- 5 Résultats
prix le plus bas: € 42,79, prix le plus élevé: € 71,49, prix moyen: € 59,24
1
Transactions on Computational Science IV - C. J. Kenneth Tan
Commander
sur Springer.com
£ 49,99
(environ € 59,26)
CommanderLien sponsorisé
C. J. Kenneth Tan:

Transactions on Computational Science IV - nouveau livre

ISBN: 9783642010040

The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science, but rather… Plus…

new in stock. Frais d'envoiplus shipping costs., Livraison non-comprise
2
Transactions on Computational Science IV
Commander
sur Springer.com
€ 42,79
Envoi: € 0,001
CommanderLien sponsorisé
Transactions on Computational Science IV - nouveau livre

ISBN: 9783642010040

The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science, but rather… Plus…

Nr. 978-3-642-01004-0. Frais d'envoiWorldwide free shipping, , DE. (EUR 0.00)
3
Transactions on Computational Science IV - C. J. Kenneth Tan
Commander
sur Springer.com
€ 59,49
CommanderLien sponsorisé
C. J. Kenneth Tan:
Transactions on Computational Science IV - nouveau livre

ISBN: 9783642010040

Computer Science; Systems and Data Security; Special Purpose and Application-Based Systems; Data Structures, Cryptology and Information Theory; Computer Communication Networks; Algorithm … Plus…

  - This issue focuses on the theme of security in computing. It offers in-depth coverage of a number of hot topics, presenting new architectures, novel hardware implementations, cryptographic algorithms and security protocols, and new tools and applications. Frais d'envoizzgl. Versandkosten, Livraison non-comprise
4
Transactions on Computational Science IV : Special Issue on Security in Computing - Siegfried Peer
Commander
sur hive.co.uk
£ 53,54
(environ € 63,17)
CommanderLien sponsorisé
Siegfried Peer:
Transactions on Computational Science IV : Special Issue on Security in Computing - nouveau livre

ISBN: 9783642010040

This issue focuses on the theme of security in computing. It offers in-depth coverage of a number of hot topics, presenting new architectures, novel hardware implementations, cryptographi… Plus…

  - No. 9783642010040 Frais d'envoiInstock, Despatched same working day before 3pm, zzgl. Versandkosten, Livraison non-comprise
5
Transactions on Computational Science IV
Commander
sur eBook.de
€ 71,49
Envoi: € 0,001
CommanderLien sponsorisé
Transactions on Computational Science IV - nouveau livre

ISBN: 9783642010040

Transactions on Computational Science IV - Special Issue on Security in Computing: ab 71.49 € eBooks > Sachthemen & Ratgeber > Computer & Internet Springer-Verlag GmbH, Springer-Verlag GmbH

Frais d'envoiin stock, , , DE. (EUR 0.00)

1Comme certaines plateformes ne transmettent pas les conditions d'expédition et que celles-ci peuvent dépendre du pays de livraison, du prix d'achat, du poids et de la taille de l'article, d'une éventuelle adhésion de la plateforme, d'une livraison directe par la plateforme ou via un prestataire tiers (Marketplace), etc. il est possible que les frais de livraison indiqués par eurolivre ne correspondent pas à ceux de la plateforme qui propose l'article.

Données bibliographiques du meilleur livre correspondant

Détails sur le livre

Informations détaillées sur le livre - Transactions on Computational Science IV - Special Issue on Security in Computing


EAN (ISBN-13): 9783642010040
Date de parution: 2009
Editeur: Springer Berlin
18 Pages
Langue: eng/Englisch

Livre dans la base de données depuis 2012-11-06T03:56:53+01:00 (Zurich)
Page de détail modifiée en dernier sur 2023-08-19T23:43:56+02:00 (Zurich)
ISBN/EAN: 9783642010040

ISBN - Autres types d'écriture:
978-3-642-01004-0


Données de l'éditeur

Titre: Lecture Notes in Computer Science; Transactions on Computational Science; Transactions on Computational Science IV - Special Issue on Security in Computing
Editeur: Springer; Springer Berlin
263 Pages
Date de parution: 2009-03-27
Berlin; Heidelberg; DE
Imprimé / Fabriqué en
Langue: Anglais
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
XVIII, 263 p.

EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Computersicherheit; Verstehen; Error-correcting Code; FPGA performance; Information; Performance; Service Oriented Architecture (SOA); algorithm; algorithms; anonymous veto; clustering; communication; communication interfaces; embedded security systems; error correcting code; hardware integrity; security; algorithm analysis and problem complexity; C; Systems and Data Security; Special Purpose and Application-Based Systems; Data Structures and Information Theory; Computer Communication Networks; Algorithm Analysis and Problem Complexity; Information Systems Applications (incl. Internet); Data and Information Security; Special Purpose and Application-Based Systems; Data Structures and Information Theory; Computer Communication Networks; Algorithms; Computer and Information Systems Applications; Computer Science; Netzwerksicherheit; Wissensbasierte Systeme, Expertensysteme; Algorithmen und Datenstrukturen; Informationstheorie; Netzwerk-Hardware; Angewandte Informatik; BC

Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines.- Behavioural Characterization for Network Anomaly Detection.- The Power of Anonymous Veto in Public Discussion.- Collusion-Resistant Message Authentication in Overlay Multicast Communication.- A Model for Authentication Credentials Translation in Service Oriented Architecture.- Secure and Efficient Group Key Agreements for Cluster Based Networks.- An Integrated ECC-MAC Based on RS Code.- Optimizing Pseudonym Updation in Vehicular Ad-Hoc Networks.- Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools.- Role Based Access Control with Spatiotemporal Context for Mobile Applications.- A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior.- A Hardware Architecture for Integrated-Security Services.- Evaluating Resistance of MCML Technology to Power Analysis Attacks Using a Simulation-Based Methodology.- Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection.

Autres livres qui pourraient ressembler au livre recherché:

Dernier livre similaire:
9783642010033 Transactions on Computational Science IV (Tan, C. J. Kenneth)


< pour archiver...