Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 113,70
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : As New. Unread book in perfect condition.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 116,98
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 111,22
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
EUR 111,21
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
EUR 118,89
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : As New. Unread book in perfect condition.
Vendeur : PBShop.store US, Wood Dale, IL, Etats-Unis
EUR 119,30
Quantité disponible : Plus de 20 disponibles
Ajouter au panierHRD. Etat : New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Vendeur : PBShop.store UK, Fairford, GLOS, Royaume-Uni
EUR 112,97
Quantité disponible : Plus de 20 disponibles
Ajouter au panierHRD. Etat : New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
EUR 109
Quantité disponible : 2 disponible(s)
Ajouter au panierBuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryption and decryption schemes as well as on user authentication for the purpose of non-repudiation. Subsequently, the topics of distributed and cloud computing have emerged. Existing results related to cryptography and network security had to be tuned to adapt to these new technologies. With the more recent advancement of mobile technologies and IOT (internet of things), these algorithms had to take into consideration the limited resources such as battery power, storage and processor capabilities. This has led to the development of lightweight cryptography for resource constrained devices. The topic of network security also had to face many challenges owing to variable interconnection topology instead of a fixed interconnection topology. For this reason, the system is susceptible to various attacks from eavesdroppers. This book addresses these issues that arise in present day computing environments and helps the reader to overcome these security threats. 68 pp. Englisch.
Vendeur : moluna, Greven, Allemagne
EUR 85,81
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. KlappentextrnrnIn the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphase.
Vendeur : THE SAINT BOOKSTORE, Southport, Royaume-Uni
EUR 133,03
Quantité disponible : Plus de 20 disponibles
Ajouter au panierHardback. Etat : New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days.
Vendeur : preigu, Osnabrück, Allemagne
EUR 89
Quantité disponible : 5 disponible(s)
Ajouter au panierBuch. Etat : Neu. Recent Advances in Cryptography and Network Security | Pinaki Mitra | Buch | 68 S. | Englisch | 2018 | IntechOpen | EAN 9781789843453 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu Print on Demand.
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 109
Quantité disponible : 1 disponible(s)
Ajouter au panierBuch. Etat : Neu. This item is printed on demand - Print on Demand Titel. Neuware -In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryption and decryption schemes as well as on user authentication for the purpose of non-repudiation. Subsequently, the topics of distributed and cloud computing have emerged. Existing results related to cryptography and network security had to be tuned to adapt to these new technologies. With the more recent advancement of mobile technologies and IOT (internet of things), these algorithms had to take into consideration the limited resources such as battery power, storage and processor capabilities. This has led to the development of lightweight cryptography for resource constrained devices. The topic of network security also had to face many challenges owing to variable interconnection topology instead of a fixed interconnection topology. For this reason, the system is susceptible to various attacks from eavesdroppers. This book addresses these issues that arise in present day computing environments and helps the reader to overcome these security threats.Books on Demand GmbH, Überseering 33, 22297 Hamburg 68 pp. Englisch.
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 110,31
Quantité disponible : 1 disponible(s)
Ajouter au panierBuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryption and decryption schemes as well as on user authentication for the purpose of non-repudiation. Subsequently, the topics of distributed and cloud computing have emerged. Existing results related to cryptography and network security had to be tuned to adapt to these new technologies. With the more recent advancement of mobile technologies and IOT (internet of things), these algorithms had to take into consideration the limited resources such as battery power, storage and processor capabilities. This has led to the development of lightweight cryptography for resource constrained devices. The topic of network security also had to face many challenges owing to variable interconnection topology instead of a fixed interconnection topology. For this reason, the system is susceptible to various attacks from eavesdroppers. This book addresses these issues that arise in present day computing environments and helps the reader to overcome these security threats.