Sprache: Englisch
Verlag: Springer Berlin / Heidelberg, 2004
ISBN 10: 3540236597 ISBN 13: 9783540236597
Anbieter: Better World Books, Mishawaka, IN, USA
Zustand: Good. Former library copy. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Includes library markings. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good.
Anbieter: ThriftBooks-Dallas, Dallas, TX, USA
Hardcover. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Sprache: Englisch
Verlag: Berlin, Heidelberg : Springer (Lecture Notes in Computer Science / LNCS 3285), 2004
ISBN 10: 3540236597 ISBN 13: 9783540236597
Anbieter: Antiquariat Smock, Freiburg, Deutschland
Erstausgabe
Zustand: Gut. Formateinband: Broschierte Ausgabe XII, 334 S. (24 cm) 1st Edition; In gutem Zustand. Sprache: Englisch Gewicht in Gramm: 600 [Stichwörter: ].
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 59,96
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Sprache: Englisch
Verlag: Tata McGraw-Hill Education Private Limited, 2011
ISBN 10: 0070707316 ISBN 13: 9780070707313
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 66,70
Anzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 674 pages. 9.50x7.25x1.52 inches. In Stock.
EUR 80,79
Anzahl: 3 verfügbar
In den WarenkorbZustand: New. pp. 446.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 89,86
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - The focus of the Asian Applied Computing Conference (AACC) is primarily to bring the research in computer science closer to practical applications. The conference is aimed primarily at topics that have immediate practical bene ts. By hosting the conf- ence in the developingnations in Asia we aim to provide a forum for engagingboth the academic and the commercial sectors in that region. The rst conference 'Information Technology Prospects and Challenges' was held in May 2003 in Kathmandu, Nepal. Thisyear theconferencenamewas changedto 'Asian AppliedComputingConference' to re ect both the regional- and the application-oriented nature of the conference. AACC is planned to be a themed conference with a primary focus on a small set of topics although other relevant applied topics will be considered. The theme in AACC 2004 was on the following topics: systems and architectures, mobile and ubiquitous computing, soft computing, man machine interfaces,and innovative applications for the developing world. AACC 2004 attracted 184 paper submissions from around the world, making the reviewing and the selection process tough and time consuming. The selected papers covered a wide range of topics: genetic algorithms and soft computing; scheduling, - timization andconstraintsolving; neuralnetworksandsupportvectormachines;natural language processing and information retrieval; speech and signal processing; networks and mobile computing; parallel, grid and high-performance computing; innovative - plications for the developing world; cryptography and security; and machine lea- ing. Papers were primarily judged on originality, presentation, relevance and quality of work. Papers that had clearly demonstrated results were given preference.
EUR 115,67
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 446 pages. 10.00x7.01x1.06 inches. In Stock.
Sprache: Englisch
Verlag: Jenny Stanford Publishing, 2013
ISBN 10: 9814364630 ISBN 13: 9789814364638
Anbieter: PBShop.store US, Wood Dale, IL, USA
HRD. Zustand: New. New Book. Shipped from UK. Established seller since 2000.
Sprache: Englisch
Verlag: Jenny Stanford Publishing, 2013
ISBN 10: 9814364630 ISBN 13: 9789814364638
Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
EUR 129,60
Anzahl: 10 verfügbar
In den WarenkorbHRD. Zustand: New. New Book. Shipped from UK. Established seller since 2000.
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
EUR 161,69
Anzahl: 1 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 1st edition. 450 pages. 9.29x5.98x1.46 inches. In Stock.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 188,11
Anzahl: 1 verfügbar
In den WarenkorbZustand: New. pp. xvii + 463 Illus.
Sprache: Englisch
Verlag: Jenny Stanford Publishing, 2013
ISBN 10: 9814364630 ISBN 13: 9789814364638
Anbieter: moluna, Greven, Deutschland
EUR 141,94
Anzahl: Mehr als 20 verfügbar
In den WarenkorbGebunden. Zustand: New.
EUR 160,06
Anzahl: Mehr als 20 verfügbar
In den WarenkorbGebunden. Zustand: New. Talukder, Asoke K. Chaitanya, ManishTraditionally, software engineers have defined security as a non-functional requirement. As such, all too often it is only considered as an afterthought, making software applications and services vulnerable to.
Sprache: Englisch
Verlag: Jenny Stanford Publishing Nov 2013, 2013
ISBN 10: 9814364630 ISBN 13: 9789814364638
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Neuware - The convergence of two powerful technologies-wireless and the Internet-through IPv4/v6 protocol has led to emergence of next-generation networks (NGNs). NGN is no more a network of mere computers but a connected conglomeration of varied networks with diverse physical properties, with a plethora of network elements, along with a variety of real-time multimedia applications. This book covers the entire gamut of technology challenges from physical layer to application layer including security from both academic and industrial perspectives.
Sprache: Englisch
Verlag: Taylor & Francis Ltd Dez 2008, 2008
ISBN 10: 1420087843 ISBN 13: 9781420087840
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Neuware - Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development life cycle. The authors examine security architectures and threat countermeasures for .NET, UNIX, Java, mobile, and Web environments.