We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
£43.29
Springer Modeling and Analyzing Security Protocols with Tamarin: A Comprehensive Guide (Information Security and Cryptography)
Price data last checked 21 day(s) ago - will refresh soon
We'll watch every seller, every day. One email when your price arrives.
It has never been this cheap. We have no record of a lower price.
£43 today · cheaper than every other day in the last 3 months
NEW HERE?
Amazon shows you one price. We show you all of them.
Tosheroon watches Amazon prices so you don't have to. Every product on Amazon has a price history — we make it visible. Set the price you'd actually pay, and we'll email you the second it gets there. No app, no account, one email.
WHAT'S ON THIS PAGE
when this has been cheap or pricey
where the price is heading next
all-time high & low, recent range
name your number, we'll email you
Price History & Forecast
Grey patches = out of stock. Cheaper = lower on the chart. Hover for exact prices.
Last 70 days • 15 data points (No recent data available)
Price Distribution
Price distribution over 70 days • 2 price levels
Price Analysis
Most common price: £45 (14 days, 93.3%)
Price range: £43 - £45
Price levels: 2 different prices over 15 days
Description
Product Specifications
- Brand
- Springer
- Format
- hardcover
- ASIN
- 3031909356
- Category
- Books > Subjects > Computing & Internet > Networking & Security > Introduction to Network & Security
- Domain
- Amazon UK
- Release Date
- 28 July 2025
- Listed Since
- 18 March 2025
Barcode
No barcode data available
Similar Products You Might Like
Secure Transaction Protocol Analysis: Models and Applications: 5111 (Lecture Notes in Computer Science, 5111)
Springer
Understanding and Applying Cryptography and Data Security
CRC Press
Cryptographic Protocol: Security Analysis Based on Trusted Freshness
Springer
Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali (ACM Collection II)
Morgan & Claypool
Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation
Springer
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption
No Starch Press
Foundations of Cryptography v1: Volume 1, Basic Tools
Cambridge University Press
Cryptographic Security Architecture: Design and Verification
Springer
Cryptography Made Simple (Information Security and Cryptography)
Springer
Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I: 9562 (Lecture Notes in Computer Science, 9562)
Springer
Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I: 8042 (Lecture Notes in Computer Science, 8042)
Springer
Advances in Cryptology -- CRYPTO 2014: 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II: 8617 (Lecture Notes in Computer Science, 8617)
Springer
Trusted Computing Platforms: Design and Applications
Springer
Boolean Functions and Their Applications in Cryptography: 0 (Advances in Computer Science and Technology)
Springer
Modern Cryptography: Applied Mathematics for Encryption and Information Security
Springer
Springer Mathematical Modelling for Next-Generation Cryptography
Springer
A Multidisciplinary Introduction to Information Security (Discrete Mathematics and Its Applications)
CRC Press
Pro Cryptography and Cryptanalysis with C++23: Creating and Programming Advanced Algorithms
Apress
Springer Lattice-Based Cryptosystems: A Design Perspective
Springer
Classical and Physical Security of Symmetric Key Cryptographic Algorithms (Computer Architecture and Design Methodologies)
Springer
Cryptography: Theory and Practice, Fourth Edition (Chapman & Hall/CRC Cryptography and Network Security Series)
CRC Press
Practical Mathematical Cryptography (Chapman & Hall/CRC Cryptography and Network Security Series)
Attribute-Based Encryption and Access Control: From Theory to Practice (Data-Enabled Engineering)
CRC Press