Cantitate/Preț
Produs

Information Security: 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papers: Communications in Computer and Information Science, cartea 973

Editat de Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff
en Limba Engleză Paperback – 25 ian 2019
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018.
The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.
Citește tot Restrânge

Din seria Communications in Computer and Information Science

Preț: 31593 lei

Preț vechi: 39492 lei
-20% Nou

Puncte Express: 474

Preț estimativ în valută:
6046 6379$ 5039£

Carte tipărită la comandă

Livrare economică 02-16 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030114060
ISBN-10: 3030114066
Pagini: 193
Ilustrații: XVI, 193 p. 38 illus., 23 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.3 kg
Ediția:1st ed. 2019
Editura: Springer International Publishing
Colecția Springer
Seria Communications in Computer and Information Science

Locul publicării:Cham, Switzerland

Cuprins

Authentication.- Access control.- Digital (cyber) forensics.- Cyber security.- Mobile and wireless security.- Privacy-preserving protocols.- Authorization.- Trust frameworks.- Security requirements.- Formal security models.- Malware and its mitigation.- Intrusion detection systems.- Social engineering.- Operating systems security.- Browser security.- Denial-of-service attacks.- Vulnerability management.- File system security.- Firewalls.- Web protocol security.- Digital rights management.- Distributed systems security.