ICT Systems Security and Privacy Protection: IFIP Advances in Information and Communication Technology
Editat de Norbert Meyer, Anna Grocholewska-Czury¿oen Limba Engleză Paperback – 25 apr 2025
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (1) | 778.27 lei 39-44 zile | |
| Springer – 25 apr 2025 | 778.27 lei 39-44 zile | |
| Hardback (1) | 741.61 lei 6-8 săpt. | |
| Springer – 24 apr 2024 | 741.61 lei 6-8 săpt. |
Din seria IFIP Advances in Information and Communication Technology
- 20%
Preț: 555.24 lei - 20%
Preț: 327.36 lei -
Preț: 382.30 lei - 20%
Preț: 323.23 lei - 20%
Preț: 327.99 lei - 20%
Preț: 526.97 lei - 20%
Preț: 424.11 lei - 15%
Preț: 624.01 lei - 20%
Preț: 1116.37 lei - 18%
Preț: 909.08 lei - 20%
Preț: 1232.88 lei - 20%
Preț: 689.95 lei - 20%
Preț: 505.27 lei - 15%
Preț: 613.18 lei - 20%
Preț: 957.62 lei - 20%
Preț: 619.71 lei - 18%
Preț: 911.54 lei - 20%
Preț: 1327.97 lei - 15%
Preț: 611.23 lei - 18%
Preț: 914.70 lei - 20%
Preț: 1237.63 lei - 18%
Preț: 1180.37 lei - 20%
Preț: 623.18 lei - 20%
Preț: 620.31 lei - 18%
Preț: 1216.83 lei - 20%
Preț: 1232.08 lei - 20%
Preț: 952.00 lei - 20%
Preț: 1848.88 lei - 15%
Preț: 611.23 lei - 18%
Preț: 1183.12 lei - 18%
Preț: 1171.97 lei - 18%
Preț: 916.93 lei - 20%
Preț: 968.03 lei - 20%
Preț: 2110.89 lei - 20%
Preț: 634.64 lei - 20%
Preț: 614.65 lei - 20%
Preț: 640.33 lei - 20%
Preț: 947.83 lei - 20%
Preț: 623.22 lei - 20%
Preț: 1227.82 lei - 20%
Preț: 952.62 lei - 20%
Preț: 953.70 lei - 15%
Preț: 639.43 lei - 20%
Preț: 635.02 lei - 20%
Preț: 624.40 lei - 15%
Preț: 622.13 lei - 20%
Preț: 1224.53 lei - 18%
Preț: 908.24 lei
Preț: 778.27 lei
Preț vechi: 972.83 lei
-20%
Puncte Express: 1167
Preț estimativ în valută:
137.60€ • 162.19$ • 120.18£
137.60€ • 162.19$ • 120.18£
Carte tipărită la comandă
Livrare economică 06-11 aprilie
Specificații
ISBN-13: 9783031563287
ISBN-10: 303156328X
Pagini: 392
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.59 kg
Editura: Springer
Seria IFIP Advances in Information and Communication Technology
ISBN-10: 303156328X
Pagini: 392
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.59 kg
Editura: Springer
Seria IFIP Advances in Information and Communication Technology
Cuprins
Web Content Integrity Tamper-proof websites beyond HTTPS.- Privacy-Preserving Clustering for Multi-Dimensional Data Randomization under LDP.- Hierarchical Model-Based Cybersecurity Risk Assessment During System Design.- The Influence of Privacy Concerns on Cryptocurrency Acceptance.- Automated Enrichment of Logical Attack Graphs via Formal Ontologies.- Detecting Web Bots via Mouse Dynamics and Communication Metadata.- Practical Single-Round Secure Wildcard Pattern Matching.- Efficient non-interactive anonymous communication.- PointPuff An Ed25519 Optimization Implementation.- Detecting web tracking at the network layer.- What’s inside a node? Malicious IPFS nodes under the magnifying glass.- Quantum-secure Communication for Trusted Edge Computing with IoT Devices.- Evaluation of a Red Team Automation Tool in live Cyber Defence Exercises.- Automated and Improved Detection of Cyber Attacks via an Industrial IDS Probe.- An Accurate and Real-time Detection Method for Concealed Slow HTTP DoS in Backbone Network.- Towards An Information Privacy Competency Model for the Usage of Mobile Applications.- SecPassInput: Towards Secure Memory and Password Handling in Web Applications.- Bl0ck Paralyzing 802.11 connections through Block Ack frames.- Enhancing the ACME Protocol to Automate the Management of All X 509 Web Certificates.- MADONNA Browser-Based MAlicious Domain Detection through Optimized Neural Network with Feature Analysis.- Cyber Key Terrain Identification Using Adjusted PageRank Centrality.- Machine Learning Metrics for Network Datasets Evaluation.- Factors of Intention to Use a Photo Tool: Comparison between Privacy-enhancing and Non-privacy-enhancing Tools.- Real-time Platform Identification of VPN Video Streaming Based on Side-Channel Attack.- Toward the Establishment of Evaluating URL Embedding Methods using Intrinsic Evaluator viaMalicious URLs Detection.- Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication.