Cantitate/Preț
Produs

Trustworthy Computing and Services

Editat de Yuyu Yuan, Xu Wu, Yueming Lu
en Limba Engleză Paperback – 11 ian 2013
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2012, held in Beijing, China, in May/June 2012. The 92 revised full papers presented were carefully reviewed and selected from 278 papers. The topics covered are architecture for trusted computing systems, trusted computing platform, trusted systems build, network and protocol security, mobile network security, network survivability and other critical theories and standard systems, credible assessment, credible measurement and metrics, trusted systems, trusted networks, trusted mobile network, trusted routing, trusted software, trusted operating systems, trusted storage, fault-tolerant computing and other key technologies, trusted e-commerce and e-government, trusted logistics, trusted internet of things, trusted cloud and other trusted services and applications.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 32749 lei  6-8 săpt.
  Springer – 14 iul 2014 32749 lei  6-8 săpt.
  Springer – 11 ian 2013 64543 lei  6-8 săpt.

Preț: 64543 lei

Preț vechi: 80679 lei
-20%

Puncte Express: 968

Preț estimativ în valută:
11411 13633$ 9885£

Carte tipărită la comandă

Livrare economică 14-28 martie


Specificații

ISBN-13: 9783642357947
ISBN-10: 3642357946
Pagini: 760
Ilustrații: XVIII, 739 p. 301 illus.
Dimensiuni: 155 x 235 x 41 mm
Greutate: 1.13 kg
Ediția:2013
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Architecture for trusted computing systems.- Trusted computing platform.- Trusted systems build.- Network and protocol security.- Mobile network security.- Network survivability and other critical theories and standard systems.- Credible assessment, credible measurement and metrics.- Trusted systems.- Trusted networks.- Trusted mobile network.- Trusted routing.- Trusted software.- Trusted operating systems.- Trusted storage.- Fault-tolerant computing and other key technologies.- Trusted e-commerce and e-government.- Trusted logistics.- Trusted internet of things.- Trusted cloud and other trusted services and applications.

Caracteristici

Up-to-date results Fast track conference proceedings State-of-the-art report