Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7 707 857-29-98
  +7(7172) 65-23-70
  10:00-18:00 пн-пт
  shop@logobook.kz
   
    Поиск книг                        
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Бестселлеры | |
 

Attribute-based encryption and access control, Huang, Dijiang Dong, Qiuxiang Zhu, Yan


Варианты приобретения
Цена: 46950.00T
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: 170 шт.  
При оформлении заказа до: 2025-08-02
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Huang, Dijiang Dong, Qiuxiang Zhu, Yan
Название:  Attribute-based encryption and access control
ISBN: 9781032173764
Издательство: Taylor&Francis
Классификация:
ISBN-10: 1032173769
Обложка/Формат: Paperback
Страницы: 340
Вес: 0.49 кг.
Дата издания: 30.09.2021
Серия: Data-enabled engineering
Язык: English
Иллюстрации: 55 illustrations, black and white
Размер: 156 x 231 x 23
Рейтинг:
Поставляется из: Европейский союз
Описание: This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications. The goal is to provide in-depth knowledge usable for college students and researchers who want to have a comprehensive understanding of ABE schemes and novel ABE-enabled research and applications. The specific focus is to present the development of using new ABE features such as group-based access, ID-based revocation, and attributes management functions such as delegation, federation, and interoperability. These new capabilities can build a new ABE-based Attribute-Based Access Control (ABAC) solution that can incorporate data access policies and control into ciphertext. This book is also ideal for IT companies to provide them with the most recent technologies and research on how to implement data access control models for mobile and data-centric applications, where data access control does not need to rely on a fixed access control infrastructure. It’s also of interested to those working in security, to enable them to have the most recent developments in data access control such as ICN and Blockchain technologies.FeaturesCovers cryptographic background knowledge for ABE and ABACFeatures various ABE constructions to achieve integrated access control capabilitiesOffers a comprehensive coverage of ABE-based ABACProvides ABE applications with real-world examplesAdvances the ABE research to support new mobile and data-centric applications
Дополнительное описание: Foundations. Attribute-Based Encryption. Group-Based Communication. Comparable ABE. Privacy-Preserving ABE. Identity-Based User Revocation. Performance Enhancement in ABE. Attribute Management. Case Study. Conclusion. Appendix: Codes of ABE schemes.


Applied Cryptography: Protocols, Algorithms and Source Code in C

Автор: Schneier Bruce
Название: Applied Cryptography: Protocols, Algorithms and Source Code in C
ISBN: 1119096723 ISBN-13(EAN): 9781119096726
Издательство: Wiley
Рейтинг:
Цена: 61250.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: From the world`s most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information.

Attribute-based credentials for trust

Название: Attribute-based credentials for trust
ISBN: 3319144383 ISBN-13(EAN): 9783319144382
Издательство: Springer
Рейтинг:
Цена: 121110.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: ​Introduction.- Architecture for Application Developers.- Architecture for Crypto Developers.- Comparison.- The Soederhamn Pilot.- The Patras Pilot.- Experiences and Feedback from the Pilots.- Annexes.

Attribute-based Credentials for Trust

Автор: Kai Rannenberg; Jan Camenisch; Ahmad Sabouri
Название: Attribute-based Credentials for Trust
ISBN: 3319381946 ISBN-13(EAN): 9783319381947
Издательство: Springer
Рейтинг:
Цена: 121110.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: ​Introduction.- Architecture for Application Developers.- Architecture for Crypto Developers.- Comparison.- The Soederhamn Pilot.- The Patras Pilot.- Experiences and Feedback from the Pilots.- Annexes.

Limitations and Future Applications of Quantum Cryptography

Автор: Alka Agrawal, Brijesh K. Chaurasia, Neeraj Kumar, Raees Ahmad Khan
Название: Limitations and Future Applications of Quantum Cryptography
ISBN: 1799866785 ISBN-13(EAN): 9781799866787
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 181110.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country's sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography.

Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing.

Applied Incident Response

Автор: Anson Steve
Название: Applied Incident Response
ISBN: 1119560268 ISBN-13(EAN): 9781119560265
Издательство: Wiley
Рейтинг:
Цена: 39070.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Democratic practices - participation, citizenship rights, and an inclusionary state - enhance human development. The book uncovers how local democratic governance improves well-being, related to poverty, health, women`s empowerment, and education. Municipalities that invest in democracy attain greater human development. Commitments to democracy thus have real consequences for citizens.

Digital Forensics

Автор: Andre Arnes
Название: Digital Forensics
ISBN: 1119262380 ISBN-13(EAN): 9781119262381
Издательство: Wiley
Рейтинг:
Цена: 69640.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critical field Written by faculty members and associates of the world-renowned Norwegian Information Security Laboratory (NisLab) at the Norwegian University of Science and Technology (NTNU), this textbook takes a scientific approach to digital forensics ideally suited for university courses in digital forensics and information security. Each chapter was written by an accomplished expert in his or her field, many of them with extensive experience in law enforcement and industry. The author team comprises experts in digital forensics, cybercrime law, information security and related areas.   Digital forensics is a key competency in meeting the growing risks of cybercrime, as well as for criminal investigation generally. Considering the astonishing pace at which new information technology – and new ways of exploiting information technology – is brought on line, researchers and practitioners regularly face new technical challenges, forcing them to continuously upgrade their investigatory skills. Designed to prepare the next generation to rise to those challenges, the material contained in Digital Forensics has been tested and refined by use in both graduate and undergraduate programs and subjected to formal evaluations for more than ten years. Encompasses all aspects of the field, including methodological, scientific, technical and legal matters Based on the latest research, it provides novel insights for students, including an informed look at the future of digital forensics Includes test questions from actual exam sets, multiple choice questions suitable for online use and numerous visuals, illustrations and case example images Features real-word examples and scenarios, including court cases and technical problems, as well as a rich library of academic references and references to online media Digital Forensics is an excellent introductory text for programs in computer science and computer engineering and for master degree programs in military and police education. It is also a valuable reference for legal practitioners, police officers, investigators, and forensic practitioners seeking to gain a deeper understanding of digital forensics and cybercrime.

Cryptography in the information society

Автор: Ryabko, Boris Fionov, Andrey
Название: Cryptography in the information society
ISBN: 9811226156 ISBN-13(EAN): 9789811226151
Издательство: Marston Book Services
Рейтинг:
Цена: 105600.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians. The topics addressed include block ciphers, stream ciphers, public key encryption, digital signatures, cryptographic protocols, elliptic curve cryptography, theoretical security, blockchain and cryptocurrencies, issues concerning random numbers, and steganography. The key results discussed in each chapter are mathematically proven, and the methods are described in sufficient detail to enable their computational implementation. Exercises are provided.

Identity-Based Encryption

Автор: Sanjit Chatterjee; Palash Sarkar
Название: Identity-Based Encryption
ISBN: 1489996974 ISBN-13(EAN): 9781489996978
Издательство: Springer
Рейтинг:
Цена: 107130.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This form of public key encryption has been the subject of intense research in recent years. Summarizing the literature on IBE, this volume covers ideas that could spark further research as well as background on subjects such as elliptic curves and pairings.

Integer Algorithms In Cryptology And Information Assurance

Автор: Verkhovsky Boris S
Название: Integer Algorithms In Cryptology And Information Assurance
ISBN: 9814623741 ISBN-13(EAN): 9789814623742
Издательство: World Scientific Publishing
Цена: 153120.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Integer Algorithms in Cryptology and Information Assurance is a collection of the author`s own innovative approaches in algorithms and protocols for secret and reliable communication.

Computational Number Theory and Modern Cryptography

Автор: Yan Song Y
Название: Computational Number Theory and Modern Cryptography
ISBN: 1118188586 ISBN-13(EAN): 9781118188583
Издательство: Wiley
Рейтинг:
Цена: 87590.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: * Makes deep mathematical problems accessible to computer scientists and engineers * Based on classroom tested materials used in the US, UK and China * Exercises included in every chapter * Instructor resources available on the book s Companion Website .

The Design of Rijndael: The Advanced Encryption Standard (Aes)

Автор: Daemen Joan, Rijmen Vincent
Название: The Design of Rijndael: The Advanced Encryption Standard (Aes)
ISBN: 3662607719 ISBN-13(EAN): 9783662607718
Издательство: Springer
Цена: 149060.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch.

OSINT Toolkit: A Hacker?s Guide to Open Source Intelligence Gathering for Digital Investigations

Автор: Vinny Troia
Название: OSINT Toolkit: A Hacker?s Guide to Open Source Intelligence Gathering for Digital Investigations
ISBN: 1119540925 ISBN-13(EAN): 9781119540922
Издательство: Wiley
Рейтинг:
Цена: 34850.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers. This book explores Open Source Intelligence Gathering (OSINT) inside out from multiple perspectives, including those of hackers and seasoned intelligence experts. OSINT refers to the techniques and tools required to harvest publicly available data concerning a person or an organization. With several years of experience of tracking hackers with OSINT, the author whips up a classical plot-line involving a hunt for a threat actor. While taking the audience through the thrilling investigative drama, the author immerses the audience with in-depth knowledge of state-of-the-art OSINT tools and techniques. Technical users will want a basic understanding of the Linux command line in order to follow the examples. But a person with no Linux or programming experience can still gain a lot from this book through the commentaries.

This book's unique digital investigation proposition is a combination of story-telling, tutorials, and case studies. The book explores digital investigation from multiple angles:

  • Through the eyes of the author who has several years of experience in the subject.
  • Through the mind of the hacker who collects massive amounts of data from multiple online sources to identify targets as well as ways to hit the targets.
  • Through the eyes of industry leaders.

This book is ideal for:

Investigation professionals, forensic analysts, and CISO/CIO and other executives wanting to understand the mindset of a hacker and how seemingly harmless information can be used to target their organization.

Security analysts, forensic investigators, and SOC teams looking for new approaches on digital investigations from the perspective of collecting and parsing publicly available information.

CISOs and defense teams will find this book useful because it takes the perspective of infiltrating an organization from the mindset of a hacker. The commentary provided by outside experts will also provide them with ideas to further protect their organization's data.



Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2)
ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz
Kaspi QR
   В Контакте     В Контакте Мед  Мобильная версия