Cryptography Demystified
ISBN: 9780071406383 / Angielski / Miękka / 356 str. Termin realizacji zamówienia: ok. 1620 dni roboczych. Works through 35 cryptography modules supported by exercises and answers
Works through 35 cryptography modules supported by exercises and answers


cena:
244,44 zł 
Advances in Computers : Information Security
ISBN: 9780120121601 / Angielski / Twarda / 340 str. Termin realizacji zamówienia: ok. 2225 dni roboczych. Advances in Computers covers new developments in computer technology. Most chapters present an overview of a current subfield within computers, with many citations, and often include new developments in the field by the authors of the individual chapters. Topics include hardware, software, theoretical underpinnings of computing, and novel applications of computers. This current volume emphasizes information security issues and includes topics like certifying computer professionals, noninvasive attacks ("cognitive hacking"), computer files as legal evidence ("computer forensics")... Advances in Computers covers new developments in computer technology. Most chapters present an overview of a current subfield within compute... 

cena:
766,30 zł 
Data Hiding Fundamentals and Applications : Content Security in Digital Multimedia
ISBN: 9780120471447 / Angielski / Twarda / 252 str. Termin realizacji zamówienia: ok. 2225 dni roboczych. Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce. Data Hiding Fundamentals and... Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of servi... 

cena:
334,53 zł 
Secure Group Communications Over Data Networks
ISBN: 9780387229706 / Angielski / Twarda / 172 str. Termin realizacji zamówienia: ok. 22 dni roboczych. The ubiquitous nature of the Internet is enabling a new generation of  pUcations to support collaborative work among geographically distant users. Security in such an environment is of utmost importance to safeguard the pri vacy of the communication and to ensure the integrity of the applications. 'Secure group communications' (SGC) refers to a scenario in which a group of participants can receive and send messages to group members, in a way that outsiders are unable to glean any information even when they are able to intercept the messages. SGC is becoming extremely important for...
The ubiquitous nature of the Internet is enabling a new generation of  pUcations to support collaborative work among geographically distant users. Se...


cena:
562,91 zł 
Image and Video Encryption: From Digital Rights Management to Secured Personal Communication
ISBN: 9780387234021 / Angielski / Twarda / 161 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....). The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material. Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from com... 

cena:
635,51 zł 
Computer Security and Cryptography
ISBN: 9780471947837 / Angielski / Twarda / 544 str. Termin realizacji zamówienia: ok. 2225 dni roboczych. Gain the skills and knowledge needed to create effective data security systems
This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain handson experience in cryptanalysis and learn how to create effective cryptographic systems. The author contributed to the design and analysis of the Data Encryption Standard... Gain the skills and knowledge needed to create effective data security systems
This book updates readers with all the tools, techniques, and... 

cena:
628,83 zł 
Complexity and Cryptography : An Introduction
ISBN: 9780521617710 / Angielski / Miękka / 292 str. Termin realizacji zamówienia: ok. 1620 dni roboczych. Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and webbased business processes. Understanding the principles on which it is based is an important topic that requires a knowledge of both computational complexity and a range of topics in pure mathematics. This book provides that knowledge, combining an informal style with strong proofs of the key results to provide an accessible introduction. It includes many examples and exercises, and is based on a highly successful course developed and taught over many years.
Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and webbased business processes. Und...


cena:
303,38 zł 
Protecting Information : From Classical Error Correction to Quantum Cryptography
ISBN: 9780521827409 / Angielski / Twarda / 304 str. Termin realizacji zamówienia: ok. 18 dni roboczych. For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum computing, thus providing a context in which ideas from mathematics and physics meet. By covering such topics as Shor's quantum factoring algorithm, this text informs the reader about current thinking in quantum information theory and encourages an appreciation of the connections between mathematics and science. Of particular interest are the...
For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error ...


cena:
440,81 zł 
Quantum Cryptography and SecretKey Distillation
ISBN: 9780521864855 / Angielski / Twarda / 276 str. Termin realizacji zamówienia: ok. 18 dni roboczych. Quantum cryptography (or quantum key distribution) is a stateoftheart technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This 2006 text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secretkey distillation. The book starts with an overview chapter, progressing to classical cryptography, information theory (classical and quantum), and applications of quantum cryptography. The discussion moves to secretkey distillation, privacy...
Quantum cryptography (or quantum key distribution) is a stateoftheart technique that exploits properties of quantum mechanics to guarantee the secu...


cena:
440,81 zł 
Pseudorandomness and Cryptographic Applications
ISBN: 9780691025469 / Angielski / Miękka / 248 str. Termin realizacji zamówienia: ok. 2225 dni roboczych. A pseudorandom generator is an easytocompute function that stretches a short random string into a much longer string that "looks" just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construction of a private key cryptosystem that is secure against chosen plaintext attack. There do not seem to be natural examples of functions that are pseudorandom generators. On the other hand, there do seem to be a variety of natural examples of another basic primitive: the oneway function. A function is oneway if it is easy to... A pseudorandom generator is an easytocompute function that stretches a short random string into a much longer string that "looks" just like a ran... 

cena:
357,87 zł 
Statistical Methods in Computer Security
ISBN: 9780824759391 / Angielski / Twarda / 376 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blueribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct on the Internet, considers the development of infrastructures that may prevent breaches of security and law, and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software,...
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current appl...


cena:
701,55 zł 
Cryptology : Machines, History and Methods
ISBN: 9780890063996 / Angielski / Twarda / 520 str. Termin realizacji zamówienia: ok. 22 dni roboczych. The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yesterday, today and tomorrow ) culled from Cryptologia (RoseHulman Institute of Technology, Terre Haute, IN). The articles are divided into five sectio
The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yes...


cena:
867,80 zł 
DataDriven Block Ciphers for Fast Telecommunication Systems
ISBN: 9781420054118 / Angielski / Twarda / 208 str. Termin realizacji zamówienia: ok. 20 dni roboczych. The Most Progressive and Complete Guide to DDOBased Ciphers
Developers have long recognized that ciphers based on Permutation Networks (PNs) and Controlled SubstitutionPermutation Networks (CSPNs) allow for the implementation of a variety of Data Driven Operations (DDOs). These DDOs can provide fast encryption without incurring excessive hardware costs in modern telecommunication networks. However, until now, with a few exceptions, most DDObased ciphers have been poorly represented in available literature and have continued to remain known to only a small number of encryption experts.... The Most Progressive and Complete Guide to DDOBased Ciphers
Developers have long recognized that ciphers based on Permutation Networks (PNs) and C... 

cena:
647,58 zł 
Handbook of Financial Cryptography and Security
ISBN: 9781420059816 / Angielski / Twarda / 631 str. Termin realizacji zamówienia: ok. 20 dni roboczych. The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic techniques to auctions, electronic voting, micropayment systems, digital rights, financial portfolios, routing networks, and more. In the first part, the book examines blind signatures and other important cryptographic techniques with respect to digital cash/ecash. It also looks at the role of cryptography in auctions and... The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to es... 

cena:
755,51 zł 
Cryptography in C and C++
ISBN: 9781590595022 / Angielski / Twarda / 504 str. Termin realizacji zamówienia: ok. 22 dni roboczych. CRYPTOGRAPHY IS AN ANCIENT ART, well over two thousand years old. The need to keep certain information secret has always existed, and attempts to preserve secrets have therefore existed as well. But it is only in the last thirty years that cryptography has developed into a science that has offered us needed security in our daily lives. Whether we are talking about automated teller machines, cellular telephones, Internet commerce, or computerized ignition locks on automobiles, there is cryptography hidden within. And what is more, none of these applications would work without cryptography The...
CRYPTOGRAPHY IS AN ANCIENT ART, well over two thousand years old. The need to keep certain information secret has always existed, and attempts to pres...


cena:
314,83 zł 
Cryptography for Developers
ISBN: 9781597491044 / Angielski / Miękka / 423 str. Termin realizacji zamówienia: ok. 2225 dni roboczych. The only guide for software developers who must learn and implement cryptography safely and cost effectively.
Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, oneway hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes... The only guide for software developers who must learn and implement cryptography safely and cost effectively.
Cryptography for Developers b... 

cena:
250,94 zł 
Primality Testing in Polynomial Time : From Randomized Algorithms to "Primes is in P"
ISBN: 9783540403449 / Angielski / Miękka / 150 str. Termin realizacji zamówienia: ok. 22 dni roboczych. On August 6, 2002, a paper with the title "PRIMES is in P," by M. Agrawal, N. Kayal, and N. Saxena, appeared on the website of the Indian Institute of Technology at Kanpur, India. In this paper it was shown that the "primality problem"hasa"deterministic algorithm" that runs in "polynomial time." Finding out whether a given number n is a prime or not is a problem that was formulated in ancient times, and has caught the interest of mathema ciansagainandagainfor centuries. Onlyinthe 20thcentury, with theadvent of cryptographic systems that actually used large prime numbers, did it turn out to...
On August 6, 2002, a paper with the title "PRIMES is in P," by M. Agrawal, N. Kayal, and N. Saxena, appeared on the website of the Indian Institute of...


cena:
248,27 zł 
Advances in Cryptology  CRYPTO 2002 : 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 1822, 2002. Proceedings
ISBN: 9783540440505 / Angielski / Miękka / 630 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Crypto 2002, the 22nd Annual Crypto Conference, was sponsored by IACR, the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara. It is published as Vol. 2442 of the Lecture Notes in Computer Science (LNCS) of Springer Verlag. Note that 2002, 22 and 2442 are all palindromes... (Don't nod ) Theconferencereceived175submissions, ofwhich40wereaccepted;twos missionsweremergedintoasinglepaper, yieldingthetotalof39papersaccepted...
Crypto 2002, the 22nd Annual Crypto Conference, was sponsored by IACR, the International Association for Cryptologic Research, in cooperation with the...


cena:
587,11 zł 
Basics Of Contemporary Cryptography For It Practitioners
ISBN: 9789812564054 / Angielski / Twarda / 208 str. Termin realizacji zamówienia: ok. 2530 dni roboczych. The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques and facilities of contemporary cryptography, proving key results along the way. The contents of the first five chapters can be used for onesemester course.
The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conve...


cena:
465,80 zł 
Digital Rights Management : Technological, Economic, Legal and Political Aspects
ISBN: 9783540404651 / Angielski / Miękka / 812 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Digital Rights Management (DRM) is a topic of interest to a wide range of people from various backgrounds: engineers and technicians, legal academics and lawyers, economists and business practitioners. The two conferences on the issue held in 2000 and 2002 in Berlin, Germany, brought these people together for fruitful discussions. This book continues this process by providing insights into the three main areas that DRM in?uences and that DRM is in?uenced by: technology, economics, and law and politics. Looking at the ?rst results of the two conferences we would like to emphasize three...
Digital Rights Management (DRM) is a topic of interest to a wide range of people from various backgrounds: engineers and technicians, legal academics ...


cena:
683,92 zł 