|
1. Autor |
Názov titulu |
Vydavateľstvo |
Rok |
Cena |
|
Robert H. Sloan,Richard Warner |
Unauthorized Access: The Crisis in Online Privacy and Security |
Taylor & Francis |
2013 |
53,51 € |
|
Gilbert Baumslag |
A Course in Mathematical Cryptography |
Walter de Gruyter |
2015 |
51,37 € |
|
Dominic Chell,Tyrone Erasmus,Shaun Colley,Ollie Whitehouse |
The Mobile Application Hacker´s Handbook |
Wiley |
2015 |
55,48 € |
|
Schneier B. |
Applied Cryptography: Protocols, Algorithms and Source Code in C |
Wiley |
2015 |
56,84 € |
|
Jean–Guillaume Dumas,Jean–Louis Roch,Éric Tannier,Sébastien Varrette |
Foundations of Coding: Compression, Encryption, Error Correction |
Wiley |
2015 |
95,95 € |
|
Kazuo Sakiyama,Yu Sasaki,Yang Li |
Security of Block Ciphers: From Algorithm Design to Hardware Implementation |
Wiley |
2015 |
97,90 € |
|
Xiaoyun Wang,Guangwu Xu,Mingqiang Wang,Xianmeng Meng |
Mathematical Foundations of Public Key Cryptography |
Taylor & Francis |
2015 |
70,87 € |
|
Maria Isabel González Vasco,Rainer Steinwandt |
Group Theoretic Cryptography |
Taylor & Francis |
2015 |
83,53 € |
|
Rod Downey |
Turing's Legacy: Developments from Turing's Ideas in Logic |
Cambridge University Press |
2014 |
78,32 € |
|
Peter Ryan |
The New Codebreakers |
Springer |
2016 |
74,38 € |
|
Ying Tan |
Artificial Immune System: Applications in Computer Security |
Wiley |
2016 |
83,37 € |
|
Rzeszut |
10 Don'ts on Your Digital Devices |
Springer |
2014 |
23,07 € |
|
Arthur |
A Practical Guide to TPM 2.0 |
Springer |
2015 |
30,11 € |
|
Futral |
Intel Trusted Execution Technology for Server Platforms |
Springer |
2013 |
30,11 € |
|
Ruan |
Platform Embedded Security Technology Revealed |
Springer |
2014 |
30,11 € |
|
Nayak |
The InfoSec Handbook |
Springer |
2014 |
30,11 € |
|
Sikos |
Mastering Structured Data on the Semantic Web |
Springer |
2015 |
34,13 € |
|
Volker Diekert, Manfred Kufleitner, Gerhard Rosenberger, Ulrich Hertrampf |
Discrete Algebraic Methods: Arithmetic, Cryptography, Automata and Groups |
De Gruyter |
2016 |
35,13 € |
|
von zur Gathen |
CryptoSchool |
Springer |
2015 |
35,17 € |
|
Gault |
Beginning Oracle Application Express 4.2 |
Springer |
2013 |
38,15 € |
|
Dewson |
Beginning SQL Server for Developers |
Springer |
2015 |
38,15 € |
|
Kellenberger |
Beginning T-SQL |
Springer |
2014 |
38,15 € |
|
Sawant |
Big Data Application Architecture Q&A |
Springer |
2013 |
38,15 € |
|
Aspin |
Business Intelligence with SQL Server Reporting Services |
Springer |
2015 |
38,15 € |
|
Hirani |
Entity Framework 6 Recipes |
Springer |
2013 |
38,15 € |
|
Robichau |
Healthcare Information Privacy and Security |
Springer |
2014 |
38,15 € |
|
West |
Practical PHP and MySQL Website Databases |
Springer |
2013 |
38,15 € |
|
Leonard |
Pro Hibernate and MongoDB |
Springer |
2013 |
38,15 € |
|
Chanda |
Beginning ASP.NET 4.5 Databases |
Springer |
2013 |
40,15 € |
|
Hei |
Security for Wireless Implantable Medical Devices |
Springer |
2013 |
40,20 € |
|
Shi |
Transactions on Data Hiding and Multimedia Security IX |
Springer |
2014 |
40,21 € |
|
Shi |
Transactions on Data Hiding and Multimedia Security X |
Springer |
2015 |
40,21 € |
|
Pearl |
Healthy SQL |
Springer |
2015 |
42,17 € |
|
Morton |
Pro Oracle SQL |
Springer |
2013 |
42,17 € |
|
Smart |
Cryptography Made Simple |
Springer |
2016 |
45,22 € |
|
Ayala |
Cyber-Physical Attack Recovery Procedures |
Springer |
2016 |
45,22 € |
|
Dooley |
A Brief History of Cryptology and Cryptographic Algorithms |
Springer |
2013 |
50,24 € |
|
Haataja |
Bluetooth Security Attacks |
Springer |
2013 |
50,24 € |
|
Rao |
Digital Watermarking Techniques in Curvelet and Ridgelet Domain |
Springer |
2016 |
50,24 € |
|
Orman |
Encrypted Email |
Springer |
2015 |
50,24 € |
|
Alzubi |
Forward Error Correction Based On Algebraic-Geometric Theory |
Springer |
2014 |
50,24 € |
|
Riggan |
Fundamentals of Sketch-Based Passwords |
Springer |
2014 |
50,24 € |
|
Yi |
Homomorphic Encryption and Applications |
Springer |
2014 |
50,24 € |
|
Traverso |
Homomorphic Signature Schemes |
Springer |
2016 |
50,24 € |
|
Gao |
Channel Estimation for Physical Layer Network Coding Systems |
Springer |
2014 |
50,24 € |
|
Delfs |
Introduction to Cryptography |
Springer |
2015 |
50,24 € |
|
Buchmann |
Introduction to Public Key Infrastructures |
Springer |
2013 |
50,24 € |
|
Li |
Leakage Resilient Password Systems |
Springer |
2015 |
50,24 € |
|
Guang |
Linear Network Error Correction Coding |
Springer |
2014 |
50,24 € |
|
Kościelny |
Modern Cryptography Primer |
Springer |
2013 |
50,24 € |
|
Baldi |
QC-LDPC Code-Based Cryptography |
Springer |
2014 |
50,24 € |
|
Wen |
Querying over Encrypted Data in Smart Grids |
Springer |
2014 |
50,24 € |
|
Michéle |
Smart TV Security |
Springer |
2015 |
50,24 € |
|
Foster |
Database Systems |
Springer |
2014 |
53,22 € |
|
Donaldson |
Enterprise Cybersecurity |
Springer |
2015 |
53,22 € |
|
Vallath |
Expert Oracle RAC Performance Diagnostics and Tuning |
Springer |
2014 |
60,26 € |
|
Lepofsky |
The Manager's Guide to Web Application Security |
Springer |
2014 |
60,26 € |
|
Gómez Pardo |
Introduction to Cryptography with Maple |
Springer |
2013 |
60,30 € |
|
Dannecker |
Energy Time Series Forecasting |
Springer |
2015 |
65,75 € |
|
Hoffstein |
An Introduction to Mathematical Cryptography |
Springer |
2014 |
70,35 € |
|
Budaghyan |
Construction and Analysis of Cryptographic Functions |
Springer |
2014 |
70,35 € |
|
Liu |
Visual Cryptography for Image Processing and Security |
Springer |
2015 |
70,35 € |
|
Pape |
Authentication in Insecure Environments |
Springer |
2014 |
75,14 € |
|
Ryabko |
Compression-Based Methods of Statistical Analysis and Prediction of Time Series |
Springer |
2016 |
77,38 € |
|
Androulidakis |
Industrial Espionage and Technical Surveillance Counter Measurers |
Springer |
2016 |
80,40 € |
|
Rebeiro |
Timing Channels in Cryptography |
Springer |
2015 |
80,40 € |
|
Krämer |
Why Cryptography Should Not Rely on Physical Attack Complexity |
Springer |
2015 |
80,40 € |
|
Gao |
Advanced Video Coding Systems |
Springer |
2014 |
85,43 € |
|
Aumasson |
The Hash Function BLAKE |
Springer |
2014 |
85,43 € |
|
Genovese |
Touchless Palmprint Recognition Systems |
Springer |
2014 |
85,43 € |
|
Zhang |
Security in Network Coding |
Springer |
2016 |
87,44 € |
|
Roland |
Security Issues in Mobile NFC Devices |
Springer |
2015 |
88,35 € |
|
Wu |
Boolean Functions and Their Applications in Cryptography |
Springer |
2016 |
93,25 € |
|
Donovan |
Code Breaking in the Pacific |
Springer |
2014 |
93,25 € |
|
Applebaum |
Cryptography in Constant Parallel Time |
Springer |
2014 |
93,25 € |
|
Koç |
Open Problems in Mathematics and Computational Science |
Springer |
2014 |
93,25 € |
|
Maes |
Physically Unclonable Functions |
Springer |
2013 |
93,25 € |
|
Ogiela |
Secure Information Management Using Linguistic Threshold Approach |
Springer |
2014 |
93,25 € |
|
Aydinian |
Information Theory, Combinatorics, and Search Theory |
Springer |
2013 |
93,27 € |
|
Livraga |
Protecting Privacy in Data Release |
Springer |
2015 |
98,17 € |
|
Gregory |
Security and the Networked Society |
Springer |
2013 |
98,17 € |
|
Ramkumar |
Symmetric Cryptographic Protocols |
Springer |
2014 |
98,17 € |
|
Yan |
Quantum Attacks on Public-Key Cryptosystems |
Springer |
2013 |
107,98 € |
|
Campisi |
Security and Privacy in Biometrics |
Springer |
2013 |
107,98 € |
|
Böhme |
The Economics of Information Security and Privacy |
Springer |
2013 |
107,98 € |
|
Li |
Interference Cancellation Using Space-Time Processing and Precoding Design |
Springer |
2013 |
127,62 € |
|
Ohm |
Multimedia Signal Coding and Transmission |
Springer |
2015 |
127,62 € |
|
Nepal |
Security, Privacy and Trust in Cloud Systems |
Springer |
2014 |
127,62 € |
|
Sara Turing |
Alan M. Turing: Centenary Edition |
Cambridge University Press |
2014 |
13,35 € |
|
Philip N. Klein |
A Cryptography Primer: Secrets and Promises |
Cambridge University Press |
2014 |
30,01 € |
|
David Kahn |
How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code |
Taylor & Francis |
2015 |
39,15 € |
|
Seymour Goodman, Detmar W. Straub, Richard Baskerville |
Information Security: Policy, Processes, and Practices |
Taylor & Francis |
2016 |
44,74 € |
|
Michael M. Stark |
QR Codes: The Technical Guide |
Taylor & Francis |
2016 |
41,76 € |
|
MacDonnell Ulsch |
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks |
Wiley |
2014 |
44,37 € |
|
J. D. Glaser |
Secure Development for Mobile Apps: How to Design and Code Secure Mobile Applications with PHP and JavaScript |
Taylor & Francis |
2014 |
50,90 € |
|
Mark Kelbert, Yuri Suhov |
Information Theory and Coding by Example |
Cambridge University Press |
2013 |
52,20 € |
|
Pedro Franco |
Understanding Bitcoin: Cryptography, Engineering and Economics |
Wiley |
2014 |
52,20 € |
|
William R. Simpson |
Enterprise Level Security: Securing Information Systems in an Uncertain World |
Taylor & Francis |
2016 |
60,45 € |
|
Douglas J. Landoll |
Information Security Policies, Procedures, and Standards: A Practitioner's Reference |
Taylor & Francis |
2016 |
60,45 € |
|
Saiful Azad, Al-Sakib Khan Pathan |
Practical Cryptography: Algorithms and Implementations Using C++ |
Taylor & Francis |
2014 |
58,73 € |