0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings... Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings (Paperback, 1st ed. 2017)
Eric Bodden, Mathias Payer, Elias Athanasopoulos
R2,141 Discovery Miles 21 410 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Symposium on Engineering Secure Software and Systems, ESSoS 2017, held in Bonn, Germany in July 2017. The 12 full papers presented together with 3 short papers were carefully reviewed and selected from 32 submissions. The goal of this symposium is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering.

Engineering Secure Software and Systems - 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings... Engineering Secure Software and Systems - 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings (Paperback, 1st ed. 2016)
Juan Caballero, Eric Bodden, Elias Athanasopoulos
R2,221 Discovery Miles 22 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Symposium on Engineering Secure Software and Systems, ESSoS 2016, held in London, UK, in April 2016. The 13 full papers presented together with 3 short papers and 1 invited talk were carefully reviewed and selected from 50 submissions. The goal of this symposium, is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering. The presentations and associated publications at ESSoS 2016 contribute to this goal in several directions: First, by improving methodologies for secure software engineering (such as flow analysis and policycompliance). Second, with results for the detection and analysis of software vulnerabilities and the attacks they enable. Finally, for securing software for specific application domains (such as mobile devices and access control).

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Nintendo Joy-Con Neon Controller Pair…
R1,899 R1,489 Discovery Miles 14 890
Lucifer - Season 5
Tom Ellis DVD  (1)
R174 Discovery Miles 1 740
Shatter Me - 9-Book Collection
Tahereh Mafi Paperback R999 R660 Discovery Miles 6 600
Future Past
Duran Duran CD R187 R88 Discovery Miles 880
The Garden Within - Where the War with…
Anita Phillips Paperback R329 R239 Discovery Miles 2 390
Fisher-Price Laugh & Learn Smart Stages…
 (1)
R499 R439 Discovery Miles 4 390
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Parallel Mothers
Pedro Almodovar DVD R133 Discovery Miles 1 330
Sudocrem Skin & Baby Care Barrier Cream…
R210 Discovery Miles 2 100

 

Partners