Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

Bücher veröffentlicht von Springer US

Filter
Filter
Ordnen nachSortieren Beliebt
  • 12% sparen
    von Debra Cook
    94,00 €

    Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes.CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. As the processing power of GPUs increases, research involving the use of GPUs for general purpose computing has arisen. This work extends such research by considering the use of a GPU as a parallel processor for encrypting data. The authors evaluate the operations found in symmetric and asymmetric key ciphers to determine if encryption can be programmed in existing GPUs. A detailed description for a GPU based implementation of AES is provided. The feasibility of GPU-based encryption allows the authors to explore the use of a GPU as a trusted system component. Unencrypted display data can be confined to the GPU to avoid exposing it to any malware running on the operating system.

  • 10% sparen
    von Xiaoxi Yang, Zhao Duan, Weijun Wang, usw.
    96,00 €

  • 12% sparen
    von Khaldoun Al Agha
    94,00 €

  • 11% sparen
    von Sylvain Lavelle, Veronique Laurent, Kai Kimppa, usw.
    95,00 €

    Chrisanthi Avgerou TC9 chair Professor of Information Systems London School of Economics c.avgerou@lse.ac.uk A conference to honour the professional life of Jacques Berleur has inevitably been a platform for debate on the most fundamental issues that pre-occupy the working groups of the IFIP Technical Committee 9 (TC9) on the 'Relationship between Computers and Society'. Jacques Berleur has of course been one of those few ICT experts who, since the 1970s, has tirelessly worked within the IFIP community to expose the nature of the ethical dilemmas of a society increasingly relying on the complex ICT infrastructures, to raise awareness of the social challenges this poses, and to influence action compatible with the ethical values of western democracy. And while Jacques, in the wake of his retirement from his university post is accelerating the pace of building his oeuvre, we can take the opportunity of this event to reflect on the critical stance towards the Information Society he has contributed to form within the TC9, which he chaired for many years.

  • 11% sparen
    von Khaldoun Al Agha, Xavier Carcelle & Guy Pujolle
    95,00 €

  • - Countering the Largest Security Threat
    von Wenke Lee
    99,00 - 118,00 €

    Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat.Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based on the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets. It provides botnet detection techniques and response strategies, as well as the latest results from leading academic, industry and government researchers.Botnet Detection: Countering the Largest Security Threat is intended for researchers and practitioners in industry. This book is also appropriate as a secondary text or reference book for advanced-level students in computer science. 

  • von John Impagliazzo
    49,00 €

  • von Wenyu Sun
    168,00 €

    Optimization Theory and Methods can be used as a textbook for an optimization course for graduates and senior undergraduates. It is the result of the author's teaching and research over the past decade. It describes optimization theory and several powerful methods. For most methods, the book discusses an idea's motivation, studies the derivation, establishes the global and local convergence, describes algorithmic steps, and discusses the numerical performance.

  • 15% sparen
    von Song Y. Yan
    96,00 €

    RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and widely-used cryptographic system in today's digital world, for which its three inventors Rivest, Shamir and Adleman received the year 2002 Turing Award, the equivalent Nobel Prize in Computer Science.Cryptanalytic Attacks on RSA covers almost all major known cryptanalytic attacks and defenses of the RSA cryptographic system and its variants. Since RSA depends heavily on computational complexity theory and number theory, background information on complexity theory and number theory is presented first. This is followed by an account of the RSA cryptographic system and its variants.Cryptanalytic Attacks on RSA is designed for a professional audience of practitioners and researchers in industry and academia and as a reference or secondary text for advanced level students in computer science, applied mathematics, electrical & communication engineering.

  • 12% sparen
    von Sujeet Shenoi & Mauricio Papa
    94,00 €

  • von John Impagliazzo
    49,00 €

  • 13% sparen
    - IFIP 19th World Computer Congress, TC 12: IFIP AI 2006 Stream, August 21-24, 2006, Santiago, Chile
    von Max Bramer
    140,00 €

    The papers in this volume comprise the refereed proceedings of the conference 'Artificial Intelligence in Theory and Practice' (IFIP AI 2006), which formed part of the 19th World Computer Congress of IFIP, the International Federation for Information Processing (WCC- 2006), in Santiago, Chile in August 2006. The conference is organised by the IFIP Technical Committee on Artificial Intelligence (Technical Committee 12) and its Working Group 12.5 (Artificial Intelligence Applications). All papers were reviewed by at least two members of our Programme Committee. The best papers were selected for the conference and are included in this volume. The international nature of IFIP is amply reflected in the large number of countries represented here. The conference featured invited talks by Rose Dieng, John Atkinson, John Debenham and myself. IFIP AI 2006 also included the Second IFIP Symposium on Professional Practice in Artificial Intelligence, organised by Professor John Debenham, which ran alongside the refereed papers. I should like to thank the conference chair. Professor Debenham for all his efforts in organising the Symposium and the members of our programme committee for reviewing an unexpectedly large number of papers to a very tight deadline. This is the latest in a series of conferences organised by IFIP Technical Committee 12 dedicated to the techniques of Artificial Intelligence and their real-world applications. The wide range and importance of these applications is clearly indicated by the papers in this volume. Further information about TCI 2 can be found on our website http://www.ifiptcl2.org.

  • 12% sparen
    von K. Marti, A. Dontchev, H. Furuta, usw.
    94,00 €

  • von Matthias Rauterberg, Marco Roccetti, Ryohei Nakatsu & usw.
    49,00 €

  • 12% sparen
    von Bartomeu Serra, Carlos Guerrero, Pedro Cuenca & usw.
    94,00 €

  • 12% sparen
    von Steve Elliot, David Avison, John Krogstie & usw.
    94,00 €

  • 12% sparen
    von Krzysztof J. Cios
    75,00 €

    "e;If you torture the data long enough, Nature will confess,"e; said 1991 Nobel-winning economist Ronald Coase. The statement is still true. However, achieving this lofty goal is not easy. First, "e;long enough"e; may, in practice, be "e;too long"e; in many applications and thus unacceptable. Second, to get "e;confession"e; from large data sets one needs to use state-of-the-art "e;torturing"e; tools. Third, Nature is very stubborn - not yielding easily or unwilling to reveal its secrets at all. Fortunately, while being aware of the above facts, the reader (a data miner) will find several efficient data mining tools described in this excellent book. The book discusses various issues connecting the whole spectrum of approaches, methods, techniques and algorithms falling under the umbrella of data mining. It starts with data understanding and preprocessing, then goes through a set of methods for supervised and unsupervised learning, and concludes with model assessment, data security and privacy issues. It is this specific approach of using the knowledge discovery process that makes this book a rare one indeed, and thus an indispensable addition to many other books on data mining. To be more precise, this is a book on knowledge discovery from data. As for the data sets, the easy-to-make statement is that there is no part of modern human activity left untouched by both the need and the desire to collect data. The consequence of such a state of affairs is obvious.

  • 13% sparen
    von D. Feng & K. Shimohara
    140,00 €

  • 11% sparen
    von Fredrik Persson & Jan Olhager
    95,00 €

  • von Sergio F. Ochoa & Gruia-Catalin Roman
    49,00 €

  • 13% sparen
    von John Impagliazzo, Markku I. Nurminen & Jacques Berleur
    140,00 €

  • 11% sparen
    von Franz Rammig, Mauro Zanella, Achim Rettberg, usw.
    95,00 €

  • 10% sparen
    von Oded Maimon & Lior Rokach
    48,00 €

  • 11% sparen
    von Antonino Mazzeo, Roberto Bellini & Gianmario Motta
    95,00 €

  • von Joao Malva
    112,00 €

    Interactions Between Neurons and Glia in Aging and Disease is a source of "reference reviews" and "concise overviews" of the functional cross-talk between neurons and glial cells, with a focus on microglia and inflammation in the aging brain and in neurological disorders. The scientific area covered by this book may be considered of key interest, and it is recognized, by the scientific community, as a major competitive area with critical implications for human health.This book is organized in three main sections that are expected to guide the readers from the basic functional cross-talk between neuron and glia to brain pathology. The specific proposed sections are: 1) Neuroimmunity and Neuroinflammation; 2) Signalling and inflammation in aging; 3) Neurodegeneration and inflammation in age related diseases.

  • 11% sparen
    von Raymond W. Yeung
    62,00 €

    This book is an evolution from my book A First Course in Information Theory published in 2002 when network coding was still at its infancy. The last few years have witnessed the rapid development of network coding into a research ?eld of its own in information science. With its root in infor- tion theory, network coding has not only brought about a paradigm shift in network communications at large, but also had signi?cant in?uence on such speci?c research ?elds as coding theory, networking, switching, wireless c- munications,distributeddatastorage,cryptography,andoptimizationtheory. While new applications of network coding keep emerging, the fundamental - sults that lay the foundation of the subject are more or less mature. One of the main goals of this book therefore is to present these results in a unifying and coherent manner. While the previous book focused only on information theory for discrete random variables, the current book contains two new chapters on information theory for continuous random variables, namely the chapter on di?erential entropy and the chapter on continuous-valued channels. With these topics included, the book becomes more comprehensive and is more suitable to be used as a textbook for a course in an electrical engineering department.

  • 14% sparen
    von Douglas Maughan, Mihai Christodorescu, Somesh Jha, usw.
    276,00 €

  • 14% sparen
    von Patrick Traynor
    78,00 €

    Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, well over three billion people across the globe rely upon these systems, as their primary means of connecting to the world around them.Given the significant focus on securing critical infrastructure in recent years, Security for Telecommunications Networks creates a starting place for new researchers in the field of secure telecommunications networks. This volume not only discusses emerging threats, along with system vulnerability, but also presents the open questions posited by network evolution and defense mechanisms. This is one of the first books to discuss securing current and next generation telecommunications networks by the security community.Security for Telecommunications Networks is designed for a professional audience composed of practitioners and researchers in industry. This book is also suitable as a secondary text book or reference for advanced-level students in computer science and electrical engineering. 

  • 12% sparen
    von Mohammed Ismail & Ayman Fayed
    94,00 €

  • 12% sparen
    von Sana Loue
    47,00 €

    This book deals specifically with the historical basis for use of terms in race, gender, ethnicity, sex and sexual orientation. It brings much needed clarity to the debate by identifying the ethical issues as well as the technical challenges inherent in measuring these elusive concepts. The author expands on her work begun in Gender, Ethnicity, and Health Research by paralleling the evolution of racial and sexual categories with the development of health research. In addition, the book provides a salient guide to assessment tools currently used in measuring racial and sexual constructs, identity, and experience.

Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.