- 5 Resultados
precio mínimo: € 8,00, precio máximo: € 48,45, precio promedio: € 36,78
1
Department of Defense Sponsored Information Security Research - Cliff Wang; Steven King; Ralph Wachter; Robert Herklotz; Chris Arney; Gary Toth; David Hislop; Sharon Heise; Todd Combs
Pedir
por lehmanns.de
€ 43,99
PedirEnlace patrocinado
Cliff Wang; Steven King; Ralph Wachter; Robert Herklotz; Chris Arney; Gary Toth; David Hislop; Sharon Heise; Todd Combs:

Department of Defense Sponsored Information Security Research - Primera edición

2007, ISBN: 9780470128572

New Methods for Protecting Against Cyber Threats, eBooks, eBook Download (PDF), 1. Auflage, * After September 11th, the Department of Defense (DoD) undertooka massive and classified resea… Más…

Gastos de envío:Does not ship to your country., más gastos de envío
2
Department of Defense Sponsored Information Security Research : New Methods for Protecting Against Cyber Threats - Cliff Wang
Pedir
por hive.co.uk
£ 33,99
(aprox. € 39,45)
PedirEnlace patrocinado

Cliff Wang:

Department of Defense Sponsored Information Security Research : New Methods for Protecting Against Cyber Threats - libro nuevo

ISBN: 9780470128572

After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret infor… Más…

No. 9780470128572. Gastos de envío:Instock, Despatched same working day before 3pm, plus shipping costs., más gastos de envío
3
Department of Defense Sponsored Information Security Research - Cliff Wang, Steven King, Ralph Wachter, Robert Herklotz, Chris Arney, Gary Toth, David Hislop, Sharon Heise, Todd Combs
Pedir
por Perlego.com
€ 8,00 (Renta/mes)
Envío: € 0,001
Pedir (Renta/mes)Enlace patrocinado
Cliff Wang, Steven King, Ralph Wachter, Robert Herklotz, Chris Arney, Gary Toth, David Hislop, Sharon Heise, Todd Combs:
Department of Defense Sponsored Information Security Research (Renta mensual. Suscripción anual.)

ISBN: 9780470128572

Wiley Computer Networking extensive; pages; years; summarize; research; traditional; methods; critical; longer; infrastructures; adequate; information; department; extensive university re… Más…

Gastos de envío: EUR 0.00
4
Department of Defense Sponsored Information Security Research - Cliff Wang; Chris Arney; Todd Combs; Sharon Heise; Robert Herklotz; David Hislop; Steven King; Gary Toth; Ralph Wachter
Pedir
por lehmanns.de
€ 43,99
Envío: € 0,001
PedirEnlace patrocinado
Cliff Wang; Chris Arney; Todd Combs; Sharon Heise; Robert Herklotz; David Hislop; Steven King; Gary Toth; Ralph Wachter:
Department of Defense Sponsored Information Security Research - Primera edición

2007, ISBN: 9780470128572

New Methods for Protecting Against Cyber Threats, eBooks, eBook Download (PDF), 1. Auflage, [PU: Wiley], Wiley, 2007

Gastos de envío:Download sofort lieferbar. (EUR 0.00)
5
Department of Defense Information Security Report: The New Model for Protecting Networks Against Terrorist Threats
Pedir
por amazon.co.uk
£ 41,74
(aprox. € 48,45)
Envío: € 8,101
PedirEnlace patrocinado
Department of Defense Information Security Report: The New Model for Protecting Networks Against Terrorist Threats - libro nuevo

ISBN: 9780470128572

Digital Download, Produktgruppe: Digital Book Service, Subjects, Books, [PU: Wiley]

Gastos de envío:In stock. Lieferung von Amazon. (EUR 8.10) Amazon.co.uk

1Dado que algunas plataformas no nos comunican las condiciones de envío y éstas pueden depender del país de entrega, del precio de compra, del peso y tamaño del artículo, de una posible membresía a la plataforma, de una entrega directa por parte de la plataforma o a través de un tercero (Marketplace), etc., es posible que los gastos de envío indicados por eurolibro/terralibro no concuerden con los de la plataforma ofertante.

Datos bibliográficos del mejor libro coincidente

Detalles del libro

Detalles del libro - Department of Defense Sponsored Information Security Research


EAN (ISBN-13): 9780470128572
ISBN (ISBN-10): 0470128577
Año de publicación: 2007
Editorial: Wiley

Libro en la base de datos desde 2008-12-31T19:29:11-06:00 (Mexico City)
Página de detalles modificada por última vez el 2024-02-16T04:35:05-06:00 (Mexico City)
ISBN/EAN: 0470128577

ISBN - escritura alterna:
0-470-12857-7, 978-0-470-12857-2
Mode alterno de escritura y términos de búsqueda relacionados:
Autor del libro: wachter, david king, toth, king steven, ralph röber, hislop, sharon, herklotz, robert wang, cliff david, langley
Título del libro: information security, department


Datos del la editorial

Autor: Cliff Wang; Steven King; Ralph Wachter; Robert Herklotz; Chris Arney; Gary Toth; David Hislop; Sharon Heise; Todd Combs
Título: Department of Defense Sponsored Information Security Research - New Methods for Protecting Against Cyber Threats
Editorial: Wiley; John Wiley & Sons
688 Páginas
Año de publicación: 2008-02-13
Idioma: Inglés
43,99 € (DE)
Not available (reason unspecified)

EA; E107; E-Book; Nonbooks, PBS / Informatik, EDV/Datenkommunikation, Netzwerke; Computernetzwerke und maschinelle Kommunikation; Computer Science; Informatik; Networking; Netzwerk; Netzwerke; Netzwerke; BB

Foreword. Acknowledgements. Introduction (Steven King). Chapter 1. Architecting Information Infrastructures forSecurity (Cliff Wang). 1.1 Architectures for Secure and Robust DistributedInfrastructures. 1.2 A complex Adaptive System Approach to QoS Assurance andStateful Resource Management for Dependable InformationInfrastructure. 1.3 Anomaly and Misuse Detection in Network TrafficStreams-Checking and Machine Learning Approaches. 1.4 Distributed Systems Security via Logical Framework. 1.5 Distributed Immune Systems for Wireless Networks InformationAssurance. 1.6 Hi-DRA High-Speed, Wide-Area Network Detection, Response,and Analysis. Chapter 2. At the Edges of the Critical InformationInfrastructure (David Hislop, Todd Combs). 2.1 Enabling Dynamic Security Management of Networked Systemsvia Device-Embedded Security. 2.2 Software Model Checking for Embedded Systems. 2.3 Advanced tool Integration for Embedded System Assurance. 2.4 Verification Tools for Embedded Systems. Chapter 3. Software Engineering for Assurance (RalphWachter, Gary Toth). 3.1 Static Analysis to Enhance toe Power of Model Checking forConcurrent Software. 3.2 Protecting COTS from the Inside. 3.3 RAPIDware: Component-Based Development of Adaptive andDependable Middleware. 3.4 Generating Efficient Trust Management Software fromPolicies. 3.5 Modeling and Simulation Environment for Critical InformationProtection. Chapter 4. Malicious Mobile Code (Ralph Wachter, GaryToth). 4.1 Language-Based Security for Malicious Mobile Code. 4.2 Model-Carrying Code: A New Approach to Mobile-CodeSecurity. 4.3 Neutralizing Malicious Mobile Code. Chapter 5. Dependable Critical Information Infrastructure forCommand and Control (Robert Herklotz, Chris Arney). 5.1 Trustworthy Infrastructure, Mechanisms, and Experimentationfor Diffuse Computing. 5.2 Adaptable Situation-Aware Secure Services-Based Systems. 5.3 Detecting Deception in the Military Infosphere: Improvingand Integrating Human Detection Capabilities with AutomatedTools. 5.4 Vulnerability Assessment Tools for Complex InformationNetworks.

Más, otros libros, que pueden ser muy parecidos a este:

Último libro similar:
9780471787563 Department of Defense Information Security Report (Department of Defense; Bollinger, Terry)


< para archivar...