Login

Search "Cryptology and Information Theory"

Izmailov, Igor - Cryptology Transmitted Message Protection, ebook

Cryptology Transmitted Message Protection

Izmailov, Igor

138,35€

Deterministic Chaos Phenomenon from the Standpoint of Information Protection Tasks
Igor Izmailov, Boris Poizner, Ilia Romanov, Sergey Smolskiy
2. Radiophysical and Optical Chaotic Oscillators Applicable for Information Protection
Igor Izmailov, Boris Poizner,

Böhme, Rainer - The Economics of Information Security and Privacy, ebook

The Economics of Information Security and Privacy

Böhme, Rainer

129,65€

A Closer Look at Information Security Costs
Matthias Brecht, Thomas Nowey
2. To Invest or Not to Invest? Assessing the Economic Viability of a Policy and Security Configuration Management Tool
Lukas Demetz, Daniel Bachlechner
3. Ad-Blocking Games: Monetizing

Pejaś, Jerzy - Advances in Information Processing and Protection, ebook

Advances in Information Processing and Protection

Pejaś, Jerzy

161,20€

Reliability of Node Information on Autonomous Load Distribution Method
Michihiko Kudo, Koichi Kashiwagi, Yoshinobu Higami, Shin-Ya Kobayashi
36. Methodology of Developing Computer-Based Training Systems for Operators of Dynamic Objects
Orest Popov, Tatiana

Stavroulakis, Peter - Handbook of Information and Communication Security, ebook

Handbook of Information and Communication Security

Stavroulakis, Peter

432,80€

Table of contents
Part A. Fundamentals and Cryptography
1. A Framework for System Security
Clark Thomborson
2. Public-Key Cryptography
Jonathan Katz
3. Elliptic Curve Cryptography
David Jao
4. Cryptographic Hash Functions
Praveen Gauravaram, Lars R. Knudsen
5. Block Cipher Cryptanalysis

Moore, Tyler - Economics of Information Security and Privacy, ebook

Economics of Information Security and Privacy

Moore, Tyler

173,60€

Optimal Timing of Information Security Investment: A Real Options Approach
Ken-ichi Tatsumi, Makoto Goto
12. Competitive Cyber-Insurance and Internet Security
Nikhil Shetty, Galina Schwartz, Mark Felegyhazi, Jean Walrand
13. Potential Rating Indicators

Weerasinghe, Dasun - Information Security and Digital Forensics, ebook

Information Security and Digital Forensics

Weerasinghe, Dasun

57,10€

Table of contents
1. Analysis of Denial of Service Attacks in IEEE 802.11s Wireless Mesh Networks
Divya, Sanjeev Kumar
2. A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation