• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2953408]
• Literatura piękna
 [1818674]

  więcej...
• Turystyka
 [70115]
• Informatyka
 [151610]
• Komiksy
 [36466]
• Encyklopedie
 [23169]
• Dziecięca
 [612210]
• Hobby
 [135681]
• AudioBooki
 [1806]
• Literatura faktu
 [226254]
• Muzyka CD
 [391]
• Słowniki
 [2978]
• Inne
 [449189]
• Kalendarze
 [1375]
• Podręczniki
 [166538]
• Poradniki
 [469635]
• Religia
 [508779]
• Czasopisma
 [523]
• Sport
 [61275]
• Sztuka
 [243340]
• CD, DVD, Video
 [3479]
• Technologie
 [219064]
• Zdrowie
 [98975]
• Książkowe Klimaty
 [124]
• Zabawki
 [2531]
• Puzzle, gry
 [3670]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8134]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2777

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Algebraic Geometry for Coding Theory and Cryptography: Ipam, Los Angeles, Ca, February 2016 Howe, Everett W. 9783319639307 Springer
Algebraic Geometry for Coding Theory and Cryptography: Ipam, Los Angeles, Ca, February 2016

ISBN: 9783319639307 / Angielski / Twarda / 150 str.

ISBN: 9783319639307/Angielski/Twarda/150 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Everett W. Howe; Kristin E. Lauter; Judy L. Walker
Covering topics in algebraic geometry, coding theory, and cryptography, this volume presents interdisciplinary group research completed for the February 2016 conference at the Institute for Pure and Applied Mathematics (IPAM) in cooperation with the Association for Women in Mathematics (AWM).
Covering topics in algebraic geometry, coding theory, and cryptography, this volume presents interdisciplinary group research completed for the Februa...
cena: 697,18

 Cryptographic Hardware and Embedded Systems - Ches 2017: 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings Fischer, Wieland 9783319667867 Springer
Cryptographic Hardware and Embedded Systems - Ches 2017: 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings

ISBN: 9783319667867 / Angielski / Miękka / 710 str.

ISBN: 9783319667867/Angielski/Miękka/710 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Wieland Fischer; Naofumi Homma
This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017.
The 33 full papers presented in this volume were carefully reviewed and selected from 130 submissions.
The annual CHES conference highlights new results in the design and analysis of cryptographic hardware and soft- ware implementations. The workshop builds a valuable bridge between the research and cryptographic engineering communities and attracts participants from industry, academia, and government...
This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, ...
cena: 410,09

 Journal of Cyber Security and Mobility (5-3) Dutta, Ashutosh 9788793609129 River Publishers
Journal of Cyber Security and Mobility (5-3)

ISBN: 9788793609129 / Angielski / Miękka / 350 str.

ISBN: 9788793609129/Angielski/Miękka/350 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ashutosh Dutta; Wojciech Mazurczyk; Neeli R. Prasad

Aim

Journal of Cyber Security and Mobility provides an in-depth and holistic view of security and solutions from practical to theoretical aspects. It covers topics that are equally valuable for practitioners as well as those new in the field.

Scope

The journal covers security issues in cyber space and solutions thereof. As cyber space has moved towards the wireless/mobile world, issues in wireless/mobile communications will also be published. The publication will take a holistic view. Some example topics are: security in mobile networks, security and mobility...

Aim

Journal of Cyber Security and Mobility provides an in-depth and holistic view of security and solutions from practical to theoretical...

cena: 199,24

 Lattices Applied to Coding for Reliable and Secure Communications Sueli I. R. Costa Frederique Oggier Antonio Campello 9783319678818 Springer
Lattices Applied to Coding for Reliable and Secure Communications

ISBN: 9783319678818 / Angielski / Miękka / 120 str.

ISBN: 9783319678818/Angielski/Miękka/120 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sueli I. R. Costa; Frederique Oggier; Antonio Campello
This book provides a first course on lattices - mathematical objects pertaining to the realm of discrete geometry, which are of interest to mathematicians for their structure and, at the same time, are used by electrical and computer engineers working on coding theory and cryptography.
This book provides a first course on lattices - mathematical objects pertaining to the realm of discrete geometry, which are of interest to mathematic...
cena: 246,04

 Ubiquitous Networking: Third International Symposium, Unet 2017, Casablanca, Morocco, May 9-12, 2017, Revised Selected Papers Sabir, Essaid 9783319681788 Springer
Ubiquitous Networking: Third International Symposium, Unet 2017, Casablanca, Morocco, May 9-12, 2017, Revised Selected Papers

ISBN: 9783319681788 / Angielski / Miękka / 659 str.

ISBN: 9783319681788/Angielski/Miękka/659 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Essaid Sabir; Ana Garcia Armada; Mounir Ghogho
This book constitutes the refereed proceedings of the Third International Symposium on Ubiquitous Networking, UNet 2017, held in Casablanca, Morocco, in May 2017. The 56 full papers presented in this volume were carefully reviewed and selected from 127 submissions.
This book constitutes the refereed proceedings of the Third International Symposium on Ubiquitous Networking, UNet 2017, held in Casablanca, Morocco, ...
cena: 205,02

 Passwords: Philology, Security, Authentication Brian Lennon 9780674980761 Belknap Press: An Imprint of Harvard Universi
Passwords: Philology, Security, Authentication

ISBN: 9780674980761 / Angielski / Twarda / 232 str.

ISBN: 9780674980761/Angielski/Twarda/232 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Brian Lennon
Cryptology, the science of ciphers and codes, and philology, the study of languages, are typically understood as separate domains. But Brian Lennon contends that computing's humanistic applications, no less than its technical ones, are marked by the priorities of security and military institutions devoted to fighting wars and decoding intelligence.
Cryptology, the science of ciphers and codes, and philology, the study of languages, are typically understood as separate domains. But Brian Lennon co...
cena: 204,08

 Blockchain: Beginners Bible - Discover How Blockchain Could Enrich Your Life, Your Business & Your Cryptocurrency Wallet Stephen Satoshi 9781976344756 Createspace Independent Publishing Platform
Blockchain: Beginners Bible - Discover How Blockchain Could Enrich Your Life, Your Business & Your Cryptocurrency Wallet

ISBN: 9781976344756 / Angielski / Miękka / 90 str.

ISBN: 9781976344756/Angielski/Miękka/90 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stephen Satoshi
cena: 53,71

 Future Data and Security Engineering: 4th International Conference, Fdse 2017, Ho Chi Minh City, Vietnam, November 29 - December 1, 2017, Proceedings Dang, Tran Khanh 9783319700038 Springer
Future Data and Security Engineering: 4th International Conference, Fdse 2017, Ho Chi Minh City, Vietnam, November 29 - December 1, 2017, Proceedings

ISBN: 9783319700038 / Angielski / Miękka / 492 str.

ISBN: 9783319700038/Angielski/Miękka/492 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Tran Khanh Dang; Roland Wagner; Josef Kung
cena: 205,02

 Cloud Computing, Security, Privacy in New Computing Environments: 7th International Conference, Cloudcomp 2016, and First International Conference, Sp Wan, Jiafu 9783319696041 Springer
Cloud Computing, Security, Privacy in New Computing Environments: 7th International Conference, Cloudcomp 2016, and First International Conference, Sp

ISBN: 9783319696041 / Angielski / Miękka / 240 str.

ISBN: 9783319696041/Angielski/Miękka/240 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jiafu Wan; Kai Lin; Delu Zeng
cena: 205,02

 Blockchain: 2 Manuscripts - Ultimate Beginners Guide to Mastering Bitcoin, Making Money with Cryptocurrency & Profiting from Block Stephen Satoshi 9781981102303 Createspace Independent Publishing Platform
Blockchain: 2 Manuscripts - Ultimate Beginners Guide to Mastering Bitcoin, Making Money with Cryptocurrency & Profiting from Block

ISBN: 9781981102303 / Angielski / Miękka / 198 str.

ISBN: 9781981102303/Angielski/Miękka/198 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Stephen Satoshi
cena: 41,31

 Guide to Automotive Connectivity and Cybersecurity: Trends, Technologies, Innovations and Applications Möller, Dietmar P. F. 9783319735115 Springer
Guide to Automotive Connectivity and Cybersecurity: Trends, Technologies, Innovations and Applications

ISBN: 9783319735115 / Angielski / Twarda / 645 str.

ISBN: 9783319735115/Angielski/Twarda/645 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Dietmar P. F. Moller; Roland E. Haas
cena: 410,09

 Animal Biometrics: Techniques and Applications Kumar, Santosh 9789811079559 Springer
Animal Biometrics: Techniques and Applications

ISBN: 9789811079559 / Angielski / Twarda / 243 str.

ISBN: 9789811079559/Angielski/Twarda/243 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Santosh Kumar; Sanjay Kumar Singh; Rishav Singh
cena: 389,58

 Digital Forensics with Kali Linux: Perform data acquisition, digital investigation, and threat analysis using Kali Linux tools Shiva V. N. Parasram, Alex Samm, Dale Joseph 9781788625005 Packt Publishing Limited
Digital Forensics with Kali Linux: Perform data acquisition, digital investigation, and threat analysis using Kali Linux tools

ISBN: 9781788625005 / Angielski / Miękka / 274 str.

ISBN: 9781788625005/Angielski/Miękka/274 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shiva V. N. Parasram;Alex Samm;Dale Joseph
Kali Linux is used mainly for penetration testing and digital forensics. This book will help you explore and unleash the tools available in Kali Linux for effective digital forensics investigations. Using practical examples, you will be able to make the most of forensics process such as investigation, evidence acquisition, and analysis.
Kali Linux is used mainly for penetration testing and digital forensics. This book will help you explore and unleash the tools available in Kali Linux...
cena: 194,00

 The GnuTLS 3.6.1 Manual Mavrogiannopoulos, Nikos 9781680921779 12th Media Services
The GnuTLS 3.6.1 Manual

ISBN: 9781680921779 / Angielski / Miękka / 350 str.

ISBN: 9781680921779/Angielski/Miękka/350 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Nikos Mavrogiannopoulos; Simon Josefsson
cena: 86,61

 Internet Password Logbook (Red Leatherette): Keep track of usernames, passwords, web addresses in one easy and organized location Editors of Rock Point 9781631065668 Quarto Publishing Group USA Inc
Internet Password Logbook (Red Leatherette): Keep track of usernames, passwords, web addresses in one easy and organized location

ISBN: 9781631065668 / Angielski / Twarda / 128 str.

ISBN: 9781631065668/Angielski/Twarda/128 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Editors of Rock Point
Password security is paramount in today's world. Data security experts advise a hard copy of all difficult passwords, and this Internet Password Logbook is the perfect record for them.
Password security is paramount in today's world. Data security experts advise a hard copy of all difficult passwords, and this Internet Password Logbo...
cena: 43,27

 Information Security and Cryptology - Icisc 2017: 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Kim, Howon 9783319785554 Springer
Information Security and Cryptology - Icisc 2017: 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected

ISBN: 9783319785554 / Angielski / Miękka / 369 str.

ISBN: 9783319785554/Angielski/Miękka/369 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Howon Kim; Dong-Chan Kim
This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017. The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions.
This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul...
cena: 205,02

 Gdpr and Cyber Security for Business Information Systems Antoni Gobeo Connor Fowler William J. Buchanan 9788793609136 River Publishers
Gdpr and Cyber Security for Business Information Systems

ISBN: 9788793609136 / Angielski / Twarda / 350 str.

ISBN: 9788793609136/Angielski/Twarda/350 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Antoni Gobeo; Connor Fowler; William J. Buchanan
The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. GDPR and Cyber Security for Business Information Systems is designed to present specific and practical information on the key areas of compliance to the GDPR relevant to Business Information Systems in a global context.
The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by th...
cena: 308,55

 Information Security and Privacy: 23rd Australasian Conference, Acisp 2018, Wollongong, Nsw, Australia, July 11-13, 2018, Proceedings Susilo, Willy 9783319936376 Springer
Information Security and Privacy: 23rd Australasian Conference, Acisp 2018, Wollongong, Nsw, Australia, July 11-13, 2018, Proceedings

ISBN: 9783319936376 / Angielski / Miękka / 833 str.

ISBN: 9783319936376/Angielski/Miękka/833 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Willy Susilo; Guomin Yang
This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions.
This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong...
cena: 401,89

 Interoperability, Safety and Security in Iot: Third International Conference, Interiot 2017, and Fourth International Conference, Saseiot 2017, Valenc Fortino, Giancarlo 9783319937960 Springer
Interoperability, Safety and Security in Iot: Third International Conference, Interiot 2017, and Fourth International Conference, Saseiot 2017, Valenc

ISBN: 9783319937960 / Angielski / Miękka / 165 str.

ISBN: 9783319937960/Angielski/Miękka/165 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Fortino Giancarlo; Carlos E. Palau; Antonio Guerrieri
This book constitutes the refereed post-conference proceedings of the Third International Conference on Interoperability, InterIoT 2017, which was collocated with SaSeIoT 2017, and took place in Valencia, Spain, in November 2017.
This book constitutes the refereed post-conference proceedings of the Third International Conference on Interoperability, InterIoT 2017, which was col...
cena: 172,25

 Learn Red - Fundamentals of Red Ivo Balbaert 9781789130706 Packt Publishing
Learn Red - Fundamentals of Red

ISBN: 9781789130706 / Angielski / Miękka / 252 str.

ISBN: 9781789130706/Angielski/Miękka/252 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Ivo Balbaert
A key problem of software development today is the software bloat, where huge toolchains and development environments are needed in software coding and deployment. Red significantly reduces this bloat by offering a minimal but complete toolchain. This is the first introductory book on Red, and it will get you up and running as quickly as possible.
A key problem of software development today is the software bloat, where huge toolchains and development environments are needed in software coding an...
cena: 171,95

Pierwsza Podprzednia  130  131  132  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia