Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Security in Computing Systems

Best Price (Coupon Required):
Buy Security in Computing Systems for $116.10 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $129.00 - $129.00
BEST PRICE

Single Product Purchase

$116.10
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$129.00 $129.00

10% OFF
This deals requires coupon
$116.10
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783540784418
Condition
New
Product Description

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. Here, computing refers to all activities which individuals or groups directly or indirectly perform by means of computing s- tems, i. e. , by means of computers and networks of them built on telecommuni- tion. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the information society, we are challenged to maintain our values, to pursue our goals and to enforce our interests, by consciously desi- ing a global information infrastructure on a large scale as well as by approp- ately configuring our personal computers on a small scale. As a result, we hope to achieve secure computing: Roughly speaking, computer-assisted activities of in- viduals and computer-mediated cooperation between individuals should happen as required by each party involved, and nothing else which might be harmful to any party should occur. The notion of security circumscribes many aspects, ranging from human qua- ties to technical enforcement. First of all, in considering the explicit security requirements of users, administrators and other persons concerned, we hope that usually all persons will follow the stated rules, but we also have to face the pos- bility that some persons might deviate from the wanted behavior, whether ac- dently or maliciously.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Myth and Memory in the Mediterranean

Myth and Memory in the Mediterranean

$169.99
Statistical Properties of the Generalized Inverse Gaussian Distribution

Statistical Properties of the Generalized Inverse Gaussian Distribution

$54.99
Liberal Democracy

Liberal Democracy

$17.99
Algorithms for VLSI Physical Design Automation

Algorithms for VLSI Physical Design Automation

$99.00
Exploring Sustainable Land Use in Monsoon Asia

Exploring Sustainable Land Use in Monsoon Asia

$109.99
The New Employee Contract

The New Employee Contract

$27.99
Stringer-Panel Models in Structural Concrete

Stringer-Panel Models in Structural Concrete

$24.99
Suspensions of Colloidal Particles and Aggregates

Suspensions of Colloidal Particles and Aggregates

$169.99
Umhegt oder abhngig?

Umhegt oder abhngig?

$79.99
500 Years of Christianity and the Global Filipino/a

500 Years of Christianity and the Global Filipino/a

$129.99
FDG-PET/CT and PET/MR in Cardiovascular Diseases

FDG-PET/CT and PET/MR in Cardiovascular Diseases

$109.99
Ionic Soft Matter: Modern Trends in Theory and Applications

Ionic Soft Matter: Modern Trends in Theory and Applications

$109.99
Sparsame, sachgeme Krankenbehandlung

Sparsame, sachgeme Krankenbehandlung

$59.99
Global University Rankings and the Mediatization of Higher Education

Global University Rankings and the Mediatization of Higher Education

$54.99
Massive Open Online Courses im Kontext von Persnlichkeit und Prokrastination

Massive Open Online Courses im Kontext von Persnlichkeit und Prokrastination

$44.99
Collaborative Public Diplomacy

Collaborative Public Diplomacy

$54.99
Cell Activation and Apoptosis in HIV Infection

Cell Activation and Apoptosis in HIV Infection

$39.99
Planung und Auslegung des Materialflusses flexibler Fertigungssysteme

Planung und Auslegung des Materialflusses flexibler Fertigungssysteme

$69.99
Islam und die deutsche Gesellschaft

Islam und die deutsche Gesellschaft

$64.99
Perspectives in Antiinfective Therapy

Perspectives in Antiinfective Therapy

$59.99
Methoden der Programmerstellung fr Tisch- und Taschenrechner

Methoden der Programmerstellung fr Tisch- und Taschenrechner

$59.99
Endocytosis and Signaling

Endocytosis and Signaling

$179.99
Steuerung und Kontrolle von Investitionsprozessen

Steuerung und Kontrolle von Investitionsprozessen

$59.99
Therapie mit Allopurinol

Therapie mit Allopurinol

$59.99
Japanische Plakate Sechziger Jahre bis heute

Japanische Plakate Sechziger Jahre bis heute

$24.99
Knowledge and Demonstration

Knowledge and Demonstration

$109.99
Intuitive Judgments of Change

Intuitive Judgments of Change

$39.99
Arzneipflanzenkultur und Kruterhandel

Arzneipflanzenkultur und Kruterhandel

$49.99
Microbiota and Biofertilizers

Microbiota and Biofertilizers

$199.99
Zielorientierte Unternehmensfinanzierung

Zielorientierte Unternehmensfinanzierung

$59.99
Economic and Monetary Union Macroeconomic Policies

Economic and Monetary Union Macroeconomic Policies

$54.99
Explorations in Phenomenology

Explorations in Phenomenology

$54.99
Proteases in the Brain

Proteases in the Brain

$129.00
Perfumes

Perfumes

$69.99
Technische Arbeit Einst und Jetzt

Technische Arbeit Einst und Jetzt

$59.99
Rethinking Technology and Engineering

Rethinking Technology and Engineering

$119.00
Knowledge, Learning and Innovation

Knowledge, Learning and Innovation

$84.99
Pervasive Wireless Environments: Detecting and Localizing User Spoofing

Pervasive Wireless Environments: Detecting and Localizing User Spoofing

$39.99
Aktuelle Perspektiven der Biologischen Psychiatrie

Aktuelle Perspektiven der Biologischen Psychiatrie

$59.99
IBM Personal System/2

IBM Personal System/2

$69.99
previous
next