Spedizione gratuita con Packeta per un prezzo superiore a 79.99 €
BRT 7.99 Punto BRT 7.99 DHL 7.99 HR Parcel 7.49 GLS 3.99

Communications and Multimedia Security

Libro Communications and Multimedia Security Bart de Decker
Codice Libristo: 05194122
This book constitutes the refereed proceedings of the 15th IFIP TC 6/TC 11 International Conference... Descrizione completa
? points 141 b
59.83
Magazzino esterno in piccole quantità Inviamo tra 13-16 giorni

30 giorni per il reso


Potrebbe interessarti anche


I MIGLIORI
Avatar: The Last Airbender - The Promise Part 2 Gene Luen Yang / In brossura
common.buy 13.26
I MIGLIORI
High School DxD, Vol. 1 Hiroji Mishima / In brossura
common.buy 13.69
Dynamic Wrinkles and Drapery Burne Hogarth / In brossura
common.buy 24.72
Ultimate Tattoo Apprentice Training Guide MR Stephan Hawke / In brossura
common.buy 18.72
Field Guide to the Birds of Brazil Ber van Perlo / In brossura
common.buy 65.93
Mahabharata, Volume 3 van Buitenen / In brossura
common.buy 71.60
Less Than One Joseph Brodsky / In brossura
common.buy 19.69
Medusa Clive Cussler / In brossura
common.buy 14.55
Golden Step Christopher Somerville / In brossura
common.buy 13.26
Actor's Handbook Constantin Stanislavski / In brossura
common.buy 30.28
Something about the Author, Volume 251 Lisa Kumar / Rigido
common.buy 467.55
Ionic Liquids Barbara Kirchner / In brossura
common.buy 425.91
Visions Michio Kaku / In brossura
common.buy 47.41
From Sea to Shining Sea - 1787-1837 Peter Marshall / In brossura
common.buy 23.43
Teen Guide Job Search Donald L Wilkes / In brossura
common.buy 18.08

This book constitutes the refereed proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2014, held in Aveiro, Portugal, in September 2014.§The 4 revised full papers presented together with 6 short papers, 3 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on vulnerabilities and threats, identification and authentification, applied security.

Regala questo libro oggi stesso
È facile
1 Aggiungi il libro al carrello e scegli la consegna come regalo 2 Ti invieremo subito il buono 3 Il libro arriverà all'indirizzo del destinatario

Accesso

Accedi al tuo account. Non hai ancora un account Libristo? Crealo ora!

 
obbligatorio
obbligatorio

Non hai un account? Ottieni i vantaggi di un account Libristo!

Con un account Libristo, avrai tutto sotto controllo.

Crea un account Libristo