Idioma: Inglés
Publicado por Morgan and Claypool Publishers, 2010
ISBN 10: 1598296299 ISBN 13: 9781598296297
Librería: suffolkbooks, Center moriches, NY, Estados Unidos de America
EUR 15,83
Cantidad disponible: 16 disponibles
Añadir al carritopaperback. Condición: Very Good. Fast Shipping - Safe and Secure 7 days a week!
Librería: BookOrders, Russell, IA, Estados Unidos de America
EUR 17,58
Cantidad disponible: 1 disponibles
Añadir al carritoSoft Cover. Condición: Good. Ex-library with the usual features. Library label on front cover. The interior is clean and tight. Binding is good. Cover shows light wear. Ex-Library.
Librería: Lucky's Textbooks, Dallas, TX, Estados Unidos de America
EUR 36,55
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: Ria Christie Collections, Uxbridge, Reino Unido
EUR 38,43
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. In English.
EUR 35,66
Cantidad disponible: 10 disponibles
Añadir al carritoPF. Condición: New.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 53,20
Cantidad disponible: 15 disponibles
Añadir al carritoCondición: New.
Librería: Lucky's Textbooks, Dallas, TX, Estados Unidos de America
EUR 52,01
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: California Books, Miami, FL, Estados Unidos de America
EUR 59,79
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 61,25
Cantidad disponible: 15 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: Ria Christie Collections, Uxbridge, Reino Unido
EUR 58,66
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. In English.
Librería: Chiron Media, Wallingford, Reino Unido
EUR 56,55
Cantidad disponible: 10 disponibles
Añadir al carritoPF. Condición: New.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 58,65
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: Books Puddle, New York, NY, Estados Unidos de America
EUR 72,93
Cantidad disponible: 4 disponibles
Añadir al carritoCondición: New.
Librería: Books Puddle, New York, NY, Estados Unidos de America
EUR 74,28
Cantidad disponible: 4 disponibles
Añadir al carritoCondición: New. pp. ix + 159.
Librería: Lucky's Textbooks, Dallas, TX, Estados Unidos de America
EUR 76,97
Cantidad disponible: 1 disponibles
Añadir al carritoCondición: New.
Idioma: Inglés
Publicado por Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, Berlin, 2012
ISBN 10: 3642294197 ISBN 13: 9783642294198
Librería: Grand Eagle Retail, Bensenville, IL, Estados Unidos de America
EUR 80,49
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: new. Paperback. This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Formal Aspects of Security and Trust, FAST 2011, held in conjunction with the 16th European Symposium on Research in Computer Security, ESORICS 2011, in Leuven, Belgium in September 2011. The 15 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 42 submissions. The papers focus on security and trust policy models; security protocol design and analysis; formal models of trust and reputation; logics for security and trust; distributed trust management systems; trust-based reasoning; digital assets protection; data protection; privacy and ID issues; information flow analysis; language-based security; security and trust aspects of ubiquitous computing; validation/analysis tools; web service security/trust/privacy; grid security; security risk assessment; and case studies. This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Formal Aspects of Security and Trust, FAST 2011, held in conjunction with the 16th European Symposium on Research in Computer Security, ESORICS 2011, in Leuven, Belgium in September 2011. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Librería: BargainBookStores, Grand Rapids, MI, Estados Unidos de America
EUR 83,16
Cantidad disponible: 5 disponibles
Añadir al carritoPaperback or Softback. Condición: New. Advances in Computer Science, Information Security and Privacy: 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedin. Book.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 66,53
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Idioma: Inglés
Publicado por Springer-Verlag New York Inc, 2009
ISBN 10: 3642106218 ISBN 13: 9783642106217
Librería: Revaluation Books, Exeter, Reino Unido
EUR 76,44
Cantidad disponible: 2 disponibles
Añadir al carritoPaperback. Condición: Brand New. 1st edition. 159 pages. 9.10x6.00x0.50 inches. In Stock.
Idioma: Inglés
Publicado por Springer International Publishing, Springer International Publishing Apr 2010, 2010
ISBN 10: 3031012062 ISBN 13: 9783031012068
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 35,30
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Neuware -Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher likelihood of accidental failures and malicious attacks. Disruption of services caused by such undesired events can have catastrophic effects, such as disruption of essential services and huge financial losses. The increased reliance of critical services on our cyberinfrastructure and the dire consequences of security breaches have highlighted the importance of information security. Authorization, security protocols, and software security are three central areas in security in which there have been significant advances in developing systematic foundations and analysis methods that work for practical systems. This book provides an introduction to this work, covering representative approaches, illustrated by examples, and providing pointers to additional work in the area. Table of Contents: Introduction / Foundations / Detecting Buffer Overruns Using Static Analysis / Analyzing Security Policies / Analyzing Security ProtocolsSpringer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 168 pp. Englisch.
Idioma: Inglés
Publicado por Springer International Publishing, 2010
ISBN 10: 3031012062 ISBN 13: 9783031012068
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 35,30
Cantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Druck auf Anfrage Neuware - Printed after ordering - Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher likelihood of accidental failures and malicious attacks. Disruption of services caused by such undesired events can have catastrophic effects, such as disruption of essential services and huge financial losses. The increased reliance of critical services on our cyberinfrastructure and the dire consequences of security breaches have highlighted the importance of information security. Authorization, security protocols, and software security are three central areas in security in which there have been significant advances in developing systematic foundations and analysis methods that work for practical systems. This book provides an introduction to this work, covering representative approaches, illustrated by examples, and providing pointers to additional work in the area. Table of Contents: Introduction / Foundations / Detecting Buffer Overruns Using Static Analysis / Analyzing Security Policies / Analyzing Security Protocols.
Idioma: Inglés
Publicado por Springer Berlin Heidelberg, 2009
ISBN 10: 3642106218 ISBN 13: 9783642106217
Librería: moluna, Greven, Alemania
EUR 53,32
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Idioma: Inglés
Publicado por Springer-Verlag New York Inc, 2012
ISBN 10: 3642294197 ISBN 13: 9783642294198
Librería: Revaluation Books, Exeter, Reino Unido
EUR 98,27
Cantidad disponible: 2 disponibles
Añadir al carritoPaperback. Condición: Brand New. revised edition. 289 pages. 9.10x6.00x0.80 inches. In Stock.
Idioma: Inglés
Publicado por Springer, Berlin, Springer Berlin Heidelberg, Springer, 2009
ISBN 10: 3642106218 ISBN 13: 9783642106217
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 57,68
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009. The 7 revised full papers and 3 revised short papers presented together with 2 invited talks were carefully reviewed and selected from 45 submissions. Focusing on the theory and practice of information security and privacy, the papers include topics of deducibility constraints, symmetric encryption modes, dynamic security domains and policies, cryptography, formal verification of quantum programs, decision of static equivalence, authenticated message and proxy signature scheme.
Librería: Buchpark, Trebbin, Alemania
EUR 27,92
Cantidad disponible: 1 disponibles
Añadir al carritoCondición: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher | Keine Beschreibung verfügbar.
Librería: Buchpark, Trebbin, Alemania
EUR 38,75
Cantidad disponible: 1 disponibles
Añadir al carritoCondición: Sehr gut. Zustand: Sehr gut | Seiten: 277 | Sprache: Englisch | Produktart: Bücher | Keine Beschreibung verfügbar.
Publicado por Sciencia Scripts Jun 2024, 2024
ISBN 10: 6207684265 ISBN 13: 9786207684267
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 21,90
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Neuware -V issledowanie byli wklücheny wse pacienty, postupiwshie w otdelenie mediciny i pediatrii s gemofiliej. Vsego bylo issledowano 79 pacientow s gemofiliej, 94,9% muzhchin i 4% zhenschin; 74,7% byli w wozraste do 20 let, 78,5% byli izwestnymi pacientami s gemofiliej, w to wremq kak 21,5% byli nedawno diagnostirowany; 64,6% pacientow imeli opredelennyj semejnyj anamnez; 79,7% byli s deficitom faktora VIII i 20. U 47 (74,6%) pacientow byl tqzhelyj deficit faktora VIII, u 12 (19%) pacientow - umerennyj deficit faktora VIII i u 4 (6,4%) pacientow - legkij deficit faktora VIII; u 11 (68,7%) pacientow byl tqzhelyj deficit faktora IX. Iz 57 pacientow s krowotecheniem iz sustawow u 38 (67%) byli porazheny kolennye sustawy, u 16 (28%) - golenostopnye, u 13 (22,8%) - luchezapqstnye, u 8 (14%) - loktewye i u 3 (5,3%) - plechewye. Iz 19 sluchaew wnutrimyshechnogo krowotecheniq u 13 (68,4%) pacientow bylo krowotechenie iz psoasa; u 43 (75,4%) pacientow bylo mnozhestwennoe wowlechenie sustawow; u 7 (12,3%) pacientow bylo i sustawnoe, i wnutrimyshechnoe krowotechenie; u 68,4% pacientow byla deformaciq sustawow. Bol'shinstwu nashih pacientow budet polezno profilakticheskoe lechenie s regulqrnoj zamenoj faktorow.Books on Demand GmbH, Überseering 33, 22297 Hamburg 64 pp. Russisch.
Idioma: Inglés
Publicado por Springer International Publishing Apr 2010, 2010
ISBN 10: 3031012062 ISBN 13: 9783031012068
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 35,30
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher likelihood of accidental failures and malicious attacks. Disruption of services caused by such undesired events can have catastrophic effects, such as disruption of essential services and huge financial losses. The increased reliance of critical services on our cyberinfrastructure and the dire consequences of security breaches have highlighted the importance of information security. Authorization, security protocols, and software security are three central areas in security in which there have been significant advances in developing systematic foundations and analysis methods that work for practical systems. This book provides an introduction to this work, covering representative approaches, illustrated by examples, and providing pointers to additional work in the area. Table of Contents: Introduction / Foundations / Detecting Buffer Overruns Using Static Analysis / Analyzing Security Policies / Analyzing Security Protocols 168 pp. Englisch.
Publicado por Sciencia Scripts Jun 2024, 2024
ISBN 10: 6207684265 ISBN 13: 9786207684267
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 21,90
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware 64 pp. Russisch.
Idioma: Inglés
Publicado por Berlin Springer Berlin Heidelberg Springer Nov 2009, 2009
ISBN 10: 3642106218 ISBN 13: 9783642106217
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 53,49
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009. The 7 revised full papers and 3 revised short papers presented together with 2 invited talks were carefully reviewed and selected from 45 submissions. Focusing on the theory and practice of information security and privacy, the papers include topics of deducibility constraints, symmetric encryption modes, dynamic security domains and policies, cryptography, formal verification of quantum programs, decision of static equivalence, authenticated message and proxy signature scheme. 159 pp. Englisch.