|
1. Autor |
Název titulu |
Vydavatelství |
Rok |
Cena |
|
Robert H. Sloan,Richard Warner |
Unauthorized Access: The Crisis in Online Privacy and Security |
Taylor & Francis |
2013 |
1 440 Kč |
|
Gilbert Baumslag |
A Course in Mathematical Cryptography |
Walter de Gruyter |
2015 |
1 420 Kč |
|
Dominic Chell,Tyrone Erasmus,Shaun Colley,Ollie Whitehouse |
The Mobile Application Hacker´s Handbook |
Wiley |
2015 |
1 493 Kč |
|
Schneier B. |
Applied Cryptography: Protocols, Algorithms and Source Code in C |
Wiley |
2015 |
1 544 Kč |
|
Jean–Guillaume Dumas,Jean–Louis Roch,Éric Tannier,Sébastien Varrette |
Foundations of Coding: Compression, Encryption, Error Correction |
Wiley |
2015 |
2 581 Kč |
|
Kazuo Sakiyama,Yu Sasaki,Yang Li |
Security of Block Ciphers: From Algorithm Design to Hardware Implementation |
Wiley |
2015 |
2 634 Kč |
|
Xiaoyun Wang,Guangwu Xu,Mingqiang Wang,Xianmeng Meng |
Mathematical Foundations of Public Key Cryptography |
Taylor & Francis |
2015 |
1 836 Kč |
|
Maria Isabel González Vasco,Rainer Steinwandt |
Group Theoretic Cryptography |
Taylor & Francis |
2015 |
2 247 Kč |
|
Rod Downey |
Turing's Legacy: Developments from Turing's Ideas in Logic |
Cambridge University Press |
2014 |
2 107 Kč |
|
Peter Ryan |
The New Codebreakers |
Springer |
2016 |
2 057 Kč |
|
Ying Tan |
Artificial Immune System: Applications in Computer Security |
Wiley |
2016 |
2 243 Kč |
|
Rzeszut |
10 Don'ts on Your Digital Devices |
Springer |
2014 |
638 Kč |
|
Arthur |
A Practical Guide to TPM 2.0 |
Springer |
2015 |
832 Kč |
|
Futral |
Intel Trusted Execution Technology for Server Platforms |
Springer |
2013 |
832 Kč |
|
Ruan |
Platform Embedded Security Technology Revealed |
Springer |
2014 |
832 Kč |
|
Nayak |
The InfoSec Handbook |
Springer |
2014 |
832 Kč |
|
Sikos |
Mastering Structured Data on the Semantic Web |
Springer |
2015 |
944 Kč |
|
Volker Diekert, Manfred Kufleitner, Gerhard Rosenberger, Ulrich Hertrampf |
Discrete Algebraic Methods: Arithmetic, Cryptography, Automata and Groups |
De Gruyter |
2016 |
972 Kč |
|
von zur Gathen |
CryptoSchool |
Springer |
2015 |
972 Kč |
|
Gault |
Beginning Oracle Application Express 4.2 |
Springer |
2013 |
1 055 Kč |
|
Dewson |
Beginning SQL Server for Developers |
Springer |
2015 |
1 055 Kč |
|
Kellenberger |
Beginning T-SQL |
Springer |
2014 |
1 055 Kč |
|
Sawant |
Big Data Application Architecture Q&A |
Springer |
2013 |
1 055 Kč |
|
Aspin |
Business Intelligence with SQL Server Reporting Services |
Springer |
2015 |
1 055 Kč |
|
Hirani |
Entity Framework 6 Recipes |
Springer |
2013 |
1 055 Kč |
|
Robichau |
Healthcare Information Privacy and Security |
Springer |
2014 |
1 055 Kč |
|
West |
Practical PHP and MySQL Website Databases |
Springer |
2013 |
1 055 Kč |
|
Leonard |
Pro Hibernate and MongoDB |
Springer |
2013 |
1 055 Kč |
|
Chanda |
Beginning ASP.NET 4.5 Databases |
Springer |
2013 |
1 110 Kč |
|
Hei |
Security for Wireless Implantable Medical Devices |
Springer |
2013 |
1 112 Kč |
|
Shi |
Transactions on Data Hiding and Multimedia Security IX |
Springer |
2014 |
1 112 Kč |
|
Shi |
Transactions on Data Hiding and Multimedia Security X |
Springer |
2015 |
1 112 Kč |
|
Pearl |
Healthy SQL |
Springer |
2015 |
1 166 Kč |
|
Morton |
Pro Oracle SQL |
Springer |
2013 |
1 166 Kč |
|
Smart |
Cryptography Made Simple |
Springer |
2016 |
1 250 Kč |
|
Ayala |
Cyber-Physical Attack Recovery Procedures |
Springer |
2016 |
1 250 Kč |
|
Dooley |
A Brief History of Cryptology and Cryptographic Algorithms |
Springer |
2013 |
1 390 Kč |
|
Haataja |
Bluetooth Security Attacks |
Springer |
2013 |
1 390 Kč |
|
Rao |
Digital Watermarking Techniques in Curvelet and Ridgelet Domain |
Springer |
2016 |
1 390 Kč |
|
Orman |
Encrypted Email |
Springer |
2015 |
1 390 Kč |
|
Alzubi |
Forward Error Correction Based On Algebraic-Geometric Theory |
Springer |
2014 |
1 390 Kč |
|
Riggan |
Fundamentals of Sketch-Based Passwords |
Springer |
2014 |
1 390 Kč |
|
Yi |
Homomorphic Encryption and Applications |
Springer |
2014 |
1 390 Kč |
|
Traverso |
Homomorphic Signature Schemes |
Springer |
2016 |
1 390 Kč |
|
Gao |
Channel Estimation for Physical Layer Network Coding Systems |
Springer |
2014 |
1 390 Kč |
|
Delfs |
Introduction to Cryptography |
Springer |
2015 |
1 390 Kč |
|
Buchmann |
Introduction to Public Key Infrastructures |
Springer |
2013 |
1 390 Kč |
|
Li |
Leakage Resilient Password Systems |
Springer |
2015 |
1 390 Kč |
|
Guang |
Linear Network Error Correction Coding |
Springer |
2014 |
1 390 Kč |
|
Kościelny |
Modern Cryptography Primer |
Springer |
2013 |
1 390 Kč |
|
Baldi |
QC-LDPC Code-Based Cryptography |
Springer |
2014 |
1 390 Kč |
|
Wen |
Querying over Encrypted Data in Smart Grids |
Springer |
2014 |
1 390 Kč |
|
Michéle |
Smart TV Security |
Springer |
2015 |
1 390 Kč |
|
Foster |
Database Systems |
Springer |
2014 |
1 471 Kč |
|
Donaldson |
Enterprise Cybersecurity |
Springer |
2015 |
1 471 Kč |
|
Vallath |
Expert Oracle RAC Performance Diagnostics and Tuning |
Springer |
2014 |
1 666 Kč |
|
Lepofsky |
The Manager's Guide to Web Application Security |
Springer |
2014 |
1 666 Kč |
|
Gómez Pardo |
Introduction to Cryptography with Maple |
Springer |
2013 |
1 668 Kč |
|
Dannecker |
Energy Time Series Forecasting |
Springer |
2015 |
1 818 Kč |
|
Hoffstein |
An Introduction to Mathematical Cryptography |
Springer |
2014 |
1 946 Kč |
|
Budaghyan |
Construction and Analysis of Cryptographic Functions |
Springer |
2014 |
1 946 Kč |
|
Liu |
Visual Cryptography for Image Processing and Security |
Springer |
2015 |
1 946 Kč |
|
Pape |
Authentication in Insecure Environments |
Springer |
2014 |
2 078 Kč |
|
Ryabko |
Compression-Based Methods of Statistical Analysis and Prediction of Time Series |
Springer |
2016 |
2 140 Kč |
|
Androulidakis |
Industrial Espionage and Technical Surveillance Counter Measurers |
Springer |
2016 |
2 224 Kč |
|
Rebeiro |
Timing Channels in Cryptography |
Springer |
2015 |
2 224 Kč |
|
Krämer |
Why Cryptography Should Not Rely on Physical Attack Complexity |
Springer |
2015 |
2 224 Kč |
|
Gao |
Advanced Video Coding Systems |
Springer |
2014 |
2 362 Kč |
|
Aumasson |
The Hash Function BLAKE |
Springer |
2014 |
2 362 Kč |
|
Genovese |
Touchless Palmprint Recognition Systems |
Springer |
2014 |
2 362 Kč |
|
Zhang |
Security in Network Coding |
Springer |
2016 |
2 418 Kč |
|
Roland |
Security Issues in Mobile NFC Devices |
Springer |
2015 |
2 443 Kč |
|
Wu |
Boolean Functions and Their Applications in Cryptography |
Springer |
2016 |
2 579 Kč |
|
Donovan |
Code Breaking in the Pacific |
Springer |
2014 |
2 579 Kč |
|
Applebaum |
Cryptography in Constant Parallel Time |
Springer |
2014 |
2 579 Kč |
|
Koç |
Open Problems in Mathematics and Computational Science |
Springer |
2014 |
2 579 Kč |
|
Maes |
Physically Unclonable Functions |
Springer |
2013 |
2 579 Kč |
|
Ogiela |
Secure Information Management Using Linguistic Threshold Approach |
Springer |
2014 |
2 579 Kč |
|
Aydinian |
Information Theory, Combinatorics, and Search Theory |
Springer |
2013 |
2 579 Kč |
|
Livraga |
Protecting Privacy in Data Release |
Springer |
2015 |
2 715 Kč |
|
Gregory |
Security and the Networked Society |
Springer |
2013 |
2 715 Kč |
|
Ramkumar |
Symmetric Cryptographic Protocols |
Springer |
2014 |
2 715 Kč |
|
Yan |
Quantum Attacks on Public-Key Cryptosystems |
Springer |
2013 |
2 986 Kč |
|
Campisi |
Security and Privacy in Biometrics |
Springer |
2013 |
2 986 Kč |
|
Böhme |
The Economics of Information Security and Privacy |
Springer |
2013 |
2 986 Kč |
|
Li |
Interference Cancellation Using Space-Time Processing and Precoding Design |
Springer |
2013 |
3 529 Kč |
|
Ohm |
Multimedia Signal Coding and Transmission |
Springer |
2015 |
3 529 Kč |
|
Nepal |
Security, Privacy and Trust in Cloud Systems |
Springer |
2014 |
3 529 Kč |
|
Sara Turing |
Alan M. Turing: Centenary Edition |
Cambridge University Press |
2014 |
359 Kč |
|
Philip N. Klein |
A Cryptography Primer: Secrets and Promises |
Cambridge University Press |
2014 |
808 Kč |
|
David Kahn |
How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code |
Taylor & Francis |
2015 |
1 053 Kč |
|
Seymour Goodman, Detmar W. Straub, Richard Baskerville |
Information Security: Policy, Processes, and Practices |
Taylor & Francis |
2016 |
1 159 Kč |
|
Michael M. Stark |
QR Codes: The Technical Guide |
Taylor & Francis |
2016 |
1 124 Kč |
|
MacDonnell Ulsch |
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks |
Wiley |
2014 |
1 194 Kč |
|
J. D. Glaser |
Secure Development for Mobile Apps: How to Design and Code Secure Mobile Applications with PHP and JavaScript |
Taylor & Francis |
2014 |
1 369 Kč |
|
Mark Kelbert, Yuri Suhov |
Information Theory and Coding by Example |
Cambridge University Press |
2013 |
1 404 Kč |
|
Pedro Franco |
Understanding Bitcoin: Cryptography, Engineering and Economics |
Wiley |
2014 |
1 404 Kč |
|
William R. Simpson |
Enterprise Level Security: Securing Information Systems in an Uncertain World |
Taylor & Francis |
2016 |
1 567 Kč |
|
Douglas J. Landoll |
Information Security Policies, Procedures, and Standards: A Practitioner's Reference |
Taylor & Francis |
2016 |
1 567 Kč |
|
Saiful Azad, Al-Sakib Khan Pathan |
Practical Cryptography: Algorithms and Implementations Using C++ |
Taylor & Francis |
2014 |
1 580 Kč |