ICT Systems Security and Privacy Protection: IFIP Advances in Information and Communication Technology
Editat de Norbert Meyer, Anna Grocholewska-Czury¿oen Limba Engleză Paperback – 25 apr 2025
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (1) | 778.27 lei 38-44 zile | |
| Springer – 25 apr 2025 | 778.27 lei 38-44 zile | |
| Hardback (1) | 741.61 lei 6-8 săpt. | |
| Springer – 24 apr 2024 | 741.61 lei 6-8 săpt. |
Din seria IFIP Advances in Information and Communication Technology
- 20%
Preț: 555.24 lei - 20%
Preț: 327.36 lei -
Preț: 382.30 lei - 20%
Preț: 323.23 lei - 20%
Preț: 327.99 lei - 20%
Preț: 526.97 lei - 20%
Preț: 424.11 lei - 15%
Preț: 624.01 lei - 20%
Preț: 1116.37 lei - 18%
Preț: 909.08 lei - 20%
Preț: 1232.88 lei - 20%
Preț: 689.95 lei - 20%
Preț: 505.27 lei - 18%
Preț: 911.54 lei - 15%
Preț: 616.15 lei - 18%
Preț: 1216.83 lei - 15%
Preț: 613.18 lei - 15%
Preț: 611.74 lei - 20%
Preț: 957.62 lei - 20%
Preț: 619.71 lei - 18%
Preț: 911.54 lei - 15%
Preț: 611.23 lei - 18%
Preț: 914.70 lei - 20%
Preț: 1237.63 lei - 20%
Preț: 1235.90 lei - 20%
Preț: 1327.97 lei - 18%
Preț: 1180.37 lei - 20%
Preț: 623.18 lei - 15%
Preț: 616.45 lei - 20%
Preț: 944.97 lei - 20%
Preț: 1231.59 lei - 20%
Preț: 1226.84 lei - 20%
Preț: 616.05 lei - 20%
Preț: 1232.08 lei - 20%
Preț: 952.00 lei - 20%
Preț: 1232.88 lei - 15%
Preț: 611.23 lei - 18%
Preț: 1183.12 lei - 18%
Preț: 1171.97 lei - 20%
Preț: 1848.88 lei - 20%
Preț: 968.03 lei - 20%
Preț: 2110.89 lei - 20%
Preț: 634.64 lei - 20%
Preț: 623.22 lei - 20%
Preț: 640.33 lei - 20%
Preț: 947.83 lei - 20%
Preț: 620.31 lei - 15%
Preț: 639.43 lei - 20%
Preț: 1227.82 lei
Preț: 778.27 lei
Preț vechi: 972.83 lei
-20%
Puncte Express: 1167
Preț estimativ în valută:
137.59€ • 163.16$ • 119.35£
137.59€ • 163.16$ • 119.35£
Carte tipărită la comandă
Livrare economică 07-13 martie
Specificații
ISBN-13: 9783031563287
ISBN-10: 303156328X
Pagini: 392
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.59 kg
Editura: Springer
Seria IFIP Advances in Information and Communication Technology
ISBN-10: 303156328X
Pagini: 392
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.59 kg
Editura: Springer
Seria IFIP Advances in Information and Communication Technology
Cuprins
Web Content Integrity Tamper-proof websites beyond HTTPS.- Privacy-Preserving Clustering for Multi-Dimensional Data Randomization under LDP.- Hierarchical Model-Based Cybersecurity Risk Assessment During System Design.- The Influence of Privacy Concerns on Cryptocurrency Acceptance.- Automated Enrichment of Logical Attack Graphs via Formal Ontologies.- Detecting Web Bots via Mouse Dynamics and Communication Metadata.- Practical Single-Round Secure Wildcard Pattern Matching.- Efficient non-interactive anonymous communication.- PointPuff An Ed25519 Optimization Implementation.- Detecting web tracking at the network layer.- What’s inside a node? Malicious IPFS nodes under the magnifying glass.- Quantum-secure Communication for Trusted Edge Computing with IoT Devices.- Evaluation of a Red Team Automation Tool in live Cyber Defence Exercises.- Automated and Improved Detection of Cyber Attacks via an Industrial IDS Probe.- An Accurate and Real-time Detection Method for Concealed Slow HTTP DoS in Backbone Network.- Towards An Information Privacy Competency Model for the Usage of Mobile Applications.- SecPassInput: Towards Secure Memory and Password Handling in Web Applications.- Bl0ck Paralyzing 802.11 connections through Block Ack frames.- Enhancing the ACME Protocol to Automate the Management of All X 509 Web Certificates.- MADONNA Browser-Based MAlicious Domain Detection through Optimized Neural Network with Feature Analysis.- Cyber Key Terrain Identification Using Adjusted PageRank Centrality.- Machine Learning Metrics for Network Datasets Evaluation.- Factors of Intention to Use a Photo Tool: Comparison between Privacy-enhancing and Non-privacy-enhancing Tools.- Real-time Platform Identification of VPN Video Streaming Based on Side-Channel Attack.- Toward the Establishment of Evaluating URL Embedding Methods using Intrinsic Evaluator viaMalicious URLs Detection.- Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication.