ICT Systems Security and Privacy Protection: IFIP Advances in Information and Communication Technology
Editat de Norbert Meyer, Anna Grocholewska-Czury¿oen Limba Engleză Paperback – 25 apr 2025
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (1) | 778.85 lei 38-44 zile | |
| Springer – 25 apr 2025 | 778.85 lei 38-44 zile | |
| Hardback (1) | 741.61 lei 6-8 săpt. | |
| Springer – 24 apr 2024 | 741.61 lei 6-8 săpt. |
Din seria IFIP Advances in Information and Communication Technology
- 20%
Preț: 559.95 lei - 20%
Preț: 746.71 lei - 20%
Preț: 555.69 lei - 20%
Preț: 623.07 lei - 20%
Preț: 623.39 lei - 20%
Preț: 327.36 lei -
Preț: 382.30 lei - 20%
Preț: 323.23 lei - 20%
Preț: 327.99 lei - 20%
Preț: 528.48 lei - 15%
Preț: 527.06 lei - 20%
Preț: 527.38 lei - 20%
Preț: 424.44 lei - 15%
Preț: 624.01 lei - 20%
Preț: 1116.37 lei - 18%
Preț: 909.08 lei - 20%
Preț: 1232.88 lei - 20%
Preț: 689.95 lei - 18%
Preț: 911.54 lei - 15%
Preț: 616.15 lei - 18%
Preț: 1216.83 lei - 15%
Preț: 613.18 lei - 15%
Preț: 611.74 lei - 20%
Preț: 957.62 lei - 20%
Preț: 619.71 lei - 15%
Preț: 616.45 lei - 20%
Preț: 944.97 lei - 20%
Preț: 1231.59 lei - 20%
Preț: 1226.84 lei - 20%
Preț: 616.05 lei - 20%
Preț: 1232.08 lei - 20%
Preț: 952.00 lei - 20%
Preț: 1232.88 lei - 18%
Preț: 1183.12 lei - 15%
Preț: 611.23 lei - 18%
Preț: 911.54 lei - 18%
Preț: 1171.97 lei - 20%
Preț: 1848.88 lei - 15%
Preț: 611.23 lei - 18%
Preț: 914.70 lei - 20%
Preț: 968.03 lei - 20%
Preț: 2110.89 lei - 20%
Preț: 1237.63 lei - 20%
Preț: 634.64 lei - 20%
Preț: 623.22 lei - 20%
Preț: 1235.90 lei - 20%
Preț: 1327.97 lei - 18%
Preț: 1180.37 lei - 20%
Preț: 623.18 lei
Preț: 778.85 lei
Preț vechi: 973.57 lei
-20% Nou
Puncte Express: 1168
Preț estimativ în valută:
137.80€ • 160.54$ • 120.33£
137.80€ • 160.54$ • 120.33£
Carte tipărită la comandă
Livrare economică 16-22 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031563287
ISBN-10: 303156328X
Pagini: 392
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.59 kg
Editura: Springer
Seria IFIP Advances in Information and Communication Technology
ISBN-10: 303156328X
Pagini: 392
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.59 kg
Editura: Springer
Seria IFIP Advances in Information and Communication Technology
Cuprins
Web Content Integrity Tamper-proof websites beyond HTTPS.- Privacy-Preserving Clustering for Multi-Dimensional Data Randomization under LDP.- Hierarchical Model-Based Cybersecurity Risk Assessment During System Design.- The Influence of Privacy Concerns on Cryptocurrency Acceptance.- Automated Enrichment of Logical Attack Graphs via Formal Ontologies.- Detecting Web Bots via Mouse Dynamics and Communication Metadata.- Practical Single-Round Secure Wildcard Pattern Matching.- Efficient non-interactive anonymous communication.- PointPuff An Ed25519 Optimization Implementation.- Detecting web tracking at the network layer.- What’s inside a node? Malicious IPFS nodes under the magnifying glass.- Quantum-secure Communication for Trusted Edge Computing with IoT Devices.- Evaluation of a Red Team Automation Tool in live Cyber Defence Exercises.- Automated and Improved Detection of Cyber Attacks via an Industrial IDS Probe.- An Accurate and Real-time Detection Method for Concealed Slow HTTP DoS in Backbone Network.- Towards An Information Privacy Competency Model for the Usage of Mobile Applications.- SecPassInput: Towards Secure Memory and Password Handling in Web Applications.- Bl0ck Paralyzing 802.11 connections through Block Ack frames.- Enhancing the ACME Protocol to Automate the Management of All X 509 Web Certificates.- MADONNA Browser-Based MAlicious Domain Detection through Optimized Neural Network with Feature Analysis.- Cyber Key Terrain Identification Using Adjusted PageRank Centrality.- Machine Learning Metrics for Network Datasets Evaluation.- Factors of Intention to Use a Photo Tool: Comparison between Privacy-enhancing and Non-privacy-enhancing Tools.- Real-time Platform Identification of VPN Video Streaming Based on Side-Channel Attack.- Toward the Establishment of Evaluating URL Embedding Methods using Intrinsic Evaluator viaMalicious URLs Detection.- Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication.