Angebote zu "Cryptography" (32 Treffer)

Kategorien

Shops

Microsoft Windows Server 2008 R2 Standard
Topseller
144,99 € *
ggf. zzgl. Versand

Basierend auf Windows 7 zeichnet sich Windows Server 2008 R2 Standard durch zahlreiche Neuerungen aus, die Ihr Unternehmen optimal bei der Server-Verwaltung unterstützen. Dazu zählt beispielsweise DirectAccess oder aber die Nutzung von maximal 256 logischen Prozessoren. Verschiedene Modi erleichtern die Verwaltung Das Server-Betriebssystem richtet sich prinzipiell an alle Unternehmen und bietet diverse Neuheiten in den Bereichen Verwaltung, Virtualisierung, Datentransfer und Netzwerk-Lastverteilung. Für die zentrale Verwaltung der Funktionen und Rollen ist in Windows 2008 R2 Standard der Servermanager verantwortlich. Er gibt darüber hinaus einen Überblick zu anfallenden Benachrichtigungen der Komponenten und dem Systemzustand in einer integrierten Ereignisanzeige. Hinzu kommen weitere Verwaltungs-Modi wie Snap-ins und die MMC, eine WMI-Schnittstelle sowie die Verwaltung per PowerShell. Außerdem bekommen Sie mit Microsoft Windows Server 2008 R2 Standard die Virtualisierungsplattform Hyper-V, mit der Sie komplette Serversysteme virtualisieren können. Verbesserte Features sorgen für Geschwindigkeit Die Entwickler haben durch ein Re-Design der Kommunikations-Stacks den Datendurchsatz im Vergleich zu Windows Server 2003 nahezu verdreifacht. Windows Server Standard 2008 R2 verteilt die Netzwerklast durch eine intelligente Lastverteilung auf verschiedene Systeme. IPv6 und IPv4 werden unterstützte. Die Systemanforderungen haben sich bezüglich Prozessor und Festplatte leicht erhöht: Sie benötigen nun mindestens 1,4 GHz im Vergleich zu den 1 GHz in der Vorgängerversion. Zudem sind nun mindestens 32 GB Festplattenspeicher erforderlich. Weitere wichtige Neuerungen sind das Active Directory, das zur Verwaltung von Benutzern und Ressourcen dient. Außerdem erhalten Sie den Core-Server, der Ihnen den Betriebssystemmodus ohne grafische Bedienoberfläche ermöglicht. Windows Server 2008 R2 Standard besitzt überarbeitete Terminaldienste mit neuen Zusatzfunktionen, PowerShell, das eine moderne Alternative zum Kommandozeilenprogramm ist und BitLocker zur Datenverschlüsselung. Zusätzlich können Sie den Internet Information Services 7.0 nutzen, den Webserver für dynamische und statische Websites. Sicherheit ist in Windows Server 2008 R2 Standard wichtig In Windows Server 2008 R2 Standard bekommen Sie zahlreiche neue Funktionen, um die Sicherheit Ihrer Server zu erhöhen. Dazu zählt etwa ein integrierter Netzwerkzugriffsschutz (Network Access Protection, kurz NAP). Dieser bewertet stets die aktuellen Clients-Zustände. Unsichere Zustände und Zugriffe werden schnell entdeckt und das Netz optimal gesichert. Die Firewall unterstützt sowohl die Firewall-Einstellungen als auch die IPsec-Richtlinien im Verwaltungs-Modus Snap-in. Überlappende Einstellungen im Frontend werden so schnell sichtbar. Windows Server 2008 R2 Standard bietet mit Cryptography Next Generation ein weiteres Feature für kryptographische Anwendungen, den Read only Domaincontroller für sicherheitskritische Bereiche sowie die Isolationsstrategie DC. DC hilft, Ressourcen und Domänen zur isolierten Erstellung logischer Netzwerke innerhalb physischer Netzwerke zu verwalten. Versandart Beim Kauf entscheiden Sie selbst, ob Sie das Produkt sofort downloaden oder lieber bequem per USB-Stick nach Hause geschickt bekommen wollen. Klicken Sie einfach in der Auswahl die bevorzugte Variante an und legen Sie das Produkt in den Warenkorb.

Anbieter: Lizenzfuchs
Stand: 05.04.2020
Zum Angebot
Understanding Cryptography
28,99 € *
ggf. zzgl. Versand

Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations. The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book's website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.

Anbieter: buecher
Stand: 05.04.2020
Zum Angebot
Who Is Satoshi Nakamoto?: An In-Depth Look at t...
9,95 € *
ggf. zzgl. Versand

Satoshi Nakamoto is the name used by the person or people who designed Bitcoin and created its original reference implementation. As part of the implementation, they also devised the first blockchain database. In the process they were the first to solve the double-spending problem for digital currency. They were active in the development of Bitcoin up until December 2010.  On a P2P Foundation profile, Nakamoto claimed to be a man living in Japan, born on 5 April 1975. Speculation about the true identity of Nakamoto has mostly focused on a number of cryptography and computer science experts of non-Japanese descent, living in the United States and various European countries. Satoshi Nakamoto also created the bitcointalk forum, posted the first message in 2009 under the pseudonym satoshi.  In October 2008, Nakamoto published a paper on the cryptography mailing list at metzdowd.com describing the Bitcoin digital currency. It was titled "Bitcoin: A Peer-to-Peer Electronic Cash System". In January 2009, Nakamoto released the first Bitcoin software that launched the network and the first units of the Bitcoin cryptocurrency, called Bitcoins. Satoshi Nakamoto released the Version 0.1 of Bitcoin software on Sourceforge on 9 January 2009.  Nakamoto claimed that work on the writing of the code began in 2007. The inventor of Bitcoin knew that due to its nature, the core design would have to be able to support a broad range of transaction types. The implemented solution enabled specialized codes and data fields from the start through the use of a predicative script.  Nakamoto created a website with the domain name bitcoin.org and continued to collaborate with other developers on the Bitcoin software until mid-2010. Around this time, he handed over control of the source code repository and network alert key to Gavin Andresen, transferred several related domains to various prominent members of the Bitcoin community, and stopped his involveme 1. Language: English. Narrator: Ron Welch. Audio sample: http://samples.audible.de/bk/acx0/115088/bk_acx0_115088_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 05.04.2020
Zum Angebot
Introduction to Linear Algebra
68,99 € *
ggf. zzgl. Versand

Linear algebra is something all mathematics undergraduates and many other students, in subjects ranging from engineering to economics, have to learn. The fifth edition of this hugely successful textbook retains all the qualities of earlier editions, while at the same time seeing numerous minor improvements and major additions. The latter include: - A new chapter on singular values and singular vectors, including ways to analyze a matrix of data - A revised chapter on computing in linear algebra, with professional-level algorithms and code that can be downloaded for a variety of languages - A new section on linear algebra and cryptography - A new chapter on linear algebra in probability and statistics. A dedicated and active website also offers solutions to exercises as well as new exercises from many different sources (including practice problems, exams, and development of textbook examples), plus codes in MATLAB®, Julia, and Python.

Anbieter: buecher
Stand: 05.04.2020
Zum Angebot
Introduction to Linear Algebra
68,99 € *
ggf. zzgl. Versand

Linear algebra is something all mathematics undergraduates and many other students, in subjects ranging from engineering to economics, have to learn. The fifth edition of this hugely successful textbook retains all the qualities of earlier editions, while at the same time seeing numerous minor improvements and major additions. The latter include: - A new chapter on singular values and singular vectors, including ways to analyze a matrix of data - A revised chapter on computing in linear algebra, with professional-level algorithms and code that can be downloaded for a variety of languages - A new section on linear algebra and cryptography - A new chapter on linear algebra in probability and statistics. A dedicated and active website also offers solutions to exercises as well as new exercises from many different sources (including practice problems, exams, and development of textbook examples), plus codes in MATLAB®, Julia, and Python.

Anbieter: buecher
Stand: 05.04.2020
Zum Angebot
Resistance math in algorithms like RSA
35,90 € *
ggf. zzgl. Versand

Whenever we enter our credit card information, checking account number, or passwords, we most likely want to keep them secret. Whether it's a website or the bank, we generally don't want someone else to discover our private information. For reaching this goal, encryption was born. Encryption is the art of converting messages into code, in a way such that it is difficult for an eavesdropper to decipher our message. Encryption has been around for thousands of years, slowly increasing in complexity and efficiency. The Problem of older encryption mechanisms was that it was too simple to crack. Currently there are 2 main types of encryption, namely symmetric and asymmetric. In two-key or asymmetric cryptography relies on the existence of a computational primitive called trapdoor functions. A trapdoor function takes a domain to a range in such a way that it is easy to go from the domain to range and it is hard to go from the range to the domain, but it is easy to go from the range to the domain given a special string called the trapdoor.

Anbieter: Dodax
Stand: 05.04.2020
Zum Angebot
URL Filtering in BroadBand Access Technologies ...
54,90 € *
ggf. zzgl. Versand

Information and communication technology has always fascinated me and this interest was the main reason behind my decision to opt for a degree in software engineering. During the course of my studies my interest grew towards the security of these systems, leading me to choose for specialization in security. I made a decision to undertake courses that will broaden my knowledge in system security and therefore enrolled in Network Security, Digital Forensics, Cryptography and System incident handling courses. After taking courses of my degree, self study and team projects, I gained a deeper and valuable knowledge of system security and decided to take my final year project on URL filtering in broadband access technologies. The project focused on the content based filtering of websites. A novel method was introduced to block a specific text based content of the webpage instead blocking full website, in addition to this an additional feature to filter out URLs based on server policy was implemented. This book is the publication of My work along with my team members Sana Fatima and Saad Abdullah who pro-actively helped me and co operated with me to complete this work.

Anbieter: Dodax
Stand: 05.04.2020
Zum Angebot
Coding for Data and Computer Communications
128,39 € *
ggf. zzgl. Versand

Digital data is heavily used when generating, storing, and transmitting information, and special codes are used to represent the data and to control its size, reliability, and security. Data coding is therefore a highly important, and indeed increasingly critical, discipline for data and computer communications.In a unique, single volume, this highly versatile text/reference introduces readers to the importance of channel coding (error-correcting codes), secure coding (cryptography), and source coding (data compression). It is organized in three main parts and uses clear, nonmathematical explanations to develop the concepts, principles, and techniques in each area of coding. Requiring only a general familiarity with computer methods, the book deals with all aspects of coding and its relevance to fast, secure, and reliable data transmission and storage.Features &amp, Benefits:Presents comprehensive coverage of areas of coding often found in separate books, and stresses data coding s relevance in today s worldProvides a wealth of examples and exercises (with solutions) to help readers easily grasp the materialIncorporates an extensive chapter on data hiding, a sparsely documented topic of increasing importance in the communityIncludes an author-supplied website with supplementary materialPossesses a detailed bibliography and helpful glossary, index, and appendixes (including projects for self-study).Computer scientists, electrical engineers, and other professionals will find this up-to-date, accessible volume an essential resource about key areas, problems, and methods associated with data coding. Its straightforward approach also makes it very suitable for students taking courses on computer networks, coding and encryption, data communications, and information theory and coding.David Salomon is a professor emeritus of computer science at California State University, Northridge. He has authored numerous articles and books, including Data Compression: The Complete Reference (Third Edition), Guide to Data Compression Methods, and Data Privacy and Security, and Computer Graphics and Geometric Modeling.Key Topics: Error-control codes Image compression methods Cipher types Public-key cryptography Check digits Error detection Statistical methods of source coding Steganography (data hiding) Encryption codes Security / Cryptography Beginning / Intermediate

Anbieter: Dodax
Stand: 05.04.2020
Zum Angebot
Introduction to Linear Algebra
104,30 € *
ggf. zzgl. Versand

Linear algebra is something all mathematics undergraduates and many other students, in subjects ranging from engineering to economics, have to learn. The fifth edition of this hugely successful textbook retains all the qualities of earlier editions, while at the same time seeing numerous minor improvements and major additions. The latter include: - A new chapter on singular values and singular vectors, including ways to analyze a matrix of data - A revised chapter on computing in linear algebra, with professional-level algorithms and code that can be downloaded for a variety of languages - A new section on linear algebra and cryptography - A new chapter on linear algebra in probability and statistics. A dedicated and active website also offers solutions to exercises as well as new exercises from many different sources (including practice problems, exams, and development of textbook examples), plus codes in MATLAB®, Julia, and Python.

Anbieter: Dodax
Stand: 05.04.2020
Zum Angebot
Understanding Cryptography
35,11 € *
ggf. zzgl. Versand

Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography.After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations.The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book's website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.

Anbieter: Dodax
Stand: 05.04.2020
Zum Angebot