Atjaunināt sīkdatņu piekrišanu

Computer Security ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 48, 2021, Proceedings, Part II 1st ed. 2021 [Mīkstie vāki]

Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 786 pages, height x width: 235x155 mm, weight: 1223 g, 83 Illustrations, color; 75 Illustrations, black and white; XXIV, 786 p. 158 illus., 83 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 12973
  • Izdošanas datums: 02-Oct-2021
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030884279
  • ISBN-13: 9783030884277
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 100,46 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 118,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 786 pages, height x width: 235x155 mm, weight: 1223 g, 83 Illustrations, color; 75 Illustrations, black and white; XXIV, 786 p. 158 illus., 83 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 12973
  • Izdošanas datums: 02-Oct-2021
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030884279
  • ISBN-13: 9783030884277
Citas grāmatas par šo tēmu:
The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-8, 2021.The 71 full papers presented in this book were carefully reviewed and selected from 351 submissions. They were organized in topical sections as follows:





Part I: network security; attacks; fuzzing; malware; user behavior and underground economy; blockchain; machine learning; automotive; anomaly detection;





Part II: encryption; cryptography; privacy; differential privacy; zero knowledge; key exchange; multi-party computation.