425,06 €
472,29 €
-10% with code: EXTRA
Analyzing Security, Trust, and Crime in the Digital World
Analyzing Security, Trust, and Crime in the Digital World
425,06
472,29 €
  • We will send in 10–14 business days.
In the digital era, information is the most valuable resource, and protecting one's assets is a constant struggle for both individuals and organizations. Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to furth…
  • SAVE -10% with code: EXTRA

Analyzing Security, Trust, and Crime in the Digital World (e-book) (used book) | bookbook.eu

Reviews

Description

In the digital era, information is the most valuable resource, and protecting one's assets is a constant struggle for both individuals and organizations. Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to further defend their own systems and protect the information therein.

EXTRA 10 % discount with code: EXTRA

425,06
472,29 €
We will send in 10–14 business days.

The promotion ends in 19d.19:59:32

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 4,72 Book Euros!?

In the digital era, information is the most valuable resource, and protecting one's assets is a constant struggle for both individuals and organizations. Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to further defend their own systems and protect the information therein.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)