EUR 2,98
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: Good. This is an ex-library book and may have the usual library/used-book markings inside.This book has hardback covers. In good all round condition. No dust jacket. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,550grams, ISBN:9780387952130.
Lingua: Inglese
Editore: Springer-Verlag New York Inc., 2002
ISBN 10: 0387952136 ISBN 13: 9780387952130
Da: Ammareal, Morangis, Francia
EUR 5,84
Quantità: 1 disponibili
Aggiungi al carrelloHardcover. Condizione: Très bon. Ancien livre de bibliothèque. Légères traces d'usure sur la couverture. Edition 2002. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Very good. Former library book. Slight signs of wear on the cover. Edition 2002. Ammareal gives back up to 15% of this item's net price to charity organizations.
Condizione: new.
Condizione: New. pp. 240, Maps.
EUR 27,30
Quantità: 4 disponibili
Aggiungi al carrelloCondizione: New. pp. 240 Illus., Maps.
EUR 28,16
Quantità: 4 disponibili
Aggiungi al carrelloCondizione: New. pp. 240.
Condizione: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service.
Condizione: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Lingua: Inglese
Editore: Springer, New York and Berlin, 2002
ISBN 10: 0387952136 ISBN 13: 9780387952130
Da: CURIO, Cleethorpes, North East Lincolnshire, Regno Unito
Prima edizione
EUR 17,83
Quantità: 4 disponibili
Aggiungi al carrelloHardcover. Condizione: Very Good. No Jacket. 1st Edition. First Edition / First Print (number line on copyright page 9 8 7 6 5 4 3 2 1). Hardback copy in pictorial boards, no dustjacket as issued. 209pp. B/w charts and graphs throughout. Light wear to board edges. A fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use. (22/1).
EUR 51,66
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
EUR 53,99
Quantità: 1 disponibili
Aggiungi al carrelloBrand new book. Fast ship. Please provide full street address as we are not able to ship to P O box address.
EUR 52,22
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Condizione: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service.
Condizione: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Hardcover. Condizione: New.
EUR 63,91
Quantità: 3 disponibili
Aggiungi al carrelloBrand new book. Fast ship. Please provide full street address as we are not able to ship to P O box address.
EUR 61,58
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
EUR 58,61
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
EUR 58,61
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
EUR 55,90
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Lingua: Inglese
Editore: Springer-Verlag New York Inc., 2012
ISBN 10: 146126538X ISBN 13: 9781461265382
Da: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlanda
EUR 68,39
Quantità: 15 disponibili
Aggiungi al carrelloCondizione: New. Num Pages: 209 pages, biography. BIC Classification: PBCN; UR; UT. Category: (P) Professional & Vocational. Dimension: 234 x 156 x 12. Weight in Grams: 373. . 2012. Softcover reprint of the original 1st ed. 2002. Paperback. . . . .
Lingua: Inglese
Editore: Springer-Verlag New York Inc., 2002
ISBN 10: 0387952136 ISBN 13: 9780387952130
Da: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlanda
EUR 69,54
Quantità: 15 disponibili
Aggiungi al carrelloCondizione: New. Presents a framework for network security, aimed at the military, government, industry, and academia network personnel. This book is meant for researchers and graduate students in computer science and engineering, specializing in network security, practitioners, and architects and policy makers for large-scale network infrastructure. Num Pages: 209 pages, biography. BIC Classification: PBKS; URY; UTN; UYA. Category: (P) Professional & Vocational; (UP) Postgraduate, Research & Scholarly; (XV) Technical / Manuals. Dimension: 235 x 155 x 18. Weight in Grams: 526. . 2002. Hardback. . . . .
EUR 66,47
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Lingua: Inglese
Editore: Springer-Verlag New York Inc., 2012
ISBN 10: 146126538X ISBN 13: 9781461265382
Da: Kennys Bookstore, Olney, MD, U.S.A.
Condizione: New. Num Pages: 209 pages, biography. BIC Classification: PBCN; UR; UT. Category: (P) Professional & Vocational. Dimension: 234 x 156 x 12. Weight in Grams: 373. . 2012. Softcover reprint of the original 1st ed. 2002. Paperback. . . . . Books ship from the US and Ireland.
Lingua: Inglese
Editore: Springer-Verlag New York Inc., 2002
ISBN 10: 0387952136 ISBN 13: 9780387952130
Da: Kennys Bookstore, Olney, MD, U.S.A.
Condizione: New. Presents a framework for network security, aimed at the military, government, industry, and academia network personnel. This book is meant for researchers and graduate students in computer science and engineering, specializing in network security, practitioners, and architects and policy makers for large-scale network infrastructure. Num Pages: 209 pages, biography. BIC Classification: PBKS; URY; UTN; UYA. Category: (P) Professional & Vocational; (UP) Postgraduate, Research & Scholarly; (XV) Technical / Manuals. Dimension: 235 x 155 x 18. Weight in Grams: 526. . 2002. Hardback. . . . . Books ship from the US and Ireland.
EUR 84,40
Quantità: 1 disponibili
Aggiungi al carrelloHardcover. Condizione: Like New. Like New. book.
EUR 16,92
Quantità: 1 disponibili
Aggiungi al carrelloGebunden. Condizione: Gut. Gebraucht - Gut Verlagsmängelex., XXVI, 209 p. 91 illus This new book outlines and establishes a comprehensive framework for network security which unifies the many definitions of network security and enables users from all sectors to employ the same framework to discuss, compare, and implement network security. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use. An integrated, security-on-demand system is first modeled, then simulated extensively on a large-scale asynchronous distributed simulator, and finally, the performance results are detailed.
Lingua: Inglese
Editore: Springer New York, Springer US Apr 2002, 2002
ISBN 10: 0387952136 ISBN 13: 9780387952130
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 53,49
Quantità: 2 disponibili
Aggiungi al carrelloBuch. Condizione: Neu. Neuware -As e-commerce becomes the norm of business transactions and information be comes an essential commodity, it is vital that extensive efforts be made to examine and rectify the problems with the underlying architectures, processes, methods, that are involved in providing and and tools, as well as organizational structures, utilizing services relating to information technology. Such a holistic view of the relevant structures is required in order to identify all of the key aspects that can affect network security. Unfortunately, today's systems and practices, although they have proved to be useful and become widespread, contain significant unnecessary complexity. This complexity provides many loopholes that make systems and practices vulnerable to malicious attacks by hackers as well as by individual and organized criminals. FUrther, there are enormous risks due to malfunction of the systems. The holes in the network system cannot simply be plugged up by the use of cryptography and firewalls. While many changes need to be made in operating systems and system software with respect to security, this alone does not solve the problem. The problems cannot be solved by addressing only a single key aspect of network security. A holistic approach is required. Sumit Ghosh has provided in this book such a holistic view of the area of network security. Thus, it is a most welcome contribution.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 240 pp. Englisch.
EUR 56,97
Quantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - As e-commerce becomes the norm of business transactions and information be comes an essential commodity, it is vital that extensive efforts be made to examine and rectify the problems with the underlying architectures, processes, methods, that are involved in providing and and tools, as well as organizational structures, utilizing services relating to information technology. Such a holistic view of the relevant structures is required in order to identify all of the key aspects that can affect network security. Unfortunately, today's systems and practices, although they have proved to be useful and become widespread, contain significant unnecessary complexity. This complexity provides many loopholes that make systems and practices vulnerable to malicious attacks by hackers as well as by individual and organized criminals. FUrther, there are enormous risks due to malfunction of the systems. The holes in the network system cannot simply be plugged up by the use of cryptography and firewalls. While many changes need to be made in operating systems and system software with respect to security, this alone does not solve the problem. The problems cannot be solved by addressing only a single key aspect of network security. A holistic approach is required. Sumit Ghosh has provided in this book such a holistic view of the area of network security. Thus, it is a most welcome contribution.
Lingua: Inglese
Editore: Springer New York, Springer US, 2002
ISBN 10: 0387952136 ISBN 13: 9780387952130
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 58,55
Quantità: 1 disponibili
Aggiungi al carrelloBuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - As e-commerce becomes the norm of business transactions and information be comes an essential commodity, it is vital that extensive efforts be made to examine and rectify the problems with the underlying architectures, processes, methods, that are involved in providing and and tools, as well as organizational structures, utilizing services relating to information technology. Such a holistic view of the relevant structures is required in order to identify all of the key aspects that can affect network security. Unfortunately, today's systems and practices, although they have proved to be useful and become widespread, contain significant unnecessary complexity. This complexity provides many loopholes that make systems and practices vulnerable to malicious attacks by hackers as well as by individual and organized criminals. FUrther, there are enormous risks due to malfunction of the systems. The holes in the network system cannot simply be plugged up by the use of cryptography and firewalls. While many changes need to be made in operating systems and system software with respect to security, this alone does not solve the problem. The problems cannot be solved by addressing only a single key aspect of network security. A holistic approach is required. Sumit Ghosh has provided in this book such a holistic view of the area of network security. Thus, it is a most welcome contribution.