Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
EUR 69,50
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoHardback. Condición: New. New copy - Usually dispatched within 4 working days. 166.
Librería: Ria Christie Collections, Uxbridge, Reino Unido
EUR 75,20
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. In.
Librería: Majestic Books, Hounslow, Reino Unido
EUR 69,89
Convertir monedaCantidad disponible: 3 disponibles
Añadir al carritoCondición: New.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 66,70
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: Books Puddle, New York, NY, Estados Unidos de America
EUR 74,49
Convertir monedaCantidad disponible: 3 disponibles
Añadir al carritoCondición: New. 1st edition NO-PA16APR2015-KAP.
Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America
EUR 69,37
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 69,49
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: Biblios, Frankfurt am main, HESSE, Alemania
EUR 78,84
Convertir monedaCantidad disponible: 3 disponibles
Añadir al carritoCondición: New.
Librería: GreatBookPricesUK, Woodford Green, Reino Unido
EUR 82,08
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: As New. Unread book in perfect condition.
Librería: Revaluation Books, Exeter, Reino Unido
EUR 95,75
Convertir monedaCantidad disponible: 2 disponibles
Añadir al carritoHardcover. Condición: Brand New. 104 pages. 8.75x5.50x0.25 inches. In Stock.
Librería: Lucky's Textbooks, Dallas, TX, Estados Unidos de America
EUR 65,51
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 64,50
Convertir monedaCantidad disponible: 2 disponibles
Añadir al carritoBuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.0 (OAuth 2.0) framework along with user-managed access (UMA) and security analysis. Important key concepts are discussed regarding login credentials with restricted access to third parties with a primary account as a resource server. A detailed protocol overview and authorization process, along with security analysis of OAuth 2.0, are also discussed in the book. Case studies of websites with vulnerability issues are included.FEATURESProvides an overview of the security challenges of IoT and mitigation techniques with a focus on authorization and access control mechanismsDiscusses a behavioral analysis of threats and attacks using UML base modelingCovers the use of the OAuth 2.0 Protocol and UMA for connecting web applicationsIncludes role-based access control (RBAC), discretionary access control (DAC), mandatory access control (MAC) and permission-based access control (PBAC)Explores how to provide access to third-party web applications through a resource server by use of a secured and reliable OAuth 2.0 frameworkThis book is for researchers and professionals who are engaged in IT security, auditing and computer engineering. 88 pp. Englisch.
Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
EUR 71,59
Convertir monedaCantidad disponible: 5 disponibles
Añadir al carritoHardback. Condición: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days.
Librería: PBShop.store US, Wood Dale, IL, Estados Unidos de America
EUR 80,73
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoHRD. Condición: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Librería: PBShop.store UK, Fairford, GLOS, Reino Unido
EUR 77,77
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoHRD. Condición: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Librería: Revaluation Books, Exeter, Reino Unido
EUR 71,16
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoHardcover. Condición: Brand New. 104 pages. 8.75x5.50x0.25 inches. In Stock. This item is printed on demand.
Librería: moluna, Greven, Alemania
EUR 61,20
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoGebunden. Condición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Dr. Parikshit N. Mahalle obtained his B.E degree in Computer Science and Engineering from Sant Gadge Baba Amravati University, Amravati, India and M.E. degree in Computer Engineering from Savitribai Phule Pune University, Pune, India. He.
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 72,14
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoBuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.0 (OAuth 2.0) framework along with user-managed access (UMA) and security analysis. Important key concepts are discussed regarding login credentials with restricted access to third parties with a primary account as a resource server. A detailed protocol overview and authorization process, along with security analysis of OAuth 2.0, are also discussed in the book. Case studies of websites with vulnerability issues are included.FEATURESProvides an overview of the security challenges of IoT and mitigation techniques with a focus on authorization and access control mechanismsDiscusses a behavioral analysis of threats and attacks using UML base modelingCovers the use of the OAuth 2.0 Protocol and UMA for connecting web applicationsIncludes role-based access control (RBAC), discretionary access control (DAC), mandatory access control (MAC) and permission-based access control (PBAC)Explores how to provide access to third-party web applications through a resource server by use of a secured and reliable OAuth 2.0 frameworkThis book is for researchers and professionals who are engaged in IT security, auditing and computer engineering.