£ 9.66
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. Abdali, Mr. Mohamed A. (illustrator). In.
Published by Oxford University Press, 1996
ISBN 10: 0195634705 ISBN 13: 9780195634709
Language: English
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. pp. xxiii + 469 Illus., Maps.
More buying choices from other sellers on AbeBooks
New offers from £ 15.06
Used offers from £ 41.77
Also find Hardcover First Edition
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
£ 34.12
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
More buying choices from other sellers on AbeBooks
New offers from £ 34.12
Used offers from £ 38.30
Also find Softcover
Published by LAP LAMBERT Academic Publishing, 2019
ISBN 10: 6200219575 ISBN 13: 9786200219572
Language: English
Seller: Books Puddle, New York, NY, U.S.A.
£ 46.47
Convert currencyQuantity: 4 available
Add to basketCondition: New.
Published by Editions Notre Savoir, 2023
ISBN 10: 6206438562 ISBN 13: 9786206438564
Language: French
Seller: moluna, Greven, Germany
£ 31.71
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Published by LAP LAMBERT Academic Publishing, 2016
ISBN 10: 3659953997 ISBN 13: 9783659953996
Language: English
Seller: Books Puddle, New York, NY, U.S.A.
£ 61.73
Convert currencyQuantity: 4 available
Add to basketCondition: New.
Published by LAP LAMBERT Academic Publishing Jan 2024, 2024
ISBN 10: 6207459318 ISBN 13: 9786207459315
Language: English
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
£ 39.09
Convert currencyQuantity: 2 available
Add to basketTaschenbuch. Condition: Neu. Neuware -Software bugs that result in memory corruption are a common and dangerous feature of systems developed in certain programming languages. Such bugs are security vulnerabilities if they can be leveraged by an attacker to trigger the execution of malicious code. Determining if such a possibility exists is a time consuming process and requires technical expertise in a number of areas. Often the only way to be sure that a bug is in fact exploitable by an attacker is to build a complete exploit. It is this process that we seek to automate. We present a novel algorithm that integrates data-flow analysis and a decision procedure with the aim of automatically building exploits. The exploits we generate are constructed to hijack the control flow of an application and redirect it to malicious code.Books on Demand GmbH, Überseering 33, 22297 Hamburg 76 pp. Englisch.
Published by LAP LAMBERT Academic Publishing Aug 2023, 2023
ISBN 10: 6206767094 ISBN 13: 9786206767091
Language: English
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
£ 39.09
Convert currencyQuantity: 2 available
Add to basketTaschenbuch. Condition: Neu. Neuware -The growth of the Internet as a vehicle for secure communication and electronic commerce has brought cryptographic processing performance to the forefront of high throughput system design. Cryptography provides the mechanisms necessary to implement accountability, accuracy, and confidentiality in communication. This trend will be further underscored with the widespread adoption of secure protocols such as secure IP (IPSEC) and virtual private networks (VPNs). Efficient cryptographic processing, therefore, will become increasingly vital to good system performance.In this book, we explore hardware/software-design techniques to improve the performance of secret-key cipher algorithms. We introduce new instructions that improve the efficiency of the analyzed algorithms, and further introduce the Crypto Maniac processor, a fast and flexible co-processor for cryptographic workloads.Our first approach is to add instruction set support for fast substitutions, general permutations, rotates, and modular arithmetic. Our analyses of the original and optimized algorithms suggest future directions for the design of high-performance programmable cryptographic processors.Books on Demand GmbH, Überseering 33, 22297 Hamburg 60 pp. Englisch.
Published by LAP LAMBERT Academic Publishing Okt 2016, 2016
ISBN 10: 3659967173 ISBN 13: 9783659967177
Language: English
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
£ 44.43
Convert currencyQuantity: 2 available
Add to basketTaschenbuch. Condition: Neu. Neuware -In a competitive environment, strategy should take you to a different position stands out from the crowd. This study aims to provide a picture of how relationship quality can influence customer loyalty in the business-to-business context. This study follows the composite loyalty approach providing both behavioral aspects (purchase Intentions) and attitudinal loyalty in order to fully explain the concept of customer loyalty. A literature search is undertaken in the areas of customer loyalty, relationship quality, perceived service quality, trust, commitment and satisfaction. This study then seeks to address the following research issues: Does relationship quality influence customer loyalty Which relationship quality dimensions influence each of the components of customer loyalty This study was conducted in a business-to-business setting of the insurance industry in Egypt As the results show, to maintain customer loyalty to the supplier, a supplier may enhance all four aspects of relationship quality which are trust, commitment, satisfaction and service quality. Specifically, in order to enhance customer¿s trust, a supplier should promote the customer¿s trust.Books on Demand GmbH, Überseering 33, 22297 Hamburg 100 pp. Englisch.
Published by Editions Notre Savoir, 2025
ISBN 10: 6208991757 ISBN 13: 9786208991753
Language: French
Seller: Best Price, Torrance, CA, U.S.A.
£ 45.60
Convert currencyQuantity: 2 available
Add to basketCondition: New. SUPER FAST SHIPPING.
Published by Editions Notre Savoir, 2025
ISBN 10: 6203901466 ISBN 13: 9786203901467
Language: French
Seller: Best Price, Torrance, CA, U.S.A.
£ 45.60
Convert currencyQuantity: 2 available
Add to basketCondition: New. SUPER FAST SHIPPING.
Published by Magnum Publishing LLC, 2016
ISBN 10: 1682502740 ISBN 13: 9781682502747
Language: English
Seller: Romtrade Corp., STERLING HEIGHTS, MI, U.S.A.
£ 87.92
Convert currencyQuantity: 1 available
Add to basketCondition: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
More buying choices from other sellers on AbeBooks
New offers from £ 87.92
Used offers from £ 180
Also find Hardcover
Published by Editions Notre Savoir Feb 2024, 2024
ISBN 10: 6207207343 ISBN 13: 9786207207343
Language: French
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
£ 39.09
Convert currencyQuantity: 2 available
Add to basketTaschenbuch. Condition: Neu. Neuware -Les bogues logiciels qui entraînent une corruption de la mémoire sont une caractéristique courante et dangereuse des systèmes développés dans certains langages de programmation. Ces bogues constituent des failles de sécurité s'ils peuvent être exploités par un pirate pour déclencher l'exécution d'un code malveillant. Déterminer si une telle possibilité existe est un processus qui prend du temps et nécessite une expertise technique dans un certain nombre de domaines. Souvent, la seule façon de s'assurer qu'un bogue est effectivement exploitable par un attaquant est de créer un exploit complet. C'est ce processus que nous cherchons à automatiser. Nous présentons un nouvel algorithme qui intègre l'analyse du flux de données et une procédure de décision dans le but de construire automatiquement des exploits. Les exploits que nous générons sont construits pour détourner le flux de contrôle d'une application et le rediriger vers un code malveillant.Books on Demand GmbH, Überseering 33, 22297 Hamburg 76 pp. Französisch.
Published by Springer International Publishing, 2023
ISBN 10: 3030990818 ISBN 13: 9783030990817
Language: English
Seller: Buchpark, Trebbin, Germany
£ 86.86
Convert currencyQuantity: 1 available
Add to basketCondition: Hervorragend. Zustand: Hervorragend | Sprache: Englisch | Produktart: Bücher.
More buying choices from other sellers on AbeBooks
New offers from £ 114.13
Used offers from £ 95.42
Also find Softcover
Published by VDM Verlag Dr. Mueller Aktiengesellschaft & Co. KG, 2012
ISBN 10: 3848496054 ISBN 13: 9783848496051
Language: English
Seller: Books Puddle, New York, NY, U.S.A.
£ 91.34
Convert currencyQuantity: 4 available
Add to basketCondition: New. pp. 240.
More buying choices from other sellers on AbeBooks
New offers from £ 78.96
Used offers from £ 135
Also find Softcover
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 114.13
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. In.
Seller: Best Price, Torrance, CA, U.S.A.
£ 45.60
Convert currencyQuantity: 1 available
Add to basketCondition: New. SUPER FAST SHIPPING.
Seller: Best Price, Torrance, CA, U.S.A.
£ 45.60
Convert currencyQuantity: 1 available
Add to basketCondition: New. SUPER FAST SHIPPING.
Published by Verlag Unser Wissen Feb 2024, 2024
ISBN 10: 6207207270 ISBN 13: 9786207207275
Language: German
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
£ 39.09
Convert currencyQuantity: 2 available
Add to basketTaschenbuch. Condition: Neu. Neuware -Softwarefehler, die zu einer Beschädigung des Speichers führen, sind ein häufiges und gefährliches Merkmal von Systemen, die in bestimmten Programmiersprachen entwickelt wurden. Solche Fehler sind Sicherheitslücken, wenn sie von einem Angreifer ausgenutzt werden können, um die Ausführung von bösartigem Code auszulösen. Die Feststellung, ob eine solche Möglichkeit besteht, ist ein zeitraubender Prozess und erfordert technisches Fachwissen in einer Reihe von Bereichen. Oft ist die einzige Möglichkeit, um sicher zu sein, dass ein Fehler tatsächlich von einem Angreifer ausgenutzt werden kann, die Entwicklung eines vollständigen Exploits. Genau diesen Prozess wollen wir automatisieren. Wir stellen einen neuartigen Algorithmus vor, der die Datenflussanalyse und ein Entscheidungsverfahren mit dem Ziel der automatischen Erstellung von Exploits integriert. Die von uns erstellten Exploits sind so konstruiert, dass sie den Kontrollfluss einer Anwendung kapern und ihn zu bösartigem Code umleiten.Books on Demand GmbH, Überseering 33, 22297 Hamburg 80 pp. Deutsch.
Published by Verlag Unser Wissen Sep 2023, 2023
ISBN 10: 6206438546 ISBN 13: 9786206438540
Language: German
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
£ 39.09
Convert currencyQuantity: 2 available
Add to basketTaschenbuch. Condition: Neu. Neuware -Das Wachstum des Internets als Mittel für sichere Kommunikation und elektronischen Handel hat die kryptografische Verarbeitungsleistung in den Vordergrund der Systementwicklung mit hohem Durchsatz gerückt. Die Kryptographie bietet die notwendigen Mechanismen für die Umsetzung von Verantwortlichkeit, Genauigkeit und Vertraulichkeit in der Kommunikation.Dieser Trend wird durch die weit verbreitete Einführung sicherer Protokolle wie Secure IP (IPSEC) und virtuelle private Netze (VPN) noch verstärkt. Eine effiziente kryptografische Verarbeitung wird daher für eine gute Systemleistung immer wichtiger werden.In diesem Buch untersuchen wir Hardware-/Software-Designtechniken zur Verbesserung der Leistung von Verschlüsselungsalgorithmen mit geheimen Schlüsseln. Wir führen neue Befehle ein, die die Effizienz der analysierten Algorithmen verbessern, und stellen den Crypto Maniac-Prozessor vor, einen schnellen und flexiblen Koprozessor für kryptografische Arbeitslasten.Unser erster Ansatz besteht darin, den Befehlssatz um Unterstützung für schnelle Substitutionen, allgemeine Permutationen, Rotationen und modulare Arithmetik zu erweitern. Unsere Analysen der ursprünglichen und optimierten Algorithmen zeigen zukünftige Richtungen für das Design von hochleistungsfähigen programmierbaren kryptographischen Prozessoren auf.Books on Demand GmbH, Überseering 33, 22297 Hamburg 68 pp. Deutsch.
Published by Ediciones Nuestro Conocimiento, 2023
ISBN 10: 6206438554 ISBN 13: 9786206438557
Language: Spanish
Seller: moluna, Greven, Germany
£ 31.71
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Published by Edições Nosso Conhecimento, 2023
ISBN 10: 6206438589 ISBN 13: 9786206438588
Language: Portuguese
Seller: moluna, Greven, Germany
£ 31.71
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
£ 31.71
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Seller: Best Price, Torrance, CA, U.S.A.
£ 45.60
Convert currencyQuantity: 2 available
Add to basketCondition: New. SUPER FAST SHIPPING.
Seller: Best Price, Torrance, CA, U.S.A.
£ 45.60
Convert currencyQuantity: 2 available
Add to basketCondition: New. SUPER FAST SHIPPING.
Published by Edições Nosso Conhecimento, 2025
ISBN 10: 6208991781 ISBN 13: 9786208991784
Language: Portuguese
Seller: Best Price, Torrance, CA, U.S.A.
£ 45.60
Convert currencyQuantity: 1 available
Add to basketCondition: New. SUPER FAST SHIPPING.
Published by Edições Nosso Conhecimento, 2025
ISBN 10: 6203901482 ISBN 13: 9786203901481
Language: Portuguese
Seller: Best Price, Torrance, CA, U.S.A.
£ 45.60
Convert currencyQuantity: 1 available
Add to basketCondition: New. SUPER FAST SHIPPING.
Published by Wydawnictwo Nasza Wiedza, 2025
ISBN 10: 6203901474 ISBN 13: 9786203901474
Language: Polish
Seller: Best Price, Torrance, CA, U.S.A.
£ 45.60
Convert currencyQuantity: 2 available
Add to basketCondition: New. SUPER FAST SHIPPING.
Published by Edizioni Sapienza Feb 2024, 2024
ISBN 10: 6207207351 ISBN 13: 9786207207350
Language: Italian
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
£ 39.09
Convert currencyQuantity: 2 available
Add to basketTaschenbuch. Condition: Neu. Neuware -I bug del software che causano la corruzione della memoria sono una caratteristica comune e pericolosa dei sistemi sviluppati in alcuni linguaggi di programmazione. Tali bug sono vulnerabilità di sicurezza se possono essere sfruttati da un aggressore per attivare l'esecuzione di codice dannoso. Determinare se esiste questa possibilità è un processo che richiede tempo e competenze tecniche in diverse aree. Spesso l'unico modo per essere certi che un bug sia effettivamente sfruttabile da un aggressore è costruire un exploit completo. È questo processo che cerchiamo di automatizzare. Presentiamo un nuovo algoritmo che integra l'analisi dei flussi di dati e una procedura decisionale con l'obiettivo di costruire automaticamente degli exploit. Gli exploit che generiamo sono costruiti per dirottare il flusso di controllo di un'applicazione e reindirizzarlo verso codice dannoso.Books on Demand GmbH, Überseering 33, 22297 Hamburg 76 pp. Italienisch.
Published by Ediciones Nuestro Conocimiento Feb 2024, 2024
ISBN 10: 6207207335 ISBN 13: 9786207207336
Language: Spanish
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
£ 39.09
Convert currencyQuantity: 2 available
Add to basketTaschenbuch. Condition: Neu. Neuware -Los errores de software que provocan la corrupción de la memoria son una característica común y peligrosa de los sistemas desarrollados en determinados lenguajes de programación. Estos fallos son vulnerabilidades de seguridad si pueden ser aprovechados por un atacante para desencadenar la ejecución de código malicioso. Determinar si existe tal posibilidad es un proceso que lleva tiempo y requiere conocimientos técnicos en varias áreas. A menudo, la única forma de estar seguro de que un fallo puede ser aprovechado por un atacante es construir un exploit completo. Intentamos automatizar este proceso. Presentamos un algoritmo novedoso que integra el análisis del flujo de datos y un procedimiento de decisión con el objetivo de construir automáticamente exploits. Los exploits que generamos se construyen para secuestrar el flujo de control de una aplicación y redirigirlo a código malicioso.Books on Demand GmbH, Überseering 33, 22297 Hamburg 76 pp. Spanisch.