Cantitate/Preț
Produs

ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings: IFIP Advances in Information and Communication Technology, cartea 428

Editat de Nora Cuppens-Boulahia, Frederic Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans
en Limba Engleză Paperback – 21 sep 2016
This book constitutes the refereed proceedings of the 29th IFIP TC 11 International Information Security and Privacy Conference, SEC 2014, held in Marrakech, Morocco, in June 2014. The 27 revised full papers and 14 short papers presented were carefully reviewed and selected from 151 submissions. The papers are organized in topical sections on intrusion detection, data security, mobile security, privacy, metrics and risk assessment, information flow control, identity management, identifiability and decision making, malicious behavior and fraud and organizational security.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 61450 lei  38-45 zile
  Springer Berlin, Heidelberg – 21 sep 2016 61450 lei  38-45 zile
Hardback (1) 62616 lei  38-45 zile
  Springer Berlin, Heidelberg – 5 iun 2014 62616 lei  38-45 zile

Din seria IFIP Advances in Information and Communication Technology

Preț: 61450 lei

Preț vechi: 76813 lei
-20% Nou

Puncte Express: 922

Preț estimativ în valută:
11761 12231$ 9842£

Carte tipărită la comandă

Livrare economică 10-17 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783662515419
ISBN-10: 3662515415
Pagini: 508
Ilustrații: XIV, 494 p. 94 illus. in color.
Dimensiuni: 155 x 235 x 26 mm
Greutate: 0.71 kg
Ediția:Softcover reprint of the original 1st ed. 2014
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria IFIP Advances in Information and Communication Technology

Locul publicării:Berlin, Heidelberg, Germany

Cuprins

Intrusion detection.- Data security.- Mobile security.- Privacy.- Metrics and risk assessment.- Information flow control.- Identity management.- Identifiability and decision making.- Malicious behavior and fraud.- Organizational security.