Security Protocols
indgår i Lecture Notes in Computer Science serien
indgår i Security and Cryptology serien
-
Paperback
8-11 hverdage557,95 kr.
-
Paperback
8-11 hverdage552,95 kr.
-
Paperback
8-11 hverdage554,95 kr.
-
Paperback
2-3 uger483,95 kr.
-
Paperback
8-11 hverdage561,95 kr.
-
Paperback
8-11 hverdage553,95 kr.
-
Paperback
8-11 hverdage551,95 kr.
-
Paperback
8-11 hverdage554,95 kr.
-
Paperback
8-11 hverdage554,95 kr.
-
Paperback
8-11 hverdage562,95 kr.
- Indbinding:
- Paperback
- Sideantal:
- 360
- Udgivet:
- 30. november 2007
- Størrelse:
- 155x20x235 mm.
- Vægt:
- 546 g.
- 8-11 hverdage.
- 20. november 2024
På lager
Normalpris
Abonnementspris
- Rabat på køb af fysiske bøger
- 1 valgfrit digitalt ugeblad
- 20 timers lytning og læsning
- Adgang til 70.000+ titler
- Ingen binding
Abonnementet koster 75 kr./md.
Ingen binding og kan opsiges når som helst.
- 1 valgfrit digitalt ugeblad
- 20 timers lytning og læsning
- Adgang til 70.000+ titler
- Ingen binding
Abonnementet koster 75 kr./md.
Ingen binding og kan opsiges når som helst.
Beskrivelse af Security Protocols
Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was just the beginning. After that, position papers were revised (often more than once) and transcripts were c- culated, discussed, and edited several times: our intention was not to produce a sterile record of who said what, but to share some promising lines of enquiry into interesting problems. Now we bring these proceedings to a wider audience so that you can join in. Our theme this time was ¿The systemlikes youandwants to be yourfriend.¿ Security is usually seen as making systems more di?cult for humans to use. Might there be advantages to looking at security in the context of more general design problems? Perhaps those investigating the general properties of system design and those of us in the security community have more to say to each other than we thought. Our thanks to Sidney Sussex CollegeCambridgefor the use of their facilities, and to the University of Hertfordshire for lending us several of their sta?. Particular thanks to Johanna Hunt of the University of Hertfordshire for being our impresario and organizing everything, and to Lori Klimaszewska of the University of CambridgeComputing Service for transcribing the audio tapes (in which the ¿crash barriers¿ nearly prevented collisions). The Security Protocols Workshop exists because you, the audience, part- ipate. Once you have dived into these proceedings and have had some Eleatic thoughts, we expect to hear from you.
Brugerbedømmelser af Security Protocols
Giv din bedømmelse
For at bedømme denne bog, skal du være logget ind.Andre købte også..
Find lignende bøger
Bogen Security Protocols findes i følgende kategorier:
- Business og læring > Computer og IT
- Hobby og fritid
- Litteratur og litteraturstudier
- Reference, information og tværfaglige emner > Forskning og information: generelt > Kodeteori og kryptologi
- Økonomi, finans, erhvervsliv og ledelse > Erhvervsliv, virksomheder og ledelse > Matematik for virksomhedsøkonomer og forretningssystemer
- Idræt og udendørsaktiviteter
- Databehandling og informationsteknologi > Informationsteknologi: generelle emner > Etiske og sociale aspekter ved IT
- Databehandling og informationsteknologi > Computere og hardware > Netværkskomponenter
- Databehandling og informationsteknologi > Programmering / softwareudvikling > Algoritmer og datastrukturer
- Databehandling og informationsteknologi > Datasikkerhed > Datakryptering
- Databehandling og informationsteknologi > Datakommunikation og computernetværk > Netværkssikkerhed
© 2024 Pling BØGER Registered company number: DK43351621