Автор: Gupta, Brij B. (national Institute Of Technology Kurukshetra India) Mamta, Ms Название: Secure searchable encryption and data management ISBN: 0367619679 ISBN-13(EAN): 9780367619671 Издательство: Taylor&Francis Рейтинг: Цена: 7501.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book provides every necessary detail required to develop the secure searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models which ensures the minimum security requirements for real-world application.
Описание: An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch.
Автор: Parag Chatterjee, Emmanuel Benoist, Asoke Nath Название: Applied Approach to Privacy and Security for the Internet of Things ISBN: 1799824454 ISBN-13(EAN): 9781799824459 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 24255.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities.
Applied Approach to Privacy and Security for the Internet of Things is a collection of innovative research on the methods and applied aspects of security in IoT-based systems by discussing core concepts and studying real-life scenarios. While highlighting topics including malware propagation, smart home vulnerabilities, and bio-sensor safety, this book is ideally designed for security analysts, software security engineers, researchers, computer engineers, data scientists, security professionals, practitioners, academicians, and students seeking current research on the various aspects of privacy and security within IoT.
Автор: Eli Biham; Adi Shamir Название: Differential Cryptanalysis of the Data Encryption Standard ISBN: 1461393167 ISBN-13(EAN): 9781461393160 Издательство: Springer Рейтинг: Цена: 14673.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: DES, the Data Encryption Standard, is the best known and most widely used civilian cryptosystem.
Автор: Aggelos Kiayias; Serdar Pehlivanoglu Название: Encryption for Digital Content ISBN: 1461427215 ISBN-13(EAN): 9781461427216 Издательство: Springer Рейтинг: Цена: 19564.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This is a mathematical treatment of combinatorial encryption techniques used in digital content distribution systems and related attack models. It includes a complete description of broadcast encryption with various revocation and tracing functionalities.
Название: Attribute-based credentials for trust ISBN: 3319144383 ISBN-13(EAN): 9783319144382 Издательство: Springer Рейтинг: Цена: 18167.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Introduction.- Architecture for Application Developers.- Architecture for Crypto Developers.- Comparison.- The Soederhamn Pilot.- The Patras Pilot.- Experiences and Feedback from the Pilots.- Annexes.
Автор: Kai Rannenberg; Jan Camenisch; Ahmad Sabouri Название: Attribute-based Credentials for Trust ISBN: 3319381946 ISBN-13(EAN): 9783319381947 Издательство: Springer Рейтинг: Цена: 18167.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Introduction.- Architecture for Application Developers.- Architecture for Crypto Developers.- Comparison.- The Soederhamn Pilot.- The Patras Pilot.- Experiences and Feedback from the Pilots.- Annexes.
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or bank transactions. Joshua Holden instead shows how mathematical principles underpin the ways that different codes and ciphers operate. Holden focuses on both code making and code breaking and he discusses the majority of ancient and modern ciphers currently known.
Holden begins by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically well-known ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, and ciphers involving exponentiation. He also examines public-key ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. He concludes with a look at the future of ciphers and where cryptography might be headed. Only basic mathematics up to high school algebra is needed to understand and enjoy the book.
With a plethora of historical anecdotes and real-world examples, The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.
Автор: Sanjit Chatterjee; Palash Sarkar Название: Identity-Based Encryption ISBN: 1489996974 ISBN-13(EAN): 9781489996978 Издательство: Springer Рейтинг: Цена: 16070.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This form of public key encryption has been the subject of intense research in recent years. Summarizing the literature on IBE, this volume covers ideas that could spark further research as well as background on subjects such as elliptic curves and pairings.
Tribal Knowledge from the Best in Cybersecurity Leadership
The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security.
Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businessesand governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world's top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including:
What's the most important decision you've made or action you've taken to enable a business risk?
How do you lead your team to execute and get results?
Do you have a workforce philosophy or unique approach to talent acquisition?
Have you created a cohesive strategy for your information security program or business unit?
Anyone in or aspiring to an information security leadership role, whether at a team level or organization-wide, needs to read this book. Tribe of Hackers Security Leaders has the real-world advice and practical guidance you need to advance your cybersecurity leadership career.
Автор: Xun Yi; Russell Paulet; Elisa Bertino Название: Homomorphic Encryption and Applications ISBN: 3319122282 ISBN-13(EAN): 9783319122281 Издательство: Springer Рейтинг: Цена: 6986.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. This volume achieves a balance between the theoretical and the practical components of modern information security.
Автор: Carlos Cid; Sean Murphy; Matthew Robshaw Название: Algebraic Aspects of the Advanced Encryption Standard ISBN: 1441937293 ISBN-13(EAN): 9781441937292 Издательство: Springer Рейтинг: Цена: 14673.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: to the AES.- Mathematical Background.- Description of the AES.- Algebraic Properties of the AES.- Equation Systems for the AES.- Analysis of AES Equation Systems.- Closing Remarks.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru