Condition: New.
Condition: New.
Condition: New.
Condition: As New. Unread book in perfect condition.
Condition: New.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New.
Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition.
Condition: New.
Published by Springer-Nature New York Inc, 2020
ISBN 10: 3030317285 ISBN 13: 9783030317287
Language: English
Seller: Revaluation Books, Exeter, United Kingdom
Hardcover. Condition: Brand New. 317 pages. 9.25x6.10x9.21 inches. In Stock.
Seller: Mispah books, Redhill, SURRE, United Kingdom
Hardcover. Condition: New. New. book.
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Print on Demand.
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Print on Demand.
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. PRINT ON DEMAND.
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. PRINT ON DEMAND.
Published by Springer, Berlin|Springer International Publishing|Springer, 2021
ISBN 10: 3030317315 ISBN 13: 9783030317317
Language: English
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This textbook introduces new business concepts on cloud environments such as secure, scalable anonymity and practical payment protocols for the Internet of things and Blockchain technology. For example, when a role is granted to a user, this role may confli.
Published by Springer International Publishing, 2020
ISBN 10: 3030317285 ISBN 13: 9783030317287
Language: English
Seller: moluna, Greven, Germany
Gebunden. Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Benefits researchers through insight into new ideas based on access control and Blockchain techniquesExplains how role based access control methods can be appliedCovers the management of relationships between users, roles, and permissi.