Paperback. Condizione: Fair. Condizione sovraccoperta: None as issued. Clean, solid copy with unmarked text. Cover has multiple bumps and dings, some of which carry to pages. Small bump to bottom corner of book has left a light bend to covers and page corner tips. Binding is tight and square. Surface damage on spine near top. A somewhat beat-up copy, but still entirely usable. We are unable to ship oversize books and multi-volume sets internationally.
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
EUR 51,64
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: Gallix, Gif sur Yvette, Francia
EUR 34,00
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: Neuf.
Lingua: Inglese
Editore: Springer Berlin Heidelberg 2010-06-02, 2010
ISBN 10: 364203943X ISBN 13: 9783642039430
Da: Chiron Media, Wallingford, Regno Unito
EUR 56,85
Quantità: 10 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 58,85
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Condizione: New. pp. 180.
EUR 79,44
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Lingua: Inglese
Editore: Springer Berlin Heidelberg, 2009
ISBN 10: 364203943X ISBN 13: 9783642039430
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 53,49
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - This volume contains the 12 papers presented at the WISTP 2009 conference, held in Brussels, Belgium in September 2009. WISTP 2009 was the third int- national workshop devoted to information security theory and practice. WISTP 2009 built on the successful WISTP 2007 and 2008 conferences, held in Heraklion, Crete, Greece and Seville, Spain in May 2007 and May 2008, - spectively. The proceedings of WISTP 2007 and WISTP 2008 were published as volumes 4462 and 5019 of the Lecture Notes in Computer Science series. This workshop received the following support: - Co-sponsored by IFIP WG 11. 2 Small System Security - Co-sponsored by VDE ITG - Technical sponsorship of the IEEE Systems, Man & Cybernetics Society - Supported by the Technical Committee on Systems Safety and Security - Organized in cooperation with the ACM SIGSAC - Supported by ENISA - Supported by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC) These proceedings contain 12 original papers covering a range of theoretical and practical topics in information security. For the purposes of the organi- tion of the WISTP program, the papers were divided into four main categories, namely: - Mobility - Attacks and Secure Implementations - Performance and Security - Cryptography The12papersincludedherewereselectedfromatotalof27submissions. The refereeing process was rigorous,involving at least three (and mostly four or ve) independent reports being prepared for each submission.
Da: Mispah books, Redhill, SURRE, Regno Unito
EUR 101,46
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: Like New. Like New. book.
Da: Buchpark, Trebbin, Germania
EUR 35,81
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher | Keine Beschreibung verfügbar.
Lingua: Inglese
Editore: Springer Berlin Heidelberg Aug 2009, 2009
ISBN 10: 364203943X ISBN 13: 9783642039430
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 53,49
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This volume contains the 12 papers presented at the WISTP 2009 conference, held in Brussels, Belgium in September 2009. WISTP 2009 was the third int- national workshop devoted to information security theory and practice. WISTP 2009 built on the successful WISTP 2007 and 2008 conferences, held in Heraklion, Crete, Greece and Seville, Spain in May 2007 and May 2008, - spectively. The proceedings of WISTP 2007 and WISTP 2008 were published as volumes 4462 and 5019 of the Lecture Notes in Computer Science series. This workshop received the following support: - Co-sponsored by IFIP WG 11. 2 Small System Security - Co-sponsored by VDE ITG - Technical sponsorship of the IEEE Systems, Man & Cybernetics Society - Supported by the Technical Committee on Systems Safety and Security - Organized in cooperation with the ACM SIGSAC - Supported by ENISA - Supported by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC) These proceedings contain 12 original papers covering a range of theoretical and practical topics in information security. For the purposes of the organi- tion of the WISTP program, the papers were divided into four main categories, namely: - Mobility - Attacks and Secure Implementations - Performance and Security - Cryptography The12papersincludedherewereselectedfromatotalof27submissions. The refereeing process was rigorous,involving at least three (and mostly four or ve) independent reports being prepared for each submission. 180 pp. Englisch.
Da: Grand Eagle Retail, Bensenville, IL, U.S.A.
Hardcover. Condizione: new. Hardcover. Internet of Things technologies, which connect various devices and sensors together, are increasingly at the basis of modern communication, enabling the autonomous exchange of data between billions of physical and virtual objects, creating smart environments in sectors such as healthcare, logistics, etc.However, the advancement of IoT communication also brings new security challenges. Managing the security of the IoT raises major concerns, especially when devices are deeply integrated into critical infrastructure, hospitals, and vehicles. Furthermore, the IoT is a key component of 5G/6G architecture and Industry 4.0. All these technologies are designed to support critical applications.The increased number of related potential attack vectors poses a substantial risk for malicious attackers. Also, the focus of security has been put on large-scale, software-oriented systems, such as the Cloud or datacenter systems, rather than embedded electronics. Consequently, the establishment of IoT ecosystems across different domains remains highly vulnerable to a wide range of threats.This Special Issue gathers high-quality original research contributions and the latest research results in the field of threat detection within the IoT. It also covers threat analysis and corresponding defense techniques. The threats are related to privacy issues, trust issues, IoT management issues, IoT intrusion, vulnerability issues, malware detection, cryptographic key management, reliability of IoT communication (including secure routing aspects), IoT forensics techniques, Cloud-related IoT issues, etc. This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Da: Majestic Books, Hounslow, Regno Unito
EUR 73,97
Quantità: 4 disponibili
Aggiungi al carrelloCondizione: New. Print on Demand pp. 180 Illus.
Da: Biblios, Frankfurt am main, HESSE, Germania
EUR 76,52
Quantità: 4 disponibili
Aggiungi al carrelloCondizione: New. PRINT ON DEMAND pp. 180.
Lingua: Inglese
Editore: Springer Berlin Heidelberg, 2009
ISBN 10: 364203943X ISBN 13: 9783642039430
Da: moluna, Greven, Germania
EUR 48,37
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This volume contains the 12 papers presented at the WISTP 2009 conference, held in Brussels, Belgium in September 2009. WISTP 2009 was the third int- national workshop devoted to information security theory and practice. WISTP 2009 built on the successful W.
Lingua: Inglese
Editore: Springer Berlin Heidelberg, J.B. Metzler Aug 2009, 2009
ISBN 10: 364203943X ISBN 13: 9783642039430
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 53,49
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - Print on Demand Titel. Neuware -This volume contains the 12 papers presented at the WISTP 2009 conference, held in Brussels, Belgium in September 2009. WISTP 2009 was the third int- national workshop devoted to information security theory and practice. WISTP 2009 built on the successful WISTP 2007 and 2008 conferences, held in Heraklion, Crete, Greece and Seville, Spain in May 2007 and May 2008, - spectively. The proceedings of WISTP 2007 and WISTP 2008 were published as volumes 4462 and 5019 of the Lecture Notes in Computer Science series. This workshop received the following support: ¿ Co-sponsored by IFIP WG 11. 2 Small System Security ¿ Co-sponsored by VDE ITG ¿ Technical sponsorship of the IEEE Systems, Man & Cybernetics Society ¿ Supported by the Technical Committee on Systems Safety and Security ¿ Organized in cooperation with the ACM SIGSAC ¿ Supported by ENISA ¿ Supported by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC) These proceedings contain 12 original papers covering a range of theoretical and practical topics in information security. For the purposes of the organi- tion of the WISTP program, the papers were divided into four main categories, namely: ¿ Mobility ¿ Attacks and Secure Implementations ¿ Performance and Security ¿ Cryptography The12papersincludedherewereselectedfromatotalof27submissions. The refereeing process was rigorous,involving at least three (and mostly four or ve) independent reports being prepared for each submission.Springer-Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 180 pp. Englisch.
Da: CitiRetail, Stevenage, Regno Unito
EUR 84,73
Quantità: 1 disponibili
Aggiungi al carrelloHardcover. Condizione: new. Hardcover. Internet of Things technologies, which connect various devices and sensors together, are increasingly at the basis of modern communication, enabling the autonomous exchange of data between billions of physical and virtual objects, creating smart environments in sectors such as healthcare, logistics, etc.However, the advancement of IoT communication also brings new security challenges. Managing the security of the IoT raises major concerns, especially when devices are deeply integrated into critical infrastructure, hospitals, and vehicles. Furthermore, the IoT is a key component of 5G/6G architecture and Industry 4.0. All these technologies are designed to support critical applications.The increased number of related potential attack vectors poses a substantial risk for malicious attackers. Also, the focus of security has been put on large-scale, software-oriented systems, such as the Cloud or datacenter systems, rather than embedded electronics. Consequently, the establishment of IoT ecosystems across different domains remains highly vulnerable to a wide range of threats.This Special Issue gathers high-quality original research contributions and the latest research results in the field of threat detection within the IoT. It also covers threat analysis and corresponding defense techniques. The threats are related to privacy issues, trust issues, IoT management issues, IoT intrusion, vulnerability issues, malware detection, cryptographic key management, reliability of IoT communication (including secure routing aspects), IoT forensics techniques, Cloud-related IoT issues, etc. This item is printed on demand. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Da: AussieBookSeller, Truganina, VIC, Australia
EUR 98,96
Quantità: 1 disponibili
Aggiungi al carrelloHardcover. Condizione: new. Hardcover. Internet of Things technologies, which connect various devices and sensors together, are increasingly at the basis of modern communication, enabling the autonomous exchange of data between billions of physical and virtual objects, creating smart environments in sectors such as healthcare, logistics, etc.However, the advancement of IoT communication also brings new security challenges. Managing the security of the IoT raises major concerns, especially when devices are deeply integrated into critical infrastructure, hospitals, and vehicles. Furthermore, the IoT is a key component of 5G/6G architecture and Industry 4.0. All these technologies are designed to support critical applications.The increased number of related potential attack vectors poses a substantial risk for malicious attackers. Also, the focus of security has been put on large-scale, software-oriented systems, such as the Cloud or datacenter systems, rather than embedded electronics. Consequently, the establishment of IoT ecosystems across different domains remains highly vulnerable to a wide range of threats.This Special Issue gathers high-quality original research contributions and the latest research results in the field of threat detection within the IoT. It also covers threat analysis and corresponding defense techniques. The threats are related to privacy issues, trust issues, IoT management issues, IoT intrusion, vulnerability issues, malware detection, cryptographic key management, reliability of IoT communication (including secure routing aspects), IoT forensics techniques, Cloud-related IoT issues, etc. This item is printed on demand. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
Da: preigu, Osnabrück, Germania
EUR 119,50
Quantità: 5 disponibili
Aggiungi al carrelloBuch. Condizione: Neu. IoT Security | Threat Detection, Analysis and Defense | Buch | Englisch | 2025 | MDPI AG | EAN 9783725853472 | Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, 36244 Bad Hersfeld, gpsr[at]libri[dot]de | Anbieter: preigu Print on Demand.