Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7 707 857-29-98
  +7(7172) 65-23-70
  10:00-18:00 пн-пт
  shop@logobook.kz
   
    Поиск книг                        
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Бестселлеры | |
 

Distributed Denial of Service Attacks: Concepts, Mathematical and Cryptographic Solutions, Mangey Ram, Rajeev Singh


Варианты приобретения
Цена: 166060.00T
Кол-во:
 о цене
Наличие: Отсутствует. 
Возможна поставка под заказ. Дата поступления на склад уточняется после оформления заказа


Добавить в корзину
в Мои желания

Автор: Mangey Ram, Rajeev Singh
Название:  Distributed Denial of Service Attacks: Concepts, Mathematical and Cryptographic Solutions
ISBN: 9783110619850
Издательство: Walter de Gruyter
Классификация: ISBN-10: 3110619857
Обложка/Формат: Ebook
Страницы: 232
Вес: 0.00 кг.
Дата издания: 19.07.2021
Серия: Engineering
Язык: English
Читательская аудитория: Professional and scholarly
Ключевые слова: Applied mathematics,Artificial intelligence,Computer security,Ownership & organization of enterprises,Software Engineering, COMPUTERS / Information Theory,COMPUTERS / Security / Networking,COMPUTERS / Software Development & Engineering / General,MATHEMATI
Рейтинг:
Поставляется из: Германии
Описание:

Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of mathematics and mathematical tools such as optimization techniques, finite element methods, differential equations, fluid dynamics, mathematical modelling, and simulation. Neither optimization in engineering, nor the performance of safety-critical system and system security; nor high assurance software architecture and design would be possible without the development of mathematical applications.

De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences (AMEIS) focusses on the latest applications of engineering and information technology that are possible only with the use of mathematical methods. By identifying the gaps in knowledge of engineering applications the AMEIS series fosters the international interchange between the sciences and keeps the reader informed about the latest developments.



Distributed Denial of Service Attacks: Concepts, Mathematical and Cryptographic Solutions

Автор: Mangey Ram, Rajeev Singh
Название: Distributed Denial of Service Attacks: Concepts, Mathematical and Cryptographic Solutions
ISBN: 3110616750 ISBN-13(EAN): 9783110616750
Издательство: Walter de Gruyter
Рейтинг:
Цена: 198290.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of mathematics and mathematical tools such as optimization techniques, finite element methods, differential equations, fluid dynamics, mathematical modelling, and simulation. Neither optimization in engineering, nor the performance of safety-critical system and system security; nor high assurance software architecture and design would be possible without the development of mathematical applications.

De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences (AMEIS) focusses on the latest applications of engineering and information technology that are possible only with the use of mathematical methods. By identifying the gaps in knowledge of engineering applications the AMEIS series fosters the international interchange between the sciences and keeps the reader informed about the latest developments.


Cryptographic Security Solutions for the Internet of Things

Автор: Banday Mohammad Tariq
Название: Cryptographic Security Solutions for the Internet of Things
ISBN: 1522586296 ISBN-13(EAN): 9781522586296
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 125400.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Discusses novel designs and developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. Coverage includes cryptographic algorithms, encryption techniques, and authentication procedures.

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security

Автор: Gupta Brij, Agrawal Dharma P., Yamaguchi Shingo
Название: Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
ISBN: 1522501053 ISBN-13(EAN): 9781522501053
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 296610.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments.The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.

Cryptographic Security Solutions for the Internet of Things

Автор: Mohammad Tariq Banday
Название: Cryptographic Security Solutions for the Internet of Things
ISBN: 1522557423 ISBN-13(EAN): 9781522557425
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 189420.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks.Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals.

Cryptographic Attacks: Computer Security Exploits

Автор: Krzewinski Basil
Название: Cryptographic Attacks: Computer Security Exploits
ISBN: 153002529X ISBN-13(EAN): 9781530025299
Издательство: Неизвестно
Цена: 68970.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.

Cryptographic Hardware and Embedded Systems - CHES 2000

Автор: Cetin K. Koc; Christof Paar
Название: Cryptographic Hardware and Embedded Systems - CHES 2000
ISBN: 354041455X ISBN-13(EAN): 9783540414551
Издательство: Springer
Рейтинг:
Цена: 74530.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.

Cryptographic Hardware and Embedded Systems

Автор: Cetin K. Koc; Christof Paar
Название: Cryptographic Hardware and Embedded Systems
ISBN: 354066646X ISBN-13(EAN): 9783540666462
Издательство: Springer
Рейтинг:
Цена: 74530.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The refereed proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems (CHES `99). Papers cover topics including hardware architectures, smartcards and embedded systems, arithmetic algorithms, power attacks, and true random numbers.

Cryptographic Hardware and Embedded Systems – CHES 2017

Автор: Wieland Fischer; Naofumi Homma
Название: Cryptographic Hardware and Embedded Systems – CHES 2017
ISBN: 3319667866 ISBN-13(EAN): 9783319667867
Издательство: Springer
Рейтинг:
Цена: 93160.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017. The annual CHES conference highlights new results in the design and analysis of cryptographic hardware and soft- ware implementations.

Cryptographic Applications of Analytic Number Theory

Автор: Igor Shparlinski
Название: Cryptographic Applications of Analytic Number Theory
ISBN: 3034894155 ISBN-13(EAN): 9783034894159
Издательство: Springer
Рейтинг:
Цена: 93160.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The book introduces new techniques that imply rigorous lower bounds on the com- plexity of some number-theoretic and cryptographic problems. These functions are considered over the residue ring modulo p and over the residue ring modulo an arbitrary divisor d of p - 1.

Advances in Cryptology - Eurocrypt 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croa

Автор: Canteaut Anne, Ishai Yuval
Название: Advances in Cryptology - Eurocrypt 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croa
ISBN: 3030457206 ISBN-13(EAN): 9783030457204
Издательство: Springer
Рейтинг:
Цена: 93160.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020.

Automated Methods in Cryptographic Fault Analysis

Автор: Jakub Breier; Xiaolu Hou; Shivam Bhasin
Название: Automated Methods in Cryptographic Fault Analysis
ISBN: 3030113329 ISBN-13(EAN): 9783030113322
Издательство: Springer
Рейтинг:
Цена: 93160.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book presents a collection of automated methods that are useful for different aspects of fault analysis in cryptography. The first part focuses on automated analysis of symmetric cipher design specifications, software implementations, and hardware circuits. The second part provides automated deployment of countermeasures. The third part provides automated evaluation of countermeasures against fault attacks. Finally, the fourth part focuses on automating fault attack experiments. The presented methods enable software developers, circuit designers, and cryptographers to test and harden their products.

The Cryptographic Imagination: Secret Writing from Edgar Poe to the Internet

Автор: Rosenheim Shawn James
Название: The Cryptographic Imagination: Secret Writing from Edgar Poe to the Internet
ISBN: 1421437155 ISBN-13(EAN): 9781421437156
Издательство: Неизвестно
Рейтинг:
Цена: 68430.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

Originally published in 1996. In The Cryptographic Imagination, Shawn Rosenheim uses the writings of Edgar Allan Poe to pose a set of questions pertaining to literary genre, cultural modernity, and technology. Rosenheim argues that Poe's cryptographic writing--his essays on cryptography and the short stories that grew out of them--requires that we rethink the relation of poststructural criticism to Poe's texts and, more generally, reconsider the relation of literature to communication. Cryptography serves not only as a template for the language, character, and themes of much of Poe's late fiction (including his creation, the detective story) but also as a secret history of literary modernity itself. Both postwar fiction and literary criticism, the author writes, are deeply indebted to the rise of cryptography in World War II.

Still more surprising, in Rosenheim's view, Poe is not merely a source for such literary instances of cryptography as the codes in Conan Doyle's The Dancing-Men or in Jules Verne, but, through his effect on real cryptographers, Poe's writing influenced the outcome of World War II and the development of the Cold War. However unlikely such ideas sound, The Cryptographic Imagination offers compelling evidence that Poe's cryptographic writing clarifies one important avenue by which the twentieth century called itself into being.

The strength of Rosenheim's work extends to a revisionistic understanding of the entirety of literary history (as a repression of cryptography) and then, in a breathtaking shift of register, interlinks Poe's exercises in cryptography with the hyperreality of the CIA, the Cold War, and the Internet. What enables this extensive range of applications is the stipulated tension Rosenheim discerns in the relationship between the forms of the literary imagination and the condition of its mode of production. Cryptography, in this account, names the technology of literary production--the diacritical relationship between decoding and encoding--that the literary imagination dissimulates as hieroglyphics--the hermeneutic relationship between a sign and its content.--Donald E. Pease, Dartmouth College

--Donald E. Pease, Dartmouth College "Errol Morris, director of The Thin Blue Line and A Brief History of Time"



Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2)
ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz
Kaspi QR
   В Контакте     В Контакте Мед  Мобильная версия