Anbieter: Ammareal, Morangis, Frankreich
EUR 3,59
Anzahl: 1 verfügbar
In den WarenkorbHardcover. Zustand: Très bon. Ancien livre de bibliothèque. Edition 2003. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Very good. Former library book. Edition 2003. Ammareal gives back up to 15% of this item's net price to charity organizations.
Anbieter: Ammareal, Morangis, Frankreich
EUR 13,40
Anzahl: 1 verfügbar
In den WarenkorbSoftcover. Zustand: Très bon. Ancien livre de bibliothèque avec équipements. Edition 2011. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Very good. Former library book. Edition 2011. Ammareal gives back up to 15% of this item's net price to charity organizations.
EUR 43,90
Anzahl: 1 verfügbar
In den WarenkorbZustand: New. pp. 244 Illus.
Hardcover. Zustand: As New. 1. Auflage. like new.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 60,00
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 60,00
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In English.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 64,32
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Sprache: Englisch
Verlag: Springer-Verlag New York Inc, 2011
ISBN 10: 1461414598 ISBN 13: 9781461414599
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 74,69
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 110 pages. 8.90x5.98x0.39 inches. In Stock.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 77,25
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. revised edition. 259 pages. 9.20x6.10x0.70 inches. In Stock.
Sprache: Englisch
Verlag: Springer-Verlag New York Inc, 2011
ISBN 10: 364221598X ISBN 13: 9783642215988
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 78,29
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 321 pages. 9.20x6.10x0.70 inches. In Stock.
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 81,77
Anzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 432 pages. 9.25x6.25x1.25 inches. In Stock.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 83,33
Anzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. reprint edition. 452 pages. 9.25x6.10x1.02 inches. In Stock.
Anbieter: online-buch-de, Dozwil, Schweiz
Hardcover May 17, 2022. Zustand: gebraucht; wie neu. Hardcover, neuwertig.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 96,28
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, 2011
ISBN 10: 364221598X ISBN 13: 9783642215988
Anbieter: moluna, Greven, Deutschland
Zustand: New.
Zustand: Sehr gut. Zustand: Sehr gut | Seiten: 314 | Sprache: Englisch | Produktart: Bücher | Keine Beschreibung verfügbar.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing, 2014
ISBN 10: 3319051482 ISBN 13: 9783319051482
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the thoroughly refereed proceedings of the 14th International Workshop on Information Security Applications, WISA 2013, held on Jeju Island, Korea, in August 2013. The 15 revised full papers and 2 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections such as cryptography, social network security, mobile security, network security, future applications and privacy.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing, 2018
ISBN 10: 3319883747 ISBN 13: 9783319883748
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security and high availability. Among its core features, SCION also provides route control, explicit trust information, multipath communication, scalable quality-of-service guarantees, and efficient forwarding. The book includes functional specifications of the network elements, communication protocols among these elements, data structures, and configuration files. In particular, the book offers a specification of a working prototype.The authors provide a comprehensive description of the main design features for achieving a secure Internet architecture. They facilitate the reader throughout, structuring the book so that the technical detail gradually increases, and supporting the text with a glossary, an index, a list of abbreviations, answers to frequently asked questions, and special highlighting for examples and for sections that explain important research, engineering, and deployment features. The book is suitable for researchers, practitioners, and graduate students who are interested in network security.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security and high availability. Among its core features, SCION also provides route control, explicit trust information, multipath communication, scalable quality-of-service guarantees, and efficient forwarding. The book includes functional specifications of the network elements, communication protocols among these elements, data structures, and configuration files. In particular, the book offers a specification of a working prototype.The authors provide a comprehensive description of the main design features for achieving a secure Internet architecture. They facilitate the reader throughout, structuring the book so that the technical detail gradually increases, and supporting the text with a glossary, an index, a list of abbreviations, answers to frequently asked questions, and special highlighting for examples and for sections that explain important research, engineering, and deployment features. The book is suitable for researchers, practitioners, and graduate students who are interested in network security.
Taschenbuch. Zustand: Neu. Information Security Applications | 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers | Yongdae Kim (u. a.) | Taschenbuch | Lecture Notes in Computer Science | xii | Englisch | 2014 | Springer | EAN 9783319051482 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. SCION: A Secure Internet Architecture | Adrian Perrig (u. a.) | Taschenbuch | Information Security and Cryptography | xx | Englisch | 2018 | Springer | EAN 9783319883748 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 114,40
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 114,40
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Sprache: Englisch
Verlag: Springer, Berlin|Springer International Publishing|Springer, 2023
ISBN 10: 3031052900 ISBN 13: 9783031052903
Anbieter: moluna, Greven, Deutschland
EUR 81,44
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Anbieter: Buchpark, Trebbin, Deutschland
Zustand: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher | Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data). Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer. We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans. This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security.
Anbieter: Buchpark, Trebbin, Deutschland
Zustand: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher | Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g., to convince the user that her computer is not infected with malware) and for communicating a remote computer's state (e.g., to enable the user to check that a web server will adequately protect her data). Although the recent "Trusted Computing" initiative has drawn both positive and negative attention to this area, we consider the older and broader topic of bootstrapping trust in a computer. We cover issues ranging from the wide collection of secure hardware that can serve as a foundation for trust, to the usability issues that arise when trying to convey computer state information to humans. This approach unifies disparate research efforts and highlights opportunities for additional work that can guide real-world improvements in computer security.
Sprache: Englisch
Verlag: Springer, Berlin, Springer, 2011
ISBN 10: 364221598X ISBN 13: 9783642215988
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - This book constitutes the refereed proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST 2011, held in Pittsburgh, PA, USA in June 2011.The 23 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in technical sessions on cloud and virtualization, physically unclonable functions, mobile device security, socio-economic aspects of trust, hardware trust, access control, privacy, trust aspects of routing, and cryptophysical protocols.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 138,58
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Buchpark, Trebbin, Deutschland
Zustand: Gut. Zustand: Gut | Sprache: Englisch | Produktart: Bücher | Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including: *key distribution for access control, *source authentication of transmissions, and *non-repudiation of streams. This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network. This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.