We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
£69.00
LAP Lambert Academic Publishing Runtime Verification of Information flow: Policy-Based Runtime Verification of Information Flow Control
Price data last checked 96 day(s) ago - refreshing...
We'll watch every seller, every day. One email when your price arrives.
It has never been this cheap. We have no record of a lower price.
£69 today · cheaper than every other day in the last 24 months
NEW HERE?
Amazon shows you one price. We show you all of them.
Tosheroon watches Amazon prices so you don't have to. Every product on Amazon has a price history — we make it visible. Set the price you'd actually pay, and we'll email you the second it gets there. No app, no account, one email.
WHAT'S ON THIS PAGE
when this has been cheap or pricey
where the price is heading next
all-time high & low, recent range
name your number, we'll email you
Price History & Forecast
Grey patches = out of stock. Cheaper = lower on the chart. Hover for exact prices.
Last 635 days • 635 data points (No recent data available)
Price Distribution
Price distribution over 635 days • 1 price levels
Price Analysis
Most common price: £69 (635 days, 100.0%)
Price range: £69 - £69
Price levels: 1 different prices over 635 days
Description
Product Specifications
- Format
- paperback
- ASIN
- 3845432748
- Domain
- Amazon UK
- Release Date
- 07 August 2011
- Listed Since
- 12 August 2011
Barcode
No barcode data available
Similar Products You Might Like
Expressing Information Flow Properties (Foundations and Trends® in Privacy and Security)
CRC Press Intrusion Detection Networks - Collaborative Security
CRC Press
Formal Aspects in Security and Trust: IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22-27, ... and Communication Technology, 173)
Springer
Principles of Information Security
Cengage Learning
E-Commerce Security and Privacy: 2 (Advances in Information Security, 2)
Springer
Routledge Information Security: Policy, Processes, and Practices
Routledge
Computer and Information Security Handbook
Morgan Kaufmann
Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics (Advances in Information Security, Privacy, and Ethics)
Information Science Reference
Elementary Information Security
Jones & Bartlett Learning
Integrity and Internal Control in Information Systems: Volume 1: Increasing the confidence in information systems (IFIP Advances in Information and Communication Technology)
Springer
Computer Security: Art and Science
Addison Wesley
Mitigating Information Security Risks during Operation Transition: Model and Data
LAP Lambert Academic Publishing
Integrity and Internal Control in Information Systems: IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in ... ... Information and Communication Technology, 9)
Springer
Mehrseitige Sicherheit in offenen Netzen: Grundlagen, praktische Umsetzung und in Java implementierte Demonstrations-Software (DuD-Fachbeiträge)
Vieweg+Teubner Verlag
Springer Integrity and Internal Control in Information Systems
Springer
Information Security and Employee Behaviour: How to Reduce Risk Through Employee Education, Training and Awareness
Routledge
Security in Cyber-Physical Systems: Foundations and Applications: 339 (Studies in Systems, Decision and Control, 339)
Springer
The Operational Excellence Library; Mastering Industrial Cybersecurity Frameworks
Information and Network Security Management: Strategic Concept Applications
CREATESPACE
Security in Computing
PEARSON EDUCATION
Securing Information and Communications Systems: Principles, Technologies, and Applications (Information Security & Privacy)
Artech House
Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin (Information Security and Cryptography)
Springer
Information Security Management Handbook, Volume 5
CRC Press
Introduction to Computer and Network Security: Navigating Shades of Gray
CRC Press