Language: English
Published by Rheinwerk Publishing, 2020
ISBN 10: 1493219995 ISBN 13: 9781493219995
Seller: Red's Corner LLC, Tucker, GA, U.S.A.
First Edition
Hardcover. Condition: Very Good. First Edition. Grade 3 out 5 points. This is a used book. Book has wear on cover and pages. May have personalized notes/names, stickers/labels. Has no markings on pages. May not include extra materials like access codes, CDs, accessories, etc. All orders ship by next business day! We are a small company and very thankful for your business!
Language: English
Published by Rheinwerk Publishing, Inc., 2024
ISBN 10: 1493225790 ISBN 13: 9781493225798
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
US$ 113.20
Quantity: 3 available
Add to basketHRD. Condition: New. New Book. Shipped from UK. Established seller since 2000.
Language: English
Published by LAP LAMBERT Academic Publishing, 2017
ISBN 10: 3659128570 ISBN 13: 9783659128578
Seller: preigu, Osnabrück, Germany
Taschenbuch. Condition: Neu. Secure communication in p2p networks | Implementing secure key management for peer to peer networks | Mohammed Azharuddin Adhoni | Taschenbuch | 124 S. | Englisch | 2017 | LAP LAMBERT Academic Publishing | EAN 9783659128578 | Verantwortliche Person für die EU: preigu GmbH & Co. KG, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu.
Language: English
Published by Rheinwerk Verlag GmbH, 2024
ISBN 10: 1493225790 ISBN 13: 9781493225798
Seller: moluna, Greven, Germany
Condition: New.
Seller: Revaluation Books, Exeter, United Kingdom
US$ 159.39
Quantity: 2 available
Add to basketHardcover. Condition: Brand New. 2nd enlarged edition. 484 pages. 10.00x7.00x10.00 inches. In Stock.
Seller: PAPER CAVALIER US, Brooklyn, NY, U.S.A.
Condition: as new. Appears unread. May have a retail sticker on back cover or remainder mark on the text block.
Language: English
Published by LAP LAMBERT Academic Publishing, 2012
ISBN 10: 3659128570 ISBN 13: 9783659128578
Seller: Mispah books, Redhill, SURRE, United Kingdom
US$ 197.23
Quantity: 1 available
Add to basketpaperback. Condition: New. NEW. SHIPS FROM MULTIPLE LOCATIONS. book.
Language: English
Published by LAP LAMBERT Academic Publishing Mai 2012, 2012
ISBN 10: 3659128570 ISBN 13: 9783659128578
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Increased security does not provide comfort to paranoid people. Security with some very basic protections that we are naive to believe,that we do not need. During this time when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. The main theme of any successful cryptographic protocol lies on the encryption and decryption process. Now when we say this, the key used for the mentioned processes comes into picture. 124 pp. Englisch.
Language: English
Published by LAP LAMBERT Academic Publishing, 2012
ISBN 10: 3659128570 ISBN 13: 9783659128578
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Adhoni Mohammed azharuddinI completed my masters of technology in computer science and engineering from M.S.R.I.T,Bangalore in 2011.Currently I am working as an Assistant Professor at department of information science and engineering.
Language: English
Published by LAP LAMBERT Academic Publishing Mai 2012, 2012
ISBN 10: 3659128570 ISBN 13: 9783659128578
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - Print on Demand Titel. Neuware -Increased security does not provide comfort to paranoid people. Security with some very basic protections that we are naive to believe,that we do not need. During this time when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. The main theme of any successful cryptographic protocol lies on the encryption and decryption process. Now when we say this, the key used for the mentioned processes comes into picture.VDM Verlag, Dudweiler Landstraße 99, 66123 Saarbrücken 124 pp. Englisch.
Language: English
Published by LAP LAMBERT Academic Publishing, 2012
ISBN 10: 3659128570 ISBN 13: 9783659128578
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Increased security does not provide comfort to paranoid people. Security with some very basic protections that we are naive to believe,that we do not need. During this time when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. The main theme of any successful cryptographic protocol lies on the encryption and decryption process. Now when we say this, the key used for the mentioned processes comes into picture.