Verlag: Springer (edition 1st ed. 2018), 2018
ISBN 10: 3319768034 ISBN 13: 9783319768038
Sprache: Englisch
Anbieter: BooksRun, Philadelphia, PA, USA
EUR 40,58
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbHardcover. Zustand: Good. 1st ed. 2018. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported.
Anbieter: SpringBooks, Berlin, Deutschland
Erstausgabe
EUR 46,59
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbHardcover. Zustand: As New. 1. Auflage. Unread, like new. Immediately dispatched from Germany.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 74,09
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Verlag: Springer International Publishing, Springer International Publishing, 2019
ISBN 10: 3030082938 ISBN 13: 9783030082932
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 64,19
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book provides readers with a comprehensive overview of security threats and existing countermeasures.This book has many features that make it a unique source for students, engineers and educators, including more than 80 problems and worked exercises, in addition to, approximately 200 references, which give extensive direction for further reading.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 99,26
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In English.
Verlag: Springer International Publishing, 2018
ISBN 10: 3319768034 ISBN 13: 9783319768038
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 90,94
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbBuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book discusses the design principles of physically unclonable functions (PUFs) and how these can be employed in hardware-based security applications, in particular, the book provides readers with a comprehensive overview of security threats and existing countermeasures.This book has many features that make it a unique source for students, engineers and educators, including more than 80 problems and worked exercises, in addition to, approximately 200 references, which give extensive direction for further reading.