"Sobre este título" puede pertenecer a otra edición de este libro.
Gastos de envío:
GRATIS
A Estados Unidos de America
Descripción Soft Cover. Condición: new. Nº de ref. del artículo: 9783540632320
Descripción Condición: New. Nº de ref. del artículo: ABLIING23Mar3113020172893
Descripción Condición: New. Nº de ref. del artículo: 5905459-n
Descripción Condición: New. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book. Nº de ref. del artículo: ria9783540632320_lsuk
Descripción Condición: New. Nº de ref. del artículo: 5905459-n
Descripción Condición: New. Nº de ref. del artículo: V9783540632320
Descripción Taschenbuch. Condición: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997.The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications. Nº de ref. del artículo: 9783540632320
Descripción PF. Condición: New. Nº de ref. del artículo: 6666-IUK-9783540632320
Descripción Condición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP 97, held in Sydney, NSW, Australia, in July 1997.The 20 revised full papers presented were carefully selected for inclusion i. Nº de ref. del artículo: 4896250
Descripción Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997.The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications. 356 pp. Englisch. Nº de ref. del artículo: 9783540632320