Atjaunināt sīkdatņu piekrišanu

Future Challenges in Security and Privacy for Academia and Industry: 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011, Proceedings 2011 ed. [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 330 pages, height x width: 235x155 mm, weight: 528 g, XIV, 330 p., 1 Paperback / softback
  • Sērija : IFIP Advances in Information and Communication Technology 354
  • Izdošanas datums: 15-Jul-2013
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642268331
  • ISBN-13: 9783642268335
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 330 pages, height x width: 235x155 mm, weight: 528 g, XIV, 330 p., 1 Paperback / softback
  • Sērija : IFIP Advances in Information and Communication Technology 354
  • Izdošanas datums: 15-Jul-2013
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642268331
  • ISBN-13: 9783642268335
Citas grāmatas par šo tēmu:
This book constitutes the refereed proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC 2011, held in Lucerne, Switzerland, in June 2011. The 24 revised full papers presented together with a keynote talk were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on malware, information flow and DoS attacks, authentication, network security and security protocols, software security, policy compliance and obligations, privacy attacks and privacy-enhancing technologies, risk analysis and security metrics, and intrusion detection.