онтакты/јдрес/ѕроезд   ƒоставка и ќплата
»стори€
  +7(495) 980-12-10
  10:00-18:00 пн-сб
  shop@logobook.ru
   
    ѕоиск книг                    ѕоиск по списку ISBN –асширенный поиск    
Ќайти
  «арубежные издательства –оссийские издательства  
јвторы |  аталог книг | »здательства | Ќовинки | ”чебна€ литература | —пециальные предложени€ | Ѕестселлеры
 
„итайте отзывы покупателей и оценивайте качество магазина на яндекс.ћаркете
»нформаци€
Online  аталоги
 аталог учебной литературы
по английскому €зыку >>>

 аталог учебной литературы
по английскому €зыку >>>


Secure Coding in C and C++


¬арианты приобретени€
÷ена: 7712р.
 ол-во:
Ќаличие: ѕоставка под заказ.  ≈сть в наличии на складе поставщика.
—клад јмерика: 1 шт.  
ѕри оформлении заказа до: 25 окт 2019
ќриентировочна€ дата поставки: конец Ќо€бр€
ѕри условии наличи€ книги у поставщика.

ƒобавить в корзину
в ћои желани€
јвтор: Seacord Robert
Ќазвание:  Secure Coding in C and C++
»здательство: Pearson Education
 лассификаци€:
языки программировани€
Ѕазы данных

ISBN: 0321822137
ISBN-13(EAN): 9780321822130
ISBN: 0-321-82213-7
ISBN-13(EAN): 978-0-321-82213-0
ќбложка/‘ормат: Paperback
—траницы: 450
¬ес: 0.97 кг.
ƒата издани€: 29.03.2013
язык: ENG
»здание: 2 rev ed
»ллюстрации: Illustrations
–азмер: 229 X 180 X 27
„итательска€ аудитори€: Professional & vocational
–ейтинг:
ѕоставл€етс€ из: —Ўј



2008 Ultimate Secure Coding CD

јвтор: Michael Cross
Ќазвание: 2008 Ultimate Secure Coding CD
ISBN: 1597492043 ISBN-13(EAN): 9781597492041
»здательство: Elsevier Science
÷ена: 10098 р.
Ќаличие на складе: Ќевозможна поставка.

ќписание: Most IT Professionals rely on a small core of books that are targeted specifically at their job responsibilities. These dog-eared volumes are used on a daily basis and are considered essential. But budgets and space often limit just how many books can be added to your cored library.

"The Ultimate Secure Coding CD" solves this problem. It contains seven of our best selling titles, providing the "next level" of reference you will need for about less than half the price of the hard copy books purchased separately.The CD contains the complete PDF versions of the following Syngress titles: "Developer's Guide to Web Application Security", 159749061X; "Buffer Overflow Attacks: Detect, Exploit, Prevent", "Hacking the Code: ASP.NET Web Application Security", "Sockets, Shellcode, Porting, and Coding: Reverse Engineering", "Exploits and Tool Coding for Security Professionals", and, "Programmer's Ultimate Security DeskRef". You can add over 2,754 pages of your Secure Coding bookshelf.

It includes 5 best selling SYNGRESS Books in PDF Format.

Topics in Geometry, Coding Theory and Cryptography

јвтор: Garcia Arnaldo, Stichtenoth Henning
Ќазвание: Topics in Geometry, Coding Theory and Cryptography
ISBN: 1402053339 ISBN-13(EAN): 9781402053337
»здательство: Springer
–ейтинг:
÷ена: 9349 р.
Ќаличие на складе: ≈сть у поставщика ѕоставка под заказ.

ќписание: The theory of algebraic function fields over finite fields has its origins in number theory. However, after Goppa`s discovery of algebraic geometry codes around 1980, many applications of function fields were found in different areas of mathematics and information theory, such as coding theory, sphere packings and lattices, sequence design, and cryptography. The use of function fields often led to better results than those of classical approaches.This book presents survey articles on some of these new developments. Most of the material is directly related to the interaction between function fields and their various applications; in particular the structure and the number of rational places of function fields are of great significance. The topics focus on material which has not yet been presented in other books or survey articles. Wherever applications are pointed out, a special effort has been made to present some background concerning their use.

Secure Mobile Ad-hoc Networks and Sensors / First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers

јвтор: Burmester Mike, Yasinsac Alec
Ќазвание: Secure Mobile Ad-hoc Networks and Sensors / First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers
ISBN: 3540366466 ISBN-13(EAN): 9783540366461
»здательство: Springer
–ейтинг:
÷ена: 6077 р.
Ќаличие на складе: ≈сть у поставщика ѕоставка под заказ.

ќписание: This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Secure Mobile Ad-hoc Networks and Sensors, MADNES 2005, held in Singapore, in September 2005.The 12 revised full papers presented together with 5 keynote papers and 1 invited paper were carefully reviewed and selected from a total of 33 submissions. The papers address current topics of all security aspects of constrained network environments with special focus to mobile agents, sensor networks and radio frequency (RF) devices.

Coding and Cryptography / International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005, Revised Selected Papers

јвтор: Ytrehus √Шyvind
Ќазвание: Coding and Cryptography / International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005, Revised Selected Papers
ISBN: 3540354816 ISBN-13(EAN): 9783540354819
»здательство: Springer
–ейтинг:
÷ена: 8414 р.
Ќаличие на складе: ≈сть у поставщика ѕоставка под заказ.

ќписание: This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Coding and Cryptography, WCC 2005, held in Bergen, Norway, in March 2005.The 33 revised full papers were carefully reviewed and selected during two rounds of reviewing and improvement from 118 submissions. The papers address all aspects of coding theory, cryptography and related areas, theoretical or applied. Topics covered are: coding theory, i.e., error-correcting codes, decoding algorithms, and related combinatorial problems; cryptology, i.e., block and stream ciphers, hash functions, public key cryptography, secret sharing, authentication, and intellectual property protection; and discrete mathematics and algorithmic tools arising from these two areas, such as boolean functions, sequences, finite fields, algebraic systems and related polynomial properties.

Security with Noisy Data / Private Biometrics, Secure Key Storage and Anti-Counterfeiting

јвтор: Tuyls Pim, ≈ koric Boris, Kevenaar Tom
Ќазвание: Security with Noisy Data / Private Biometrics, Secure Key Storage and Anti-Counterfeiting
ISBN: 1846289831 ISBN-13(EAN): 9781846289835
»здательство: Springer
–ейтинг:
÷ена: 13089 р.
Ќаличие на складе: ≈сть у поставщика ѕоставка под заказ.

ќписание: Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides an overview of the techniques and applications of security based on noisy data. It also covers the theory of authentication based on noisy data and shows it in practice as a key tool for prevention of counterfeiting.

Cryptography and Coding / 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings

јвтор: Smart Nigel
Ќазвание: Cryptography and Coding / 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings
ISBN: 354030276X ISBN-13(EAN): 9783540302766
»здательство: Springer
–ейтинг:
÷ена: 8414 р.
Ќаличие на складе: ≈сть у поставщика ѕоставка под заказ.

ќписание: This book constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in Cirencester, UK, in December 2005.The 26 revised full papers presented together with 4 invited contributions were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections on coding theory, signatures and signcryption, symmetric cryptography, side channels, algebraic cryptanalysis, information theoretic applications, number theoretic foundations, and public key and ID-based encryption schemes.

Secure Data Management / Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings

јвтор: Jonker Willem, Petkovic Milan
Ќазвание: Secure Data Management / Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings
ISBN: 3540287981 ISBN-13(EAN): 9783540287988
»здательство: Springer
–ейтинг:
÷ена: 6544 р.
Ќаличие на складе: ≈сть у поставщика ѕоставка под заказ.

ќписание: This book constitutes the refereed proceedings of the Second VLDB 2005 International Workshop on Secure Data Management, SDM 2005, held in Trondheim, Norway in August/September 2005 in conjunction with VLDB 2005.The 16 revised full papers presented were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on encrypted data access, access control, information disclosure control in databases, privacy and security support for distributed applications, and with a special focus on security and privacy in healthcare.

Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks

јвтор: Poovendran Radha, Wang Cliff, Roy Sumit
Ќазвание: Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
ISBN: 0387327215 ISBN-13(EAN): 9780387327211
»здательство: Springer
–ейтинг:
÷ена: 20569 р.
Ќаличие на складе: ≈сть у поставщика ѕоставка под заказ.

ќписание: Localization is a critical process in mobile ad hoc networks and wireless sensor networks. Wireless sensor node or MANET devices need to know the network's location or its relative location, with respect to the rest of the network neighbors. However, due to the open spectrum nature of wireless communication, it is subject to attacks and intrusions. Hence the wireless network synchronization needs to be both robust and secure. Furthermore, issues such as energy constraints and mobility make the localization process even more challenging.Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks presents the latest research results in the area of secure localization for both wireless mobile ad hoc networks and wireless sensor networks.

Secure Data Management in Decentralized Systems

јвтор: Yu Ting, Jajodia Sushil
Ќазвание: Secure Data Management in Decentralized Systems
ISBN: 0387276947 ISBN-13(EAN): 9780387276946
»здательство: Springer
–ейтинг:
÷ена: 15427 р.
Ќаличие на складе: ≈сть у поставщика ѕоставка под заказ.

ќписание: The research scope of database security has expanded greatly, due to the rapid development of the global inter-networked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of organizations. Instead, allowing selective access from different security domains has become a must for many business practices.Secure Data Management in Decentralized Systems is designed for a professional audience composed of practitioners and researchers in industry. This book is suitable for graduate-level students in computer science as well.

Secure Data Management / VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings

јвтор: Jonker Willem, Petkovic Milan
Ќазвание: Secure Data Management / VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings
ISBN: 3540229833 ISBN-13(EAN): 9783540229834
»здательство: Springer
–ейтинг:
÷ена: 6077 р.
Ќаличие на складе: ≈сть у поставщика ѕоставка под заказ.

ќписание: This book constitutes the refereed proceedings of the VLDB 2004 International Workshop on Secure Data Management in a Connected World, SDM 2004, held in Toronto, Canada in August 2004 in association with VLDB 2004.The 15 revised full papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in topical sections on encrypted data access, privacy perserving data management, access control, and database security.

Compression and Coding Algorithms

јвтор: Moffat Alistair, Turpin Andrew
Ќазвание: Compression and Coding Algorithms
ISBN: 0792376684 ISBN-13(EAN): 9780792376682
»здательство: Springer
–ейтинг:
÷ена: 8738 р.
Ќаличие на складе: ≈сть у поставщика ѕоставка под заказ.

ќписание: An authoritative reference to the whole area of source coding algorithms, Compression and Coding Algorithms will be a primary resource for both researchers and software engineers. The book also will be interest for people in broader area of design and analysis of algorithms and data structure. Practitioners, especially those who work in the software development and independent consulting industries creating compression software or other applications systems, in which compression plays a part, will benefit from techniques that are described. Compression and Coding Algorithms describes in detail the coding mechanisms that are available for use in data compression systems. The well known Huffman coding technique is one mechanism, but there have been many others developed over the past few decades, and this book describes, explains and assesses them. People undertaking research of software development in the areas of compression and coding algorithms will find this book an indispensable reference. In particular, the careful and detailed description of algorithms and their implementation, plus accompanying pseudo-code that can be readily implemented on computer, make this book a definitive reference in an area currently without one.The detailed pseudo-code presentation of over thirty algorithms, and careful explanation of examples, make this book approachable and authoritative. Compression and throughput results are presented where appropriate, and serve as a validation of the assessments and recommendation made in the text. The combination of implementation detail, thoughtful discussions, and careful presentation means that this book will occupy a pivotal role in this area for many years. In-depth coverage of the crucial areas of minimum-redundancy coding, arithmetic coding, adaptive coding make Compression and Coding Algorithms unique in its field.

Error Coding for Engineers

јвтор: Houghton A.
Ќазвание: Error Coding for Engineers
ISBN: 079237522X ISBN-13(EAN): 9780792375227
»здательство: Springer
–ейтинг:
÷ена: 16358 р.
Ќаличие на складе: ≈сть у поставщика ѕоставка под заказ.

ќписание: Error Coding for Engineers provides a useful tool for practicing engineers, students, and researchers, focusing on the applied rather than the theoretical. It describes the processes involved in coding messages in such a way that, if errors occur during transmission or storage, they are detected and, if necessary, corrected. Very little knowledge beyond a basic understanding of binary manipulation and Boolean algebra is assumed, making the subject accessible to a broad readership including non-specialists. The approach is tutorial: numerous examples, illustrations, and tables are included, along with over 30 pages of hands-on exercises and solutions. Error coding is essential in many modern engineering applications. Engineers involved in communications design, DSP-based applications, IC design, protocol design, storage solutions, and memory product design are among those who will find the book to be a valuable reference. Error Coding for Engineers is also suitable as a text for basic and advanced university courses in communications and engineering.


ќќќ "Ћогосфера " “ел:+7(495) 980-12-10 www.logobook.ru
   ¬  онтакте  ћобильна€ верси€