Lingua: Inglese
Editore: Morgan and Claypool Publishers, 2010
ISBN 10: 1598296299 ISBN 13: 9781598296297
Da: suffolkbooks, Center moriches, NY, U.S.A.
paperback. Condizione: Very Good. Fast Shipping - Safe and Secure 7 days a week!
Soft Cover. Condizione: Good. Ex-library with the usual features. Library label on front cover. The interior is clean and tight. Binding is good. Cover shows light wear. Ex-Library.
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
EUR 36,43
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 38,21
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In English.
EUR 35,45
Quantità: 10 disponibili
Aggiungi al carrelloPF. Condizione: New.
Condizione: New.
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
EUR 51,84
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: California Books, Miami, FL, U.S.A.
EUR 59,59
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Condizione: As New. Unread book in perfect condition.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 58,32
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In English.
Da: Chiron Media, Wallingford, Regno Unito
EUR 56,22
Quantità: 10 disponibili
Aggiungi al carrelloPF. Condizione: New.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 59,15
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Condizione: New.
Da: Books Puddle, New York, NY, U.S.A.
Condizione: New. pp. ix + 159.
Lingua: Inglese
Editore: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, Berlin, 2012
ISBN 10: 3642294197 ISBN 13: 9783642294198
Da: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condizione: new. Paperback. This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Formal Aspects of Security and Trust, FAST 2011, held in conjunction with the 16th European Symposium on Research in Computer Security, ESORICS 2011, in Leuven, Belgium in September 2011. The 15 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 42 submissions. The papers focus on security and trust policy models; security protocol design and analysis; formal models of trust and reputation; logics for security and trust; distributed trust management systems; trust-based reasoning; digital assets protection; data protection; privacy and ID issues; information flow analysis; language-based security; security and trust aspects of ubiquitous computing; validation/analysis tools; web service security/trust/privacy; grid security; security risk assessment; and case studies. This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Formal Aspects of Security and Trust, FAST 2011, held in conjunction with the 16th European Symposium on Research in Computer Security, ESORICS 2011, in Leuven, Belgium in September 2011. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Paperback or Softback. Condizione: New. Advances in Computer Science, Information Security and Privacy: 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedin. Book.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 66,15
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Lingua: Inglese
Editore: Springer-Verlag New York Inc, 2009
ISBN 10: 3642106218 ISBN 13: 9783642106217
Da: Revaluation Books, Exeter, Regno Unito
EUR 76,11
Quantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 1st edition. 159 pages. 9.10x6.00x0.50 inches. In Stock.
Lingua: Inglese
Editore: Springer International Publishing, Springer International Publishing Apr 2010, 2010
ISBN 10: 3031012062 ISBN 13: 9783031012068
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 35,30
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Neuware -Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher likelihood of accidental failures and malicious attacks. Disruption of services caused by such undesired events can have catastrophic effects, such as disruption of essential services and huge financial losses. The increased reliance of critical services on our cyberinfrastructure and the dire consequences of security breaches have highlighted the importance of information security. Authorization, security protocols, and software security are three central areas in security in which there have been significant advances in developing systematic foundations and analysis methods that work for practical systems. This book provides an introduction to this work, covering representative approaches, illustrated by examples, and providing pointers to additional work in the area. Table of Contents: Introduction / Foundations / Detecting Buffer Overruns Using Static Analysis / Analyzing Security Policies / Analyzing Security ProtocolsSpringer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 168 pp. Englisch.
Lingua: Inglese
Editore: Springer International Publishing, 2010
ISBN 10: 3031012062 ISBN 13: 9783031012068
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 35,30
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher likelihood of accidental failures and malicious attacks. Disruption of services caused by such undesired events can have catastrophic effects, such as disruption of essential services and huge financial losses. The increased reliance of critical services on our cyberinfrastructure and the dire consequences of security breaches have highlighted the importance of information security. Authorization, security protocols, and software security are three central areas in security in which there have been significant advances in developing systematic foundations and analysis methods that work for practical systems. This book provides an introduction to this work, covering representative approaches, illustrated by examples, and providing pointers to additional work in the area. Table of Contents: Introduction / Foundations / Detecting Buffer Overruns Using Static Analysis / Analyzing Security Policies / Analyzing Security Protocols.
Lingua: Inglese
Editore: Springer Berlin Heidelberg, 2009
ISBN 10: 3642106218 ISBN 13: 9783642106217
Da: moluna, Greven, Germania
EUR 53,32
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Lingua: Inglese
Editore: Springer-Verlag New York Inc, 2012
ISBN 10: 3642294197 ISBN 13: 9783642294198
Da: Revaluation Books, Exeter, Regno Unito
EUR 97,84
Quantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. revised edition. 289 pages. 9.10x6.00x0.80 inches. In Stock.
Lingua: Inglese
Editore: Springer, Berlin, Springer Berlin Heidelberg, Springer, 2009
ISBN 10: 3642106218 ISBN 13: 9783642106217
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 57,68
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009. The 7 revised full papers and 3 revised short papers presented together with 2 invited talks were carefully reviewed and selected from 45 submissions. Focusing on the theory and practice of information security and privacy, the papers include topics of deducibility constraints, symmetric encryption modes, dynamic security domains and policies, cryptography, formal verification of quantum programs, decision of static equivalence, authenticated message and proxy signature scheme.
Da: preigu, Osnabrück, Germania
EUR 49,75
Quantità: 5 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Advances in Computer Science, Information Security and Privacy | 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedings | Anupam Datta | Taschenbuch | ix | Englisch | 2009 | Springer | EAN 9783642106217 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Da: Buchpark, Trebbin, Germania
EUR 27,92
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher | Keine Beschreibung verfügbar.
Da: Buchpark, Trebbin, Germania
EUR 38,75
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: Sehr gut. Zustand: Sehr gut | Seiten: 277 | Sprache: Englisch | Produktart: Bücher | Keine Beschreibung verfügbar.
Editore: Sciencia Scripts Jun 2024, 2024
ISBN 10: 6207684265 ISBN 13: 9786207684267
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 21,90
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Neuware -V issledowanie byli wklücheny wse pacienty, postupiwshie w otdelenie mediciny i pediatrii s gemofiliej. Vsego bylo issledowano 79 pacientow s gemofiliej, 94,9% muzhchin i 4% zhenschin; 74,7% byli w wozraste do 20 let, 78,5% byli izwestnymi pacientami s gemofiliej, w to wremq kak 21,5% byli nedawno diagnostirowany; 64,6% pacientow imeli opredelennyj semejnyj anamnez; 79,7% byli s deficitom faktora VIII i 20. U 47 (74,6%) pacientow byl tqzhelyj deficit faktora VIII, u 12 (19%) pacientow - umerennyj deficit faktora VIII i u 4 (6,4%) pacientow - legkij deficit faktora VIII; u 11 (68,7%) pacientow byl tqzhelyj deficit faktora IX. Iz 57 pacientow s krowotecheniem iz sustawow u 38 (67%) byli porazheny kolennye sustawy, u 16 (28%) - golenostopnye, u 13 (22,8%) - luchezapqstnye, u 8 (14%) - loktewye i u 3 (5,3%) - plechewye. Iz 19 sluchaew wnutrimyshechnogo krowotecheniq u 13 (68,4%) pacientow bylo krowotechenie iz psoasa; u 43 (75,4%) pacientow bylo mnozhestwennoe wowlechenie sustawow; u 7 (12,3%) pacientow bylo i sustawnoe, i wnutrimyshechnoe krowotechenie; u 68,4% pacientow byla deformaciq sustawow. Bol'shinstwu nashih pacientow budet polezno profilakticheskoe lechenie s regulqrnoj zamenoj faktorow.Books on Demand GmbH, Überseering 33, 22297 Hamburg 64 pp. Russisch.
Editore: Sciencia Scripts, 2024
ISBN 10: 6207684265 ISBN 13: 9786207684267
Da: preigu, Osnabrück, Germania
EUR 20,90
Quantità: 5 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Klinicheskij profil' bol'nyh gemofiliej iz Verhnego Assama | Issledowanie na baze bol'nicy | Anupam Datta | Taschenbuch | Russisch | 2024 | Sciencia Scripts | EAN 9786207684267 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu.
Lingua: Inglese
Editore: Springer International Publishing Apr 2010, 2010
ISBN 10: 3031012062 ISBN 13: 9783031012068
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 35,30
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher likelihood of accidental failures and malicious attacks. Disruption of services caused by such undesired events can have catastrophic effects, such as disruption of essential services and huge financial losses. The increased reliance of critical services on our cyberinfrastructure and the dire consequences of security breaches have highlighted the importance of information security. Authorization, security protocols, and software security are three central areas in security in which there have been significant advances in developing systematic foundations and analysis methods that work for practical systems. This book provides an introduction to this work, covering representative approaches, illustrated by examples, and providing pointers to additional work in the area. Table of Contents: Introduction / Foundations / Detecting Buffer Overruns Using Static Analysis / Analyzing Security Policies / Analyzing Security Protocols 168 pp. Englisch.