Mini faq
Cryptography Demystified
ISBN: 9780071406383 / Angielski / Miękka / 356 str. Works through 35 cryptography modules supported by exercises and answers
Works through 35 cryptography modules supported by exercises and answers


cena:
248,85 zł 
SystemOnChip Architectures and Implementations for PrivateKey Data Encryption
ISBN: 9780306478826 / Angielski / Twarda / 160 str. In SystemonChip Architectures and Implementations for PrivateKey Data Encryption, new generic silicon architectures for the DES and Rijndael symmetric key encryption algorithms are presented. The generic architectures can be utilised to rapidly and effortlessly generate systemonchip cores, which support numerous application requirements, most importantly, different modes of operation and encryption and decryption capabilities. In addition, efficient silicon SHA1, SHA2 and HMAC hash algorithm architectures are described. A singlechip Internet... In SystemonChip Architectures and Implementations for PrivateKey Data Encryption, new generic silicon architec... 

cena:
532,73 zł 
Brute Force: Cracking the Data Encryption Standard
ISBN: 9780387201092 / Angielski / Twarda / 292 str. In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved to be rigorous enough. In 1973, the NBS put out an open call for a new, stronger encryption system that would become the new federal standard. Several years later, IBM responded with a system called Lucifer that came to simply be known as DES... In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these c... 

cena:
134,44 zł 
Secure Group Communications Over Data Networks
ISBN: 9780387229706 / Angielski / Twarda / 172 str. The ubiquitous nature of the Internet is enabling a new generation of  pUcations to support collaborative work among geographically distant users. Security in such an environment is of utmost importance to safeguard the pri vacy of the communication and to ensure the integrity of the applications. 'Secure group communications' (SGC) refers to a scenario in which a group of participants can receive and send messages to group members, in a way that outsiders are unable to glean any information even when they are able to intercept the messages. SGC is becoming extremely important for...
The ubiquitous nature of the Internet is enabling a new generation of  pUcations to support collaborative work among geographically distant users. Se...


cena:
532,73 zł 
Intrusion Detection and Correlation: Challenges and Solutions
ISBN: 9780387233987 / Angielski / Twarda / 118 str. Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and cryptography. The Internet is omnipresent and companies have increasingly put critical resources online. This has given rise to the activities of cyber criminals. Virtually all organizations face increasing threats to their networks and the... Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the proble... 

cena:
601,40 zł 
Image and Video Encryption: From Digital Rights Management to Secured Personal Communication
ISBN: 9780387234021 / Angielski / Twarda / 161 str. Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....). The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material. Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from com... 

cena:
601,40 zł 
Certification and Security in InterOrganizational EServices: Ifip 18th World Computer Congress, August 2227, 2004, Toulouse, France
ISBN: 9780387250878 / Angielski / Twarda / 149 str. Certification and Security in InterOrganizational EServices presents the proceeding of CSES 2004  the 2nd International Workshop on Certification and Security in InterOrganizational EServices held within IFIP WCC 2004 in August, 2004, in Toulouse, France. Certification and security share a common technological basis in the reliable and efficient monitoring of executed and running processes; they likewise depend on the same fundamental organizational and economic principles. As the range of services managed and accessed through communication networks grows throughout... Certification and Security in InterOrganizational EServices presents the proceeding of CSES 2004  the 2nd International Worksho... 

cena:
463,87 zł 
Multivariate Public Key Cryptosystems
ISBN: 9780387322292 / Angielski / Twarda / 260 str. Multivariate public key cryptosystems (MPKC) is a fastdeveloping new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoreticbased cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC will become a necessary alternative. Multivariate Public Key Cryptosystems systematically presents the subject matter for a broad audience. The first chapter is an introduction to the basic ideas and early development of both... Multivariate public key cryptosystems (MPKC) is a fastdeveloping new area in cryptography. In the past 10 years, MPKC schemes have increasingly be... 

cena:
555,62 zł 
Cryptographic Security Architecture: Design and Verification
ISBN: 9780387953878 / Angielski / Twarda / 320 str. A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar cryptovariables. It is the foundation for enforcing computer security policies and controls and preempting system misuse. This book provides a comprehensive design for a portable, flexible highsecurity cryptographic architecture, with particular emphasis on incorporating rigorous security models and practices. "Cryptographic Security Architecture" unveils an alternative means of building a trustworthy system based on concepts... A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar ... 

cena:
509,84 zł 
Cryptography and Public Key Infrastructure on the Internet
ISBN: 9780470847459 / Angielski / Miękka / 488 str. A practical guide to Cryptography and its use in the Internet and other communication networks.
This overview takes the reader through basic issues and on to more advanced concepts, to cover all levels of interest. Coverage includes all key mathematical concepts, standardisation, authentication, elliptic curve cryptography, and algorithm modes and protocols (including SSL, TLS, IPSec, SMIME, & PGP protocols). * Details what the risks on the internet are and how cryptography can help * Includes a chapter on interception which is unique amongst competing books in this... A practical guide to Cryptography and its use in the Internet and other communication networks.
This overview takes the reader through ba... 

cena:
159,53 zł 
Computer Security and Cryptography
ISBN: 9780471947837 / Angielski / Twarda / 521 str. Gain the skills and knowledge needed to create effective data security systems
This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain handson experience in cryptanalysis and learn how to create effective cryptographic systems. The author contributed to the design and analysis of the Data Encryption Standard... Gain the skills and knowledge needed to create effective data security systems
This book updates readers with all the tools, techniques, and... 

cena:
561,41 zł 
Complexity and Cryptography
ISBN: 9780521617710 / Angielski / Miękka / 292 str. Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and webbased business processes. Understanding the principles on which it is based is an important topic that requires a knowledge of both computational complexity and a range of topics in pure mathematics. This book provides that knowledge, combining an informal style with strong proofs of the key results to provide an accessible introduction. It includes many examples and exercises, and is based on a highly successful course developed and taught over many years.
Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and webbased business processes. Und...


cena:
286,84 zł 
Protecting Information: From Classical Error Correction to Quantum Cryptography
ISBN: 9780521827409 / Angielski / Twarda / 304 str. For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum computing, thus providing a context in which ideas from mathematics and physics meet. By covering such topics as Shor's quantum factoring algorithm, this text informs the reader about current thinking in quantum information theory and encourages an appreciation of the connections between mathematics and science. Of particular interest are the...
For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error ...


cena:
431,03 zł 
Quantum Cryptography and SecretKey Distillation
ISBN: 9780521864855 / Angielski / Twarda / 261 str. Quantum cryptography (or quantum key distribution) is a stateoftheart technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This 2006 text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secretkey distillation. The book starts with an overview chapter, progressing to classical cryptography, information theory (classical and quantum), and applications of quantum cryptography. The discussion moves to secretkey distillation, privacy...
Quantum cryptography (or quantum key distribution) is a stateoftheart technique that exploits properties of quantum mechanics to guarantee the secu...


cena:
390,51 zł 
Spatial and Temporal Reasoning
ISBN: 9780792346449 / Angielski / Twarda / 394 str. Qualitative reasoning about space and time  a reasoning at the human level  promises to become a fundamental aspect of future systems that will accompany us in daily activity.
The aim of Spatial and Temporal Reasoning is to give a picture of current research in this area focusing on both representational and computational issues. The picture emphasizes some major lines of development in this multifaceted, constantly growing area. The material in the book also shows some common ground and a novel combination of spatial and temporal aspects of qualitative reasoning. Part... Qualitative reasoning about space and time  a reasoning at the human level  promises to become a fundamental aspect of future systems that will acco...


cena:
784,52 zł 
Recent Advances in Rsa Cryptography
ISBN: 9780792374381 / Angielski / Twarda / 140 str. Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in RSA cryptography. Special emphasis is laid on the description and analysis of proposed attacks against the RSA cryptosystem. The first chapters introduce the necessary background information on number theory, complexity and public key cryptography. Subsequent chapters review factorization algorithms and specific properties that make RSA attractive for cryptographers. Most recent attacks against RSA are discussed in the third part of the book (among them attacks against...
Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in RSA cryptography. Special emp...


cena:
692,77 zł 
Elliptic Curves and Their Applications to Cryptography: An Introduction
ISBN: 9780792385899 / Angielski / Twarda / 164 str. Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic communication, and this need, given the tremendous growth of the Internet, is likely to continue growing. Elliptic curve cryptosystems represent the state of the art for such systems.
Elliptic Curves and Their Applications to Cryptography An Introduction provides a comprehensive and selfcontained introduction to elliptic curves and how they are employed to secure public key cryptosystems. Even though the... Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic...


cena:
898,78 zł 
Statistical Methods in Computer Security
ISBN: 9780824759391 / Angielski / Twarda / 376 str. Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blueribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct on the Internet, considers the development of infrastructures that may prevent breaches of security and law, and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software,...
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current appl...


cena:
602,24 zł 
Cryptology: Machines, History, & Methods
ISBN: 9780890063996 / Angielski / Twarda / 520 str. The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yesterday, today and tomorrow ) culled from Cryptologia (RoseHulman Institute of Technology, Terre Haute, IN). The articles are divided into five sectio
The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yes...


cena:
883,46 zł 
Intrusion Detection in Distributed Systems: An AbstractionBased Approach
ISBN: 9781402076244 / Angielski / Twarda / 136 str. Intrusion Detection In Distributed Systems: An AbstractionBased Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstractionbased approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modeling requests among cooperative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.
Intrusion Detection In Distributed Systems: An AbstractionBased Approach presents research contributions in three areas with respect...


cena:
248,89 zł 