Cantitate/Preț
Produs

Foundations and Practice of Security: Lecture Notes in Computer Science, cartea 8930

Editat de Frédéric Cuppens, Joaquin Garcia-Alfaro, Nur Zincir Heywood, Philip W. L. Fong
en Limba Engleză Paperback – 16 apr 2015
This book constitutes the thoroughly refereed post-proceedings of the 7th Symposium on Foundations and Practice of Security, FPS 2014, held in Montreal, QC, Canada, in November 2014. The 18 revised full papers presented together with 5 short papers and 2 position papers were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on privacy; software security and malware analysis; network security and protocols; access control models and policy analysis; protocol verification; and cryptographic technologies.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 32688 lei

Preț vechi: 40860 lei
-20%

Puncte Express: 490

Preț estimativ în valută:
5780 6628$ 4996£

Carte tipărită la comandă

Livrare economică 27 aprilie-11 mai


Specificații

ISBN-13: 9783319170398
ISBN-10: 3319170392
Pagini: 392
Ilustrații: XIII, 375 p. 98 illus.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.59 kg
Ediția:2015
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science

Locul publicării:Cham, Switzerland

Public țintă

Research

Cuprins

Privacy.- Software security and malware analysis.- Network security and protocols.- Access control models and policy analysis.- Protocol verification.- Cryptographic technologies.

Textul de pe ultima copertă

This book constitutes the thoroughly refereed post-proceedings of the 7th Symposium on Foundations and Practice of Security, FPS 2014, held in Montreal, QC, Canada, in November 2014. The 18 revised full papers presented together with 5 short papers and 2 position papers were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on privacy; software security and malware analysis; network security and protocols; access control models and policy analysis; protocol verification; and cryptographic technologies.

Caracteristici

Includes supplementary material: sn.pub/extras