• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Edgar R Weippl » książki

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Wyniki wyszukiwania:

wyszukanych pozycji: 11

Dostępność:
Kategoria:
Dostępny język:
Cena:
od:
do:
ilość na stronie:


 Contemporary Challenges and Solutions for Mobile and Multimedia Technologies Ismail Khalil Edgar Weippl 9781466621633
Contemporary Challenges and Solutions for Mobile and Multimedia Technologies

ISBN: 9781466621633 / Angielski / Twarda / 2012 / 377 str.

ISBN: 9781466621633/Angielski/Twarda/2012/377 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych (Bez gwarancji dostawy przed świętami)
Ismail Khalil; Edgar Weippl
Mobile computing and multimedia technologies continue to expand and change the way we interact with each other on a business and social level. With the increased use of mobile devices and the exchange of information over wireless networks, information systems are able to process and transmit multimedia data in various areas. Contemporary Challenges and Solutions for Mobile and Multimedia Technologies provides comprehensive knowledge on the growth and changes in the field of multimedia and mobile technologies. This reference source highlights the advancements in mobile technology that are...
Mobile computing and multimedia technologies continue to expand and change the way we interact with each other on a business and social level. With th...
cena: 971,12 zł

 Security in E-Learning Edgar R. Weippl 9781441937223
Security in E-Learning

ISBN: 9781441937223 / Angielski / Miękka / 2010 / 185 str.

ISBN: 9781441937223/Angielski/Miękka/2010/185 str.

Termin realizacji zamówienia: ok. 22 dni roboczych (Bez gwarancji dostawy przed świętami)
Edgar R. Weippl

As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this topic. Security in E-Learning discusses typical threats to e-learning projects and introduces how these issues have been and should be addressed. This knowledge is essential to conduct a security risk analysis effectively, because participants need to be aware of common threats, protection mechanisms and effort/cost issues. Based on the security risk analysis, appropriate preventive measures are thoroughly discussed in this...

As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this...

cena: 403,47 zł

 Security in E-Learning Edgar R. Weippl 9780387243412
Security in E-Learning

ISBN: 9780387243412 / Angielski / Twarda / 2005 / 185 str.

ISBN: 9780387243412/Angielski/Twarda/2005/185 str.

Termin realizacji zamówienia: ok. 22 dni roboczych (Bez gwarancji dostawy przed świętami)
Edgar R. Weippl

As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this topic. Security in E-Learning discusses typical threats to e-learning projects and introduces how these issues have been and should be addressed. This knowledge is essential to conduct a security risk analysis effectively, because participants need to be aware of common threats, protection mechanisms and effort/cost issues. Based on the security risk analysis, appropriate preventive measures are thoroughly discussed in this...

As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this...

cena: 403,47 zł

 Hardware Malware Edgar Weippl Christian Krieg Adrian Dabrowski 9783031012105
Hardware Malware

ISBN: 9783031012105 / Angielski / Miękka / 2013 / 103 str.

ISBN: 9783031012105/Angielski/Miękka/2013/103 str.

Termin realizacji zamówienia: ok. 22 dni roboczych (Bez gwarancji dostawy przed świętami)
Edgar Weippl;Christian Krieg;Adrian Dabrowski
In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest. The design and production process of integrated circuits is mostly decentralized due to...
In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or ...
cena: 133,12 zł

 Information and Communication Technology: International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedings Khabib Mustofa, Erich Neuhold, A Min Tjoa, Edgar R. Weippl, Ilsun You 9783642368172
Information and Communication Technology: International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013, Proceedings

ISBN: 9783642368172 / Angielski / Miękka / 2013 / 552 str.

ISBN: 9783642368172/Angielski/Miękka/2013/552 str.

Termin realizacji zamówienia: ok. 22 dni roboczych (Bez gwarancji dostawy przed świętami)
Khabib Mustofa;Erich Neuhold;A Min Tjoa
This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography,...
This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the ...
cena: 201,72 zł

 Trust, Privacy and Security in Digital Business: 17th International Conference, Trustbus 2020, Bratislava, Slovakia, September 14-17, 2020, Proceeding Stefanos Gritzalis Edgar R. Weippl Gabriele Kotsis 9783030589851
Trust, Privacy and Security in Digital Business: 17th International Conference, Trustbus 2020, Bratislava, Slovakia, September 14-17, 2020, Proceeding

ISBN: 9783030589851 / Angielski / Miękka / 2020 / 235 str.

ISBN: 9783030589851/Angielski/Miękka/2020/235 str.

Termin realizacji zamówienia: ok. 22 dni roboczych (Bez gwarancji dostawy przed świętami)
Stefanos Gritzalis; Edgar R. Weippl; Gabriele Kotsis
cena: 201,72 zł

 Empirical Research for Software Security: Foundations and Experience Lotfi Be Martin Gilje Jaatun Edgar Weippl 9780367572549
Empirical Research for Software Security: Foundations and Experience

ISBN: 9780367572549 / Angielski / Miękka / 2020 / 302 str.

ISBN: 9780367572549/Angielski/Miękka/2020/302 str.

Termin realizacji zamówienia: ok. 22 dni roboczych (Bez gwarancji dostawy przed świętami)
Lotfi Ben Othmane; Martin Gilje Jaatun; Edgar Weippl
cena: 219,45 zł

 Empirical Research for Software Security: Foundations and Experience Lotfi Be Martin Gilje Jaatun Edgar Weippl 9781498776417
Empirical Research for Software Security: Foundations and Experience

ISBN: 9781498776417 / Angielski / Twarda / 2017 / 302 str.

ISBN: 9781498776417/Angielski/Twarda/2017/302 str.

Termin realizacji zamówienia: ok. 22 dni roboczych (Bez gwarancji dostawy przed świętami)
Lotfi Ben Othmane; Martin Gilje Jaatun; Edgar Weippl

Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development...

Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on sha...

cena: 609,72 zł

 Availability, Reliability, and Security in Information Systems and HCI: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013, Proceeding Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu 9783642405105
Availability, Reliability, and Security in Information Systems and HCI: IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013, Proceeding

ISBN: 9783642405105 / Angielski / Miękka / 2013 / 504 str.

ISBN: 9783642405105/Angielski/Miękka/2013/504 str.

Termin realizacji zamówienia: ok. 22 dni roboczych (Bez gwarancji dostawy przed świętami)
Alfredo Cuzzocrea;Christian Kittl;Dimitris E. Simos
This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference on Availability, Reliability and Security, CD-ARES 2013, held in Regensburg, Germany, in September 2013. The 21 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of information systems bridging the gap between research results in computer science and the many application fields. They are organized in the following topical sections: economic, ethical, legal, multilingual, organizational and social...
This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference on Availability, Reliability and Se...
cena: 201,72 zł

 Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013, Proceedings Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu 9783642405877
Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013, Proceedings

ISBN: 9783642405877 / Angielski / Miękka / 2013 / 466 str.

ISBN: 9783642405877/Angielski/Miękka/2013/466 str.

Termin realizacji zamówienia: ok. 22 dni roboczych (Bez gwarancji dostawy przed świętami)
Alfredo Cuzzocrea;Christian Kittl;Dimitris E. Simos
This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework of the IFIP 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, in Regensburg, Germany, in September 2013. The 16 revised papers presented at MoCrySEn 2013 were carefully reviewed and selected from 30 submissions. They deal with symmetric-key cryptography, public-key cryptography,...
This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (...
cena: 201,72 zł

 Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, Xinwen Zhang 9783642309205
Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012, Proceedings

ISBN: 9783642309205 / Angielski / Miękka / 2012 / 341 str.

ISBN: 9783642309205/Angielski/Miękka/2012/341 str.

Termin realizacji zamówienia: ok. 22 dni roboczych (Bez gwarancji dostawy przed świętami)
Stefan Katzenbeisser;Edgar Weippl;L. Jean Camp
Constitutes the refereed proceedings of the 5th International Conference on "Trust and Trustworthy Computing", TRUST 2012, held in Vienna, Austria, in June 2012.
Constitutes the refereed proceedings of the 5th International Conference on "Trust and Trustworthy Computing", TRUST 2012, held in Vienna, Austria, in...
cena: 201,72 zł


Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia