- 5 Ergebnisse
Kleinster Preis: € 101,09, größter Preis: € 249,99, Mittelwert: € 144,80
1
ICT Systems Security and Privacy Protection - Dieter Gollmann
Bestellen
bei booklooker.de
€ 158,36
Versand: € 4,501
Bestellengesponserter Link
Dieter Gollmann:

ICT Systems Security and Privacy Protection - Taschenbuch

2017, ISBN: 9783319387079

[ED: Taschenbuch], [PU: Springer International Publishing], Neuware - This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy … Mehr…

Versandkosten:Versand nach Deutschland. (EUR 4.50) AHA-BUCH GmbH
2
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings (IFIP ... and Communication Technology, Band 455)
Bestellen
bei amazon.de
€ 101,09
Versand: € 3,001
Bestellengesponserter Link
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings (IFIP ... and Communication Technology, Band 455) - Taschenbuch

2016, ISBN: 9783319387079

Springer, Taschenbuch, Auflage: Softcover reprint of the original 1st ed. 2015, 664 Seiten, Publiziert: 2016-10-17T00:00:01Z, Produktgruppe: Buch, 21.79 kg, Informationsmanagement, Manage… Mehr…

Versandkosten:Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 3.00)
3
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings (IFIP ... and Communication Technology, Band 455)
Bestellen
bei amazon.de
€ 107,55
Versand: € 0,001
Bestellengesponserter Link
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings (IFIP ... and Communication Technology, Band 455) - Taschenbuch

2016

ISBN: 9783319387079

Springer, Taschenbuch, Auflage: Softcover reprint of the original 1st ed. 2015, 664 Seiten, Publiziert: 2016-10-17T00:00:01Z, Produktgruppe: Buch, 21.79 kg, Informationsmanagement, Manage… Mehr…

Versandkosten:Auf Lager, Lieferung von Amazon. (EUR 0.00) Amazon.de
4
ICT Systems Security and Privacy Protection
Bestellen
bei Hugendubel.de
€ 106,99
Versand: € 0,001
Bestellengesponserter Link
ICT Systems Security and Privacy Protection - Taschenbuch

2015, ISBN: 9783319387079

*ICT Systems Security and Privacy Protection* - 30th IFIP TC 11 International Conference SEC 2015 Hamburg Germany May 26-28 2015 Proceedings. Softcover reprint of the original 1st ed. 201… Mehr…

Versandkosten:Shipping in 3 days, , Versandkostenfrei nach Hause oder Express-Lieferung in Ihre Buchhandlung., DE. (EUR 0.00)
5
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings (IFIP ... in Information and Communication Technology) - Gollmann, Dieter
Bestellen
bei Rakuten.fr
€ 249,99
Versand: € 11,001
Bestellengesponserter Link
Gollmann, Dieter:
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings (IFIP ... in Information and Communication Technology) - gebrauchtes Buch

2015, ISBN: 3319387073

Livre

1 Offers. Versandkosten:France. (EUR 11.00) Priceminister

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch

Detailangaben zum Buch - ICT Systems Security and Privacy Protection


EAN (ISBN-13): 9783319387079
ISBN (ISBN-10): 3319387073
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2015
Herausgeber: Springer International Publishing

Buch in der Datenbank seit 2016-11-21T14:40:45+01:00 (Berlin)
Detailseite zuletzt geändert am 2024-03-30T13:39:37+01:00 (Berlin)
ISBN/EAN: 9783319387079

ISBN - alternative Schreibweisen:
3-319-38707-3, 978-3-319-38707-9
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: göllmann, gollmann
Titel des Buches: hamburg, sec, germany


Daten vom Verlag:

Autor/in: Hannes Federrath; Dieter Gollmann
Titel: IFIP Advances in Information and Communication Technology; ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings
Verlag: Springer; Springer International Publishing
646 Seiten
Erscheinungsjahr: 2016-10-17
Cham; CH
Gedruckt / Hergestellt in Niederlande.
Sprache: Englisch
106,99 € (DE)
109,99 € (AT)
118,00 CHF (CH)
POD
XVI, 646 p. 156 illus.

BC; Hardcover, Softcover / Informatik, EDV/Informatik; Computersicherheit; Verstehen; Access control; Attack trees; Authentication; Cloud security; Critical infrastructures; Cryptography; Cyber-physical systems; Honey networks; Identity management; Mobile security; Network security; Password security; Privacy enhancing technologies; Software security; Trust management; Web application security; Data and Information Security; IT Operations; Computer Communication Networks; Cryptology; Netzwerksicherheit; Wirtschaftsmathematik und -informatik, IT-Management; Netzwerk-Hardware; Kodierungstheorie und Verschlüsselung (Kryptologie); Kryptografie, Verschlüsselungstechnologie; BB

O-PSI: Delegated Private Set Intersection on Outsourced Datasets.- Flexible and Robust Privacy-Preserving Implicit Authentication.- Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack.- POSN: A Personal Online Social Network.- Verifying Observational Determinism.- Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing.- Enforcing Usage Constraints on Credentials for Web Applications.- A Survey of Alerting Websites: Risks and Solutions.- A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant.- Enhancing Passwords Security Using Deceptive Covert Communication.- Information Sharing and User Privacy in the Third-party Identity Management Landscape.- An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems.- A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control.- Model-Driven Integration and Analysis of Access-Control Policies in Multi-layer Information Systems.- Authenticated File Broadcast Protocol.- Automated Classification of C&C Connections Through Malware URL Clustering.- B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications.- Security Management and Human Aspects of Security Investigation of Employee Security Behaviour: A Grounded Theory Approach.- Practice-Based Discourse Analysis of InfoSec Policies.- Understanding Collaborative Challenges in IT Security Preparedness Exercises.- Social Groupings and Information Security Obedience Within Organizations.- Attack Trees with Sequential Conjunction.- Enhancing the Security of Image CAPTCHAs Through Noise Addition.- SHRIFT System-Wide HybRid Information Flow Tracking.- ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries.- Exploit Generation for Information Flow Leaks in Object-Oriented Programs.- Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference.- Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach.- Integrity for Approximate Joins on Untrusted Computational Servers.- Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers.- Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment.- A Secure Exam Protocol Without Trusted Parties.- ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis.- Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases.- An Empirical Study on Android for Saving Non-shared Data on Public Storage.- The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation.- On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps.- A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration.- Cyber-physical Systems and Critical Infrastructures Security Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems.- Securing BACnet’s Pitfalls.- On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios.
Includes supplementary material: sn.pub/extras

< zum Archiv...