Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Cryptology and Network Security, Feng Bao; San Ling; Tatsuaki Okamoto; Huaxiong Wan


Варианты приобретения
Цена: 9781.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Feng Bao; San Ling; Tatsuaki Okamoto; Huaxiong Wan
Название:  Cryptology and Network Security
ISBN: 9783540769682
Издательство: Springer
Классификация:
ISBN-10: 3540769684
Обложка/Формат: Paperback
Страницы: 295
Вес: 0.46 кг.
Дата издания: 2007
Серия: Lecture notes in computer science / security and cryptology
Язык: English
Иллюстрации: Illustrations
Размер: 239 x 153 x 18
Читательская аудитория: Professional & vocational
Подзаголовок: 6th international conference, cans 2007, singapore, december 8-10, 2007, proceedings
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Германии
Описание: Constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS 2007, held in Singapore, in December 2007. In this book, the papers are organized in topical sections on signatures, network security, secure keyword search and private information retrieval, and public key encryption.


Network security with openssl

Автор: Viega, Jon Messier, Matt Chandra, Pravir
Название: Network security with openssl
ISBN: 059600270X ISBN-13(EAN): 9780596002701
Издательство: Wiley
Рейтинг:
Цена: 5067.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This volume is designed to enable developers to use The OpenSSL library more effectively. It offers guidance on avoiding pitfalls, while taking advantage of the library`s advanced features and provides the information necessary to use OpenSSL safely and effectively.

Applied Network Security Monitoring,

Автор: Chris Sanders
Название: Applied Network Security Monitoring,
ISBN: 0124172083 ISBN-13(EAN): 9780124172081
Издательство: Elsevier Science
Рейтинг:
Цена: 6736.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: A guide to becoming an NSM analyst from the ground up. It takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. It discusses the proper methods for data collection, and teaches you how to become a skilled NSM analyst.

Hardware Security

Автор: Mukhopadhyay
Название: Hardware Security
ISBN: 143989583X ISBN-13(EAN): 9781439895832
Издательство: Taylor&Francis
Рейтинг:
Цена: 19140.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC).

Gain a Comprehensive Understanding of Hardware Security--from Fundamentals to Practical Applications

Since most implementations of standard cryptographic algorithms leak information that can be exploited by adversaries to gather knowledge about secret encryption keys, Hardware Security: Design, Threats, and Safeguards:

  • Details algorithmic- and circuit-level countermeasures for attacks based on power, timing, fault, cache, and scan chain analysis
  • Describes hardware intellectual property piracy and protection techniques at different levels of abstraction based on watermarking
  • Discusses hardware obfuscation and physically unclonable functions (PUFs), as well as Trojan modeling, taxonomy, detection, and prevention

Design for Security and Meet Real-Time Requirements

If you consider security as critical a metric for integrated circuits (ICs) as power, area, and performance, you'll embrace the design-for-security methodology of Hardware Security: Design, Threats, and Safeguards.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия