![]() |
Cryptographic Security Architecture: Design and Verification
ISBN: 9781441929808 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar cryptovariables. It is the foundation for enforcing computer security policies and controls and preempting system misuse. This book provides a comprehensive design for a portable, flexible high-security cryptographic architecture, with particular emphasis on incorporating rigorous security models and practices. "Cryptographic Security Architecture" unveils an alternative means of building a trustworthy system based on concepts... A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar ... |
cena:
403,47 |
![]() |
Intrusion Detection and Correlation: Challenges and Solutions
ISBN: 9781441936240 / Angielski / Miękka / 118 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and cryptography. The Internet is omnipresent and companies have increasingly put critical resources online. This has given rise to the activities of cyber criminals. Virtually all organizations face increasing threats to their networks and the... Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the proble... |
cena:
403,47 |
![]() |
Image and Video Encryption: From Digital Rights Management to Secured Personal Communication
ISBN: 9781441936257 / Angielski / Miękka / 161 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....). The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material. Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from com... |
cena:
461,11 |
![]() |
Multimedia Encryption and Watermarking
ISBN: 9781441937438 / Angielski / Miękka / 327 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which enable a secure exchange of multimedia intellectual property. Part I, Digital Rights Management (DRM) for Multimedia, introduces DRM concepts and models for multimedia content protection, and presents the key players. Part II, Multimedia Cryptography, provides an overview of modern cryptography, with the focus on modern image, video, speech, and audio encryption techniques. This book also provides an advanced concept of visual and audio... Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which ena... |
cena:
605,23 |
![]() |
A Classical Introduction to Cryptography: Applications for Communications Security
ISBN: 9781441937971 / Angielski / Miękka / 336 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes. This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra and number theory for cryptologists; public key cryptography and cryptanalysis of these schemes; and other cryptographic protocols, e.g. secret sharing, zero-knowledge proofs and undeniable signature... A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication securit... |
cena:
342,95 |
![]() |
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
ISBN: 9781441954381 / Angielski / Miękka / 396 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research. "Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions analyzing such areas of AI as fuzzy set theory, predicate logic, neural networks, clustering, data mining and others. It also presents applications of AI as possible solutions for problems like firm bankruptcy, soil erosion, flight control and others. ...Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading E... |
cena:
922,27 |
![]() |
Digitale Signaturen
ISBN: 9783540423515 / Angielski / Twarda / 280 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digitale Signaturen basieren auf kryptographischen Algorithmen. Nationale Gesetze zielen auf die beweisrechtliche Gleichstellung digitaler/elektronischer Signaturen mit handschriftlichen Unterschriften. Die Falschungssicherheit digitaler Signaturen ist dabei eine wesentliche Voraussetzung. Im Buch werden die bekannten Verfahren der Gultigkeitsprufung digitaler Signaturen vorgestellt, Probleme analysiert und neue Losungsansatze vorgeschlagen. Dabei werden die Vorgaben des Signaturgesetzes und X.509 berucksichtigt. Die Theorie uber Abgabe und Zugang von Erklarungen des BGB wird dem Verfahren...
Digitale Signaturen basieren auf kryptographischen Algorithmen. Nationale Gesetze zielen auf die beweisrechtliche Gleichstellung digitaler/elektronisc...
|
cena:
263,94 |
![]() |
Advances in Cryptology - Crypto '89: Proceedings
ISBN: 9780387973173 / Angielski / Miękka / 634 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. CRYPTO is a conference devoted to all aspects of cryptologic research. It is held each year at the University of California at Santa Barbara. Annual meetings on this topic also take place in Europe and are regularly published in this Lecture Notes series under the name of EUROCRYPT. This volume presents the proceedings of the ninth CRYPTO meeting. The papers are organized into sections with the following themes: Why is cryptography harder than it looks?, pseudo-randomness and sequences, cryptanalysis and implementation, signature and authentication, threshold schemes and key management, key...
CRYPTO is a conference devoted to all aspects of cryptologic research. It is held each year at the University of California at Santa Barbara. Annual m...
|
cena:
201,72 |
![]() |
Sicherheit Und Vertrauen in Der Mobilen Informations- Und Kommunikationstechnologie: Tagungsband Zur Eict-Konferenz It-Sicherheit
ISBN: 9783834808172 / Niemiecki / Miękka Termin realizacji zamówienia: ok. 5-8 dni roboczych. Udo Bub, Klaus-Dieter Wolfenstetter Angesichts der Dynamik des technologischen Wandels und der umfassenden Verbreitung der Informations- und Kommunikationstechnologien (IKT) haben Unternehmen, Privatpersonen und offentliche Hand einen wachsenden Bedarf an Datenschutz und Sicherheit im Netz. Dabei stehen Industrie, Forschung und Politik - je nach Aufgabenstellung - vor zwei Herausforderungen: Einerseits verlangen innovative Anwendungen, die durch zunehmende Mobilitat gepragt sind, angemessene Sicherheitslosungen und einen ausgewogenen Datenschutz, andererseits mussen auch bereits bestehende...
Udo Bub, Klaus-Dieter Wolfenstetter Angesichts der Dynamik des technologischen Wandels und der umfassenden Verbreitung der Informations- und Kommunika...
|
cena:
37,68 |
![]() |
Datenschutz Kompakt Und Verständlich: Eine Praxisorientierte Einführung
ISBN: 9783834812254 / Niemiecki / Miękka / 246 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Das Thema "Datenschutz" geht jeden an, der an verantwortlicher Stelle mit IT zu tun hat, d. h. nicht nur den Datenschutzbeauftragten. Es geht um die Verarbeitung personenbezogener Daten und die Gewahrleistung des informationellen Selbstbestimmungsrechtes der betroffenen Individuen. Daran kommt heute kein Informatiker oder Marketingverantwortlicher mehr vorbei. "Datenschutz kompakt und verstandlich" vermittelt fundiertes Basis- und Praxiswissen. Die BDSG-Novellen 2009 werden ebenso wie z. B. das neue IT-Grundrecht auf die betriebliche und behordliche Praxis angewendet.
Dieses Buch eignet... Das Thema "Datenschutz" geht jeden an, der an verantwortlicher Stelle mit IT zu tun hat, d. h. nicht nur den Datenschutzbeauftragten. Es geht um die V...
|
cena:
131,95 |
![]() |
Decrypted Secrets: Methods and Maxims of Cryptology
ISBN: 9783642063831 / Angielski / Miękka / 525 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In today's unsafe and increasingly wired world cryptology plays a vital role in protecting communication channels, databases, and software from unwanted intruders. This revised and extended third edition of the classic reference work on cryptology now contains many new technical and biographical details. The first part treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis, where particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a... In today's unsafe and increasingly wired world cryptology plays a vital role in protecting communication channels, databases, and software from unw... |
cena:
806,99 |
![]() |
Intelligence and Security Informatics: Techniques and Applications
ISBN: 9783642088704 / Angielski / Miękka / 460 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) conference series (http: //www. isiconference. org) have drawn significant attention in the recent years. Intelligence and Security Informatics is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The ISI conference series have brought together academic researchers, law enforcement and intelligence experts, -...
The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (P...
|
cena:
605,23 |
![]() |
Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore
ISBN: 9783642173721 / Angielski / Miękka / 634 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ASIACRYPT 2010 was held in the Swiss otel Merchant Court in Singapore, d- ing December 5-9, 2010. The conference was sponsored by the International Association for Cryptologic Research (IACR) in cooperation with the Coding and Cryptography Research Group of Nanyang Technological University. It was also supported by the Singapore Tourism Board, and co-sponsored by the - tional Research Foundation of Singapore, Lee Foundation, IBM Singapore Ltd., O'Connor'sSingaporeLtd., Pu?ersoftLtd., PrivylinkLtd., Hewlett-PackardS- gaporeLtd., JardineOneSolutionLtd., andSingaporeMathematicalSociety.San Ling...
ASIACRYPT 2010 was held in the Swiss otel Merchant Court in Singapore, d- ing December 5-9, 2010. The conference was sponsored by the International As...
|
cena:
201,72 |
![]() |
Security Technology, Disaster Recovery and Business Continuity: International Conferences, Sectech and Drbc 2010, Held as Part of the Future Generatio
ISBN: 9783642176098 / Angielski / Miękka / 300 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Welcome to the proceedings of the 2010 International Conferences on Security Te- nology (SecTech 2010), and Disaster Recovery and Business Continuity (DRBC 2010) - two of the partnering events of the Second International Mega-Conference on Future Generation Information Technology (FGIT 2010). SecTech and DRBC bring together researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of security and disaster recovery methodologies, including their links to c- putational sciences, mathematics and information...
Welcome to the proceedings of the 2010 International Conferences on Security Te- nology (SecTech 2010), and Disaster Recovery and Business Continuity ...
|
cena:
201,72 |
![]() |
Cryptology and Network Security: 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings
ISBN: 9783642176180 / Angielski / Miękka / 355 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12-14, 2010. The conference was co-organized by the Multimedia University (MMU), Malaysia, and Universiti Tunku Abdul Rahman (UTAR), Malaysia. The conference received 64 submissions from 22 countries, out of which 21 were accepted after a careful and thorough review process. These proceedings also contain abstracts for two invited talks. All submissions were reviewed by at least three members of the Program Committee; those authored or co-authored by Program...
The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12-14, 2010. The co...
|
cena:
201,72 |
![]() |
Digital Watermarking: 9th International Workshop, Iwdw 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers
ISBN: 9783642184048 / Angielski / Miękka / 317 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held in Seoul, Korea, in October 2010. The 26 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on forensics, visual cryptography, robust watermarking, steganography, fingerprinting, and steganalysis.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held i...
|
cena:
201,72 |
![]() |
Transactions on Computational Science XI: Special Issue on Security in Computing, Part II
ISBN: 9783642176968 / Angielski / Miękka / 294 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Transactions on Computational Science XI reflects recent developments in the field of Computational Science. Each chapter addresses a range of hot topics within the sphere of security research, including new architectures, novel hardware implementations, and more.
Transactions on Computational Science XI reflects recent developments in the field of Computational Science. Each chapter addresses a range of hot top...
|
cena:
201,72 |
![]() |
Computational Number Theory
ISBN: 9781439866153 / Angielski / Twarda / 614 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Developed from the author s popular graduate-level course, Computational Number Theory presents a complete treatment of number-theoretic algorithms. Avoiding advanced algebra, this self-contained text is designed for advanced undergraduate and beginning graduate students in engineering. It is also suitable for researchers new to the field and practitioners of cryptography in industry. Requiring no prior experience with number theory or sophisticated algebraic tools, the book covers many computational aspects of number theory and highlights important and... Developed from the author s popular graduate-level course, Computational Number Theory presents a complete treatment of number-the... |
cena:
584,14 |
![]() |
Communication and Cyberspace
ISBN: 9781572733947 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. A study of communication in the electronic environment known as cyberspace. It features essays on theoretical contexts, discussion and research on cybernetworks and cyberspaces, studies of new senses of space and navigation (cybernautics) and explorations of cybercommunication and cyberculture.
A study of communication in the electronic environment known as cyberspace. It features essays on theoretical contexts, discussion and research on cyb...
|
cena:
131,39 |
![]() |
Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011, Proceedings
ISBN: 9783642190735 / Angielski / Miękka / 417 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2011, CT-RSA 2011, held in San Francisco, CA, USA, in February 2011.
The 24 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on secure two-party computation, cryptographic primitives, side channel attacks, authenticated key agreement, proofs of security, block ciphers, security notions, public-key encryption, crypto tools and parameters, and digital signatures. This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2011, CT-RSA 2011, held in San Francisco, CA, USA, i...
|
cena:
201,72 |