Atjaunināt sīkdatņu piekrišanu

Computer Security ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 2529, 2023, Proceedings, Part III 1st ed. 2024 [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 494 pages, height x width: 235x155 mm, weight: 777 g, 112 Illustrations, color; 41 Illustrations, black and white; XV, 494 p. 153 illus., 112 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 14346
  • Izdošanas datums: 12-Jan-2024
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031514785
  • ISBN-13: 9783031514784
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 73,68 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 86,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 494 pages, height x width: 235x155 mm, weight: 777 g, 112 Illustrations, color; 41 Illustrations, black and white; XV, 494 p. 153 illus., 112 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 14346
  • Izdošanas datums: 12-Jan-2024
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031514785
  • ISBN-13: 9783031514784
Citas grāmatas par šo tēmu:
The four-volume set LNCS 14344-14347 constitutes the refereed proceedings of the 28th European Symposium on Research in Computer Security, ESORICS 2023, which took place in The Hague, The Netherlands, during September 25-29, 2023.





The 93 full papers presented in these proceedings were carefully reviewed and selected from 478 submissions. They were organized in topical sections as follows:





Part I: Crypto.





Part II: Network, web and internet; privacy; and remote.





Part III: Attacks; blockchain; and miscellaneous.





Part IV: Machine learning; software and systems security.





 
Crypto.- Network, web and internet.- Privacy.- Remote.- Attacks.- Blockchain.- Miscellaneous.- Machine learning.- Software and systems security.