• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Dynamic Negotiation of Security Protocols in Distributed Systems » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946912]
• Literatura piękna
 [1852311]

  więcej...
• Turystyka
 [71421]
• Informatyka
 [150889]
• Komiksy
 [35717]
• Encyklopedie
 [23177]
• Dziecięca
 [617324]
• Hobby
 [138808]
• AudioBooki
 [1671]
• Literatura faktu
 [228371]
• Muzyka CD
 [400]
• Słowniki
 [2841]
• Inne
 [445428]
• Kalendarze
 [1545]
• Podręczniki
 [166819]
• Poradniki
 [480180]
• Religia
 [510412]
• Czasopisma
 [525]
• Sport
 [61271]
• Sztuka
 [242929]
• CD, DVD, Video
 [3371]
• Technologie
 [219258]
• Zdrowie
 [100961]
• Książkowe Klimaty
 [124]
• Zabawki
 [2341]
• Puzzle, gry
 [3766]
• Literatura w języku ukraińskim
 [255]
• Art. papiernicze i szkolne
 [7810]
Kategorie szczegółowe BISAC

Dynamic Negotiation of Security Protocols in Distributed Systems

ISBN-13: 9783639832204 / Angielski / Miękka / 2014 / 144 str.

Crisciani Flavio
Dynamic Negotiation of Security Protocols in Distributed Systems Crisciani Flavio 9783639832204 Edizioni Accademiche Italiane - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Dynamic Negotiation of Security Protocols in Distributed Systems

ISBN-13: 9783639832204 / Angielski / Miękka / 2014 / 144 str.

Crisciani Flavio
cena 200,37
(netto: 190,83 VAT:  5%)

Najniższa cena z 30 dni: 200,37
Termin realizacji zamówienia:
ok. 10-14 dni roboczych
Dostawa w 2026 r.

Darmowa dostawa!

Nowadays, recent technological innovations in low-power, low-cost communication miniature computing devices and sensors, make it possible to use them in an increasingly wide range of objects. Furthermore, their communication capabilities make it possible to build Networked Embedded Systems (NES) in which devices collaborate with each other and exhibit autonomous and coordinated behavior. Security, is a crucial requirement for an increasing number of embedded systems, ranging from low-end systems such as PDAs and networked sensors to high-end systems such as routers, gateways and storage servers. Technological growth, that spurred the development of these electronic types of systems, also ushered in the growth of adversary powers and sophistication in making attacks to those systems. In this work SecCom component has been implemented, it provides the secure communication service according to the application security policy. A security policy defines the sets of protocols that have to be applied in order to protect the communication among components in different physical devices. SecCom could negotiate the secure communication protocol as well as the cryptographic algorithms.

Nowadays, recent technological innovations in low-power, low-cost communication miniature computing devices and sensors, make it possible to use them in an increasingly wide range of objects. Furthermore, their communication capabilities make it possible to build Networked Embedded Systems (NES) in which devices collaborate with each other and exhibit autonomous and coordinated behavior. Security, is a crucial requirement for an increasing number of embedded systems, ranging from low-end systems such as PDAs and networked sensors to high-end systems such as routers, gateways and storage servers. Technological growth, that spurred the development of these electronic types of systems, also ushered in the growth of adversary powers and sophistication in making attacks to those systems. In this work SecCom component has been implemented, it provides the secure communication service according to the application security policy. A security policy defines the sets of protocols that have to be applied in order to protect the communication among components in different physical devices. SecCom could negotiate the secure communication protocol as well as the cryptographic algorithms.

Kategorie:
Technologie
Kategorie BISAC:
Technology & Engineering > Electronics - General
Wydawca:
Edizioni Accademiche Italiane
Język:
Angielski
ISBN-13:
9783639832204
Rok wydania:
2014
Ilość stron:
144
Waga:
0.22 kg
Wymiary:
22.86 x 15.24 x 0.86
Oprawa:
Miękka
Wolumenów:
01

Flavio Crisciani is a computer engineer that loves cutting-edge technologies with high innovation potential and disruptive impact.He started as R&D engineer in an Italian company focused on P2P networks right after the Master Thesis. One year later he moved to San Francisco, fascinated by the city and the great tech environment of the Bay Area.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia