Udvidet returret til d. 31. januar 2025

Datakryptering

Her finder du spændende bøger om Datakryptering. Nedenfor er et flot udvalg af over 316 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Nathan Clarke & Steven Furnell
    1.096,95 - 1.307,95 kr.

  • af Michael Fairhurst & Ali Ismail Awad
    1.647,95 kr.

  • af Mukaddim Pathan & Surya Nepal
    1.126,95 kr.

  • af Raghuram Yeluri
    421,95 kr.

    For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-criticalapplications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations."e;A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!"e; —Vince Lubsey, Vice President, Product Development, Virtustream Inc."e; Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles."e; —John Skinner, Vice President, HyTrust Inc."e;Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud."e; —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation

  • - 11th International Conference, FC 2007, and First International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad/Tobago, February 12-16, 2007. Revised Selected Papers
    af Sven Dietrich
    563,95 - 580,95 kr.

    The 11th International Conference on Financial Cryptography and Data Security (FC 2007, http://fc07. ifca. ai), organized by the International Financial Crypt- raphy Association (IFCA, http://www. ifca. ai/), was held in Tobago, February 12-15, 2007. The conference is a well-established and premier international - rum for research, advanced development, education, exploration, and debate - garding security in the context of ?nance and commerce. We continue to cover all aspects of securing transactions and systems, which this year included a range of technical areas such as cryptography, payment systems, anonymity, privacy, - thentication, and commercial and ?nancial transactions. For the ?rst time, there was an adjacent workshop on Usable Security, held after FC 2007 in the same - cation. The papers are included in the last part of this volume. The conference goal was to bring together top cryptographers, data-security specialists, and c- puter scientists with economists, bankers, implementers, and policy makers. The goal was met this year: there were 85 submissions, out of which 17 research papers and 1 system presentation paper were accepted. In addition, the conference featured two distinguished speakers, Mike Bond and Dawn Jutla, and two panel sessions, one on RFID and one on virtual economies. As always, there was the rump session on Tuesday evening, colorful as usual.

  • af Milan Petkovic & Willem Jonker
    706,95 kr.

  • af Vijay Atluri & Claudia Diaz
    605,95 kr.

  • - Second IFIP WG 6.8 Joint Conference, WMNC 2009, Gdansk, Poland, September 9-11, 2009, Proceedings
    af Józef Wozniak
    1.109,95 - 1.118,95 kr.

    Recent spectacular achievements in wireless, mobile, and sensor networks have dramatically changed our lives in many ways. However, the rapid evolution of wireless systems not only promises increased functionality, reliability, availability, and security, as well as putting a wide variety of new services at the users' disposal ? it also creates a number of design challenges that our research community is now facing. Scientists and engineers need to come up with, and promptly implement, novel wireless network architectures, while system operators and planners rethink their business models and attend to the growing expectations of their customer base. To provide a suitable forum for discussion between researchers, practitioners, and industry representatives interested in new developments in the respective research area, IFIP WG 6. 8 launched three separate series of conferences: MWCN (Mobile and Wireless Communications Networks), PWC (Personal Wireless Communications), and WSAN (Wireless Sensor and Actors Networks). In 2008, MWCN and PWC were merged into the IFIP Wireless and Mobile Networking Conference (WMNC 2008), held in Toulouse, France, from September 30 to October 2, 2008. MWNC 2008 and PWC 2008 topics were subsequently revised with a view to covering the whole spectrum of hot issues in wireless and mobile networking. As a result, IFIP WG 6. 8 decided to add WSAN as another WMNC track.

  • af Michael Portnoy & Seymour Goodman
    1.091,95 - 1.100,95 kr.

  • af Steve Furnell, Bhavani Thuraisingham & X. Sean Wang
    1.109,95 kr.

  • af Henning Stichtenoth & Arnaldo Garcia
    564,95 kr.

  • af Debra Cook
    1.089,95 kr.

    Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes.CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. As the processing power of GPUs increases, research involving the use of GPUs for general purpose computing has arisen. This work extends such research by considering the use of a GPU as a parallel processor for encrypting data. The authors evaluate the operations found in symmetric and asymmetric key ciphers to determine if encryption can be programmed in existing GPUs. A detailed description for a GPU based implementation of AES is provided. The feasibility of GPU-based encryption allows the authors to explore the use of a GPU as a trusted system component. Unencrypted display data can be confined to the GPU to avoid exposing it to any malware running on the operating system.

  • af Cliff Wang, Dawn Song, Somesh Jha, mfl.
    3.224,95 kr.

  • af Jaideep Vaidya, Yu Michael Zhu & Christopher W. Clifton
    1.087,95 kr.

  • af Godfried B. Williams
    566,95 kr.

  • af Sushil Jajodia & Michael Gertz
    1.222,95 kr.

  • af Ulrich Flegel
    1.576,95 kr.

  • af Giuseppe Ateniese
    1.444,95 kr.

    The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which will take place in a hybrid mode in Rome, Italy in June 2022. The 44 full papers together with 5 short papers presented in this proceeding were carefully reviewed and selected from a total of 185 submissions. They were organized in topical sections as follows: Encryption, Attacks, Cryptographic Protocols, System Security., Cryptographic Primitives, MPC, Blockchain, Block-Cyphers, and Post-Quantum Cryptography.

  • af Audun Jøsang, Lynn Futcher & Janne Hagen
    1.597,95 kr.

    This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.*The 28 full papers presented were carefully reviewed and selected from 112 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in ICT systems. They are organized in topical sections on digital signatures; vulnerability management; covert channels and cryptography; application and system security; privacy; network security; machine learning for security; and security management.*The conference was held virtually.

  • af Elisa Bertino, Xingming Sun, Zhihua Xia & mfl.
    1.330,95 - 1.429,95 kr.

  • af Albrecht Beutelspacher, Jörg Schwenk & Klaus-Dieter Wolfenstetter
    324,95 kr.

    Die Entwicklung und Analyse von Protokollen wird ein immer wichtigerer Zweig der modernen Kryptologie. Große Berühmtheit erlangt haben die so genannten "Zero-Knowledge-Protokolle", mit denen es gelingt, einen anderen von der Existenz eines Geheimnisses zu überzeugen, ohne ihm das Geringste zu verraten.

  • af Javi Fons
    246,95 kr.

    Bienvenido a esta época, al nacimiento de una tecnología que, más allá de transformar el dinero que tenemos hoy en día. Estamos frente a una Revolución y estoy seguro que quieres ser parte de ella. Bitcoin nos propone nuevas formas de libertad financiera, tener el control de tu dinero por sobre entidades gubernamentales y bancarias. Nos ofrece un control sobre nuestros activos que no existía antes de su creación en 2009. Bitcoin es sinónimo de libertad. Le devuelve el control a las personas comunes y corrientes como tu y yo.Bitcoin es al mismo tiempo una moneda y un sistema monetario cuyo buen funcionamiento no depende de la benevolencia de una autoridad sino de las inmutables leyes de la matemática. Bitcoin es una criptomoneda, eso quiere decir que es digital, descentralizado, abierto, universal, de uso voluntario, no tiene problemas contra la inflación, libre de intermediarios no deseados como por ejemplo el banco.Bitcoin permite efectuar transacciones de manera extremadamente segura y privada. Sus ventajas respecto al sistema que hemos heredado son tantas, y tan obvias, que cada vez son más los que deciden adoptarlo. En este libro aprenderás: Los fundamentos básicos para entender Bitcoin y el Blockchain.Como empezar con Bitcoin, Ethereum, XRP, Ripple, Bitcoin Cash y otras criptomonedas mas, por nombrar algunas.La mejor manera de evitar estafas y SCAMS dentro del mundo de las criptomonedas.Las altcoins que te podrán hacer rico en este 2021 si inviertes en ellas.Como comenzar a hacer tu primera compra y venta y empezar a hacer trading de criptomonedas desde lo mas básico a lo mas avanzado.¡y mucho mucho mas!

  • af Aljosha Judmayer
    395,95 kr.

    The new field of cryptographic currencies and consensus ledgers, commonly referred to as blockchains, is receiving increasing interest from various different communities. These communities are very diverse and amongst others include: technical enthusiasts, activist groups, researchers from various disciplines, start ups, large enterprises, public authorities, banks, financial regulators, business men, investors, and also criminals. The scientific community adapted relatively slowly to this emerging and fast-moving field of cryptographic currencies and consensus ledgers. This was one reason that, for quite a while, the only resources available have been the Bitcoin source code, blog and forum posts, mailing lists, and other online publications. Also the original Bitcoin paper which initiated the hype was published online without any prior peer review. Following the original publication spirit of the Bitcoin paper, a lot of innovation in this field has repeatedly come from the community itself in the form of online publications and online conversations instead of established peer-reviewed scientific publishing. On the one side, this spirit of fast free software development, combined with the business aspects of cryptographic currencies, as well as the interests of today's time-to-market focused industry, produced a flood of publications, whitepapers, and prototypes. On the other side, this has led to deficits in systematization and a gap between practice and the theoretical understanding of this new field. This book aims to further close this gap and presents a well-structured overview of this broad field from a technical viewpoint. The archetype for modern cryptographic currencies and consensus ledgers is Bitcoin and its underlying Nakamoto consensus. Therefore we describe the inner workings of this protocol in great detail and discuss its relations to other derived systems.

  • af Shlomi Dolev
    1.120,95 kr.

    This book constitutes the refereed proceedings of the 6th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2022, held in Be'er Sheva, Israel, in June - July 2022.The 24 full and 11 short papers presented together with a keynote paper in this volume were carefully reviewed and selected from 53 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.

  • af Orr Dunkelman & Stefan Dziembowski
    1.341,95 - 1.829,95 kr.

  • af Giulio D'Agostino
    467,95 kr.

  • af Balázs Pejó & Damien Desfontaines
    602,95 kr.

  • af Kai Rannenberg, Nils Gruschka, Agnieszka Gryszczy¿ska, mfl.
    606,95 kr.

  • af Rudrapatna Shyamasundar & Atul Prakash
    588,95 kr.

  • af Palash Sarkar & Tetsu Iwata
    592,95 - 596,95 kr.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.