Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7 707 857-29-98
  +7(7172) 65-23-70
  10:00-18:00 пн-пт
  shop@logobook.kz
   
    Поиск книг                        
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Бестселлеры | |
 

Reversible Steganography and Authentication Via Transform Encoding, Mandal Jyotsna Kumar


Варианты приобретения
Цена: 149060.00T
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: 176 шт.  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Mandal Jyotsna Kumar
Название:  Reversible Steganography and Authentication Via Transform Encoding
ISBN: 9789811543999
Издательство: Springer
Классификация:


ISBN-10: 9811543992
Обложка/Формат: Paperback
Страницы: 325
Вес: 0.48 кг.
Дата издания: 02.06.2021
Язык: English
Размер: 23.39 x 15.60 x 1.83 cm
Ссылка на Издательство: Link
Поставляется из: Германии
Описание: This book focuses on reversible steganography and authentication via transform encoding, fully discussing in detail the reversibility computation of six transformation techniques: DFT, DCT, wavelets, Z, binomial and grouplet, as well as chaos-based authentication.

Reversible Steganography and Authentication Via Transform Encoding

Автор: Mandal Jyotsna Kumar
Название: Reversible Steganography and Authentication Via Transform Encoding
ISBN: 9811543968 ISBN-13(EAN): 9789811543968
Издательство: Springer
Рейтинг:
Цена: 149060.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book focuses on reversible steganography and authentication via transform encoding, fully discussing in detail the reversibility computation of six transformation techniques: DFT, DCT, wavelets, Z, binomial and grouplet, as well as chaos-based authentication.

Optimization Models in Steganography Using Metaheuristics

Автор: Sarmah Dipti Kapoor, Kulkarni Anand J., Abraham Ajith
Название: Optimization Models in Steganography Using Metaheuristics
ISBN: 3030420469 ISBN-13(EAN): 9783030420468
Издательство: Springer
Цена: 93160.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book explores the use of a socio-inspired optimization algorithm (the Cohort Intelligence algorithm), along with Cognitive Computing and a Multi-Random Start Local Search optimization algorithm.

Optimization Models in Steganography Using Metaheuristics

Автор: Sarmah Dipti Kapoor, Kulkarni Anand J., Abraham Ajith
Название: Optimization Models in Steganography Using Metaheuristics
ISBN: 3030420434 ISBN-13(EAN): 9783030420437
Издательство: Springer
Рейтинг:
Цена: 93160.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book explores the use of a socio-inspired optimization algorithm (the Cohort Intelligence algorithm), along with Cognitive Computing and a Multi-Random Start Local Search optimization algorithm.

Emerging Technologies for Authorization and Authentication: Second International Workshop, Etaa 2019, Luxembourg City, Luxembourg, September 27, 2019,

Автор: Saracino Andrea, Mori Paolo
Название: Emerging Technologies for Authorization and Authentication: Second International Workshop, Etaa 2019, Luxembourg City, Luxembourg, September 27, 2019,
ISBN: 3030397483 ISBN-13(EAN): 9783030397487
Издательство: Springer
Рейтинг:
Цена: 46570.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

Logics to reason formally about trust computation and manipulation.- An Authorization framework for Cooperate Intelligent Transport Systems.- A Framework for the Validation of Access Control Systems.- The Structure and Agency Policy Language (SAPL) for Attribute Stream-Based Access Control (ASBAC).- Security Requirements for Store-on-Client and Verify-on-Server Secure Biometric Authentication.- Reflexive Memory Authenticator: a proposal for effortless renewable biometrics.- Collaborative Authentication using Threshold Cryptography.- MuFASA: a Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols.- A Risk-driven Model to Minimize the Effects of Human Factors on Smart Devices.- A Formal Security Analysis of the p≡p Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email.


Emerging Technologies for Authorization and Authentication: Third International Workshop, Etaa 2020, Guildford, Uk, September 18, 2020, Proceedings

Автор: Saracino Andrea, Mori Paolo
Название: Emerging Technologies for Authorization and Authentication: Third International Workshop, Etaa 2020, Guildford, Uk, September 18, 2020, Proceedings
ISBN: 3030644545 ISBN-13(EAN): 9783030644543
Издательство: Springer
Цена: 46570.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the proceedings of the Third International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2020, held in Guildford, UK, in September 2020.

Mechanics of User Identification and Authentication

Автор: Todorov, Dobromir
Название: Mechanics of User Identification and Authentication
ISBN: 1420052195 ISBN-13(EAN): 9781420052190
Издательство: Taylor&Francis
Рейтинг:
Цена: 132710.00 T
Наличие на складе: Нет в наличии.

Access Control, Authentication, and Public Key Infrastructur

Автор: Chapple Mike
Название: Access Control, Authentication, and Public Key Infrastructur
ISBN: 1284031594 ISBN-13(EAN): 9781284031591
Издательство: Jones & Bartlett
Рейтинг:
Цена: 128060.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES

Series meets all standards put forth by CNSS 4011 & 4013A

Access control protects resources against unauthorized viewing, tampering, or destruction. They serve as a primary means of ensuring privacy, confidentiality, and prevention of unauthorized disclosure. Revised and updated with the latest data from this fast paced field, Access Control, Authentication, and Public Key Infrastructure defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access control programs. It looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. It provides a student and professional resource that details how to put access control systems to work as well as testing and managing them.

New to the Second Edition:

Updated references to Windows 8 and Outlook 2011
A new discussion of recent Chinese hacking incidence
Examples depicting the risks associated with a missing unencrypted laptop containing private data.
New sections on the Communications Assistance for Law Enforcement Act (CALEA) and granting Windows folder permissions are added.
New information on the Identity Theft Enforcement and Restitution Act and the Digital Millennium Copyright Act (DMCA).

Managing Security Services in Heterogenous Networks

Автор: Klingler-Vidra, Robyn (King`s College London, UK) Glennie, Alex (Nesta, UK) Lawrence, Courtney Savie (Circular Design Lab)
Название: Managing Security Services in Heterogenous Networks
ISBN: 0367647451 ISBN-13(EAN): 9780367647452
Издательство: Taylor&Francis
Рейтинг:
Цена: 40820.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book sheds light upon the security threats, defenses, and remediation on various networking and data processing domains including wired networks, wireless networks, mobile ad hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control.

Emerging Technologies for Authorization and Authentication

Автор: Saracino
Название: Emerging Technologies for Authorization and Authentication
ISBN: 303125466X ISBN-13(EAN): 9783031254666
Издательство: Springer
Рейтинг:
Цена: 51230.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This volume constitutes the refereed proceedings of the 5th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2022, held in Copenhagen, Denmark, on September 30, 2022, co-located with ESORICS 2022. The revised 8 full papers presented together with one invited paper were carefully reviewed and selected from 10 submissions. They cover topics such as: new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, including the smart home environment.

Instant Java Password and Authentication Security

Автор: Mayoral Fernando
Название: Instant Java Password and Authentication Security
ISBN: 1849697760 ISBN-13(EAN): 9781849697767
Издательство: Неизвестно
Рейтинг:
Цена: 36770.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.

Authentication in IoT

Автор: Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mi
Название: Authentication in IoT
ISBN: 1119527929 ISBN-13(EAN): 9781119527923
Издательство: Wiley
Рейтинг:
Цена: 110830.00 T
Наличие на складе: Невозможна поставка.
Описание:

An up-to-date guide to an overview of authentication in the Internet of Things (IoT)

The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level.

The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors--noted experts on the topic--provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases. This important book:

  • Offers an authoritative reference designed for use by all IoT stakeholders
  • Includes information for securing devices at the user, device, and network levels
  • Contains a classification of existing vulnerabilities
  • Written by an international group of experts on the topic
  • Provides a guide to the most current information available on IoT security

Written for network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations, and security solution developers, IoT Security is an essential guide that contains information on security features, including underlying networks, architectures, and security requirements.


Emerging Technologies for Authorization and Authentication: 4th International Workshop, ETAA 2021, Darmstadt, Germany, October 8, 2021, Revised Select

Автор: Saracino Andrea, Mori Paolo
Название: Emerging Technologies for Authorization and Authentication: 4th International Workshop, ETAA 2021, Darmstadt, Germany, October 8, 2021, Revised Select
ISBN: 3030937461 ISBN-13(EAN): 9783030937461
Издательство: Springer
Рейтинг:
Цена: 51230.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the proceedings of the 4th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2021, held in Darmstadt, Germany, on October 8, 2021.


Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2)
ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz
Kaspi QR
   В Контакте     В Контакте Мед  Мобильная версия