Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Analysis Techniques for Information Security

Best Price (Coupon Required):
Buy Analysis Techniques for Information Security for $27.00 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

2 Offers Price Range: $29.99 - $40.00
BEST PRICE

Single Product Purchase

$27.00
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$29.99 $29.99

10% OFF
This deals requires coupon
$27.00
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783031023347
Condition
New
Product Description

Increasingly our critical infrastructures are reliant on computers. We see examples of such infrastructures in several domains, including medical, power, telecommunications, and finance. Although automation has advantages, increased reliance on computers exposes our critical infrastructures to a wider variety and higher likelihood of accidental failures and malicious attacks. Disruption of services caused by such undesired events can have catastrophic effects, such as disruption of essential services and huge financial losses. The increased reliance of critical services on our cyberinfrastructure and the dire consequences of security breaches have highlighted the importance of information security. Authorization, security protocols, and software security are three central areas in security in which there have been significant advances in developing systematic foundations and analysis methods that work for practical systems. This book provides an introduction to this work, covering representative approaches, illustrated by examples, and providing pointers to additional work in the area. Table of Contents: Introduction / Foundations / Detecting Buffer Overruns Using Static Analysis / Analyzing Security Policies / Analyzing Security Protocols.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

52 Stunden Informatik

52 Stunden Informatik

$29.99
Newtons Physics and the Conceptual Structure of the Scientific Revolution

Newtons Physics and the Conceptual Structure of the Scientific Revolution

$259.00
Fortschritte der Chemie organischer Naturstoffe / Progress in the Chemistry of Organic Natural Produ

Fortschritte der Chemie organischer Naturstoffe / Progress in the Chemistry of Organic Natural Produ

$39.99
Aesthetic Surgery of the Buttock

Aesthetic Surgery of the Buttock

$189.00
Moderne Flugsicherung

Moderne Flugsicherung

$84.99
Liver Cirrhosis

Liver Cirrhosis

$54.99
Breast Cancer

Breast Cancer

$109.99
Cure of Thermosetting Resins

Cure of Thermosetting Resins

$84.99
Make a 2D RPG in a Weekend

Make a 2D RPG in a Weekend

$39.99
Smart Societies, Infrastructure, Technologies and Applications

Smart Societies, Infrastructure, Technologies and Applications

$54.99
Papyri from the Washington University Collection St. Louis, Missouri

Papyri from the Washington University Collection St. Louis, Missouri

$54.99
Earth and Gods

Earth and Gods

$129.00
Recent Developments in Alcoholism

Recent Developments in Alcoholism

$169.00
Multicriteria Decision Aid and Resource Management

Multicriteria Decision Aid and Resource Management

$179.99
Drugs and Alcohol

Drugs and Alcohol

$54.99
The Valuation of Digital Intangibles

The Valuation of Digital Intangibles

$169.99
Decolonial Puerto Rican Women's Writings

Decolonial Puerto Rican Women's Writings

$59.99
The High Latitude Heliosphere

The High Latitude Heliosphere

$39.99
Transient Effects in Simulations of Hybrid Electric Drivetrains

Transient Effects in Simulations of Hybrid Electric Drivetrains

$54.99
Advances in Human Factors, Business Management and Leadership

Advances in Human Factors, Business Management and Leadership

$219.99
Fit fr gute 120 Jahre

Fit fr gute 120 Jahre

$24.99
Web Indicators for Research Evaluation

Web Indicators for Research Evaluation

$44.99
Local Governance Reform in Global Perspective

Local Governance Reform in Global Perspective

$44.99
Immunological and Clinical Aspects of Allergy

Immunological and Clinical Aspects of Allergy

$39.99
SAS  Eine anwendungsorientierte Einfhrung

SAS Eine anwendungsorientierte Einfhrung

$69.99
Kleidung und Schmuck

Kleidung und Schmuck

$29.99
COVID-19 Pandemic

COVID-19 Pandemic

$169.99
Sustainable Use of Feed Additives in Livestock

Sustainable Use of Feed Additives in Livestock

$249.99
Nanostructured and Advanced Materials for Applications in Sensor, Optoelectronic and Photovoltaic Te

Nanostructured and Advanced Materials for Applications in Sensor, Optoelectronic and Photovoltaic Te

$219.99
The Economic and Political Development of the Sudan

The Economic and Political Development of the Sudan

$59.99
Simulated Evolution and Learning

Simulated Evolution and Learning

$84.99
Wahlen und Whler

Wahlen und Whler

$59.99
Disorders of the Patellofemoral Joint

Disorders of the Patellofemoral Joint

$49.99
Logotherapy and Existential Analysis

Logotherapy and Existential Analysis

$199.99
Nachhaltig erfolgreiches Bankmanagement

Nachhaltig erfolgreiches Bankmanagement

$49.99
Die Brownsche Bewegung und Einige Verwandte Erscheinungen

Die Brownsche Bewegung und Einige Verwandte Erscheinungen

$59.99
Sozialwissenschaftliche Hermeneutik

Sozialwissenschaftliche Hermeneutik

$64.99
Pattern Recognition in Bioinformatics

Pattern Recognition in Bioinformatics

$39.99
Wireless Networks

Wireless Networks

$169.99
The Flowchart Approach to Industrial Cluster Policy

The Flowchart Approach to Industrial Cluster Policy

$109.99
previous
next