![]() |
Cyber Defense and Situational Awareness
ISBN: 9783319113906 / Angielski / Twarda / 329 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for...
This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It ...
|
cena:
402,53 |
![]() |
Secure It Systems: 19th Nordic Conference, Nordsec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings
ISBN: 9783319115986 / Angielski / Miękka / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 19th Nordic Conference on Secure IT Systems, held in Tromso, Norway, in October 2014. The 15 full papers presented in this volume were carefully reviewed and selected from 42 submissions. They are organized in topical sections named: information management and data privacy; cloud, big data and virtualization security; network security and logging; attacks and defenses; and security in healthcare and biometrics. The volume also contains one full-paper invited talk.
This book constitutes the proceedings of the 19th Nordic Conference on Secure IT Systems, held in Tromso, Norway, in October 2014. The 15 full papers ...
|
cena:
193,23 |
![]() |
Post-Quantum Cryptography: 6th International Workshop, Pqcrypto 2014, Waterloo, On, Canada, October 1-3, 2014. Proceedings
ISBN: 9783319116587 / Angielski / Miękka / 284 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 6th International Workshop on Post-Quantum Cryptography, PQCrypto 2014, held in Waterloo, ON, Canada, in October 2014. The 16 revised full papers presented were carefully reviewed and selected from 37 submissions. The papers cover all technical aspects of cryptographic research related to the future world with large quantum computers such as code-based cryptography, lattice-based cryptography, multivariate cryptography, isogeny-based cryptography, security proof frameworks, cryptanalysis and implementations.
This book constitutes the refereed proceedings of the 6th International Workshop on Post-Quantum Cryptography, PQCrypto 2014, held in Waterloo, ON, Ca...
|
cena:
201,24 |
![]() |
Network and System Security: 8th International Conference, Nss 2014, Xi'an, China, October 15-17, 2014. Proceedings
ISBN: 9783319116976 / Angielski / Miękka / 576 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 8th International Conference on Network and System Security, NSS 2014, held in Xi'an, China, in October 2014. The 35 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 155 initial submissions. The papers are organized in topical sections on cloud computing, access control, network security, security analysis, public key cryptography, system security, privacy-preserving systems and biometrics, and key management and distribution.
This book constitutes the proceedings of the 8th International Conference on Network and System Security, NSS 2014, held in Xi'an, China, in October 2...
|
cena:
201,24 |
![]() |
Security and Trust Management: 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings
ISBN: 9783319118505 / Angielski / Miękka / 210 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management, STM 2014, held in Wroclaw, Poland, in September 2014, in conjunction with the 19th European Symposium Research in Computer Security, ESORICS 2014. The 11 revised full papers were carefully reviewed and selected from 29 submissions and cover topics as access control, data protection, digital rights, security and trust policies, security and trust in social networks.
This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management, STM 2014, held in Wroclaw, Poland,...
|
cena:
193,23 |
![]() |
Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers
ISBN: 9783662447734 / Angielski / Miękka / 249 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This books constitutes the thoroughly refereed papers and poster abstracts from the FC 2014 Workshops, the First Workshop on Bitcoin Research, BITCOIN 2014, and the Second Workshop on Applied Homomorphic Cryptography and Encrypted Computing, WAHC 2014, co-located with the 18th International Conference on Financial Cryptography and Data Security, held in Christ Church, Barbados, on March 7, 2014. The 15 full papers and 3 poster abstracts presented were carefully reviewed and selected from 30 submissions. They are grouped in topical sections on Bitcoin transactions, policy and legal issues;...
This books constitutes the thoroughly refereed papers and poster abstracts from the FC 2014 Workshops, the First Workshop on Bitcoin Research, BITCOIN...
|
cena:
201,24 |
![]() |
Communications and Multimedia Security: 15th Ifip Tc 6/Tc 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings
ISBN: 9783662448847 / Angielski / Miękka / 157 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2014, held in Aveiro, Portugal, in September 2014.
The 4 revised full papers presented together with 6 short papers, 3 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on vulnerabilities and threats, identification and authentification, applied security. This book constitutes the refereed proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 201...
|
cena:
161,03 |
![]() |
Advances in Digital Forensics X: 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers
ISBN: 9783662449516 / Angielski / Twarda / 335 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security...
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wirele...
|
cena:
201,24 |
![]() |
Integer Algorithms in Cryptology and Information Assurance
ISBN: 9789814623742 / Angielski / Twarda / 460 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Integer Algorithms in Cryptology and Information Assurance is a collection of the author's own innovative approaches in algorithms and protocols for secret and reliable communication. It concentrates on the “what” and “how” behind implementing the proposed cryptographic algorithms rather than on formal proofs of “why” these algorithms work.The book consists of five parts (in 28 chapters) and describes the author's research results in: This text contains innovative cryptographic algorithms; computationally efficient algorithms for...
Integer Algorithms in Cryptology and Information Assurance is a collection of the author's own innovative approaches in algorithms and protocol...
|
cena:
705,83 |
![]() |
Securing Voip: Keeping Your Voip Network Safe
ISBN: 9780124170391 / Angielski / Miękka / 220 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans,... Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiti... |
cena:
180,06 |
![]() |
Trusted Computing Platforms: Design and Applications
ISBN: 9781489997739 / Angielski / Miękka / 239 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. How can one trust computation taking place at a remote site, particularly if a party at that site might have motivation to subvert this trust? In recent years, industrial efforts have advanced the notion of a "trusted computing platform" as a building block. Through a conspiracy of hardware and software magic, these platforms attempt to solve this remote trust problem, to preserve various critical properties against various types of adversaries. However, these current efforts are just points on a larger continuum, which ranges from earlier work on secure coprocessor design and... How can one trust computation taking place at a remote site, particularly if a party at that site might have motivation to subvert this trust? In r... |
cena:
402,53 |
![]() |
Beaglebone for Secret Agents
ISBN: 9781783986040 / Angielski / Miękka / 162 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
114,59 |
![]() |
Securing Wireless Communications at the Physical Layer
ISBN: 9781489983756 / Angielski / Miękka / 396 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Securing communications is a challenging task. A ?rst attempt at security involves learning basic cryptography, and applying encryption algorithms to make messages unintelligible to adversaries. However, rarely is the task of securing a message - changesosimple.Whenonestepsbackandcontemplateshowtosecuretheexchange of communications, one realizes that the challenge is fundamentally one of bui- ing a complete solution. For example, one must ensure that all entities involved have proper and authenticated cryptographic material, or one must ensure that one veri?ably knows to whom one is...
Securing communications is a challenging task. A ?rst attempt at security involves learning basic cryptography, and applying encryption algorithms to ...
|
cena:
603,81 |
![]() |
Information Security and Cryptology -- Icisc 2013: 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers
ISBN: 9783319121598 / Angielski / Miękka / 538 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013. The 31 revised full papers presented together with 2 invited talks were carefully selected from 126 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on secure multiparty computation, proxy re-encryption, side channel analysis and...
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology,...
|
cena:
201,24 |
![]() |
Cryptology and Network Security: 13th International Conference, Cans 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings
ISBN: 9783319122793 / Angielski / Miękka / 401 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 13th International Conference on Cryptology and Network Security, CANS 2014, held in Heraklion, Creete, Greece, in October 2014. The 25 revised full papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected from 86 submissions. The papers cover topics of interest such as encryption; cryptanalysis; malware analysis; and privacy and identification systems as well as various types of network protocol design and analysis work.
This book constitutes the refereed proceedings of the 13th International Conference on Cryptology and Network Security, CANS 2014, held in Heraklion, ...
|
cena:
201,24 |
![]() |
Provable Security: 8th International Conference, Provsec 2014, Hong Kong, China, October 9-10, 2014. Proceedings
ISBN: 9783319124742 / Angielski / Miękka / 351 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 20 full papers and 7 short papers presented together with 2 invited talks were carefully reviewed and selected from 68 submissions. The papers are grouped in topical sections on fundamental, symmetric key encryption, authentication, signatures, protocol, public key encryption, proxy re-encryption, predicate encryption, and attribute-based cryptosystem.
This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in Sept...
|
cena:
201,24 |
![]() |
Progress in Cryptology -- Indocrypt 2014: 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings
ISBN: 9783319130385 / Angielski / Miękka / 444 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 15th International Conference on Cryptology in India, INDOCRYPT 2014, held in New Delhi, India, in December 2014. The 25 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on side channel analysis; theory; block ciphers; cryptanalysis; efficient hardware design; protected hardware design; elliptic curves.
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology in India, INDOCRYPT 2014, held in New Delhi, India, ...
|
cena:
201,24 |
![]() |
Selected Areas in Cryptography -- Sac 2014: 21st International Conference, Montreal, Qc, Canada, August 14-15, 2014, Revised Selected Papers
ISBN: 9783319130507 / Angielski / Miękka / 381 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014.
The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and... This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, ...
|
cena:
201,24 |
![]() |
Radio Frequency Identification: Security and Privacy Issues: 10th International Workshop, Rfidsec 2014, Oxford, Uk, July 21-23, 2014, Revised Selected
ISBN: 9783319130651 / Angielski / Miękka / 215 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed post-proceedings of the 10th Workshop on RFID Security and Privacy, RFIDSec 2014, held in Oxford, UK, in 2014. The 9 revised full papers and 4 short papers presented in this volume were carefully reviewed and selected from 27 submissions. The papers deal with topics such as RFID power-efficiency, privacy, authentication and side channels, and key exchange.
This book constitutes the refereed post-proceedings of the 10th Workshop on RFID Security and Privacy, RFIDSec 2014, held in Oxford, UK, in 2014. The ...
|
cena:
193,23 |
![]() |
Financial Cryptography and Data Security: 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers
ISBN: 9783662454718 / Angielski / Miękka / 506 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC 2014), held in Christ Church, Barbados, in March 2014. The 19 revised full papers and 12 short papers were carefully selected and reviewed from 165 abstract registrations and 138 full papers submissions. The papers are grouped in the following topical sections: payment systems, case studies, cloud and virtualization, elliptic curve cryptography, privacy-preserving systems, authentication and visual encryption, network security, mobile...
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Secu...
|
cena:
201,24 |