Cantitate/Preț
Produs

Information Security: 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers: Lecture Notes in Computer Science, cartea 6531

Editat de Mike Burmester, Gene Tsudik, Spyros S. Magliveras, Ivana Ilic
en Limba Engleză Paperback – 25 ian 2011
This book constitutes the refereed proceedings of the 13th International Conference on Information Security, ISC 2010, held in Boca Raton, FL, USA, in October 2010.The 25 revised full papers and the 11 short papers presented were carefully reviewed and selected from 117 submissions. The papers are organized in topical sections on attacks and analysis; analysis; authentication, PIR and content identification; privacy; malware, crimeware and code injection; intrusion detection; side channels; cryptography; smartphones; biometrics; cryptography, application; buffer overflow; and cryptography, theory.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 33590 lei

Preț vechi: 41986 lei
-20% Nou

Puncte Express: 504

Preț estimativ în valută:
6428 6762$ 5322£

Carte disponibilă

Livrare economică 24 decembrie 24 - 07 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783642181771
ISBN-10: 3642181775
Pagini: 450
Ilustrații: XIV, 446 p. 113 illus., 41 illus. in color.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.7 kg
Ediția:2011
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Textul de pe ultima copertă

This book constitutes the refereed proceedings of the 13th International Conference on Information Security, ISC 2010, held in Boca Raton, FL, USA, in October 2010.
The 25 revised full papers and the 11 short papers presented were carefully reviewed and selected from 117 submissions. The papers are organized in topical sections on attacks and analysis; analysis; authentication, PIR and content identification; privacy; malware, crimeware and code injection; intrusion detection; side channels; cryptography; smartphones; biometrics; cryptography, application; buffer overflow; and cryptography, theory.