Cantitate/Preț
Produs

Decision and Game Theory for Security: Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012, Proceedings: Lecture Notes in Computer Science, cartea 7638

Editat de Jens Grossklags, Jean Walrand
en Limba Engleză Paperback – 27 sep 2012
This book constitutes the refereed proceedings of the Third International Conference on Decision and Game Theory for Security, GameSec 2012, held in Budapest, Hungary, in November 2012.
The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on secret communications, identification of attackers, multi-step attacks, network security, system defense, and applications security.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 33372 lei

Preț vechi: 41715 lei
-20% Nou

Puncte Express: 501

Preț estimativ în valută:
6386 6627$ 5338£

Carte tipărită la comandă

Livrare economică 17-31 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783642342653
ISBN-10: 3642342655
Pagini: 324
Ilustrații: XII, 309 p. 48 illus.
Dimensiuni: 155 x 235 x 17 mm
Greutate: 0.45 kg
Ediția:2012
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Secret Communications.- Identification of Attackers.- Multi-step Attacks.- Network Security.- System Defense.- Applications Security.
Identification of Attackers.- Multi-step Attacks.- Network Security.- System Defense.- Applications Security.

Textul de pe ultima copertă

This book constitutes the refereed proceedings of the Third International Conference on Decision and Game Theory for Security, GameSec 2012, held in Budapest, Hungary, in November 2012.
The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on secret communications, identification of attackers, multi-step attacks, network security, system defense, and applications security.

Caracteristici

Fast track conference proceedings Unique visibility State of the art reserach