Cantitate/Preț
Produs

ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings: IFIP Advances in Information and Communication Technology, cartea 428

Editat de Nora Cuppens-Boulahia, Frederic Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans
en Limba Engleză Hardback – 5 iun 2014
This book constitutes the refereed proceedings of the 29th IFIP TC 11 International Information Security and Privacy Conference, SEC 2014, held in Marrakech, Morocco, in June 2014. The 27 revised full papers and 14 short papers presented were carefully reviewed and selected from 151 submissions. The papers are organized in topical sections on intrusion detection, data security, mobile security, privacy, metrics and risk assessment, information flow control, identity management, identifiability and decision making, malicious behavior and fraud and organizational security.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 61450 lei  38-44 zile
  Springer Berlin, Heidelberg – 21 sep 2016 61450 lei  38-44 zile
Hardback (1) 62616 lei  38-44 zile
  Springer Berlin, Heidelberg – 5 iun 2014 62616 lei  38-44 zile

Din seria IFIP Advances in Information and Communication Technology

Preț: 62616 lei

Preț vechi: 78269 lei
-20% Nou

Puncte Express: 939

Preț estimativ în valută:
11983 12448$ 9954£

Carte tipărită la comandă

Livrare economică 29 ianuarie-04 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783642554148
ISBN-10: 3642554148
Pagini: 508
Ilustrații: XIV, 494 p. 94 illus. in color.
Dimensiuni: 155 x 235 x 33 mm
Greutate: 0.89 kg
Ediția:2014
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria IFIP Advances in Information and Communication Technology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Intrusion detection.- Data security.- Mobile security.- Privacy.- Metrics and risk assessment.- Information flow control.- Identity management.- Identifiability and decision making.- Malicious behavior and fraud.- Organizational security.