Condition: very good. Gut/Very good: Buch bzw. Schutzumschlag mit wenigen Gebrauchsspuren an Einband, Schutzumschlag oder Seiten. / Describes a book or dust jacket that does show some signs of wear on either the binding, dust jacket or pages.
Published by Taibei Shi : Han xue yan jiu zhong xin, Minguo 100, 2011
ISBN 10: 9576785421 ISBN 13: 9789576785429
Seller: GuthrieBooks, Spring Branch, TX, U.S.A.
Paperback. Condition: Very Good. Trade Paperback. Very Good. Clean, tight.75 p. : col. ill. ; 28 cm.
Language: English
Published by Foreign Languages Press, 2015
ISBN 10: 711908576X ISBN 13: 9787119085760
Seller: Approximations, Ottawa, ON, Canada
First Edition
Soft cover. Condition: Very Good. 1st Edition. Trade paperback with French flaps. Light bump to front lower corner. Few other light indications of prior handling. 235pp. Octavo.
Paperback. Condition: Very Good. Ex-library paperback in very nice condition with the usual markings and attachments. Except for library markings, interior clean and unmarked. Tight binding.
Paperback. Condition: Very Good. Ex-library paperback in very nice condition with the usual markings and attachments.
paperback. Condition: Very Good. Information and Communications Security: 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings: 10631 (Lecture Notes in Computer Science, 10631) This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping.
paperback. Condition: Very Good. This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping.
Condition: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service.
Condition: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New.
Condition: New.
Condition: New.
Paperback or Softback. Condition: New. Cryptography and Coding: 13th Ima International Conference, Imacc 2011, Oxford, Uk, December 2011, Proceedings. Book.
Condition: New.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition.
Condition: New.
Condition: New.
Condition: As New. Unread book in perfect condition.
Condition: As New. Unread book in perfect condition.
Condition: New. pp. 440.
Condition: As New. Unread book in perfect condition.
Condition: New. pp. 440 Illus.
Condition: As New. Unread book in perfect condition.
Condition: As New. Unread book in perfect condition.
Condition: New.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 44.30
Quantity: Over 20 available
Add to basketCondition: New. In.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 44.60
Quantity: Over 20 available
Add to basketCondition: New. In.
Seller: Chiron Media, Wallingford, United Kingdom
PF. Condition: New.
Paperback. Condition: New.
Language: English
Published by Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, Berlin, 2010
ISBN 10: 3642145965 ISBN 13: 9783642145964
Seller: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condition: new. Paperback. This volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international conference on the theory, technologies and applications of trusted systems. It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference was to bring academic and industrial researchers, designers and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The program consisted of 3 invited talks and 20 contributed papers. The - vited speakerswere Wenchang Shi (Renmin Universityof China), DavidWooten (Microsoft) and Scott Rotondo (Sun Microsystems). The ?rst speaker provided a paper, which is included in these proceedings. Special thanks are due to these speakers. The contributed talks were arranged with two main tracks, one devoted to academic aspects of trusted computing systems (addressed by these proce- ings), and the other devoted to industrial aspects. The contributed papers were selected out of 42 submissions from 13 countries. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion. It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.