Doprava zadarmo s Packetou nad 59.99 €
Pošta 4.49 SPS 4.99 Kuriér GLS 3.99 Zberné miesto GLS 2.99 Packeta kurýr 4.99 Packeta 2.99 SPS Parcel Shop 2.99

Foundations and Applications of Security Analysis

Jazyk AngličtinaAngličtina
Kniha Brožovaná
Kniha Foundations and Applications of Security Analysis Pierpaolo Degano
Libristo kód: 01650247
Nakladateľstvo Springer, Berlin, júl 2009
This book constitutes the thoroughly refereed post-conference§proceedings of the Joint Workshop on A... Celý popis
? points 154 b
61.30
Skladom u dodávateľa v malom množstve Odosielame za 13-16 dní

30 dní na vrátenie tovaru


Mohlo by vás tiež zaujímať


TOP
Security Analysis: The Classic 1940 Edition Benjamin Graham / Pevná
common.buy 51.13
Information Security Risk Analysis Thomas R Peltier / Pevná
common.buy 167.01
Cluster Chemistry Guillermo Gonzalez-Moraga / Brožovaná
common.buy 61.30
Three Farces and a Comedy Ben Travers / Brožovaná
common.buy 27.17
Tonkunst in der Culturgeschichte Emil Naumann / Brožovaná
common.buy 80.33
Federico Fellini Hava Aldouby / Brožovaná
common.buy 52.24
MEMOIRS OF THE MUSEUM OF COMPA Harvard University Museum of Comparativ / Pevná
common.buy 31.60
Infective Endocarditis Gilbert Habib / Pevná
common.buy 159.06
Roman History, Volume V Appian / Pevná
common.buy 35.03
Indonesia Journal Benedict R. O'G Anderson / Brožovaná
common.buy 37.84

This book constitutes the thoroughly refereed post-conference§proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, held in York, UK, in March 2009, in association with ETAPS 2009.§The 12 revised full papers presented together with 2 invited talks were§carefully reviewed and selected from 27 submissions. The papers feature§topics including formal specification, analysis and design of security protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, the modeling of information flow and its application to confidentiality policies, system composition and covert channel analysis.

Darujte túto knihu ešte dnes
Je to jednoduché
1 Pridajte knihu do košíka a vyberte možnosť doručiť ako darček 2 Obratom Vám zašleme poukaz 3 Knihu zašleme na adresu obdarovaného

Prihlásenie

Prihláste sa k svojmu účtu. Ešte nemáte Libristo účet? Vytvorte si ho teraz!

 
povinné
povinné

Nemáte účet? Získajte výhody Libristo účtu!

Vďaka Libristo účtu budete mať všetko pod kontrolou.

Vytvoriť Libristo účet