![]() |
Advances in Audio Watermarking Based on Singular Value Decomposition
ISBN: 9783319147994 / Angielski / Miękka / 58 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book introduces audio watermarking methods for copyright protection, which has drawn extensive attention for securing digital data from unauthorized copying. The book is divided into two parts. First, an audio watermarking method in discrete wavelet transform (DWT) and discrete cosine transform (DCT) domains using singular value decomposition (SVD) and quantization is introduced. This method is robust against various attacks and provides good imperceptible watermarked sounds. Then, an audio watermarking method in fast Fourier transform (FFT) domain using SVD and Cartesian-polar... This book introduces audio watermarking methods for copyright protection, which has drawn extensive attention for securing digital data from unauth... |
cena:
205,02 |
![]() |
Arithmetic of Finite Fields: 5th International Workshop, Waifi 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers
ISBN: 9783319162768 / Angielski / Miękka / 213 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 5th International Workshop on the Arithmetic of Finite Field, WAIFI 2014, held in Gebze, Turkey, in September 2014. The 9 revised full papers and 43 invited talks presented were carefully reviewed and selected from 27 submissions. This workshop is a forum of mathematicians, computer scientists, engineers and physicists performing research on finite field arithmetic, interested in communicating the advances in the theory, applications, and implementations of finite fields. The workshop will help to bridge the gap between the mathematical...
This book constitutes the refereed proceedings of the 5th International Workshop on the Arithmetic of Finite Field, WAIFI 2014, held in Gebze, Turkey,...
|
cena:
196,86 |
![]() |
Decentralized Applications: Harnessing Bitcoin's Blockchain Technology
ISBN: 9781491924549 / Angielski / Miękka / 118 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Take advantage of Bitcoin's underlying technology, the blockchain, to build massively scalable, decentralized applications known as dapps. In this practical guide, author Siraj Raval explains why dapps will become more widely used--and profitable--than today's most popular web apps. You'll learn how the blockchain's cryptographically stored ledger, scarce-asset model, and peer-to-peer (P2P) technology provide a more flexible, better-incentivized structure than current software models. Once you understand the theory behind dapps and what a thriving dapp ecosystem looks like,... Take advantage of Bitcoin's underlying technology, the blockchain, to build massively scalable, decentralized applications known as dapps. I... |
cena:
153,52 |
![]() |
Quantum Attacks on Public-Key Cryptosystems
ISBN: 9781489997791 / Angielski / Miękka / 207 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists. Quantum Attacks on Public-Key Cryptosystems presemts almost all... The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm ... |
cena:
410,09 |
![]() |
Cyber Nation: How Venture Capital & Startups Are Protecting America from Cyber Criminals, Threats and Cyber Attacks.
ISBN: 9781514863220 / Angielski / Miękka / 148 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "The Best Book on Cybersecurity and America's Top Startups " What if you could prevent the next great cyber attack? What if you knew about the next World War - an epic battle against states, governments, companies and individuals? Venture capital and cybersecurity expert, Ross Blankenship (http: //angelkings.com/invest), shows you who's on the most wanted cyber criminal list, what methods cyber hackers are using to attack networks, where these cyber attacks have taken place (Anthem, Target, Sony, and the United States' Office of Personnel Management), when these attacks...
"The Best Book on Cybersecurity and America's Top Startups " What if you could prevent the next great cyber attack? What if you knew about the ...
|
cena:
82,48 |
![]() |
Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security: 10th International Conference, Icgs3 2015, London, Uk, September
ISBN: 9783319232751 / Angielski / Miękka / 361 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 10th International Conference on Global Security, Safety and Sustainability, ICGS3 2015, held in London, UK, in September 2015. The 31 revised full papers presented were carefully reviewed and selected from 57 submissions. The papers focus on the challenges of complexity, rapid pace of change and risk/opportunity issues associated with the 21st century living style, systems and infrastructures.
This book constitutes the refereed proceedings of the 10th International Conference on Global Security, Safety and Sustainability, ICGS3 2015, held in...
|
cena:
205,02 |
![]() |
Algebraic Informatics: 6th International Conference, Cai 2015, Stuttgart, Germany, September 1-4, 2015. Proceedings
ISBN: 9783319230207 / Angielski / Miękka / 223 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 6th International Conference on Algebraic Informatics, CAI 2015, held in Stuttgart, Germany, in September 2015. The 15 revised full papers presented were carefully reviewed and selected from 25 submissions. The papers cover topics such as data models and coding theory; fundamental aspects of cryptography and security; algebraic and stochastic models of computing; logic and program modelling. This book constitutes the refereed proceedings of the 6th International Conference on Algebraic Informatics, CAI 2015, held in Stuttgart, Germany, ... |
cena:
196,86 |
![]() |
Security and Privacy in Biometrics
ISBN: 9781447162018 / Angielski / Miękka / 438 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Biometrics-based recognition systems offer many benefits over traditional authentication approaches. However, such systems raise new challenges related to personal data protection. This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and... Biometrics-based recognition systems offer many benefits over traditional authentication approaches. However, such systems raise new challenges rel... |
cena:
410,09 |
![]() |
Trust, Privacy and Security in Digital Business: 12th International Conference, Trustbus 2015, Valencia, Spain, September 1-2, 2015, Proceedings
ISBN: 9783319229058 / Angielski / Miękka / 235 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2015, held in Valencia, Spain, in September 2015 in conjunction with DEXA 2015. trust and privacy issues in mobile environments; and privacy requirements and privacy audit.
This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2015,...
|
cena:
196,86 |
![]() |
Information Security Theory and Practice: 9th Ifip Wg 11.2 International Conference, Wistp 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceed
ISBN: 9783319240176 / Angielski / Miękka / 281 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the refereed proceedings of the 9th IFIP WG 11.2 International Conference(formerly Workshop) on Information Security Theory and Practices, WISTP 2015, held in Heraklion, Crete, Greece, in August 2015. The 14 revised full papers and 4 short papers presented together were carefully reviewed and selected from 52 submissions. WISTP 2015 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of elded systems, the application of security technology, the...
This volume constitutes the refereed proceedings of the 9th IFIP WG 11.2 International Conference(formerly Workshop) on Information Security Theory an...
|
cena:
205,02 |
![]() |
Computer Security -- Esorics 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part
ISBN: 9783319241739 / Angielski / Miękka / 543 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied... The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, E... |
cena:
205,02 |
![]() |
Computer Security -- Esorics 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part
ISBN: 9783319241760 / Angielski / Miękka / 665 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied... The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, E... |
cena:
205,02 |
![]() |
Security and Privacy Protection in Information Processing Systems: 28th Ifip Tc 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-1
ISBN: 9783642431395 / Angielski / Miękka / 436 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
410,09 |
![]() |
Big Data Forensics - Learning Hadoop Investigations
ISBN: 9781785288104 / Angielski / Miękka / 264 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
216,05 |
![]() |
Future Data and Security Engineering: Second International Conference, Fdse 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015, Proceedings
ISBN: 9783319261348 / Angielski / Miękka / 323 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Second International Conference on Future Data and Security Engineering, FDSE 2015, held in Ho Chi Minh City, Vietnam, in November 2015. The 20 revised full papers and 3 short papers presented were carefully reviewed and selected from 88 submissions. They have been organized in the following topical sections: big data analytics and massive dataset mining; security and privacy engineering; crowdsourcing and social network data analytics; sensor databases and applications in smart home and city; emerging data management systems and...
This book constitutes the refereed proceedings of the Second International Conference on Future Data and Security Engineering, FDSE 2015, held in Ho C...
|
cena:
205,02 |
![]() |
Leading Issues in Cyber Warfare and Security
ISBN: 9781910810644 / Angielski / Miękka / 252 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Almost every day sees new reports of information systems that have been hacked, broken into, compromised, and sometimes even destroyed. The prevalence of such stories reveals an overwhelming weakness in the security of the systems we increasingly rely on for everything: shopping, banking, health services, education, and even voting. That these problems persist even as the world rushes headlong into the Internet-of-Things and cloud based everything underscores the importance of understanding the current and potential aspects of information warfare, also known as cyberwarfare. Having passed...
Almost every day sees new reports of information systems that have been hacked, broken into, compromised, and sometimes even destroyed. The prevalence...
|
cena:
138,92 |
![]() |
Einführung in Die Kryptographie
ISBN: 9783642397745 / Niemiecki / Miękka / 330 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Dieses Kryptographiebuch ist geschrieben fur Studierende der Mathematik, Informatik, Physik, Elektrotechnik oder andere Leser mit mathematischer Grundbildung und wurde in vielen Vorlesungen erfolgreich eingesetzt. Es behandelt die aktuellen Techniken der modernen Kryptographie, zum Beispiel Verschlusselung und digitale Signaturen. Das Buch vermittelt auf elementare Weise alle mathematischen Grundlagen, die zu einem prazisen Verstandnis der Kryptographie notig sind, mit vielen Beispielen und Ubungen. Die Leserinnen und Leser erhalten ein fundiertes Verstandnis der modernen Kryptographie und...
Dieses Kryptographiebuch ist geschrieben fur Studierende der Mathematik, Informatik, Physik, Elektrotechnik oder andere Leser mit mathematischer Grund...
|
cena:
172,46 |
![]() |
Digitale Fernseh- Und Hörfunktechnik in Theorie Und Praxis: Mpeg-Quellcodierung Und Multiplexbildung, Analoge Und Digitale Hörfunk- Und Fernsehstandar
ISBN: 9783642538957 / Niemiecki / Twarda / 1056 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digitale Fernseh- und Horfunktechnik in Theorie und Praxis ist ein vielgelesenes Standardwerk der modernen Rundfunktechnik, das weltweit in vielen Sprachen zur Verfugung steht. Praxisnah behandelt Walter Fischer die wichtigsten digitalen Horfunk- und Fernsehstandards wie MPEG, DVB (-Standards der ersten und zweiten Generation), DAB/DAB+, ATSC, ISDB-T, DTMB, DRM, DOCSIS und IPTV. Schnell und klar vermittelt Walter Fischer auch die zugehorigen Grundlagenthemen wie analoge Fernsehtechnik, UKW-FM-Horfunk, digitale Modulation, Eintragermodulation und Mehrtragermodulation (OFDM), sowie... Digitale Fernseh- und Horfunktechnik in Theorie und Praxis ist ein vielgelesenes Standardwerk der modernen Rundfunktechnik, das weltweit in vielen... |
cena:
689,92 |
![]() |
Sharing Big Data Safely: Managing Data Security
ISBN: 9781491952122 / Angielski / Miękka / 96 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Many big data-driven companies today are moving to protect certain types of data against intrusion, leaks, or unauthorized eyes. But how do you lock down data while granting access to people who need to see it? In this practical book, authors Ted Dunning and Ellen Friedman offer two novel and practical solutions that you can implement right away. Ideal for both technical and non-technical decision makers, group leaders, developers, and data scientists, this book shows you how to:
Many big data-driven companies today are moving to protect certain types of data against intrusion, leaks, or unauthorized eyes. But how do you loc... |
cena:
104,74 |
![]() |
Python Web Penetration Testing Cookbook
ISBN: 9781784392932 / Angielski / Miękka / 224 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
216,05 |