• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

 » książki  » Computers - Security - Cryptography & Encryption

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2953408]
• Literatura piękna
 [1818674]

  więcej...
• Turystyka
 [70115]
• Informatyka
 [151610]
• Komiksy
 [36466]
• Encyklopedie
 [23169]
• Dziecięca
 [612210]
• Hobby
 [135681]
• AudioBooki
 [1806]
• Literatura faktu
 [226254]
• Muzyka CD
 [391]
• Słowniki
 [2978]
• Inne
 [449189]
• Kalendarze
 [1375]
• Podręczniki
 [166538]
• Poradniki
 [469635]
• Religia
 [508779]
• Czasopisma
 [523]
• Sport
 [61275]
• Sztuka
 [243340]
• CD, DVD, Video
 [3479]
• Technologie
 [219064]
• Zdrowie
 [98975]
• Książkowe Klimaty
 [124]
• Zabawki
 [2531]
• Puzzle, gry
 [3670]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8134]
Kategorie szczegółowe BISAC

Kategoria BISAC: Computers >> Security - Cryptography & Encryption

ilość książek w kategorii: 2775

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II Eike Kiltz Vaikuntanathan Vinod 9783031223648 Springer
Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II

ISBN: 9783031223648 / Angielski / Miękka / 811 str.

ISBN: 9783031223648/Angielski/Miękka/811 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Eike Kiltz; Vaikuntanathan Vinod
The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. The total of 60 full papers presented in this three-volume set was carefully reviewed and selected from 139 submissions. They cover topics on post-quantum cryptography; interactive proofs; quantum cryptography; secret-sharing and applications; succinct proofs; identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption;...
The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryp...
cena: 685,93

 Triangle Mesh Watermarking and Steganography Hang Zhou Kejiang Chen Zehua Ma 9789811977190 Springer
Triangle Mesh Watermarking and Steganography

ISBN: 9789811977190 / Angielski / Twarda / 188 str.

ISBN: 9789811977190/Angielski/Twarda/188 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Hang Zhou; Kejiang Chen; Zehua Ma
This book provides a systematic overview of watermarking and steganography methods for triangle meshes related to computer graphics and security. The significance of this research has been well recognized by the growing body of work on watermarking, steganography and steganalysis of 3D meshes. With the evolution of the CAD industry and real-world end-user applications such as virtual reality (VR) and 3D printing, 3D meshes have attracted world-wide attention. Besides, the flexible data structure of 3D geometry provides enough space to embed secret information, making it ideal for applications...
This book provides a systematic overview of watermarking and steganography methods for triangle meshes related to computer graphics and security. The ...
cena: 685,93

 Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World Kevin E. Foltz William R. Simpson Institute for Defense Analyses 9780367532963 CRC Press
Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World

ISBN: 9780367532963 / Angielski / Miękka / 314 str.

ISBN: 9780367532963/Angielski/Miękka/314 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Kevin E. Foltz; William R. Simpson;Institute for Defense Analyses
Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors’ first book on Enterprise Level Security (ELS), which covered the basic concepts of ELS and the discoveries made during the first eight years of its development. This book follows on from this to give a discussion of advanced topics and solutions.
Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors’ first book on Enterprise Level Security (ELS), which...
cena: 218,11

 Cyber Operations: A Case Study Approach Jerry M. (United States Office of the Secretary of Defense (OSD)) Couretas 9781119712091 John Wiley & Sons Inc
Cyber Operations: A Case Study Approach

ISBN: 9781119712091 / Angielski / Twarda / 300 str.

ISBN: 9781119712091/Angielski/Twarda/300 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jerry M. (United States Office of the Secretary of Defense (
cena: 502,65

 Math for Security: From Graphs and Geometry to Spatial Analysis Daniel Reilly 9781718502567 No Starch Press,US
Math for Security: From Graphs and Geometry to Spatial Analysis

ISBN: 9781718502567 / Angielski / Miękka / 256 str.

ISBN: 9781718502567/Angielski/Miękka/256 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Daniel Reilly
Applied Math for Security is one of the first math-based guides specifically geared for information security practitioners. Readers will learn how to use concepts from various fields of mathematics - like graph theory, computational geometry, and statistics - to create and implement ready-to-use security tools. The book is written in a lively, conversational style that engages readers from the get-go. Chapters are enriched with code examples written in Python, and feature hands-on 'proof of concept' projects that involve developing math-based applications to solve real-world problems....
Applied Math for Security is one of the first math-based guides specifically geared for information security practitioners. Readers will learn how to...
cena: 242,07

 Security, Privacy, and Applied Cryptography Engineering: 12th International Conference, SPACE 2022, Jaipur, India, December 9–12, 2022, Proceedings Lejla Batina Stjepan Picek Mainack Mondal 9783031228285 Springer
Security, Privacy, and Applied Cryptography Engineering: 12th International Conference, SPACE 2022, Jaipur, India, December 9–12, 2022, Proceedings

ISBN: 9783031228285 / Angielski / Miękka / 343 str.

ISBN: 9783031228285/Angielski/Miękka/343 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Lejla Batina; Stjepan Picek; Mainack Mondal
This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9–12, 2022.The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy.
This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE ...
cena: 302,60

 Progress in Cryptology - Indocrypt 2022: 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings Isobe, Takanori 9783031229114 Springer
Progress in Cryptology - Indocrypt 2022: 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings

ISBN: 9783031229114 / Angielski / Miękka / 722 str.

ISBN: 9783031229114/Angielski/Miękka/722 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Bimal Roy
The volume constitutes the proceedings of the 23rd International Conference on Cryptology, INDOCRYPT 2022, which was held during December 11–14, 2022. The conference took place in Kolkata, India.The 31 full papers included in this book were carefully reviewed and selected from 74 submissions. They were organized in topical sections as follows: symmetric key cryptology;protocols and implementation;cryptanalysis;boolean functions;quantum cryptography and cryptanalysis;post quantum cryptography
The volume constitutes the proceedings of the 23rd International Conference on Cryptology, INDOCRYPT 2022, which was held during December 11–14, 202...
cena: 443,82

 Advances in Cryptology – ASIACRYPT 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2022, Proceedings, Part I Shweta Agrawal Dongdai Lin 9783031229626 Springer
Advances in Cryptology – ASIACRYPT 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2022, Proceedings, Part I

ISBN: 9783031229626 / Angielski / Miękka / 811 str.

ISBN: 9783031229626/Angielski/Miękka/811 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shweta Agrawal; Dongdai Lin
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022.The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows:Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and...
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Appl...
cena: 484,18

 Advances in Cryptology – ASIACRYPT 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2022, Proceedings, Part II Shweta Agrawal Dongdai Lin 9783031229657 Springer
Advances in Cryptology – ASIACRYPT 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2022, Proceedings, Part II

ISBN: 9783031229657 / Angielski / Miękka / 695 str.

ISBN: 9783031229657/Angielski/Miękka/695 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shweta Agrawal; Dongdai Lin
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022.The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows:Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and...
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Appl...
cena: 403,47

 Advances in Cryptology – ASIACRYPT 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2022, Proceedings, Part III Shweta Agrawal Dongdai Lin 9783031229688 Springer
Advances in Cryptology – ASIACRYPT 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2022, Proceedings, Part III

ISBN: 9783031229688 / Angielski / Miękka / 788 str.

ISBN: 9783031229688/Angielski/Miękka/788 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Shweta Agrawal; Dongdai Lin
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022.The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows:Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and...
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Appl...
cena: 443,82

 Network and System Security: 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9–12, 2022, Proceedings Xingliang Yuan Guangdong Bai Cristina Alcaraz 9783031230196 Springer
Network and System Security: 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9–12, 2022, Proceedings

ISBN: 9783031230196 / Angielski / Miękka / 747 str.

ISBN: 9783031230196/Angielski/Miękka/747 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Xingliang Yuan; Guangdong Bai; Cristina Alcaraz
This book constitutes the refereed proceedings of the 16th International Conference on Network and System Security, NSS 2022, held in Denarau Island, Fiji, on December 9-12, 2022.The 23 full and 18 short papers presented in this book were carefully reviewed and selected from 83 submissions. They focus on theoretical and practical aspects of network and system security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.
This book constitutes the refereed proceedings of the 16th International Conference on Network and System Security, NSS 2022, held in Denarau Island, ...
cena: 443,82

 Trusted Computing Platforms: Design and Applications Sean W. Smith 9787302131748 Springer
Trusted Computing Platforms: Design and Applications

ISBN: 9787302131748 / Angielski / Miękka / 260 str.

ISBN: 9787302131748/Angielski/Miękka/260 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Sean W. Smith
cena: 421,00

 Kryptografie fur Dummies 2e HW Lang 9783527720934 Wiley-VCH Verlag GmbH
Kryptografie fur Dummies 2e

ISBN: 9783527720934 / Niemiecki / Miękka / 400 str.

ISBN: 9783527720934/Niemiecki/Miękka/400 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
HW Lang
cena: 112,09

 Attribute-based Encryption (ABE): Foundations and Applications within Blockchain and Cloud Environments Daniel Adu Worae 9781119989356 John Wiley & Sons Inc
Attribute-based Encryption (ABE): Foundations and Applications within Blockchain and Cloud Environments

ISBN: 9781119989356 / Angielski / Twarda / 200 str.

ISBN: 9781119989356/Angielski/Twarda/200 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Qi Xia; Jianbin Gao; Isaac Obiri
cena: 484,53

 Combinatorics and Number Theory of Counting Sequences Istvan Mezo 9781032475356 CRC Press
Combinatorics and Number Theory of Counting Sequences

ISBN: 9781032475356 / Angielski / Miękka / 498 str.

ISBN: 9781032475356/Angielski/Miękka/498 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Istvan Mezo
Combinatorialists are seldom aware of number theoretical tools, and number theorists rarely aware of possible combinatorial applications. This book is accessible for both of the groups. The first part introduces important counting sequences. The second part shows how these sequences can be generalized to study new combinatorial problems
Combinatorialists are seldom aware of number theoretical tools, and number theorists rarely aware of possible combinatorial applications. This book is...
cena: 237,50

 Cryptology: Classical and Modern Richard Klima Richard E. Klima Neil Sigmon 9781032475929 CRC Press
Cryptology: Classical and Modern

ISBN: 9781032475929 / Angielski / Miękka / 496 str.

ISBN: 9781032475929/Angielski/Miękka/496 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Richard Klima; Richard E. Klima; Neil Sigmon
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenère, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the...
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical met...
cena: 242,34

 Cryptography: Theory and Practice Douglas Robert Stinson Maura Paterson 9781032476049 CRC Press
Cryptography: Theory and Practice

ISBN: 9781032476049 / Angielski / Miękka / 598 str.

ISBN: 9781032476049/Angielski/Miękka/598 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Douglas Robert Stinson; Maura Paterson
Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students. It offers a comprehensive primer for the subject’s fundamentals and features the most current advances. The fourth edition provides in-depth treatment of the methods and protocols that safeguard the informat
Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students. It offers a comprehensive primer for the sub...
cena: 242,34

 Introduction to Coding Theory Jurgen Bierbrauer 9781032477190 CRC Press
Introduction to Coding Theory

ISBN: 9781032477190 / Angielski / Miękka / 538 str.

ISBN: 9781032477190/Angielski/Miękka/538 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jurgen Bierbrauer
This book is designed to be usable as a textbook for an undergraduate course or for an advanced graduate course in coding theory as well as a reference for researchers in discrete mathematics, engineering and theoretical computer science. This second edition has three parts: an elementary introduction to coding, theory and applications of codes,
This book is designed to be usable as a textbook for an undergraduate course or for an advanced graduate course in coding theory as well as a referenc...
cena: 242,34

 Guide to Internet Cryptography: Security Protocols and Real-World Attack Implications J?rg Schwenk 9783031194382 Springer
Guide to Internet Cryptography: Security Protocols and Real-World Attack Implications

ISBN: 9783031194382 / Angielski / Twarda / 530 str.

ISBN: 9783031194382/Angielski/Twarda/530 str.

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Jörg Schwenk
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research.This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Internet security. It describes important Internet standards in a language close to real-world cryptographic research and covers the essential cryptographic standards used on the Internet, from WLAN encryption to TLS and e-mail security. From academic and non-academic research, the book collects...
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardiza...
cena: 342,95

 Analysis, Cryptography and Information Science Panos M. Pardalos Nicholas J. Daras Michael Th Rassias 9789811271915 World Scientific Publishing Company
Analysis, Cryptography and Information Science

ISBN: 9789811271915 / Angielski

ISBN: 9789811271915/Angielski

Termin realizacji zamówienia: ok. 5-8 dni roboczych.
Panos M. Pardalos; Nicholas J. Daras; Michael Th Rassias
This compendium focuses on self-contained presentations of various developments in mathematical analysis, cryptography and information science.The volume features both original research and survey papers contributed by experts from the international community. The book has a strong interdisciplinary flavor and features the most recent developments in the topics treated.This useful reference text benefits professionals, researchers, academics and graduate students.
This compendium focuses on self-contained presentations of various developments in mathematical analysis, cryptography and information science.The vol...
cena: 436,31

Pierwsza Podprzednia  64  65  66  Następna Ostatnia

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia