Da: Books Puddle, New York, NY, U.S.A.
Condizione: New.
Da: Majestic Books, Hounslow, Regno Unito
EUR 51,68
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: New.
Da: Biblios, Frankfurt am main, HESSE, Germania
EUR 52,20
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: New.
EUR 79,46
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 70,49
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
EUR 84,32
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
EUR 70,48
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
EUR 79,66
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: Revaluation Books, Exeter, Regno Unito
EUR 111,21
Quantità: 2 disponibili
Aggiungi al carrelloHardcover. Condizione: Brand New. 508 pages. 9.25x6.10x1.34 inches. In Stock.
EUR 41,87
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: Hervorragend. Zustand: Hervorragend | Seiten: 508 | Sprache: Englisch | Produktart: Bücher | This book presents a comprehensive mathematical theory that explains precisely what information flow is, how it can be assessed quantitatively ¿ so bringing precise meaning to the intuition that certain information leaks are small enough to be tolerated ¿ and how systems can be constructed that achieve rigorous, quantitative information-flow guarantees in those terms. It addresses the fundamental challenge that functional and practical requirements frequently conflict with the goal of preserving confidentiality, making perfect security unattainable.Topics include: a systematic presentation of how unwanted information flow, i.e., "leaks", can be quantified in operationally significant ways and then bounded, both with respect to estimated benefit for an attacking adversary and by comparisons between alternative implementations; a detailed study of capacity, refinement, and Dalenius leakage, supporting robust leakage assessments; a unification of information-theoretic channels and information-leaking sequential programs within the same framework; and a collection of case studies, showing how the theory can be applied to interesting realistic scenarios.The text is unified, self-contained and comprehensive, accessible to students and researchers with some knowledge of discrete probability and undergraduate mathematics, and contains exercises to facilitate its use as a course textbook.
Lingua: Inglese
Editore: Springer International Publishing, 2020
ISBN 10: 3319961292 ISBN 13: 9783319961293
Da: moluna, Greven, Germania
EUR 55,78
Quantità: Più di 20 disponibili
Aggiungi al carrelloGebunden. Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Computer systems that process sensitive information should preserve that information s confidentiality, but our current cyber-infrastructure is failing to achieve this goal: reports of massive-scale information disclosures are distressingly frequentWritt.