 9783642242311 / Angielski / Miękka / 283 str.

ISBN: 9783642242311/Angielski/Miękka/283 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vashek Matyas;Simone Fischer-Hubner;Daniel Cvrcek
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The increasing div- sity of information and communication technologies and their equally wide range of usage in personal, professional and official capacities raise challenging questions of identity in a variety of contexts. The aim of the IFIP/FIDIS Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity m- agement and to build up collegial relationships with others. As such, the...
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally networked information society? The in...
cena: 407,25

 Multiple-Base Number System: Theory and Applications Dimitrov, Vassil 9781439830468 Circuits and Electrical Engineering
Multiple-Base Number System: Theory and Applications

ISBN: 9781439830468 / Angielski / Twarda / 294 str.

ISBN: 9781439830468/Angielski/Twarda/294 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Vassil Dimitrov; Graham A. Jullien; Roberto Muscedere

Computer arithmetic has become so fundamentally embedded into digital design that many engineers are unaware of the many research advances in the area. As a result, they are losing out on emerging opportunities to optimize its use in targeted applications and technologies. In many cases, easily available standard arithmetic hardware might not necessarily be the most efficient implementation strategy.

Multiple-Base Number System: Theory and Applications stands apart from the usual books on computer arithmetic with its concentration on the uses and the...

Computer arithmetic has become so fundamentally embedded into digital design that many engineers are unaware of the many research advances in the a...

cena: 1162,69

 European Axis Signal Intelligence in World War II National Security Agency                 Army Security Agency 9781608880089 Nimble Books
European Axis Signal Intelligence in World War II

ISBN: 9781608880089 / Angielski / Twarda / 1120 str.

ISBN: 9781608880089/Angielski/Twarda/1120 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
National Security Agency;Army Security Agency
An omnibus edition of nine volumes of postwar histories declassified by the National Security Agency in 2010. The research was carried out by the Army Security Agency relying on captured documents and interviews with prisoners. This is an absolutely essential primary reference for anyone interested in cryptography as a vital aspect of World War II.

The volumes include:

Volume I: Synopsis

Volume 2: Notes on German High Level Cryptography and Cryptanalysis

Volume 3: The Signal Intelligence Agency of the Supreme Command, Armed Forces

Volume 4: The Signal Intelligence Service of the...

An omnibus edition of nine volumes of postwar histories declassified by the National Security Agency in 2010. The research was carried out by the Army...
cena: 431,93

 Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011, Amsterdam, the Netherlands, July 7-8, 201 Holz, Thorsten 9783642224232 Springer
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011, Amsterdam, the Netherlands, July 7-8, 201

ISBN: 9783642224232 / Angielski / Miękka / 235 str.

ISBN: 9783642224232/Angielski/Miękka/235 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Thorsten Holz; Herbert Bos
This book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2011, held in Amsterdam, the Netherlands, in July 2011. The 11 full papers presented together with two short papers were carefully reviewed and selected from 41intial submissions. The papers are organized in topical sections on network security, attacks, Web security, and host security.
This book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessmen...
cena: 203,61

 Autonomic and Trusted Computing: 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011, Proceedings Alcaraz Calero, Jose M. 9783642234958 Springer
Autonomic and Trusted Computing: 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011, Proceedings

ISBN: 9783642234958 / Angielski / Miękka / 258 str.

ISBN: 9783642234958/Angielski/Miękka/258 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jose M. Alcaraz Calero; Laurence T. Yang; Felix Gomez Marmol
This book constitutes the refereed proceedings of the 8th International Conference on Autonomic and Trusted Computing, ATC 2011, held in Banff, Canada, September 2011.
The 17 revised full papers presented together with 1 keynote speech were carefully reviewed and selected from numerous submissions. The papers address all current issues in autonomic architectures, models and systems, autonomic communications, trusted and secure computing, reliable, secure and trust applications.
This book constitutes the refereed proceedings of the 8th International Conference on Autonomic and Trusted Computing, ATC 2011, held in Banff, Canada...
cena: 203,61

 Recent Advances in Intrusion Detection: 14th International Symposium, Raid 2011, Menlo Park, Ca, Usa, September 20-21, 2011, Proceedings Sommer, Robin 9783642236433 Springer
Recent Advances in Intrusion Detection: 14th International Symposium, Raid 2011, Menlo Park, Ca, Usa, September 20-21, 2011, Proceedings

ISBN: 9783642236433 / Angielski / Miękka / 399 str.

ISBN: 9783642236433/Angielski/Miękka/399 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Robin Sommer; Davide Balzarotti; Gregor Maier
This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments.
This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA...
cena: 203,61

 Critical Infrastructure Protection V: 5th Ifip Wg 11.10 International Conference on Critical Infrastructure Protection, Iccip 2011, Hanover, Nh, Usa, Butts, Jonathan 9783642248634 Springer
Critical Infrastructure Protection V: 5th Ifip Wg 11.10 International Conference on Critical Infrastructure Protection, Iccip 2011, Hanover, Nh, Usa,

ISBN: 9783642248634 / Angielski / Twarda / 218 str.

ISBN: 9783642248634/Angielski/Twarda/218 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jonathan Butts; Sujeet Shenoi
The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure...
The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every se...
cena: 203,61

 Security and Intelligent Information Systems: International Joint Confererence, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers Bouvry, Pascal 9783642252600 Springer
Security and Intelligent Information Systems: International Joint Confererence, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers

ISBN: 9783642252600 / Angielski / Miękka / 400 str.

ISBN: 9783642252600/Angielski/Miękka/400 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Pascal Bouvry; Mieczyslaw A. Klopotek; Franck Leprevost
This book constitutes the thoroughly refereed post-conference proceedings of the Joint Meeting of the 2nd Luxembourg-Polish Symposium on Security and Trust and the 19th International Conference Intelligent Information Systems, held as International Joint Confererence on Security and Intelligent Information Systems, SIIS 2011, in Warsaw, Poland, in June 2011. The 29 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 60 initial submissions during two rounds of selection and improvement. The papers are organized in the following three...
This book constitutes the thoroughly refereed post-conference proceedings of the Joint Meeting of the 2nd Luxembourg-Polish Symposium on Security and ...
cena: 203,61

Pierwsza Podprzednia  124  125  126  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia