Cantitate/Preț
Produs

Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II: Lecture Notes in Computer Science, cartea 11099

Editat de Javier Lopez, Jianying Zhou, Miguel Soriano
en Limba Engleză Paperback – 8 aug 2018
The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018.

The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security. 
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 33368 lei  6-8 săpt.
  Springer International Publishing – 8 aug 2018 33368 lei  6-8 săpt.
  Springer International Publishing – 12 aug 2018 33623 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 33368 lei

Preț vechi: 41709 lei
-20% Nou

Puncte Express: 501

Preț estimativ în valută:
5904 6878$ 5155£

Carte tipărită la comandă

Livrare economică 20 ianuarie-03 februarie 26

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319989884
ISBN-10: 331998988X
Pagini: 543
Ilustrații: XIX, 571 p. 104 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.82 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Software security.- Blockchain & machine Learning.- Hardware security.- Attacks.- Malware & vulnerabilities.- Protocol security.- Privacy (I).- CPS and IoT security.- Mobile security.- Database & web security.- Cloud security.- Applied crypto (I).- Privacy (II).- Multi-party computation.- SDN security.- Applied crypto (II).