Condition: New.
Condition: As New. Unread book in perfect condition.
Condition: As New. Unread book in perfect condition.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 50.43
Quantity: Over 20 available
Add to basketCondition: New. In.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 50.43
Quantity: Over 20 available
Add to basketCondition: New. In.
Paperback. Condition: New.
Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition.
Condition: New. pp. 508.
Paperback. Condition: Brand New. 2013 edition. 499 pages. 9.00x6.00x1.00 inches. In Stock.
Taschenbuch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - The rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware,theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer's Lecture Notes in Computer Science (LNCS) series. The area of research covered by CISC has been gaining importance in recent years, and a lot of fundamental, experimental and applied work has been done, advancing the state of the art. The program of CISC 2005 covered numerous elds of research within the general scope of the conference. The International Program Committee of the conference received a total of 196 submissions (from 21 countries). Thirty-three submissions were selected for presentation as regular papers and are part of this volume. In addition to this track, the conference also hosted a short-paper track of 32 presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas and based on their ranking and strict selection criteria the papers were selected for the various tracks. We note that stricter criteria were applied to papers co-authored by program committee members. We further note that, obviously, no member took part in in uencing the ranking of his or her own submissions.
Language: English
Published by Springer International Publishing, 2013
ISBN 10: 3319035835 ISBN 13: 9783319035833
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in November 2013. The 30 full papers presented in this volume were carefully reviewed and selected from 105 submissions. In addition the book contains 6 workshop papers. The papers are organized in topical sections named: data and applications security; network and communications security; software and systems security; and cloud security and cyberspace safety.
Hardcover. Condition: Wie neu. 145x175 mm. Advances in computer science 2. 300 p. New Item. Originally foil sealed. USADO / GEBRAUCHT / USED. [Computer Science; Computer science]. ** 10% DESCUENTO/RABATT/DISCOUNT PRIMAVERA * excl. New German Books * * * * 79,15 (original price 88,00) **.
Taschenbuch. Condition: Neu. Information Security and Cryptology | First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings | Dengguo Feng (u. a.) | Taschenbuch | xii | Englisch | 2005 | Springer | EAN 9783540308553 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Taschenbuch. Condition: Neu. Cyberspace Safety and Security | 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings | Guojun Wang (u. a.) | Taschenbuch | Lecture Notes in Computer Science | xxvi | Englisch | 2013 | Springer | EAN 9783319035833 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 115.46
Quantity: Over 20 available
Add to basketCondition: New. In.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 116.47
Quantity: Over 20 available
Add to basketCondition: New. In.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 116.47
Quantity: Over 20 available
Add to basketCondition: New. In.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
£ 115.45
Quantity: Over 20 available
Add to basketCondition: New.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition.
Seller: Rarewaves USA, OSWEGO, IL, U.S.A.
Hardback. Condition: New. The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
£ 128.98
Quantity: Over 20 available
Add to basketCondition: As New. Unread book in perfect condition.
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New.
Condition: New. pp. XV, 256 9 illus. in color. 1 Edition NO-PA16APR2015-KAP.
Language: English
Published by De Gruyter, De Gruyter, 2017
ISBN 10: 3110476045 ISBN 13: 9783110476040
Seller: AHA-BUCH GmbH, Einbeck, Germany
Buch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
Condition: New. pp. 256.