![]() |
Algebraic Geometry for Coding Theory and Cryptography: Ipam, Los Angeles, Ca, February 2016
ISBN: 9783319639307 / Angielski / Twarda / 150 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Covering topics in algebraic geometry, coding theory, and cryptography, this volume presents interdisciplinary group research completed for the February 2016 conference at the Institute for Pure and Applied Mathematics (IPAM) in cooperation with the Association for Women in Mathematics (AWM).
Covering topics in algebraic geometry, coding theory, and cryptography, this volume presents interdisciplinary group research completed for the Februa...
|
cena:
697,18 |
![]() |
Cryptographic Hardware and Embedded Systems - Ches 2017: 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings
ISBN: 9783319667867 / Angielski / Miękka / 710 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017.
The 33 full papers presented in this volume were carefully reviewed and selected from 130 submissions. The annual CHES conference highlights new results in the design and analysis of cryptographic hardware and soft- ware implementations. The workshop builds a valuable bridge between the research and cryptographic engineering communities and attracts participants from industry, academia, and government... This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, ...
|
cena:
410,09 |
![]() |
Journal of Cyber Security and Mobility (5-3)
ISBN: 9788793609129 / Angielski / Miękka / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Aim Scope The journal covers security issues in cyber space and solutions thereof. As cyber space has moved towards the wireless/mobile world, issues in wireless/mobile communications will also be published. The publication will take a holistic view. Some example topics are: security in mobile networks, security and mobility... Aim |
cena:
199,24 |
![]() |
Lattices Applied to Coding for Reliable and Secure Communications
ISBN: 9783319678818 / Angielski / Miękka / 120 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book provides a first course on lattices - mathematical objects pertaining to the realm of discrete geometry, which are of interest to mathematicians for their structure and, at the same time, are used by electrical and computer engineers working on coding theory and cryptography.
This book provides a first course on lattices - mathematical objects pertaining to the realm of discrete geometry, which are of interest to mathematic...
|
cena:
246,04 |
![]() |
Ubiquitous Networking: Third International Symposium, Unet 2017, Casablanca, Morocco, May 9-12, 2017, Revised Selected Papers
ISBN: 9783319681788 / Angielski / Miękka / 659 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Third International Symposium on Ubiquitous Networking, UNet 2017, held in Casablanca, Morocco, in May 2017. The 56 full papers presented in this volume were carefully reviewed and selected from 127 submissions.
This book constitutes the refereed proceedings of the Third International Symposium on Ubiquitous Networking, UNet 2017, held in Casablanca, Morocco, ...
|
cena:
205,02 |
![]() |
Passwords: Philology, Security, Authentication
ISBN: 9780674980761 / Angielski / Twarda / 232 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptology, the science of ciphers and codes, and philology, the study of languages, are typically understood as separate domains. But Brian Lennon contends that computing's humanistic applications, no less than its technical ones, are marked by the priorities of security and military institutions devoted to fighting wars and decoding intelligence.
Cryptology, the science of ciphers and codes, and philology, the study of languages, are typically understood as separate domains. But Brian Lennon co...
|
cena:
204,08 |
![]() |
Blockchain: Beginners Bible - Discover How Blockchain Could Enrich Your Life, Your Business & Your Cryptocurrency Wallet
ISBN: 9781976344756 / Angielski / Miękka / 90 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
53,71 |
![]() |
Future Data and Security Engineering: 4th International Conference, Fdse 2017, Ho Chi Minh City, Vietnam, November 29 - December 1, 2017, Proceedings
ISBN: 9783319700038 / Angielski / Miękka / 492 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
205,02 |
![]() |
Cloud Computing, Security, Privacy in New Computing Environments: 7th International Conference, Cloudcomp 2016, and First International Conference, Sp
ISBN: 9783319696041 / Angielski / Miękka / 240 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
205,02 |
![]() |
Blockchain: 2 Manuscripts - Ultimate Beginners Guide to Mastering Bitcoin, Making Money with Cryptocurrency & Profiting from Block
ISBN: 9781981102303 / Angielski / Miękka / 198 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
41,31 |
![]() |
Guide to Automotive Connectivity and Cybersecurity: Trends, Technologies, Innovations and Applications
ISBN: 9783319735115 / Angielski / Twarda / 645 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
410,09 |
![]() |
Animal Biometrics: Techniques and Applications
ISBN: 9789811079559 / Angielski / Twarda / 243 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
389,58 |
![]() |
Digital Forensics with Kali Linux: Perform data acquisition, digital investigation, and threat analysis using Kali Linux tools
ISBN: 9781788625005 / Angielski / Miękka / 274 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Kali Linux is used mainly for penetration testing and digital forensics. This book will help you explore and unleash the tools available in Kali Linux for effective digital forensics investigations. Using practical examples, you will be able to make the most of forensics process such as investigation, evidence acquisition, and analysis.
Kali Linux is used mainly for penetration testing and digital forensics. This book will help you explore and unleash the tools available in Kali Linux...
|
cena:
194,00 |
![]() |
The GnuTLS 3.6.1 Manual
ISBN: 9781680921779 / Angielski / Miękka / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
86,61 |
![]() |
Internet Password Logbook (Red Leatherette): Keep track of usernames, passwords, web addresses in one easy and organized location
ISBN: 9781631065668 / Angielski / Twarda / 128 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Password security is paramount in today's world. Data security experts advise a hard copy of all difficult passwords, and this Internet Password Logbook is the perfect record for them.
Password security is paramount in today's world. Data security experts advise a hard copy of all difficult passwords, and this Internet Password Logbo...
|
cena:
43,27 |
![]() |
Information Security and Cryptology - Icisc 2017: 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected
ISBN: 9783319785554 / Angielski / Miękka / 369 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul, South Korea, in November/December 2017. The total of 20 papers presented in this volume were carefully reviewed and selected from 70 submissions.
This book constitutes revised selected papers from the 20th International Conference on Information Security and Cryptology, ICISC 2017, held in Seoul...
|
cena:
205,02 |
![]() |
Gdpr and Cyber Security for Business Information Systems
ISBN: 9788793609136 / Angielski / Twarda / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. GDPR and Cyber Security for Business Information Systems is designed to present specific and practical information on the key areas of compliance to the GDPR relevant to Business Information Systems in a global context.
The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by th...
|
cena:
308,55 |
![]() |
Information Security and Privacy: 23rd Australasian Conference, Acisp 2018, Wollongong, Nsw, Australia, July 11-13, 2018, Proceedings
ISBN: 9783319936376 / Angielski / Miękka / 833 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018. The 41 revised full papers and 10 short papers presented were carefully revised and selected from 136 submissions.
This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong...
|
cena:
401,89 |
![]() |
Interoperability, Safety and Security in Iot: Third International Conference, Interiot 2017, and Fourth International Conference, Saseiot 2017, Valenc
ISBN: 9783319937960 / Angielski / Miękka / 165 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed post-conference proceedings of the Third International Conference on Interoperability, InterIoT 2017, which was collocated with SaSeIoT 2017, and took place in Valencia, Spain, in November 2017.
This book constitutes the refereed post-conference proceedings of the Third International Conference on Interoperability, InterIoT 2017, which was col...
|
cena:
172,25 |
![]() |
Learn Red - Fundamentals of Red
ISBN: 9781789130706 / Angielski / Miękka / 252 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A key problem of software development today is the software bloat, where huge toolchains and development environments are needed in software coding and deployment. Red significantly reduces this bloat by offering a minimal but complete toolchain. This is the first introductory book on Red, and it will get you up and running as quickly as possible.
A key problem of software development today is the software bloat, where huge toolchains and development environments are needed in software coding an...
|
cena:
171,95 |