Idioma: Inglés
Publicado por Cham, Springer International Publishing., 2018
ISBN 10: 3030019497 ISBN 13: 9783030019495
Librería: Universitätsbuchhandlung Herta Hold GmbH, Berlin, Alemania
Original o primera edición
EUR 16,00
Cantidad disponible: 1 disponibles
Añadir al carrito1st ed. 2018. 16 x 24 cm. XV, 818 S. XV, 818 p. 200 illus., 109 illus. in color. Softcover Versand aus Deutschland / We dispatch from Germany via Air Mail. Einband bestoßen, daher Mängelexemplar gestempelt, sonst sehr guter Zustand. Imperfect copy due to slightly bumped cover, apart from this in very good condition. Stamped. (Security and Cryptology; Lecture Notes in Computer Science). Sprache: Englisch.
Publicado por Qinghai Nationalities Publishing House, Xining, 1992
ISBN 10: 7542002961 ISBN 13: 9787542002969
Librería: Yak and Yeti Books, Denver, CO, Estados Unidos de America
EUR 35,33
Cantidad disponible: 1 disponibles
Añadir al carritoSoft cover. Condición: New. 241 pages. In Chinese.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 101,14
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 119,88
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Idioma: Inglés
Publicado por ISTE Press - Elsevier 2017-11-17, 2017
ISBN 10: 1785482572 ISBN 13: 9781785482571
Librería: Chiron Media, Wallingford, Reino Unido
EUR 104,26
Cantidad disponible: Más de 20 disponibles
Añadir al carritoHardcover. Condición: New.
Librería: Majestic Books, Hounslow, Reino Unido
EUR 119,76
Cantidad disponible: 3 disponibles
Añadir al carritoCondición: New.
Librería: Ria Christie Collections, Uxbridge, Reino Unido
EUR 113,71
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. In.
EUR 117,58
Cantidad disponible: 2 disponibles
Añadir al carritoPaperback. Condición: Brand New. reprint edition. 250 pages. 8.75x5.75x0.75 inches. In Stock.
Librería: Books Puddle, New York, NY, Estados Unidos de America
EUR 128,48
Cantidad disponible: 3 disponibles
Añadir al carritoCondición: New. 1st edition NO-PA16APR2015-KAP.
EUR 113,70
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
EUR 127,35
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: Biblios, Frankfurt am main, HESSE, Alemania
EUR 133,47
Cantidad disponible: 3 disponibles
Añadir al carritoCondición: New.
Idioma: Inglés
Publicado por ISTE Press Ltd - Elsevier Inc, 2017
ISBN 10: 1785482572 ISBN 13: 9781785482571
Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
EUR 129,88
Cantidad disponible: Más de 20 disponibles
Añadir al carritoHardback. Condición: New. New copy - Usually dispatched within 4 working days.
Librería: Books Puddle, New York, NY, Estados Unidos de America
EUR 155,55
Cantidad disponible: 4 disponibles
Añadir al carritoCondición: New. 1st ed. 2018 edition NO-PA16APR2015-KAP.
Librería: preigu, Osnabrück, Alemania
EUR 95,15
Cantidad disponible: 5 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Information and Communications Security | 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings | David Naccache (u. a.) | Taschenbuch | Lecture Notes in Computer Science | xv | Englisch | 2018 | Springer | EAN 9783030019495 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Idioma: Inglés
Publicado por Springer-Verlag New York Inc, 2018
ISBN 10: 3030019497 ISBN 13: 9783030019495
Librería: Revaluation Books, Exeter, Reino Unido
EUR 158,62
Cantidad disponible: 2 disponibles
Añadir al carritoPaperback. Condición: Brand New. 836 pages. 9.25x6.10x1.57 inches. In Stock.
Idioma: Inglés
Publicado por Springer International Publishing, Springer International Publishing, 2018
ISBN 10: 3030019497 ISBN 13: 9783030019495
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 106,99
Cantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018.The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.
Librería: Mispah books, Redhill, SURRE, Reino Unido
EUR 164,39
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: New. NEW. SHIPS FROM MULTIPLE LOCATIONS. book.
Publicado por China Agricultural Science and Technology Press Pu, 2000
ISBN 10: 7511602029 ISBN 13: 9787511602022
Librería: liu xing, Nanjing, JS, China
EUR 105,98
Cantidad disponible: 1 disponibles
Añadir al carritopaperback. Condición: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback. Language: Chinese with English summary. Pub. Date: 2010. the book is China Plant Pathology of the Ninth National Congress and the 2010 Annual Conference papers assembled. The conference received 438 papers. receiving paper based on the areas covered can be broadly divided into: Conference report abstracts 16. 140 fungi and fungal diseases. and diseases 45 prokaryotes. viruses and virus diseases 83 . nematodes and nematode disease 17. 42 plant disease resistance. forecasting and integrated disease prevention and control 18. 56 biological control. seed pathology and fungicides 21. These papers basically reflect our human resources. distribution of plant pathology. research. research level and the latest progress. Contents: The first part of the General Assembly on the human predicament and the way out - Plant Pathology scientists long way to go Unraveling the Molecular Mechanism of Resistance to the Rice Blast FungusCurrent Advances on Control of Viral Diseases of Papaya by Transgenic ApproachBacterial Pathogenesis as a Molecular Probe of Plant Immunity. Cell Biology and Jasmonate SignalingRecent Advances in the Studies on Cucumber Mosaic VirusPathogenomics and Bioinformatic Platforms for Fungal Plant PathogensFunctional Analysis of the Kinome of the Wheat Scab Fungus Fusarium graminearumAutophagy in Magnaporthe oryzae host genetic diversity and pathogenic evolution of Plant Pathology. the impact of epidemic Pseudomonas syringae Effector Proteins Reveal Regulatory Mechanisms of Plant ImmunityGenomics and Functional Genomics of Citrus Huanglongbing Bacterium. Candidatus Liberibacter asiaticusRNA shear body composition as a new class of M. grisea pathogenic factor RNA - Dependent RNA Polymerase 1 from Nicotiana tabacum Suppresses RNA Silencingand Enhances Viral Infection in Nicotiana benthamiana plant pathogenic Oomycete RXLR effector protein transmembrane transport mechanism of rice dwarf virus and the body of the insect-mediated interaction relationships What We are Learning from Whole Genome Studies of the Rice Blast Fungus? The second part of the fungi and fungal diseases of the third part of the fourth part of the prokaryotes and the danger of viruses and viral diseases and nematode worm disease Part V Part VI Part VII of plant disease resistance and disease forecasting the eighth part of the integrated control of biological control Part IX and fungicide seed pathologyFour Satisfaction guaranteed,or money back.
Librería: Brook Bookstore On Demand, Napoli, NA, Italia
EUR 86,24
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: new. Questo è un articolo print on demand.
Librería: Brook Bookstore On Demand, Napoli, NA, Italia
EUR 107,82
Cantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: new. Questo è un articolo print on demand.
Idioma: Inglés
Publicado por Springer International Publishing Okt 2018, 2018
ISBN 10: 3030019497 ISBN 13: 9783030019495
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 106,99
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018.The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management. 836 pp. Englisch.
Idioma: Inglés
Publicado por Springer International Publishing, 2018
ISBN 10: 3030019497 ISBN 13: 9783030019495
Librería: moluna, Greven, Alemania
EUR 92,27
Cantidad disponible: Más de 20 disponibles
Añadir al carritoKartoniert / Broschiert. Condición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully se.
Librería: Majestic Books, Hounslow, Reino Unido
EUR 156,78
Cantidad disponible: 4 disponibles
Añadir al carritoCondición: New. Print on Demand.
Idioma: Inglés
Publicado por Springer, Springer Okt 2018, 2018
ISBN 10: 3030019497 ISBN 13: 9783030019495
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 106,99
Cantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - Print on Demand Titel. Neuware -This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.Springer-Verlag KG, Sachsenplatz 4-6, 1201 Wien 836 pp. Englisch.
Librería: Biblios, Frankfurt am main, HESSE, Alemania
EUR 160,41
Cantidad disponible: 4 disponibles
Añadir al carritoCondición: New. PRINT ON DEMAND.
Idioma: Inglés
Publicado por Elsevier Science Nov 2017, 2017
ISBN 10: 1785482572 ISBN 13: 9781785482571
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 150,00
Cantidad disponible: 2 disponibles
Añadir al carritoBuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The software and networking industry is experiencing a rapid development and deployment of Network Functions Visualization (NFV) technology, in both enterprise and cloud data center networks. One of the primary reasons for this technological trend is that NFV has the capability to reduce CAPEX and OPEX, whilst increasing networking service efficiency, performance, agility, scalability, and resource utilization. Despite such well-recognized benefits, security remains a major concern of network service providers and seriously impedes the further expansion of NFV. This book is therefore dedicated to investigating and exploring the potential security issues of NFV. It contains three major elements: a thorough overview of the NFV framework and architecture, a comprehensive threat analysis aiming to establish a layer-specific threat taxonomy for NFV enabled networking services, and a series of comparative studies of security best practices in traditional networking scenarios and in NFV, ultimately leading to a set of recommendations on security countermeasures in NFV. This book is primarily intended for engineers, engineering students and researchers and those with an interest in the field of networks and telecommunications (architectures, protocols, services) in general, and particularly software-defined network (SDN) and network functions virtualization (NFV)-based security services. 272 pp. Englisch.
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 164,41
Cantidad disponible: 2 disponibles
Añadir al carritoBuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - The software and networking industry is experiencing a rapid development and deployment of Network Functions Visualization (NFV) technology, in both enterprise and cloud data center networks. One of the primary reasons for this technological trend is that NFV has the capability to reduce CAPEX and OPEX, whilst increasing networking service efficiency, performance, agility, scalability, and resource utilization. Despite such well-recognized benefits, security remains a major concern of network service providers and seriously impedes the further expansion of NFV. This book is therefore dedicated to investigating and exploring the potential security issues of NFV. It contains three major elements: a thorough overview of the NFV framework and architecture, a comprehensive threat analysis aiming to establish a layer-specific threat taxonomy for NFV enabled networking services, and a series of comparative studies of security best practices in traditional networking scenarios and in NFV, ultimately leading to a set of recommendations on security countermeasures in NFV. This book is primarily intended for engineers, engineering students and researchers and those with an interest in the field of networks and telecommunications (architectures, protocols, services) in general, and particularly software-defined network (SDN) and network functions virtualization (NFV)-based security services.