Secure IT Systems: Lecture Notes in Computer Science
Editat de Mikael Asplund, Simin Nadjm-Tehranien Limba Engleză Paperback – 3 mar 2021
Din seria Lecture Notes in Computer Science
- 15%
Preț: 558.12 lei - 20%
Preț: 573.45 lei - 20%
Preț: 330.54 lei - 20%
Preț: 620.33 lei - 20%
Preț: 400.77 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 629.71 lei - 20%
Preț: 328.94 lei - 20%
Preț: 375.72 lei - 20%
Preț: 568.70 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 489.11 lei - 20%
Preț: 560.93 lei - 20%
Preț: 731.97 lei - 20%
Preț: 563.29 lei - 20%
Preț: 403.00 lei - 20%
Preț: 782.57 lei - 20%
Preț: 336.86 lei - 20%
Preț: 560.93 lei - 20%
Preț: 850.42 lei - 20%
Preț: 432.78 lei - 20%
Preț: 342.61 lei - 20%
Preț: 631.96 lei - 20%
Preț: 904.16 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 487.46 lei - 20%
Preț: 400.17 lei - 20%
Preț: 984.64 lei - 20%
Preț: 556.96 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1020.28 lei - 20%
Preț: 793.92 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 679.09 lei - 20%
Preț: 558.53 lei - 20%
Preț: 327.36 lei - 20%
Preț: 340.04 lei - 20%
Preț: 327.36 lei - 20%
Preț: 560.93 lei - 20%
Preț: 324.19 lei - 20%
Preț: 1079.23 lei - 20%
Preț: 735.28 lei - 20%
Preț: 373.80 lei -
Preț: 395.25 lei - 20%
Preț: 488.90 lei - 20%
Preț: 293.24 lei
Preț: 456.68 lei
Preț vechi: 570.84 lei
-20%
Puncte Express: 685
Preț estimativ în valută:
80.74€ • 96.46$ • 69.94£
80.74€ • 96.46$ • 69.94£
Carte tipărită la comandă
Livrare economică 14-28 martie
Specificații
ISBN-13: 9783030708511
ISBN-10: 3030708519
Pagini: 276
Ilustrații: XII, 263 p. 60 illus., 33 illus. in color.
Dimensiuni: 155 x 235 x 16 mm
Greutate: 0.42 kg
Ediția:1st edition 2021
Editura: Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
ISBN-10: 3030708519
Pagini: 276
Ilustrații: XII, 263 p. 60 illus., 33 illus. in color.
Dimensiuni: 155 x 235 x 16 mm
Greutate: 0.42 kg
Ediția:1st edition 2021
Editura: Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
Cuprins
Malware and attacks.- Persistence in Linux-Based IoT Malware.- Real-time triggering of Android memory dumps for stealthy attack investigation.- Using Features of Encrypted Network Traffic to Detect Malware.- Formal analysis.- Machine-checking the universal verifiability of ElectionGuard.- Information-Flow Control by means of Security Wrappers for Active Object Languages with Futures.- Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme.- Applied cryptography.- (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption.- TLV-to-MUC Express: Post-quantum MACsec in VXLAN.- On the Certi cate Revocation Problem in the Maritime Sector.- Security mechanisms and training.- HoneyHash: Honeyword Generation Based on Transformed Hashes.- Agent-based File Extraction Using Virtual Machine Introspection.- Cyber range automation overview with a case study of CRATE.- Applications and privacy.- Privacy Analysis of COVID-19 Contact Tracing Apps in the EU.- OnLITE: On-line Label for IoT Transparency Enhancement.- An Investigation of Comic-Based Permission Requests.