Language: English
Published by Cham, Springer International Publishing., 2018
ISBN 10: 3030019497 ISBN 13: 9783030019495
Seller: Universitätsbuchhandlung Herta Hold GmbH, Berlin, Germany
First Edition
1st ed. 2018. 16 x 24 cm. XV, 818 S. XV, 818 p. 200 illus., 109 illus. in color. Softcover Versand aus Deutschland / We dispatch from Germany via Air Mail. Einband bestoßen, daher Mängelexemplar gestempelt, sonst sehr guter Zustand. Imperfect copy due to slightly bumped cover, apart from this in very good condition. Stamped. (Security and Cryptology; Lecture Notes in Computer Science). Sprache: Englisch.
Published by Qinghai Nationalities Publishing House, Xining, 1992
ISBN 10: 7542002961 ISBN 13: 9787542002969
Seller: Yak and Yeti Books, Denver, CO, U.S.A.
Soft cover. Condition: New. 241 pages. In Chinese.
Condition: New.
Condition: As New. Unread book in perfect condition.
Language: English
Published by ISTE Press - Elsevier 2017-11-17, 2017
ISBN 10: 1785482572 ISBN 13: 9781785482571
Seller: Chiron Media, Wallingford, United Kingdom
US$ 121.96
Quantity: Over 20 available
Add to basketHardcover. Condition: New.
Language: English
Published by ISTE Press - Elsevier, 2017
ISBN 10: 1785482572 ISBN 13: 9781785482571
Seller: Majestic Books, Hounslow, United Kingdom
US$ 135.60
Quantity: 3 available
Add to basketCondition: New.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
US$ 133.02
Quantity: Over 20 available
Add to basketCondition: New. In.
Language: English
Published by Elsevier Science Ltd, 2017
ISBN 10: 1785482572 ISBN 13: 9781785482571
Seller: Revaluation Books, Exeter, United Kingdom
US$ 137.54
Quantity: 2 available
Add to basketPaperback. Condition: Brand New. reprint edition. 250 pages. 8.75x5.75x0.75 inches. In Stock.
Language: English
Published by ISTE Press - Elsevier, 2017
ISBN 10: 1785482572 ISBN 13: 9781785482571
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. 1st edition NO-PA16APR2015-KAP.
US$ 133.00
Quantity: Over 20 available
Add to basketCondition: New.
US$ 148.97
Quantity: Over 20 available
Add to basketCondition: As New. Unread book in perfect condition.
Seller: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Ireland
Condition: New.
Condition: New. 1st ed. 2018 edition NO-PA16APR2015-KAP.
Language: English
Published by ISTE Press - Elsevier, 2017
ISBN 10: 1785482572 ISBN 13: 9781785482571
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New.
Language: English
Published by ISTE Press Ltd - Elsevier Inc, 2017
ISBN 10: 1785482572 ISBN 13: 9781785482571
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
US$ 151.94
Quantity: Over 20 available
Add to basketHardback. Condition: New. New copy - Usually dispatched within 4 working days.
Condition: New.
Language: English
Published by Springer-Verlag New York Inc, 2018
ISBN 10: 3030019497 ISBN 13: 9783030019495
Seller: Revaluation Books, Exeter, United Kingdom
US$ 187.91
Quantity: 2 available
Add to basketPaperback. Condition: Brand New. 836 pages. 9.25x6.10x1.57 inches. In Stock.
Language: English
Published by Springer International Publishing, Springer International Publishing, 2018
ISBN 10: 3030019497 ISBN 13: 9783030019495
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018.The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.
Seller: Mispah books, Redhill, SURRE, United Kingdom
US$ 192.30
Quantity: 1 available
Add to basketPaperback. Condition: New. NEW. SHIPS FROM MULTIPLE LOCATIONS. book.
Published by China Agricultural Science and Technology Press Pu, 2000
ISBN 10: 7511602029 ISBN 13: 9787511602022
Seller: liu xing, Nanjing, JS, China
paperback. Condition: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback. Language: Chinese with English summary. Pub. Date: 2010. the book is China Plant Pathology of the Ninth National Congress and the 2010 Annual Conference papers assembled. The conference received 438 papers. receiving paper based on the areas covered can be broadly divided into: Conference report abstracts 16. 140 fungi and fungal diseases. and diseases 45 prokaryotes. viruses and virus diseases 83 . nematodes and nematode disease 17. 42 plant disease resistance. forecasting and integrated disease prevention and control 18. 56 biological control. seed pathology and fungicides 21. These papers basically reflect our human resources. distribution of plant pathology. research. research level and the latest progress. Contents: The first part of the General Assembly on the human predicament and the way out - Plant Pathology scientists long way to go Unraveling the Molecular Mechanism of Resistance to the Rice Blast FungusCurrent Advances on Control of Viral Diseases of Papaya by Transgenic ApproachBacterial Pathogenesis as a Molecular Probe of Plant Immunity. Cell Biology and Jasmonate SignalingRecent Advances in the Studies on Cucumber Mosaic VirusPathogenomics and Bioinformatic Platforms for Fungal Plant PathogensFunctional Analysis of the Kinome of the Wheat Scab Fungus Fusarium graminearumAutophagy in Magnaporthe oryzae host genetic diversity and pathogenic evolution of Plant Pathology. the impact of epidemic Pseudomonas syringae Effector Proteins Reveal Regulatory Mechanisms of Plant ImmunityGenomics and Functional Genomics of Citrus Huanglongbing Bacterium. Candidatus Liberibacter asiaticusRNA shear body composition as a new class of M. grisea pathogenic factor RNA - Dependent RNA Polymerase 1 from Nicotiana tabacum Suppresses RNA Silencingand Enhances Viral Infection in Nicotiana benthamiana plant pathogenic Oomycete RXLR effector protein transmembrane transport mechanism of rice dwarf virus and the body of the insect-mediated interaction relationships What We are Learning from Whole Genome Studies of the Rice Blast Fungus? The second part of the fungi and fungal diseases of the third part of the fourth part of the prokaryotes and the danger of viruses and viral diseases and nematode worm disease Part V Part VI Part VII of plant disease resistance and disease forecasting the eighth part of the integrated control of biological control Part IX and fungicide seed pathologyFour Satisfaction guaranteed,or money back.
Seller: Brook Bookstore On Demand, Napoli, NA, Italy
Condition: new. Questo è un articolo print on demand.
Language: English
Published by ISTE Press - Elsevier, 2017
ISBN 10: 1785482572 ISBN 13: 9781785482571
Seller: Brook Bookstore On Demand, Napoli, NA, Italy
Condition: new. Questo è un articolo print on demand.
Language: English
Published by Springer International Publishing Okt 2018, 2018
ISBN 10: 3030019497 ISBN 13: 9783030019495
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018.The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management. 836 pp. Englisch.
Language: English
Published by Springer International Publishing, 2018
ISBN 10: 3030019497 ISBN 13: 9783030019495
Seller: moluna, Greven, Germany
US$ 110.77
Quantity: Over 20 available
Add to basketKartoniert / Broschiert. Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully se.
Seller: Majestic Books, Hounslow, United Kingdom
US$ 163.59
Quantity: 4 available
Add to basketCondition: New. Print on Demand.
Condition: New. PRINT ON DEMAND.
Language: English
Published by Springer, Springer Okt 2018, 2018
ISBN 10: 3030019497 ISBN 13: 9783030019495
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - Print on Demand Titel. Neuware -This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.Springer-Verlag KG, Sachsenplatz 4-6, 1201 Wien 836 pp. Englisch.
Language: English
Published by Elsevier Science Nov 2017, 2017
ISBN 10: 1785482572 ISBN 13: 9781785482571
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Buch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The software and networking industry is experiencing a rapid development and deployment of Network Functions Visualization (NFV) technology, in both enterprise and cloud data center networks. One of the primary reasons for this technological trend is that NFV has the capability to reduce CAPEX and OPEX, whilst increasing networking service efficiency, performance, agility, scalability, and resource utilization. Despite such well-recognized benefits, security remains a major concern of network service providers and seriously impedes the further expansion of NFV. This book is therefore dedicated to investigating and exploring the potential security issues of NFV. It contains three major elements: a thorough overview of the NFV framework and architecture, a comprehensive threat analysis aiming to establish a layer-specific threat taxonomy for NFV enabled networking services, and a series of comparative studies of security best practices in traditional networking scenarios and in NFV, ultimately leading to a set of recommendations on security countermeasures in NFV. This book is primarily intended for engineers, engineering students and researchers and those with an interest in the field of networks and telecommunications (architectures, protocols, services) in general, and particularly software-defined network (SDN) and network functions virtualization (NFV)-based security services. 272 pp. Englisch.
Seller: AHA-BUCH GmbH, Einbeck, Germany
Buch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - The software and networking industry is experiencing a rapid development and deployment of Network Functions Visualization (NFV) technology, in both enterprise and cloud data center networks. One of the primary reasons for this technological trend is that NFV has the capability to reduce CAPEX and OPEX, whilst increasing networking service efficiency, performance, agility, scalability, and resource utilization. Despite such well-recognized benefits, security remains a major concern of network service providers and seriously impedes the further expansion of NFV. This book is therefore dedicated to investigating and exploring the potential security issues of NFV. It contains three major elements: a thorough overview of the NFV framework and architecture, a comprehensive threat analysis aiming to establish a layer-specific threat taxonomy for NFV enabled networking services, and a series of comparative studies of security best practices in traditional networking scenarios and in NFV, ultimately leading to a set of recommendations on security countermeasures in NFV. This book is primarily intended for engineers, engineering students and researchers and those with an interest in the field of networks and telecommunications (architectures, protocols, services) in general, and particularly software-defined network (SDN) and network functions virtualization (NFV)-based security services.