Kategorien
Handverlesen
Verbrieft
Kafka, Kafka, Kafka
Alice Munro
Archiv
Viel besprochen
Bücherschau des Tages
Literaturbeilagen
Bücherbrief
Bücher der Saison
Bestenlisten
Ausgezeichnet
Selbst gelesen
von Marie-Luise Knott
von Thekla Dannenberg
von Peter Truschner
von Angela Schader
Wer wir sind
Datenschutz
Impressum
Gutschein
Kostenloser Newsletter
Der
Perlentaucher unter den Buchläden
Eichendorff21
Warenkorb
Einloggen oder registrieren
Genauer suchen (10 Treffer)
Filter schließen (10 Treffer)
Stichwort auswählen
Alle Stichworte
Security Protocols (10)
Authentication (4)
Communication (2)
Computer Security (2)
Intrusion Detection (2)
Multicore Architectures (2)
Multiple Data (2)
Network Protocols (2)
Networks (2)
Processing (2)
Sensor Networks (2)
Signal Processing (2)
Access Control (1)
Applied Cryptography (1)
Asymmetric Keys (1)
Biometrics (1)
Blockchain (1)
Blockchain Technologies (1)
Ciphers (1)
Circuit Optimization (1)
Circuit Protocols (1)
Cloud Security (1)
Computer Crime (1)
Computer Networks (1)
Confidentiality (1)
Control (1)
Cryptographic Attacks (1)
Cryptography (1)
Cyber Security (1)
Databases (1)
Distributed Algorithms (1)
Distributed Computing (1)
Distributed Ledger (1)
E-Commerce (1)
E-Payments (1)
Embedded Countermeasures (1)
Embedded Security (1)
Embedded Systems (1)
Encryption (1)
Formal Methods (1)
Information (1)
Information Security (1)
Integrity (1)
Internet of Things (1)
M-Commerce (1)
Management (1)
Mobile Payments (1)
Network Security (1)
Nonrepudiation (1)
Online Payment Systems (1)
Organization (1)
Programming (1)
Public-Key Cryptography (1)
Query Languages (1)
Risk Analysis (1)
Secure Computation (1)
Secure Payment Systems (1)
Security in E-Commerce (1)
Sfe (1)
Signatur (1)
Social Commerce (1)
Society (1)
Software Design (1)
Standards (1)
Symmetric Keys (1)
Symmetric-Key Algorithm (1)
Technology (1)
Trusted Computing (1)
Usability (1)
Vulnerability Analysis (1)
Web Services (1)
Schlagwort-Sachbuch auswählen
Schlagwort Sachbuch
E-Business (2)
E-Commerce (2)
Kodierungstheorie und Verschlüsselung (kryptologie) (2)
Netzwerk-Hardware (2)
Computersicherheit (1)
Informatik (1)
Informationstheorie (1)
Schaltkreise und Komponenten (bauteile) (1)
Sprache auswählen
Sprachen
Englisch (10)
Buchform auswählen (BC=Taschenbuch,BB=Gebunden)
Formate
Taschenbuch (8)
Gebunden (2)
Nur mit
-Notizen
Auf Lager
Sortiert nach
Übereinstimmung
Neueste
Preis absteigend
Preis aufsteigend
Seitenzahl aufsteigend
Seitenzahl absteigend
Suchergebnis
Gefundene Autoren:
Catherine H. Gebotys
oder
Thomas Schneider
eng
Computational Science and Its Applications ¿ ICCSA 2023 Workshops
Athens, Greece, July 3¿6, 2023, Proceedings, Part VI
Springer Nature Switzerland
2023
Taschenbuch
660 Seiten
96,29
€
in Kürze
eng
Computational Science and Its Applications ¿ ICCSA 2023 Workshops
Athens, Greece, July 3¿6, 2023, Proceedings, Part V
Springer Nature Switzerland
2023
Taschenbuch
760 Seiten
117,69
€
in Kürze
eng
Financial Cryptography and Data Security
26th International Conference, FC 2022, Grenada, May 2¿6, 2022, Revised Selected Papers
Springer International Publishing
2022
Taschenbuch
740 Seiten
117,69
€
in Kürze
This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, …
eng
Risks and Security of Internet and Systems
15th International Conference, CRiSIS 2020, Paris, France, November 4¿6, 2020, Revised Selected Papers
Springer International Publishing
2021
Taschenbuch
392 Seiten
53,49
€
in Kürze
This book constitutes the proceedings of the 15th International Conference on Risks and Security of Internet and Systems, CRiTIS 2020, which took pla…
eng
Cryptography
Breakthroughs in Research and Practice
Information Science Reference
2019
Gebunden
600 Seiten
443,60
€
in Kürze
eng
Electronic Payment Systems for Competitive Advantage in E-Commerce
Business Science Reference
2014
Gebunden
394 Seiten
233,60
€
in Kürze
eng
Advances in Network and Distributed Systems Security
IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26¿27, 2001, Leuven, Belgium
Springer US
2013
Taschenbuch
220 Seiten
160,49
€
in Kürze
practioners who want to get involved in this Working Group, are kindlyrequestedtocontactthechairman. MoreinformationontheworkingsofWG11.4isavailable …
eng
Thomas Schneider
Engineering Secure Two-Party Computation Protocols
Design, Optimization, and Applications of Efficient Secure Function Evaluation
Springer Berlin Heidelberg
2012
Taschenbuch
156 Seiten
128,39
€
in Kürze
eng
Catherine H. Gebotys
Security in Embedded Devices
Springer US
2012
Taschenbuch
312 Seiten
117,69
€
in Kürze
Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become increasingly important and widesprea…
eng
Security and Privacy in Dynamic Environments
Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden
Springer US
2010
Taschenbuch
512 Seiten
160,49
€
in Kürze
This book contains the Proceedings of the 21st IFIP TC-11 International Information Security Conference (IFIP/SEC 2006) on "Security and Privacy in D…