16 127 528 książek w 175 językach
Jednak się nie przyda? Nic nie szkodzi! U nas możesz zwrócić towar do 30 dni
Bon prezentowy to zawsze dobry pomysł. Obdarowany może za bon prezentowy wybrać cokolwiek z naszej oferty.
30 dni na zwrot towaru
Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes.§CryptoGraphics: Exploiting Graphic Cards for Security explores the potential for implementing ciphers within graphics processing units (GPUs), and describes the relevance of GPU-based encryption and decryption to applications involving remote displays. A prototype application involving streaming video and GPU-based decryption is also described, illustrating the benefits and issues of running a cipher within a GPU.§CryptoGraphics: Exploiting Graphic Cards for Security is designed for a professional audience of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science.