Îïèñàíèå: Most IT Professionals rely on a small core of books that are targeted specifically at their job responsibilities. These dog-eared volumes are used on a daily basis
and are considered essential. But budgets and space often limit just how many books can be added to your cored library.

"The Ultimate Secure Coding CD" solves this
problem. It contains seven of our best selling titles, providing the "next level" of reference you will need for about less than half the price of the hard copy books purchased
separately.The CD contains the complete PDF versions of the following Syngress titles: "Developer's Guide to Web Application Security", 159749061X; "Buffer Overflow Attacks:
Detect, Exploit, Prevent", "Hacking the Code: ASP.NET Web Application Security", "Sockets, Shellcode, Porting, and Coding: Reverse Engineering", "Exploits and Tool Coding for
Security Professionals", and, "Programmer's Ultimate Security DeskRef". You can add over 2,754 pages of your Secure Coding bookshelf.

It includes 5 best selling
SYNGRESS Books in PDF Format.

Àâòîð: Garcia Arnaldo, Stichtenoth Henning Íàçâàíèå: Topics in Geometry, Coding Theory and Cryptography ISBN: 1402053339 ISBN-13(EAN): 9781402053337 Èçäàòåëüñòâî: Springer Ðåéòèíã: Öåíà: 9349 ð. Íàëè÷èå íà ñêëàäå: Åñòü ó ïîñòàâùèêà Ïîñòàâêà ïîä çàêàç.

Îïèñàíèå: The theory of algebraic function fields over finite fields has its origins in number theory. However, after Goppa`s discovery of algebraic geometry codes around 1980, many applications of function fields were found in different areas of mathematics and information theory, such as coding theory, sphere packings and lattices, sequence design, and cryptography. The use of function fields often led to better results than those of classical approaches.This book presents survey articles on some of these new developments. Most of the material is directly related to the interaction between function fields and their various applications; in particular the structure and the number of rational places of function fields are of great significance. The topics focus on material which has not yet been presented in other books or survey articles. Wherever applications are pointed out, a special effort has been made to present some background concerning their use.

Îïèñàíèå: This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Secure Mobile Ad-hoc Networks and Sensors, MADNES 2005, held in Singapore, in September 2005.The 12 revised full papers presented together with 5 keynote papers and 1 invited paper were carefully reviewed and selected from a total of 33 submissions. The papers address current topics of all security aspects of constrained network environments with special focus to mobile agents, sensor networks and radio frequency (RF) devices.

Îïèñàíèå: This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Coding and Cryptography, WCC 2005, held in Bergen, Norway, in March 2005.The 33 revised full papers were carefully reviewed and selected during two rounds of reviewing and improvement from 118 submissions. The papers address all aspects of coding theory, cryptography and related areas, theoretical or applied. Topics covered are: coding theory, i.e., error-correcting codes, decoding algorithms, and related combinatorial problems; cryptology, i.e., block and stream ciphers, hash functions, public key cryptography, secret sharing, authentication, and intellectual property protection; and discrete mathematics and algorithmic tools arising from these two areas, such as boolean functions, sequences, finite fields, algebraic systems and related polynomial properties.

Îïèñàíèå: Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides an overview of the techniques and applications of security based on noisy data. It also covers the theory of authentication based on noisy data and shows it in practice as a key tool for prevention of counterfeiting.

Îïèñàíèå: This book constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in Cirencester, UK, in December 2005.The 26 revised full papers presented together with 4 invited contributions were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections on coding theory, signatures and signcryption, symmetric cryptography, side channels, algebraic cryptanalysis, information theoretic applications, number theoretic foundations, and public key and ID-based encryption schemes.

Îïèñàíèå: This book constitutes the refereed proceedings of the Second VLDB 2005 International Workshop on Secure Data Management, SDM 2005, held in Trondheim, Norway in August/September 2005 in conjunction with VLDB 2005.The 16 revised full papers presented were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on encrypted data access, access control, information disclosure control in databases, privacy and security support for distributed applications, and with a special focus on security and privacy in healthcare.

Îïèñàíèå: Localization is a critical process in mobile ad hoc networks and wireless sensor networks. Wireless sensor node or MANET devices need to know the network's location or its relative location, with respect to the rest of the network neighbors. However, due to the open spectrum nature of wireless communication, it is subject to attacks and intrusions. Hence the wireless network synchronization needs to be both robust and secure. Furthermore, issues such as energy constraints and mobility make the localization process even more challenging.Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks presents the latest research results in the area of secure localization for both wireless mobile ad hoc networks and wireless sensor networks.

Àâòîð: Yu Ting, Jajodia Sushil Íàçâàíèå: Secure Data Management in Decentralized Systems ISBN: 0387276947 ISBN-13(EAN): 9780387276946 Èçäàòåëüñòâî: Springer Ðåéòèíã: Öåíà: 15427 ð. Íàëè÷èå íà ñêëàäå: Åñòü ó ïîñòàâùèêà Ïîñòàâêà ïîä çàêàç.

Îïèñàíèå: The research scope of database security has expanded greatly, due to the rapid development of the global inter-networked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of organizations. Instead, allowing selective access from different security domains has become a must for many business practices.Secure Data Management in Decentralized Systems is designed for a professional audience composed of practitioners and researchers in industry. This book is suitable for graduate-level students in computer science as well.

Îïèñàíèå: This book constitutes the refereed proceedings of the VLDB 2004 International Workshop on Secure Data Management in a Connected World, SDM 2004, held in Toronto, Canada in August 2004 in association with VLDB 2004.The 15 revised full papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in topical sections on encrypted data access, privacy perserving data management, access control, and database security.

Àâòîð: Moffat Alistair, Turpin Andrew Íàçâàíèå: Compression and Coding Algorithms ISBN: 0792376684 ISBN-13(EAN): 9780792376682 Èçäàòåëüñòâî: Springer Ðåéòèíã: Öåíà: 8738 ð. Íàëè÷èå íà ñêëàäå: Åñòü ó ïîñòàâùèêà Ïîñòàâêà ïîä çàêàç.

Îïèñàíèå: An authoritative reference to the whole area of source coding algorithms, Compression and Coding Algorithms will be a primary resource for both researchers and software engineers. The book also will be interest for people in broader area of design and analysis of algorithms and data structure. Practitioners, especially those who work in the software development and independent consulting industries creating compression software or other applications systems, in which compression plays a part, will benefit from techniques that are described. Compression and Coding Algorithms describes in detail the coding mechanisms that are available for use in data compression systems. The well known Huffman coding technique is one mechanism, but there have been many others developed over the past few decades, and this book describes, explains and assesses them. People undertaking research of software development in the areas of compression and coding algorithms will find this book an indispensable reference. In particular, the careful and detailed description of algorithms and their implementation, plus accompanying pseudo-code that can be readily implemented on computer, make this book a definitive reference in an area currently without one.The detailed pseudo-code presentation of over thirty algorithms, and careful explanation of examples, make this book approachable and authoritative. Compression and throughput results are presented where appropriate, and serve as a validation of the assessments and recommendation made in the text. The combination of implementation detail, thoughtful discussions, and careful presentation means that this book will occupy a pivotal role in this area for many years. In-depth coverage of the crucial areas of minimum-redundancy coding, arithmetic coding, adaptive coding make Compression and Coding Algorithms unique in its field.

Àâòîð: Houghton A. Íàçâàíèå: Error Coding for Engineers ISBN: 079237522X ISBN-13(EAN): 9780792375227 Èçäàòåëüñòâî: Springer Ðåéòèíã: Öåíà: 16358 ð. Íàëè÷èå íà ñêëàäå: Åñòü ó ïîñòàâùèêà Ïîñòàâêà ïîä çàêàç.

Îïèñàíèå: Error Coding for Engineers provides a useful tool for practicing engineers, students, and researchers, focusing on the applied rather than the theoretical. It describes the processes involved in coding messages in such a way that, if errors occur during transmission or storage, they are detected and, if necessary, corrected. Very little knowledge beyond a basic understanding of binary manipulation and Boolean algebra is assumed, making the subject accessible to a broad readership including non-specialists. The approach is tutorial: numerous examples, illustrations, and tables are included, along with over 30 pages of hands-on exercises and solutions. Error coding is essential in many modern engineering applications. Engineers involved in communications design, DSP-based applications, IC design, protocol design, storage solutions, and memory product design are among those who will find the book to be a valuable reference. Error Coding for Engineers is also suitable as a text for basic and advanced university courses in communications and engineering.