Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 85,45
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
EUR 80,12
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: New. pp. 500.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 74,91
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Condizione: New. pp. 500.
EUR 77,57
Quantità: 10 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
EUR 74,92
Quantità: 1 disponibili
Aggiungi al carrelloPaperback / softback. Condizione: New. New copy - Usually dispatched within 4 working days.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 83,85
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: Revaluation Books, Exeter, Regno Unito
EUR 111,77
Quantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. reprint edition. 500 pages. 10.00x7.01x1.18 inches. In Stock.
EUR 29,90
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: Hervorragend. Zustand: Hervorragend | Seiten: 500 | Sprache: Englisch | Produktart: Bücher | This book gathers the latest research with case studies in secure computing from many researchers. It compiles the recent work and findings through case studies, where the growing security attacks and countermeasures in the mobile and networking world has been explained, along with other pertinent security issues with the technology of the application itself. It discusses the challenges faced and solutions proposed by different researchers in this area.
EUR 29,90
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: Sehr gut. Zustand: Sehr gut | Seiten: 500 | Sprache: Englisch | Produktart: Bücher | This book gathers the latest research with case studies in secure computing from many researchers. It compiles the recent work and findings through case studies, where the growing security attacks and countermeasures in the mobile and networking world has been explained, along with other pertinent security issues with the technology of the application itself. It discusses the challenges faced and solutions proposed by different researchers in this area.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 127,54
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: Mispah books, Redhill, SURRE, Regno Unito
EUR 118,10
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: Like New. Like New. book.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 148,83
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: As New. Unread book in perfect condition.
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: New.
EUR 214,82
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 212,53
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 214,81
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: New.
Da: Revaluation Books, Exeter, Regno Unito
EUR 276,96
Quantità: 2 disponibili
Aggiungi al carrelloHardcover. Condizione: Brand New. 1st edition. 500 pages. 10.00x7.25x1.25 inches. In Stock.
Da: PBShop.store US, Wood Dale, IL, U.S.A.
EUR 93,26
Quantità: Più di 20 disponibili
Aggiungi al carrelloPAP. Condizione: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Da: PBShop.store UK, Fairford, GLOS, Regno Unito
EUR 85,06
Quantità: Più di 20 disponibili
Aggiungi al carrelloPAP. Condizione: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Da: Biblios, Frankfurt am main, HESSE, Germania
EUR 89,12
Quantità: 4 disponibili
Aggiungi al carrelloCondizione: New. PRINT ON DEMAND pp. 500.
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
EUR 85,33
Quantità: 5 disponibili
Aggiungi al carrelloPaperback / softback. Condizione: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days.
Da: moluna, Greven, Germania
EUR 64,47
Quantità: Più di 20 disponibili
Aggiungi al carrelloKartoniert / Broschiert. Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Dr. Biju Issac is a senior lecturer at the School of Computing, Teesside University, United Kingdom, and has more than 15 years of academic experience with higher education in India, Malaysia, and the United Kingdom. He earned a PhD in n.
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 107,69
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - In today's age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies.This book examines the growing security attacks and countermeasures in the stand-alone and networking worlds, along with other pertinent security issues. The many case studies capture a truly wide range of secure computing applications. Surveying the common elements in computer security attacks and defenses, the book:Describes the use of feature selection and fuzzy logic in a decision tree model for intrusion detectionIntroduces a set of common fuzzy-logic-based security risk estimation techniques with examplesProposes a secure authenticated multiple-key establishment protocol for wireless sensor networksInvestigates various malicious activities associated with cloud computing and proposes some countermeasuresExamines current and emerging security threats in long-term evolution backhaul and core networksSupplies a brief introduction to application-layer denial-of-service (DoS) attacksIllustrating the security challenges currently facing practitioners, this book presents powerful security solutions proposed by leading researchers in the field. The examination of the various case studies will help to develop the practical understanding required to stay one step ahead of the security threats on the horizon.This book will help those new to the field understand how to mitigate security threats. It will also help established practitioners fine-tune their approach to establishing robust and resilient security for next-generation computing systems.
Da: PBShop.store UK, Fairford, GLOS, Regno Unito
EUR 219,75
Quantità: Più di 20 disponibili
Aggiungi al carrelloHRD. Condizione: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Da: PBShop.store US, Wood Dale, IL, U.S.A.
EUR 232,47
Quantità: Più di 20 disponibili
Aggiungi al carrelloHRD. Condizione: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Da: moluna, Greven, Germania
EUR 212,33
Quantità: Più di 20 disponibili
Aggiungi al carrelloGebunden. Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Dr. Biju Issac is a senior lecturer at the School of Computing, Teesside University, United Kingdom, and has more than 15 years of academic experience with higher education in India, Malaysia, and the United Kingdom. He earned a PhD in n.
Da: preigu, Osnabrück, Germania
EUR 220,10
Quantità: 5 disponibili
Aggiungi al carrelloBuch. Condizione: Neu. Case Studies in Secure Computing | Achievements and Trends | Biju Issac (u. a.) | Buch | Einband - fest (Hardcover) | Englisch | 2014 | Auerbach Publications | EAN 9781482207064 | Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, 36244 Bad Hersfeld, gpsr[at]libri[dot]de | Anbieter: preigu Print on Demand.
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 264,97
Quantità: 1 disponibili
Aggiungi al carrelloBuch. Condizione: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - This book gathers the latest research with case studies in secure computing from many researchers. It compiles the recent work and findings through case studies, where the growing security attacks and countermeasures in the mobile and networking world has been explained, along with other pertinent security issues with the technology of the application itself. It discusses the challenges faced and solutions proposed by different researchers in this area.