Soft Cover. Zustand: Good. Soft cover. Lecture Notes in Computer Science (LNCS) 4462. Usual ex-library features. The interior is clean and tight. Binding is good. Cover shows slight wear and has library label on spine. 253 pages. Ex-Library.
Sprache: Englisch
Verlag: Berlin etc.: Springer, 2008
Anbieter: Antiquariat Thomas Haker GmbH & Co. KG, Berlin, Deutschland
Verbandsmitglied: GIAQ
Hardcover/Pappeinband. Zustand: Wie neu. 432 pages. Like new. Shrink wrapped. / Wie neu. In Folie verschweißt. Sprache: Englisch Gewicht in Gramm: 830.
Anbieter: Universitätsbuchhandlung Herta Hold GmbH, Berlin, Deutschland
2nd ed. xxxiv, 531 p. Hardcover. 2nd ed. Versand aus Deutschland / We dispatch from Germany via Air Mail. Einband bestoßen, daher Mängelexemplar gestempelt, sonst sehr guter Zustand. Imperfect copy due to slightly bumped cover, apart from this in very good condition. Stamped. Sprache: Englisch.
Anbieter: Phatpocket Limited, Waltham Abbey, HERTS, Vereinigtes Königreich
EUR 37,12
Anzahl: 1 verfügbar
In den WarenkorbZustand: Good. Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so some stamps and wear, but in good overall condition. Our donations to The Rainbow Centre have helped provide an education and a safe haven to hundreds of children who live in appalling conditions.
Anbieter: Anybook.com, Lincoln, Vereinigtes Königreich
EUR 33,25
Anzahl: 1 verfügbar
In den WarenkorbZustand: Poor. This is an ex-library book and may have the usual library/used-book markings inside.This book has hardback covers. In poor condition, suitable as a reading copy. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,1100grams, ISBN:9783319504988.
Anbieter: Anybook.com, Lincoln, Vereinigtes Königreich
EUR 33,25
Anzahl: 1 verfügbar
In den WarenkorbZustand: Poor. This is an ex-library book and may have the usual library/used-book markings inside.This book has hardback covers. In poor condition, suitable as a reading copy. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,1100grams, ISBN:9783319504988.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 76,88
Anzahl: 1 verfügbar
In den WarenkorbZustand: New.
Sprache: Englisch
Verlag: Springer-Verlag New York Inc, 2008
ISBN 10: 3540799656 ISBN 13: 9783540799658
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 76,00
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 1st edition. 151 pages. 9.25x6.25x0.50 inches. In Stock.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 76,41
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 203 pages. 9.25x6.00x0.75 inches. In Stock.
Zustand: New.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 79,73
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. spiral-bound edition. 863 pages. 9.00x6.00x0.75 inches. In Stock.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing Jun 2024, 2024
ISBN 10: 3031555600 ISBN 13: 9783031555602
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - Trusted execution environments (TEEs) protect sensitive code and data on computing platforms, even when the primary operating system is compromised. Once a technical curiosity, TEEs have rapidly become a key component in securing numerous systems from cloud servers to constrained devices. Today, TEEs have been deployed on billions of devices for protecting financial payments, personal files, copyrighted media content, and many others. Despite this, TEEs remain poorly understood due to their complexity and diversity. This book addresses this gap, providing a comprehensive treatment of different TEE technologies, their features, benefits, and shortcomings.A holistic view of secure and trusted execution is taken, examining smart cards and CPU protection rings before discussing modern TEEs, such as Intel SGX and ARM TrustZone. A wide range of paradigms for building secure and trusted execution environments are explored, from dedicated security chips to system-on-chip extensions and virtualisation technologies. The relevant industry standards and specifications are covered in detail, including how TEEs are evaluated and certified in practice with respect to security. Several case studies are presented showing how TEEs are used in some common security mechanisms, such as secure boot sequences, biometric authentication, and file-based encryption. This book also discusses present challenges in the field, covering potential attack vectors against TEEs and concerns relating to fragmentation, interoperability, and transparency. Lastly, a selection of future directions are examined that may be used by the trusted execution environments of tomorrow.This book is particularly targeted at practitioners and researchers in cyber security, such as penetration testers, security engineers, and security analysts. Additionally, this book serves as a valuable resource for university students, both postgraduate and advanced undergraduates, and professors in computer science and electrical engineering.
Sprache: Englisch
Verlag: Springer International Publishing, Springer Nature Switzerland Jun 2024, 2024
ISBN 10: 3031555600 ISBN 13: 9783031555602
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -Trusted execution environments (TEEs) protect sensitive code and data on computing platforms, even when the primary operating system is compromised. Once a technical curiosity, TEEs have rapidly become a key component in securing numerous systems from cloud servers to constrained devices. Today, TEEs have been deployed on billions of devices for protecting financial payments, personal files, copyrighted media content, and many others. Despite this, TEEs remain poorly understood due to their complexity and diversity. This book addresses this gap, providing a comprehensive treatment of different TEE technologies, their features, benefits, and shortcomings.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 224 pp. Englisch.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, 2008
ISBN 10: 3540799656 ISBN 13: 9783540799658
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - With the rapid development of information technologies and the transition to next-generation networks, computer systems and in particular embedded s- tems are becoming more and more mobile and ubiquitous. They also strongly interact with the physical world. Ensuring the security of these complex and resource-constrained systems is a really challenging research topic. Therefore this Workshop in Information Security Theory and Practices was organized to bring together researchers and practitioners in related areas, and to encourage cooperation between the research and the industrial communities. This was the second edition of WISTP, after the First event in Heraklion, Greece, in 2007. This year again we had a significant number of high-quality submissions coming from many di erent countries. These submissions re ected the major topics of the conference, i. e. , smart devices, convergence, and ne- generation networks. Submissions were reviewed by at least three reviewers, in most cases by four, and at least by ve for the papers involving Program C- mittee members. This long and rigorousprocess could be achievedthanks to the hard work of the Program Committee members and additional reviewers, listed in the following pages. This led to the selection of high-quality papers that made up the workshop program and are published in these proceedings. A number of posters and short papers were also selected for presentation at the conference. The process was very selective and we would like to thank all those authors who submitted contributions that could not be selected.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing, 2017
ISBN 10: 3319620231 ISBN 13: 9783319620237
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Workshop on Radio Frequency Identification and IoT Security, RFIDSec 2016, held in Hong Kong, China, in November/December 2016.The 14 revised full papers were carefully reviewed and selected from 30 submissions and are organized in topical sections on protocols; side channel and hardware; cards and tokens; proximity; and communication.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, Springer Berlin Heidelberg Apr 2010, 2010
ISBN 10: 3642123678 ISBN 13: 9783642123672
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -These proceedings contain the papers selected for presentation at the 4th Wo- shop on Information Security Theory and Practice (WISTP 2010), held during April 12¿14, 2010 in Passau, Germany. In response to the call for papers, 69 papers were submitted to the wo- shop. These papers were evaluated on the basis of their signi cance, novelty, and technicalquality. Eachpaper was reviewedby four members of the Program Committee. Reviewing was double-blind meaning that the Program Committee was not able to see the names and a liations of the authors, and the authors were not told which committee members reviewed which papers. The Program Committee meeting was held electronically, holding intensive discussions over a periodoftwo weeks.Of the papers submitted, 20 full papersand 10shortpapers were selected for presentation at the workshop. This workshop was sponsored by Vodaphone, who also provided a best - per award. We would like to thank this organization for their support, which helped make this workshop possible. Their continued support helps to reduce registration fees and make WISTP a continuing success. WISTP 2010 was also organized in cooperation with the International - sociation for Cryptologic Research (IACR), the IFIP WG 11.2 Pervasive S- tems Security, and ACM SIGSAC. Their support has signi cantly contributed to raising the pro le of WISTP, which is re ected in the number of high-quality submissions that we received.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 400 pp. Englisch.
Sprache: Englisch
Verlag: Springer Nature Switzerland, Springer International Publishing Jul 2017, 2017
ISBN 10: 3319620231 ISBN 13: 9783319620237
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Workshop on Radio Frequency Identification and IoT Security, RFIDSec 2016, held in Hong Kong, China, in November/December 2016.The 14 revised full papers were carefully reviewed and selected from 30 submissions and are organized in topical sections on protocols; side channel and hardware; cards and tokens; proximity; and communication.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 216 pp. Englisch.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, 2010
ISBN 10: 3642123678 ISBN 13: 9783642123672
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - These proceedings contain the papers selected for presentation at the 4th Wo- shop on Information Security Theory and Practice (WISTP 2010), held during April 12 14, 2010 in Passau, Germany. In response to the call for papers, 69 papers were submitted to the wo- shop. These papers were evaluated on the basis of their signi cance, novelty, and technicalquality. Eachpaper was reviewedby four members of the Program Committee. Reviewing was double-blind meaning that the Program Committee was not able to see the names and a liations of the authors, and the authors were not told which committee members reviewed which papers. The Program Committee meeting was held electronically, holding intensive discussions over a periodoftwo weeks.Of the papers submitted, 20 full papersand 10shortpapers were selected for presentation at the workshop. This workshop was sponsored by Vodaphone, who also provided a best - per award. We would like to thank this organization for their support, which helped make this workshop possible. Their continued support helps to reduce registration fees and make WISTP a continuing success. WISTP 2010 was also organized in cooperation with the International - sociation for Cryptologic Research (IACR), the IFIP WG 11.2 Pervasive S- tems Security, and ACM SIGSAC. Their support has signi cantly contributed to raising the pro le of WISTP, which is re ected in the number of high-quality submissions that we received.
Sprache: Englisch
Verlag: Springer, Berlin, Springer Berlin Heidelberg, Springer, 2007
ISBN 10: 3540723536 ISBN 13: 9783540723530
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous. Ensuring the security of these complex and yet resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers.Although there are a number of information security conferences that look at particular aspects of the challenge, we decided to create the Workshop in Information - curity Theory and Practices (WISTP) to consider the problem as a whole. In additiontheworkshopaimsto bringtogetherresearchersandpractitionersin- lated disciplines and encourage interchange and practical co-operation between academia and industry. Although this is the rst ever WISTP event, the response from researchers wassuperbwithover68paperssubmittedforpotentialinclusionintheworkshop and proceedings. The submissions were reviewed by at least three reviewers, in most cases by four, and for program committee (PC) papers at least ve reviewers. This long and rigorous process was only possible thanks to the hard work of the PC members and additional reviewers, listed in the following pages. We would like to express our gratitude to the PC members, who were very supportive from the very beginning of this project. Thanks are also due to the additional expert reviewers who helped the PC to select the nal 20 workshop papers for publication in the proceedings. Of course we highly appreciate the e orts of all the authors who submitted papers to WISTP 2007. We hope they will contribute again to a future edition and encourage others to do so.
Taschenbuch. Zustand: Neu. Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems | First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 | Damien Sauveron (u. a.) | Taschenbuch | xii | Englisch | 2007 | Springer | EAN 9783540723530 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Sprache: Englisch
Verlag: Springer, Berlin|Springer Nature Switzerland|Springer, 2024
ISBN 10: 303165174X ISBN 13: 9783031651748
Anbieter: moluna, Greven, Deutschland
EUR 92,27
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Zustand: Sehr gut. Zustand: Sehr gut | Seiten: 400 | Sprache: Englisch | Produktart: Bücher | Keine Beschreibung verfügbar.
Zustand: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher | Keine Beschreibung verfügbar.
Sprache: Englisch
Verlag: Springer-Verlag New York Inc, 2017
ISBN 10: 3319504983 ISBN 13: 9783319504988
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 130,30
Anzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 2nd edition. 531 pages. 9.25x6.50x1.25 inches. In Stock.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing Jul 2018, 2018
ISBN 10: 3319844121 ISBN 13: 9783319844121
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 568 pp. Englisch.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing Mai 2017, 2017
ISBN 10: 3319504983 ISBN 13: 9783319504988
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Buch. Zustand: Neu. Neuware -This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 568 pp. Englisch.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing, 2018
ISBN 10: 3319844121 ISBN 13: 9783319844121
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book provides a broad overview of the many card systems and solutions that are in practical use today.This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application.This book is designed asa textbook for graduate level students in computer science.It is alsoasan invaluable post-graduate level referencefor professionals and researchers.This volume offers insight into benefits and pitfalls of diverseindustry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers.
Sprache: Englisch
Verlag: Springer International Publishing, 2017
ISBN 10: 3319504983 ISBN 13: 9783319504988
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book provides a broad overview of the many card systems and solutions that are in practical use today.This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application.This book is designed asa textbook for graduate level students in computer science.It is alsoasan invaluable post-graduate level referencefor professionals and researchers.This volume offers insight into benefits and pitfalls of diverseindustry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers.
Sprache: Englisch
Verlag: Springer Nature Switzerland, Springer International Publishing Jul 2024, 2024
ISBN 10: 303165174X ISBN 13: 9783031651748
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Buch. Zustand: Neu. Neuware -This book constitutes the proceedings of the 39th IFIP International Conference on ICT Systems Security and Privacy Protection, SEC 2024, held in Edinburgh, UK, during June 12¿14, 2024.The 34 full papers presented were carefully reviewed and selected from 112 submissions. The conference focused on current and future IT Security and Privacy Challenges and also was a part of a series of well-established international conferences on Security and Privacy.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 512 pp. Englisch.