Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 18,87
Anzahl: 4 verfügbar
In den WarenkorbZustand: New.
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 46,56
Anzahl: 4 verfügbar
In den WarenkorbZustand: New. pp. 376.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 47,00
Anzahl: 4 verfügbar
In den WarenkorbZustand: New. pp. 146.
EUR 54,18
Anzahl: 4 verfügbar
In den WarenkorbZustand: New. pp. 242.
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. Analysis and Forecasting of Financial Time Series Using R | Models and Applications | Jaydip Sen (u. a.) | Taschenbuch | 264 S. | Englisch | 2017 | Scholars' Press | EAN 9783330653863 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 147,33
Anzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 264 pages. 8.66x5.91x0.60 inches. In Stock.
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Buch. Zustand: Neu. Neuware -The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms. It contains eleven chapters which are divided into two parts. The chapters in Part 1 of the book mostly deal with theoretical and fundamental aspects of cryptography. The chapters in Part 2, on the other hand, discuss various applications of cryptographic protocols and techniques in designing computing and network security solutions. The book will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities.Books on Demand GmbH, Überseering 33, 22297 Hamburg 258 pp. Englisch.
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Buch. Zustand: Neu. Neuware -In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption, and non-repudiation. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduates, and doctoral students who are working in the field of cryptography, network security, and security and privacy issues in the Internet of Things (IoT). It will also be useful for faculty members of graduate schools and universities.Books on Demand GmbH, Überseering 33, 22297 Hamburg 192 pp. Englisch.
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Buch. Zustand: Neu. Neuware -Cryptography will continue to play important roles in developing of new security solutions which will be in great demand with the advent of high-speed next-generation communication systems and networks. This book discusses some of the critical security challenges faced by today's computing world and provides insights to possible mechanisms to defend against these attacks. The book contains sixteen chapters which deal with security and privacy issues in computing and communication networks, quantum cryptography and the evolutionary concepts of cryptography and their applications like chaos-based cryptography and DNA cryptography. It will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities.Books on Demand GmbH, Überseering 33, 22297 Hamburg 392 pp. Englisch.