EUR 6,91
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierHardcover. Etat : Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
EUR 10,41
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierHardcover. Etat : Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.
EUR 10,41
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierHardcover. Etat : Fair. No Jacket. Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend Less 1.
EUR 10,41
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierHardcover. Etat : Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.
EUR 10,41
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierHardcover. Etat : As New. No Jacket. Pages are clean and are not marred by notes or folds of any kind. ~ ThriftBooks: Read More, Spend Less 1.
EUR 10,41
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierHardcover. Etat : Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.
Vendeur : Goodwill of Silicon Valley, SAN JOSE, CA, Etats-Unis
EUR 10,41
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : acceptable. Supports Goodwill of Silicon Valley job training programs. The cover and pages are in Acceptable condition! Any other included accessories are also in Acceptable condition showing use. Use can include some highlighting and writing, page and cover creases as well as other types visible wear such as cover tears discoloration, staining, marks, scuffs, etc. All pages intact.
Edité par Pearson Education, Limited, 2003
ISBN 10 : 0130669431 ISBN 13 : 9780130669438
Langue: anglais
Vendeur : Better World Books, Mishawaka, IN, Etats-Unis
Edition originale
EUR 17,27
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : Good. 1st. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages.
Vendeur : GuthrieBooks, Spring Branch, TX, Etats-Unis
EUR 13,87
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Very Good. Ex-library paperback in very nice condition with the usual markings and attachments. Text block clean and unmarked. Tight binding.
Vendeur : GuthrieBooks, Spring Branch, TX, Etats-Unis
EUR 41,92
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Very Good. Ex-library paperback in very nice condition with the usual markings and attachments.
EUR 51,83
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierHardcover. Etat : New.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 53,86
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : Best Price, Torrance, CA, Etats-Unis
EUR 48,30
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierEtat : New. SUPER FAST SHIPPING.
Vendeur : Best Price, Torrance, CA, Etats-Unis
EUR 48,30
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierEtat : New. SUPER FAST SHIPPING.
Vendeur : Lucky's Textbooks, Dallas, TX, Etats-Unis
EUR 52,70
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : Lucky's Textbooks, Dallas, TX, Etats-Unis
EUR 53,17
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 61,28
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : As New. Unread book in perfect condition.
EUR 55,34
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierHardcover. Etat : New. Language:English.Author:Mao Wenbo.Binding:HardCover.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 58,48
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 58,48
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
Vendeur : Chiron Media, Wallingford, Royaume-Uni
EUR 57,36
Autre deviseQuantité disponible : 10 disponible(s)
Ajouter au panierPF. Etat : New.
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
EUR 58,47
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
EUR 79,24
Autre deviseQuantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. pp. 512.
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
EUR 66,30
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : As New. Unread book in perfect condition.
EUR 91,38
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierhardcover. Etat : New. In shrink wrap. Looks like an interesting title!
Edité par Pearson Education (US), United States, Upper Saddle River, 2003
ISBN 10 : 0130669431 ISBN 13 : 9780130669438
Langue: anglais
Vendeur : WorldofBooks, Goring-By-Sea, WS, Royaume-Uni
EUR 103,19
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierPaperback. Etat : Very Good. Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents practical examples throughout and provides all the mathematical background you'll need. Coverage includes: Crypto foundations: probability, information theory, computational complexity, number theory, algebraic techniques, and more Authentication: basic techniques and principles vs. misconceptions and consequential attacks Evaluating real-world protocol standards including IPSec, IKE, SSH, TLS (SSL), and Kerberos Designing stronger counterparts to vulnerable "textbook" crypto schemes Mao introduces formal and reductionist methodologies to prove the "fit-for-application" security of practical encryption, signature, signcryption, and authentication schemes. He gives detailed explanations for zero-knowledge protocols: definition, zero-knowledge properties, equatability vs. simulatability, argument vs. proof, round-efficiency, and non-interactive versions. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Edité par Springer Berlin Heidelberg, Springer Berlin Heidelberg Sep 2003, 2003
ISBN 10 : 3540201769 ISBN 13 : 9783540201762
Langue: anglais
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 53,49
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Neuware -The 2003 Information Security Conference was the sixth in a series that started with the InformationSecurity Workshopin 1997.A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di erent aspects of information security. This trend continued in the program of this year¿s conference. There were 133 paper submissions to ISC 2003. From these submissions the 31papersintheseproceedingswereselectedbytheprogramcommittee,covering a wide range of technical areas. These papers are supplemented by two invited papers;athirdinvitedtalkwaspresentedattheconferencebutisnotrepresented by a written paper. We would like to extend our sincere thanks to all the authors that submitted papers to ISC 2003, and we hope that those whose papers were declined will be able to nd an alternative forum for their work. We are also very grateful to the three eminent invited speakers at the conference: Paul van Oorschot (Carleton University, Canada), Ueli Maurer (ETH Zur ¿ ich, Switzerland), and Andy Clark (Inforenz Limited, UK). We were fortunate to have an energetic team of experts who took onthe task of the program committee. Their names may be found overleaf, and we thank them warmly for their considerable e orts. This team was helped by an even larger number of individuals who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete. 460 pp. Englisch.
Edité par Springer Berlin Heidelberg, Springer Berlin Heidelberg Nov 2005, 2005
ISBN 10 : 3540309349 ISBN 13 : 9783540309345
Langue: anglais
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 53,49
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Neuware -The Seventh International Conference on Information and Communications - curity,ICICS2005,washeldinBeijing,China,10-13December2005. TheICICS conference series is an established forum for exchanging new research ideas and development results in the areas of information security and applied crypt- raphy. The rst event began here in Beijing in 1997. Since then the conference series has been interleaving its venues in China and the rest of the world: ICICS 1997 in Beijing, China; ICICS 1999 in Sydney, Australia; ICICS 2001 in Xi¿an, China; ICICS 2002 in Singapore; ICICS 2003 in Hohhot City, China; and ICICS 2004 in Malaga, Spain. The conference proceedings of the past events have - ways been published by Springer in the Lecture Notes in Computer Science series, with volume numbers, respectively: LNCS 1334,LNCS 1726,LNCS 2229, LNCS 2513, LNCS 2836, and LNCS 3269. ICICS 2005 was sponsored by the Chinese Academy of Sciences (CAS); the Beijing Natural Science Foundation of China under Grant No. 4052016; the National Natural Science Foundation of China under Grants No. 60083007 and No. 60573042;the NationalGrandFundamentalResearch973ProgramofChina under Grant No. G1999035802, and Hewlett-Packard Laboratories, China. The conference was organized and hosted by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Communications and Information Security Association (ICISA). The aim of the ICICS conference series has been to o er the attendees the opportunity to discuss the latest developments in theoretical and practical - pects of information and communications security.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 512 pp. Englisch.
Edité par Springer Berlin Heidelberg, 2003
ISBN 10 : 3540201769 ISBN 13 : 9783540201762
Langue: anglais
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 53,49
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - The 2003 Information Security Conference was the sixth in a series that started with the InformationSecurity Workshopin 1997.A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di erent aspects of information security. This trend continued in the program of this year's conference. There were 133 paper submissions to ISC 2003. From these submissions the 31papersintheseproceedingswereselectedbytheprogramcommittee,covering a wide range of technical areas. These papers are supplemented by two invited papers;athirdinvitedtalkwaspresentedattheconferencebutisnotrepresented by a written paper. We would like to extend our sincere thanks to all the authors that submitted papers to ISC 2003, and we hope that those whose papers were declined will be able to nd an alternative forum for their work. We are also very grateful to the three eminent invited speakers at the conference: Paul van Oorschot (Carleton University, Canada), Ueli Maurer (ETH Zur ich, Switzerland), and Andy Clark (Inforenz Limited, UK). We were fortunate to have an energetic team of experts who took onthe task of the program committee. Their names may be found overleaf, and we thank them warmly for their considerable e orts. This team was helped by an even larger number of individuals who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete.
Edité par Springer Berlin Heidelberg, 2005
ISBN 10 : 3540309349 ISBN 13 : 9783540309345
Langue: anglais
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 53,49
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - The Seventh International Conference on Information and Communications - curity,ICICS2005,washeldinBeijing,China,10-13December2005. TheICICS conference series is an established forum for exchanging new research ideas and development results in the areas of information security and applied crypt- raphy. The rst event began here in Beijing in 1997. Since then the conference series has been interleaving its venues in China and the rest of the world: ICICS 1997 in Beijing, China; ICICS 1999 in Sydney, Australia; ICICS 2001 in Xi'an, China; ICICS 2002 in Singapore; ICICS 2003 in Hohhot City, China; and ICICS 2004 in Malaga, Spain. The conference proceedings of the past events have - ways been published by Springer in the Lecture Notes in Computer Science series, with volume numbers, respectively: LNCS 1334,LNCS 1726,LNCS 2229, LNCS 2513, LNCS 2836, and LNCS 3269. ICICS 2005 was sponsored by the Chinese Academy of Sciences (CAS); the Beijing Natural Science Foundation of China under Grant No. 4052016; the National Natural Science Foundation of China under Grants No. 60083007 and No. 60573042;the NationalGrandFundamentalResearch973ProgramofChina under Grant No. G1999035802, and Hewlett-Packard Laboratories, China. The conference was organized and hosted by the Engineering Research Center for Information Security Technology of the Chinese Academy of Sciences (ERCIST, CAS) in co-operation with the International Communications and Information Security Association (ICISA). The aim of the ICICS conference series has been to o er the attendees the opportunity to discuss the latest developments in theoretical and practical - pects of information and communications security.