Anbieter: Ammareal, Morangis, Frankreich
EUR 3,59
Anzahl: 1 verfügbar
In den WarenkorbHardcover. Zustand: Très bon. Ancien livre de bibliothèque. Edition 2003. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Very good. Former library book. Edition 2003. Ammareal gives back up to 15% of this item's net price to charity organizations.
EUR 44,09
Anzahl: 1 verfügbar
In den WarenkorbZustand: New. pp. 244 Illus.
Sprache: Englisch
Verlag: Cambridge University Press, 2019
ISBN 10: 1107043468 ISBN 13: 9781107043466
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 59,61
Anzahl: 1 verfügbar
In den WarenkorbZustand: New. pp. 338.
Sprache: Englisch
Verlag: Cambridge University Press, 2019
ISBN 10: 1107043468 ISBN 13: 9781107043466
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
EUR 82,72
Anzahl: 1 verfügbar
In den WarenkorbZustand: New. pp. 284 52:B&W 6.14 x 9.21in or 234 x 156mm (Royal 8vo) Case Laminate on White w/Gloss Lam.
Anbieter: Romtrade Corp., STERLING HEIGHTS, MI, USA
Zustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 114,33
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 114,33
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Buchpark, Trebbin, Deutschland
Zustand: Gut. Zustand: Gut | Sprache: Englisch | Produktart: Bücher | Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including: *key distribution for access control, *source authentication of transmissions, and *non-repudiation of streams. This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network. This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 140,93
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 144,57
Anzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 1983 edition. 340 pages. 9.52x6.69x0.98 inches. In Stock.
EUR 152,90
Anzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 1st edition. 268 pages. 9.50x6.25x0.75 inches. In Stock.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 154,22
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Taschenbuch. Zustand: Neu. Computer Security in the 21st Century | D. T. Lee (u. a.) | Taschenbuch | xii | Englisch | 2010 | Springer | EAN 9781441936790 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including: \*key distribution for access control, \*source authentication of transmissions, and \*non-repudiation of streams. This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network. This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.Highlights include presentations of :-Fundamental new security-Cryptographic protocols and design,-A new way of measuring network vulnerability: attack surfaces,-Network vulnerability and building impenetrable systems, -Multimedia content protection including a new standard for photographic images, JPEG2000. Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement. Highlights include presentations of : - Fundamental new security - Cryptographic protocols and design, - A new way of measuring network vulnerability: attack surfaces, - Network vulnerability and building impenetrable systems, - Multimedia content protection including a new standard for photographic images, JPEG2000. Researchers and computer security developers will find in this book interesting and useful insights into building computer systems that protect against computer worms, computer viruses, and other related concerns.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including: \*key distribution for access control, \*source authentication of transmissions, and \*non-repudiation of streams. This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network. This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.