Cantitate/Preț
Produs

Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I: Lecture Notes in Computer Science, cartea 11098

Editat de Javier Lopez, Jianying Zhou, Miguel Soriano
en Limba Engleză Paperback – 12 aug 2018
The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018.

The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security. 
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 32868 lei  6-8 săpt.
  Springer International Publishing – 8 aug 2018 32868 lei  6-8 săpt.
  Springer International Publishing – 12 aug 2018 33120 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 33120 lei

Preț vechi: 41400 lei
-20% Nou

Puncte Express: 497

Preț estimativ în valută:
6340 6816$ 5285£

Carte tipărită la comandă

Livrare economică 19 decembrie 24 - 02 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319990729
ISBN-10: 3319990721
Pagini: 585
Ilustrații: XIX, 621 p. 136 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.89 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Software security.- Blockchain & machine Learning.- Hardware security.- Attacks.- Malware & vulnerabilities.- Protocol security.- Privacy (I).- CPS and IoT security.- Mobile security.- Database & web security.- Cloud security.- Applied crypto (I).- Privacy (II).- Multi-party computation.- SDN security.- Applied crypto (II).