TOP
0
0
即日起~6/30,暑期閱讀書展,好書7折起

縮小範圍


商品類型

原文書 (8)
商品狀況

可訂購商品 (8)
庫存狀況

無庫存 (8)
商品定價

$800以上 (8)
出版日期

2018~2019 (1)
2016~2017 (1)
2016年以前 (6)
裝訂方式

平裝 (2)
精裝 (6)
作者

Sushil Jajodia (EDT)/ Peng Liu (EDT)/ Vipin Swarup (EDT)/ Cliff Wang (EDT) (2)
Sushil Jajodia (EDT)/ V. S. Subrahmanian (EDT)/ Vipin Swarup (EDT)/ Cliff Wang (EDT) (2)
Sushil Jajodia (EDT)/ Anup K. Ghosh (EDT)/ V. S. Subrahmanian (EDT)/ Vipin Swarup (EDT)/ Cliff Wang (EDT) (1)
Sushil Jajodia (EDT)/ Anup K. Ghosh (EDT)/ Vipin Swarup (EDT)/ Cliff Wang (EDT)/ Wang, (1)
Sushil Jajodia (EDT)/ Krishna Kant (EDT)/ Pierangela Samarati (EDT)/ Anoop Singhal (EDT)/ Vipin Swarup (EDT) (1)
Sushil Jajodia (EDT)/ Paulo Shakarian (EDT)/ V. S. Subrahmanian (EDT)/ Vipin Swarup (EDT)/ Cliff Wang (EDT) (1)
出版社/品牌

Springer Verlag (4)
Springer-Verlag New York Inc (2)
PBKSPRNC (1)
Springer-Nature New York Inc (1)

三民網路書店 / 搜尋結果

8筆商品,1/1頁
Secure Cloud Computing
This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli,
若需訂購本書,請電洽客服
02-25006600[分機130、131]。
Cyber Situational Awareness ― Issues and Research
作者:Sushil Jajodia (EDT); Peng Liu (EDT); Vipin Swarup (EDT); Cliff Wang (EDT)  出版社:Springer Verlag  出版日:2012/02/25 裝訂:平裝
Today, when a security accident occurs, the top three questions security administrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the first two quest
若需訂購本書,請電洽客服
02-25006600[分機130、131]。
Moving Target Defense
作者:Sushil Jajodia (EDT); Anup K. Ghosh (EDT); Vipin Swarup (EDT); Cliff Wang (EDT); Wang  出版社:PBKSPRNC  出版日:2011/08/26 裝訂:精裝
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and iden
若需訂購本書,請電洽客服
02-25006600[分機130、131]。
Cyber Situational Awareness
作者:Sushil Jajodia (EDT); Peng Liu (EDT); Vipin Swarup (EDT); Cliff Wang (EDT)  出版社:Springer Verlag  出版日:2009/11/04 裝訂:精裝
Today, when a security accident occurs, the top three questions security administrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the first two quest
若需訂購本書,請電洽客服
02-25006600[分機130、131]。
Cyber Deception ― Building the Scientific Foundation
This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory,
若需訂購本書,請電洽客服
02-25006600[分機130、131]。
Cyber Warfare ― Building the Scientific Foundation
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundatio
若需訂購本書,請電洽客服
02-25006600[分機130、131]。
Cyber Deception ― Building the Scientific Foundation
This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory,
若需訂購本書,請電洽客服
02-25006600[分機130、131]。
Moving Target Defense II—Application of Game Theory and Adversarial Modeling
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cy
若需訂購本書,請電洽客服
02-25006600[分機130、131]。

暢銷榜

客服中心

收藏

會員專區