9780470193396 - hardware-based computer security techniques to defeat hackers: from biometrics to quantum cryptography di dube, roger r. (19 risultati)

- Rilegato
Da: PBShop.store UK, Fairford, Regno UnitoPBShop.store UK
Contatta il venditoreVenditore con 4 stelleCondizione: Nuovo
EUR 116,12
EUR 4,81 spedizioneSpedito da Regno Unito a U.S.A.Quantità: 15 disponibili
HRD. Condizione: New. New Book. Shipped from UK. Established seller since 2000.

- Rilegato
Da: GreatBookPrices, Columbia, U.S.A.GreatBookPrices
Contatta il venditoreVenditore con 5 stelleCondizione: Nuovo
EUR 122,23
EUR 2,27 spedizioneSpedito in U.S.A.Quantità: Più di 20 disponibili
Condizione: New.

- Rilegato
Da: Brook Bookstore On Demand, Napoli, ItaliaBrook Bookstore On Demand
Contatta il venditoreVenditore con 3 stelleCondizione: Nuovo
EUR 116,37
EUR 5,50 spedizioneSpedito da Italia a U.S.A.Quantità: Più di 20 disponibili
Condizione: new.

- Rilegato
Da: GreatBookPricesUK, Woodford Green, Regno UnitoGreatBookPricesUK
Contatta il venditoreVenditore con 5 stelleCondizione: Nuovo
EUR 119,80
EUR 17,34 spedizioneSpedito da Regno Unito a U.S.A.Quantità: Più di 20 disponibili
Condizione: New.

- Rilegato
Da: THE SAINT BOOKSTORE, Southport, Regno UnitoTHE SAINT BOOKSTORE
Contatta il venditoreVenditore con 5 stelleCondizione: Nuovo
EUR 137,38
EUR 18,30 spedizioneSpedito da Regno Unito a U.S.A.Quantità: Più di 20 disponibili
Hardback. Condizione: New. New copy - Usually dispatched within 4 working days.

- Rilegato
Da: Majestic Books, Hounslow, Regno UnitoMajestic Books
Contatta il venditoreVenditore con 4 stelleCondizione: Nuovo
EUR 151,83
EUR 7,51 spedizioneSpedito da Regno Unito a U.S.A.Quantità: 3 disponibili
Condizione: New. pp. xxiii + 227 Illus.

- Rilegato
Da: Books Puddle, New York, U.S.A.Books Puddle
Contatta il venditoreVenditore con 4 stelleCondizione: Nuovo
EUR 164,91
EUR 3,43 spedizioneSpedito in U.S.A.Quantità: 3 disponibili
Condizione: New. pp. xxiii + 227.

- Rilegato
- Prima edizione
Da: Kennys Bookshop and Art Galleries Ltd., Galway, IrlandaKennys Bookshop and Art Galleries Ltd.
Contatta il venditoreVenditore con 5 stelleCondizione: Nuovo
EUR 155,78
EUR 10,50 spedizioneSpedito da Irlanda a U.S.A.Quantità: Più di 20 disponibili
Condizione: New. Presents the primary hardware-based computer security approaches in an easy to read format. Provides comprehensive coverage of the primary hardware-based computer security approaches in a single, easy to use reference. Establishes a toolbox of core security issues of different approaches. Num Pages: 256 pages, I…llustrations. BIC Classification: URY. Category: (P) Professional & Vocational. Dimension: 238 x 163 x 17. Weight in Grams: 478. . 2008. 1st Edition. Hardcover. . . . .

HardwareBased Computer Security Techniques to Defeat Hackers From Biometrics to Quantum Cryptography
- Rilegato
Da: Revaluation Books, Exeter, Regno UnitoRevaluation Books
Contatta il venditoreVenditore con 5 stelleCondizione: Nuovo
EUR 177,06
EUR 11,56 spedizioneSpedito da Regno Unito a U.S.A.Quantità: 2 disponibili
Hardcover. Condizione: Brand New. 1st edition. 256 pages. 9.25x6.00x0.75 inches. In Stock.

- Rilegato
Da: moluna, Greven, Germaniamoluna
Contatta il venditoreVenditore con 5 stelleCondizione: Nuovo
EUR 136,45
EUR 48,99 spedizioneSpedito da Germania a U.S.A.Quantità: Più di 20 disponibili
Gebunden. Condizione: New. Roger R. Dube, PhD, obtained his bachelor s degree in experimental physics from Cornell University and his PhD from Princeton University. He has held positions in both academia and the private sector. He has published in top peer-reviewed scientific publica.

- Rilegato
Da: Kennys Bookstore, Olney, U.S.A.Kennys Bookstore
Contatta il venditoreVenditore con 5 stelleCondizione: Nuovo
EUR 195,01
EUR 9,04 spedizioneSpedito in U.S.A.Quantità: Più di 20 disponibili
Condizione: New. Presents the primary hardware-based computer security approaches in an easy to read format. Provides comprehensive coverage of the primary hardware-based computer security approaches in a single, easy to use reference. Establishes a toolbox of core security issues of different approaches. Num Pages: 256 pages, I…llustrations. BIC Classification: URY. Category: (P) Professional & Vocational. Dimension: 238 x 163 x 17. Weight in Grams: 478. . 2008. 1st Edition. Hardcover. . . . . Books ship from the US and Ireland.

- Rilegato
Da: AHA-BUCH GmbH, Einbeck, GermaniaAHA-BUCH GmbH
Contatta il venditoreVenditore con 5 stelleCondizione: Nuovo
EUR 189,24
EUR 62,74 spedizioneSpedito da Germania a U.S.A.Quantità: 2 disponibili
Buch. Condizione: Neu. Neuware - Presents primary hardware-based computer security approaches in an easy-to-read toolbox formatProtecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intelligence…and Defense communities have successfully employed the use of hardware-based security devices.This book provides a road map of the hardware-based security devices that can defeat-and prevent-attacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers:\* Cryptography\* Key generation and distribution\* The qualities of security solutions\* Secure co-processors\* Secure bootstrap loading\* Secure memory management and trusted execution technology\* Trusted Platform Module (TPM)\* Field Programmable Gate Arrays (FPGAs)\* Hardware-based authentification\* Biometrics\* Tokens\* Location technologiesHardware-Based Computer Security Techniques to Defeat Hackers includes a chapter devoted entirely to showing readers how they can implement the strategies and technologies discussed. Finally, it concludes with two examples of security systems put into practice.The information and critical analysis techniques provided in this user-friendly book are invaluable for a range of professionals, including IT personnel, computer engineers, computer security specialists, electrical engineers, software engineers, and industry analysts.

- Rilegato
Da: GreatBookPricesUK, Woodford Green, Regno UnitoGreatBookPricesUK
Contatta il venditoreVenditore con 5 stelleCondizione: Usato - Come nuovo
EUR 272,69
EUR 17,34 spedizioneSpedito da Regno Unito a U.S.A.Quantità: Più di 20 disponibili
Condizione: As New. Unread book in perfect condition.

- Rilegato
Da: Mispah books, Redhill, Regno UnitoMispah books
Contatta il venditoreVenditore con 4 stelleCondizione: Usato - Come nuovo
EUR 263,17
EUR 28,90 spedizioneSpedito da Regno Unito a U.S.A.Quantità: 1 disponibili
Hardcover. Condizione: Like New. LIKE NEW. SHIPS FROM MULTIPLE LOCATIONS. book.

- Rilegato
Da: GreatBookPrices, Columbia, U.S.A.GreatBookPrices
Contatta il venditoreVenditore con 5 stelleCondizione: Usato - Come nuovo
EUR 298,54
EUR 2,27 spedizioneSpedito in U.S.A.Quantità: Più di 20 disponibili
Condizione: As New. Unread book in perfect condition.

- Rilegato
- Prima edizione
- Print on Demand
Da: Grand Eagle Retail, Bensenville, U.S.A.Grand Eagle Retail
Contatta il venditoreVenditore con 5 stelleCondizione: Nuovo
EUR 143,94
Spedizione gratuitaSpedito in U.S.A.Quantità: 1 disponibili
Hardcover. Condizione: new. Hardcover. Presents primary hardware-based computer security approaches in an easy-to-read toolbox format Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intell…igence and Defense communities have successfully employed the use of hardware-based security devices. This book provides a road map of the hardware-based security devices that can defeatand preventattacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers: Cryptography Key generation and distribution The qualities of security solutions Secure co-processors Secure bootstrap loading Secure memory management and trusted execution technology Trusted Platform Module (TPM) Field Programmable Gate Arrays (FPGAs) Hardware-based authentification Biometrics Tokens Location technologies Hardware-Based Computer Security Techniques to Defeat Hackers includes a chapter devoted entirely to showing readers how they can implement the strategies and technologies discussed. Finally, it concludes with two examples of security systems put into practice. The information and critical analysis techniques provided in this user-friendly book are invaluable for a range of professionals, including IT personnel, computer engineers, computer security specialists, electrical engineers, software engineers, and industry analysts. Presents the primary hardware-based computer security approaches in an easy to read format. Provides comprehensive coverage of the primary hardware-based computer security approaches in a single, easy to use reference. Establishes a toolbox of core security issues of different approaches. This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.

HardwareBased Computer Security Techniques to Defeat Hackers From Biometrics to Quantum Cryptography
- Rilegato
- Print on Demand
Da: Revaluation Books, Exeter, Regno UnitoRevaluation Books
Contatta il venditoreVenditore con 5 stelleCondizione: Nuovo
EUR 163,65
EUR 11,56 spedizioneSpedito da Regno Unito a U.S.A.Quantità: 2 disponibili
Hardcover. Condizione: Brand New. 1st edition. 256 pages. 9.25x6.00x0.75 inches. In Stock. This item is printed on demand.

- Rilegato
- Print on Demand
Da: THE SAINT BOOKSTORE, Southport, Regno UnitoTHE SAINT BOOKSTORE
Contatta il venditoreVenditore con 5 stelleCondizione: Nuovo
EUR 169,11
EUR 18,30 spedizioneSpedito da Regno Unito a U.S.A.Quantità: Più di 20 disponibili
Hardback. Condizione: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 508.

- Rilegato
- Prima edizione
- Print on Demand
Da: CitiRetail, Stevenage, Regno UnitoCitiRetail
Contatta il venditoreVenditore con 5 stelleCondizione: Nuovo
EUR 157,18
EUR 42,78 spedizioneSpedito da Regno Unito a U.S.A.Quantità: 1 disponibili
Hardcover. Condizione: new. Hardcover. Presents primary hardware-based computer security approaches in an easy-to-read toolbox format Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intell…igence and Defense communities have successfully employed the use of hardware-based security devices. This book provides a road map of the hardware-based security devices that can defeatand preventattacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers: Cryptography Key generation and distribution The qualities of security solutions Secure co-processors Secure bootstrap loading Secure memory management and trusted execution technology Trusted Platform Module (TPM) Field Programmable Gate Arrays (FPGAs) Hardware-based authentification Biometrics Tokens Location technologies Hardware-Based Computer Security Techniques to Defeat Hackers includes a chapter devoted entirely to showing readers how they can implement the strategies and technologies discussed. Finally, it concludes with two examples of security systems put into practice. The information and critical analysis techniques provided in this user-friendly book are invaluable for a range of professionals, including IT personnel, computer engineers, computer security specialists, electrical engineers, software engineers, and industry analysts. Presents the primary hardware-based computer security approaches in an easy to read format. Provides comprehensive coverage of the primary hardware-based computer security approaches in a single, easy to use reference. Establishes a toolbox of core security issues of different approaches. This item is printed on demand. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.