![]() |
Advances in Cryptology - Asiacrypt 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vi
ISBN: 9783662538890 / Angielski / Miękka / 1055 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable... The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applicatio... |
cena:
402,53 |
![]() |
Hijacked By Hackers Be Afraid: Be very, Very Afraid
ISBN: 9781539525080 / Angielski / Miękka / 254 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Come with us on a journey through the shadowy corridors of the "Dark Web" to examine what goes on in a hacker's mind. Learn about the hacker's tricks and tools of the trade used to entice or frighten people into following their lead. You'll read stories of cyber criminals who went legit, creating quite the stir in corporations like Google and Microsoft. You'll also be introduced to hackers who have threatened our national security and compromised global systems to reveal their secrets. Most importantly, you learn about how you can protect your personal and professional data from the secret...
Come with us on a journey through the shadowy corridors of the "Dark Web" to examine what goes on in a hacker's mind. Learn about the hacker's tricks ...
|
cena:
63,82 |
![]() |
Classical Encryption: Classical Ciphers
ISBN: 9781539569930 / Angielski / Miękka / 148 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In cryptography, a classical cipher is a type of cipher that was used historically but now has fallen, for the most part, into disuse. The term includes the simple systems used since Greek and Roman times; the elaborate Renaissance ciphers, World War II cryptography such as the Enigma machine and beyond.
In cryptography, a classical cipher is a type of cipher that was used historically but now has fallen, for the most part, into disuse. The term includ...
|
cena:
95,78 |
![]() |
Information Systems Security: 12th International Conference, Iciss 2016, Jaipur, India, December 16-20, 2016, Proceedings
ISBN: 9783319498058 / Angielski / Miękka / 544 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security. This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, In... |
cena:
201,24 |
![]() |
Progress in Cryptology - Indocrypt 2016: 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings
ISBN: 9783319498898 / Angielski / Miękka / 429 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 17th International Conference on Cryptology in India, INDOCRYPT 2016, held in Kolkata, India, in December 2016. The 23 revised full papers presented in this book were carefully reviewed and selected from 84 submissions. The focus of the conference includes works on Public-Key Cryptography, Cryptographic Protocols, Side-Channel Attacks, Implementation of Cryptographic Schemes, Functional Encryption, Symmetric-Key Cryptanalysis, Foundations, and New Cryptographic Constructions.
This book constitutes the refereed proceedings of the 17th International Conference on Cryptology in India, INDOCRYPT 2016, held in Kolkata, India, in...
|
cena:
201,24 |
![]() |
Information and Communications Security: 18th International Conference, Icics 2016, Singapore, Singapore, November 29 - December 2, 2016, Proceedings
ISBN: 9783319500102 / Angielski / Miękka / 478 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Singapore, Singapore, in November/December 2016.
The 20 revised full papers and 16 short papers presented were carefully selected from 60 submissions. The papers cover topics such as IoT security; cloud security; applied cryptography; attack behaviour analytics; authentication and authorization; engineering issues of cryptographic and security systems; privacy protection; risk evaluation and security; key management and language-based security;... This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Si...
|
cena:
201,24 |
![]() |
Hacking University Graduation Edition: 4 Manuscripts (Computer, Mobile, Python & Linux): Hacking Computers, Mobile Devices, Apps, Game Consoles and Le
ISBN: 9781539695172 / Angielski / Miękka / 416 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Complete Hacking University Series is here Learn everything you need to know to dominate and ensure the skills needed to hack and learn 2 popular programming languages.
This book will contain 4 manuscripts related to the topics of hacking and programming. Hacking University: Graduation edition includes Volumes 1-4 in the "Hacking Freedom and Data Driven book series." Over 300+ pages of valuable information will be included in this bundle. The Complete Hacking University Series is here Learn everything you need to know to dominate and ensure the skills needed to hack and learn 2...
|
cena:
103,69 |
![]() |
Security Solutions and Applied Cryptography in Smart Grid Communications
ISBN: 9781522518297 / Angielski / Twarda / 492 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Presents the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across a range of relevant perspectives and topics, such as threat detection, authentication, and intrusion detection, this book is designed for academics, researchers, engineers and students.
Presents the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across a rang...
|
cena:
1086,90 |
![]() |
Foundations and Practice of Security: 9th International Symposium, Fps 2016, Québec City, Qc, Canada, October 24-25, 2016, Revised Selected Papers
ISBN: 9783319519654 / Angielski / Miękka / 361 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Security, FPS 2016, held in Quebec City, QC, Canada, in October 2016.
The 18 revised regular papers presented together with 5 short papers and 3 invited talks were carefully reviewed and selected from 34 submissions. The accepted papers cover diverse research themes, ranging from classic topics, such as malware, anomaly detection, and privacy, to emerging issues, such as security and privacy in mobile computing and cloud. This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Securit... |
cena:
201,24 |
![]() |
Topics in Cryptology - Ct-Rsa 2017: The Cryptographers' Track at the Rsa Conference 2017, San Francisco, Ca, Usa, February 14-17, 2017, Proceedings
ISBN: 9783319521527 / Angielski / Miękka / 452 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2017, CT-RSA 2017, held in San Francisco, CA, USA, in February 2017. The 25 papers presented in this volume were carefully reviewed and selected from 77 submissions. CT-RSA has become a major publication venue in cryptography. It covers a wide variety of topics from public-key to symmetric key cryptography and from cryptographic protocols to primitives and their implementation security. This year selected topics such as cryptocurrencies and white-box cryptography were added to... This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2017, CT-RSA 2017, held in San Francisco, CA, USA... |
cena:
201,24 |
![]() |
Cryptographic Algorithms
ISBN: 9781541040069 / Angielski / Miękka / 154 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in practice by any adversary. It is theoretically possible to break such a system, but it is infeasible to do so by any known practical means.
Modern cryptography is heavily based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational ...
|
cena:
299,33 |
![]() |
Electronic Voting: First International Joint Conference, E-Vote-Id 2016, Bregenz, Austria, October 18-21, 2016, Proceedings
ISBN: 9783319522395 / Angielski / Miękka / 233 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed conference proceedings of the First Interational Joint Conference on Electronic Voting, E-Vote-ID 2016, held in Bregenz, Austria, in October 2016. The 14 full papers presented were carefully reviewed and selected from 57 submissions. They represent a wide range of technological proposals for different voting settings (be it in polling stations, remote voting or even mobile voting) and case studies from different countries already using electronic voting or having conducted first trial elections. This book constitutes the thoroughly refereed conference proceedings of the First Interational Joint Conference on Electronic Voting, E-Vote-ID 201... |
cena:
201,24 |
![]() |
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
ISBN: 9781119396215 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Hacking the Hacker is a motivational book demonstrating that the best hackers in the world are the previously unsung white hat hacker heroes who are continuously fighting the bad hackers in a never ending digital war. It contains 18 chapters dedicated to profiling many of today's most world renown computer security experts and luminaries, including why they chose their field, and describe their most notable work and contributions. Before each profile chapter will be an introductory technology chapter discussing how hackers attack a particular technology or with a specific methodology...
Hacking the Hacker is a motivational book demonstrating that the best hackers in the world are the previously unsung white hat hacker heroes wh...
|
cena:
105,67 |
![]() |
Information Security and Cryptology - Icisc 2016: 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected
ISBN: 9783319531762 / Angielski / Miękka / 351 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Seoul, South Korea, in November/December 2016. This book constitutes revised selected papers from the 19th International Conference on Information Security and Cryptology, ICISC 2016, held in Se... |
cena:
201,24 |
![]() |
The Cybersecurity Dilemma: Network Intrusions, Trust and Fear in the International System
ISBN: 9781849047135 / Angielski / Miękka / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Reveals the pressure points for international relations precipitated by states' use of cyber espionage.
Reveals the pressure points for international relations precipitated by states' use of cyber espionage.
|
cena:
150,97 |
![]() |
Digital Forensics and Watermarking: 15th International Workshop, Iwdw 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers
ISBN: 9783319534640 / Angielski / Miękka / 618 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the revised post-conference proceedings of the 14thInternational Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, Japan, in September 2016.
The 45 papers presented in this volume were carefully reviewed andselected from 70 submissions. The contributions are organized in topicalsections on digital forensics, visual cryptography, reversible data hiding, and steganography and steganalysis. This book constitutes the revised post-conference proceedings of the 14thInternational Workshop on Digital Forensics and Watermarking, IWDW 2016, held...
|
cena:
201,24 |
![]() |
Secure and Trustworthy Transportation Cyber-Physical Systems
ISBN: 9789811038914 / Angielski / Miękka / 159 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book comprehensively reviews the cyber security and privacy issues in transportation cyber-physical systems (TCPSs). It then discusses in detail the principles and metrics of evaluating safety and privacy in TCPSs and elaborates the verification and analysis of secure, robust and trustworthy TCPSs.
This book comprehensively reviews the cyber security and privacy issues in transportation cyber-physical systems (TCPSs). It then discusses in detail ...
|
cena:
201,24 |
![]() |
Tor: Tor and the Deep Web: A Guide to Become Anonymous Online, Conceal Your IP Address, Block NSA Spying and Hack!
ISBN: 9781542745376 / Angielski / Miękka / 58 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Want to learn how to hide your I.P address? Tired of the NSA spying on you? Want to learn how to hack? This Book Will Teach You How To be Anonymous Online Today The Internet is a wonderful resource which has allowed people to access a fountain of knowledge with the simple click of a button. The internet has grown considerably fast in the last decade, and it is still expanding at extraordinary rates. But with this incredible tool comes a danger The government has been using our vast resource to spy on individuals and businesses, overstepping their role as an entity that exists to serve the...
Want to learn how to hide your I.P address? Tired of the NSA spying on you? Want to learn how to hack? This Book Will Teach You How To be Anonymous On...
|
cena:
69,36 |
![]() |
Enterprise Security: Second International Workshop, Es 2015, Vancouver, Bc, Canada, November 30 - December 3, 2015, Revised Selected Papers
ISBN: 9783319543796 / Angielski / Miękka / 277 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Enterprise security is an important area since all types of organizations require secure and robust environments, platforms and services to work with people, data and computing applications. The book provides selected papers of the Second International Workshop on Enterprise Security held in Vancouver, Canada, November 30-December 3, 2016 in conjunction with CloudCom 2015.
The 11 papers were selected from 24 submissions and provide a comprehensive research into various areas of enterprise security such as protection of data, privacy and rights, data ownership, trust, unauthorized access... Enterprise security is an important area since all types of organizations require secure and robust environments, platforms and services to work with ...
|
cena:
201,24 |
![]() |
Public-Key Cryptography - Pkc 2017: 20th Iacr International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, the Netherlands,
ISBN: 9783662543641 / Angielski / Miękka / 466 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017.
The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sectionssuch as Cryptanalysis, Protocols, Encrpytion Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Die-Hellman, Encryption with Access Control, Special Signatures, Fully Homomorphic Encryption, Real-World Schemes,... The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in P...
|
cena:
201,24 |