Da: AwesomeBooks, Wallingford, Regno Unito
EUR 5,75
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrellohardcover. Condizione: Very Good. Security for Ubiquitous Computing (Wiley Series on Communications Networking & Distributed Systems) This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping.
Da: Bahamut Media, Reading, Regno Unito
EUR 5,75
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrellohardcover. Condizione: Very Good. This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping.
Da: BookOrders, Russell, IA, U.S.A.
EUR 33,57
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloSoft Cover. Condizione: Good. Soft cover. Lecture Notes in Computer Science (LNCS) 4462. Usual ex-library features. The interior is clean and tight. Binding is good. Cover shows slight wear and has library label on spine. 253 pages. Ex-Library.
Da: GuthrieBooks, Spring Branch, TX, U.S.A.
EUR 42,24
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: Very Good. We are unable to ship to Canada at this time.Ex-library paperback in very nice condition with the usual markings and attachments.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 53,70
Convertire valutaQuantità: 15 disponibili
Aggiungi al carrelloCondizione: New.
Editore: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, Berlin, 2007
ISBN 10: 3540723536 ISBN 13: 9783540723530
Lingua: Inglese
Da: Grand Eagle Retail, Bensenville, IL, U.S.A.
EUR 56,04
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: new. Paperback. With the rapid technological development of information technology, computer systems and especially embedded systems are becoming more mobile and ub- uitous. Ensuring the security of these complex and yet resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers. Although there are a number of information security conferences that look at particular aspects of the challenge, we decided to create the Workshop in Information - curity Theory and Practices (WISTP) to consider the problem as a whole. In additiontheworkshopaimsto bringtogetherresearchersandpractitionersin- lated disciplines and encourage interchange and practical co-operation between academia and industry. Although this is the ?rst ever WISTP event, the response from researchers wassuperbwithover68paperssubmittedforpotentialinclusionintheworkshop and proceedings. The submissions were reviewed by at least three reviewers, in most cases by four, and for program committee (PC) papers at least ?ve reviewers. This long and rigorous process was only possible thanks to the hard work of the PC members and additional reviewers, listed in the following pages. We would like to express our gratitude to the PC members, who were very supportive from the very beginning of this project. Thanks are also due to the additional expert reviewers who helped the PC to select the ?nal 20 workshop papers for publication in the proceedings. Of course we highly appreciate the e?orts of all the authors who submitted papers to WISTP 2007. We hope they will contribute again to a future edition and encourage others to do so. The submissions were reviewed by at least three reviewers, in most cases by four, and for program committee (PC) papers at least ?ve reviewers. Thanks are also due to the additional expert reviewers who helped the PC to select the ?nal 20 workshop papers for publication in the proceedings. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
EUR 52,61
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Editore: Springer, 2007
Da: mountain, GEORGETOWN, CO, U.S.A.
EUR 24,74
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrellopaperback. Condizione: Good. exlibrary hardcover book no dust jacket, usual library marks, has some light reader wear;
Da: California Books, Miami, FL, U.S.A.
EUR 60,08
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
EUR 58,22
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Editore: Springer Nature Switzerland AG, Cham, 2021
ISBN 10: 3030105903 ISBN 13: 9783030105907
Lingua: Inglese
Da: Grand Eagle Retail, Bensenville, IL, U.S.A.
Prima edizione
EUR 60,56
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloHardcover. Condizione: new. Hardcover. The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems.The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains.This book is open access under a CC BY license. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
EUR 57,17
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 61,91
Convertire valutaQuantità: 15 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
EUR 68,98
Convertire valutaQuantità: 4 disponibili
Aggiungi al carrelloCondizione: New.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 58,27
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 58,27
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: Chiron Media, Wallingford, Regno Unito
EUR 56,66
Convertire valutaQuantità: 10 disponibili
Aggiungi al carrelloPF. Condizione: New.
EUR 58,26
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 58,26
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
EUR 66,10
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 66,10
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: BargainBookStores, Grand Rapids, MI, U.S.A.
EUR 83,92
Convertire valutaQuantità: 5 disponibili
Aggiungi al carrelloPaperback or Softback. Condizione: New. Information Security Theory and Practices: Smart Cards, Mobile and Ubiquitous Computing Systems: First IFIP TC6/WG 8.8/WG 11.2 International Workshop, Book.
Da: SpringBooks, Berlin, Germania
Prima edizione
EUR 55,69
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloHardcover. Condizione: Very Good. 1. Auflage. Unread, with a mimimum of shelfwear. Immediately dispatched from Germany.
Da: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlanda
EUR 75,03
Convertire valutaQuantità: 15 disponibili
Aggiungi al carrelloCondizione: New.
Editore: Springer-Nature New York Inc, 2021
ISBN 10: 3030105903 ISBN 13: 9783030105907
Lingua: Inglese
Da: Revaluation Books, Exeter, Regno Unito
EUR 86,72
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloHardcover. Condizione: Brand New. 283 pages. 9.25x6.10x9.21 inches. In Stock.
EUR 93,28
Convertire valutaQuantità: 15 disponibili
Aggiungi al carrelloCondizione: New.
Editore: Springer Nature Switzerland AG, 2021
ISBN 10: 3030105903 ISBN 13: 9783030105907
Lingua: Inglese
Da: Librairie Thé à la page, Montélimar, Francia
EUR 44,90
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloCouverture rigide. Condizione: Comme neuf. Springer Nature Switzerland AG collection , 2021. 1 volume relié(s) format In-8 comme neuf.
EUR 112,19
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Editore: Springer International Publishing Jan 2021, 2021
ISBN 10: 3030105903 ISBN 13: 9783030105907
Lingua: Inglese
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 53,49
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloBuch. Condizione: Neu. Neuware -The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 284 pp. Englisch.
Editore: Springer International Publishing, 2021
ISBN 10: 3030105903 ISBN 13: 9783030105907
Lingua: Inglese
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 53,49
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloBuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems.The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains.This book is open access under a CC BY license.