Product Type
Condition
Binding
Collectible Attributes
Seller Location
Seller Rating
Seller: liu xing, Nanjing JiangSu, JS, China
paperback. Condition: Good. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.A27910 celebrity star scandal recorded collectionsFour Satisfaction guaranteed,or money back.
Seller: liu xing, Nanjing JiangSu, JS, China
paperback. Condition: Good. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.2006-2010 under a big bubble continued 2008Four Satisfaction guaranteed,or money back.
Published by Tsinghua University Press, 1991
ISBN 10: 7302125813ISBN 13: 9787302125815
Seller: liu xing, Nanjing JiangSu, JS, China
Book
paperback. Condition: New. Language:Chinese.Paperback. Publisher: Tsinghua University Press. This book comprehensively and systematically introduces the development of information security risk assessment.
Published by Tsinghua University Press. Pub. Date :2007-04, 2000
ISBN 10: 7302141452ISBN 13: 9787302141457
Seller: liu xing, Nanjing JiangSu, JS, China
Book
paperback. Condition: New. Paperback. Pub Date: 2007 04 of Pages: 130 in Publisher: Tsinghua University Press book is the information security risk assessment methodology and application of supporting materials. mainly introduces the basic concepts of information security risk assessment. principles. processes and methods given according to the national standard information security risk assessment norms two assessment case. For the convenience of the reader is familiar with and mastery of the risk assessment process. .
Published by Science Press, 2003
ISBN 10: 7030122771ISBN 13: 9787030122773
Seller: liu xing, Nanjing JiangSu, JS, China
Book
paperback. Condition: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback. Pub Date :2003-10-01 Pages: 421 Publisher: Science Press title: the security protocol Theory and method - State Key Laboratory of Information Security Information Security Series List Price: 42.00 yuan: Fan Hong. FENG Deng ed Publisher: Science Press Publication Date :2003-10-1ISBN: 9787030122773 Words: 532.000 yds: 421 Edition: 1 Binding: Paperback: Weight: Editor's Choice \ t \ t \ t \ t Summary book State Key Laboratory of Information Security Information Security Series one. The book systematically introduces the theory and method of computer network security protocols. the main contents include the basic concepts of the security agreement. defects. and may be affected by the type of attack. based on the reasoning structured approach. structured approach based on attack prove structural-based approach formalized interfaces. security protocol analysis. formal methods of security protocol design. Kerberos protocol. IPSec protocol. SSL protocol. X 509. and the SET protocol. The book can be used as a teaching reference books of the institutions of higher learning of computer. communication. and information security professional. also available in the relevant professional teaching. scientific research and engineering and technical personnel reference. Contents Chapter 1 Introduction 1.1 the cryptosystems 1.2 digital signature key management and distribution of 1.3 Hash Functions 1.4 1.5 PKI 2.3 security protocols of Chapter 2 of the Public Key Infrastructure security protocol 2.1 security protocols Overview 2.2 security protocol defects and its been attacks instance 2.4 Security Protocol Formal Analysis Summary Chapter 3 3.2 GNY logic-based reasoning structured approach 3.1 BAN logic the 3.3 AT logical 3.4 SVO logic logic 3.6 CS 3.5 Kailar logic 3.7 KG logic 3.8 Nonmonotomic logic Summary Chapter 4 attack structural-based approach 4.1 Summary Chapter 5 of the validation of the general-purpose language 4.2 single algebraic theory model 4.3 Special purpose expert system based on the proof structured approach 5.1 human-readable proof method 5.2 Paulson induction 5.3 Schneider rank function 5.4 strand space 5.5 Attacks 5.6 Rewriting limited law approximation method 5.8 invariant 5.7 Maude Analysis Summary Chapter 6. the formal language of the Security Protocol Analysis 6.1 security protocol analysis predicts: CPAL 6.2 security protocols Interface Description Language - ISL & AAPA 6.3 security protocol analysis Universal Description the language - CAPSL 6.4 security protocols security protocol compiler Casper 5.5 Points - spi integral Summary Chapter 7 formal methods of security protocol designed 7.1 Heintze. & Tygar: model and its components 7.2 Gong & Synersion: fail-stop protocol 7.3 Buttyan & Staaman simple logic 7.4 Rudolph abstract the model Summary Chapter 8 the Kerberos 8.1 Kerberos protocol Overview 8.2 bills to use the logo with the requested 8.3 message exchange 8.4 ULTRIX operating system implementations of Kerberos on Chapter 9 IPSec protocol the 9.4 IPSec the 9.1 IPSec Architecture 9.2 Security Alliance 9.3 IPSec security protocol application 1O 10.6 handshake protocol layer Chapter 11 of the state chapter SSL V3.0 10.1 SSL V3.0 Overview 10.2 SSL V3.0 10.4 Change Cipher Spec the 10.3 recording layer protocol agreement 10.5 Alert protocol X.509 11.1 X.509 v3 certificates Overview 11.2 certificate its expansion Inspection 11.5 11.3 CRL its extended 11.4 proof path algorithm supports 12.2 12.1 Background and Business requirements of Chapter 12 of the SET protocol system design 12.3 certificate management structure 12.4 certificate request protocol 12.5 Certificate Revocation 12.6 SET private extension References Author \ t \ t Digest preambleFour Satisfaction guaranteed,or money back.
paperback. Condition: New. Paperback. Pub Date: 2021-05-01 Pages: 98 Language: Chinese Publisher: China Medical Science and Technology Press. Oral Diseases External Therapy of Traditional Chinese Medicine 223 Methods/Contemporary External Therapy of Traditional Chinese Medicine Clinical Series consists of two chapters and eighteen sections.?The first chapter is an introduction. which systematically introduces the development history. common external treatment methods. mechanism of action. ideas and methods for improvin.
ISBN 10: 7521007093ISBN 13: 9787521007091
Seller: liu xing, Nanjing JiangSu, JS, China
Book
paperback. Condition: New. Paperback. Pub Date: 2021-03-01 Pages: 198 Language: Chinese Publisher: Ocean Press. At present. there is a dazzling array of related equipment for unmanned ocean observation. with different uses. models. functions and specifications. These equipment have complex functions and technical content. High. each type of equipment has its specific application space and functional positioning.?The Development and Application of Marine Unmanned Autonomous Observation Equipment series start from the tw.